A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET

Size: px
Start display at page:

Download "A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET"

Transcription

1 A study of Adaptve Replcaton Technque n routng te-constraned essages (VoIP) n MANET SWATI SAXENA Research Scholar AIM & ACT Banasthal Vdyapth Banasthal, (Ra.) Dr. MADHAVI SINHA Asst. Prof. (HOD) Dept. of Coputer Scence & Engneerng BIT Mesra, Japur Extenson, Japur (Ra.) ABSTRACT Iposng the constrant of tely delvery on usual essages s referred as te-constraned essages. The utlty of such essages depends upon the te at whch they arrve at ther destnaton. Due to contenton aong randoly arrvng essages at each node/ln and ult-hops between the source and destnaton that a essage ust travel, t s dffcult to guarantee the tely delvery of such essages. In case of faulty lns or node, t s lely possble for essages to reach at requred destnaton n te. To handle such type of faults, the dea of sendng ultple copes or replcated copes s used. The probablty of successful essage delvery wthn te wll be ncreased through sendng ultple copes through dsont routes, as at least one copy wll be reached wthn te. But ths wll degrade the networ perforance due to congeston and other probles. Therefore, t s requre sendng only optu nuber of copes through dsont routes. Such copes are estated on the bass of networ load and essage deadlne. In ths paper, we present the ethod to estate the optu nuber of copes. The syste s desgned for developng replcaton strategy naed as Adaptve Fault Tolerance Replcaton Technque (AFTRT) for VoIP applcatons used for Moble Ad hoc Networ. The paraeters such as end-to-end latency, node delvery ndex and essage delvery probablty are deterne by the destnaton and send as feedbac to the source. Based on ths nforaton, source replcates the essage. The perforance study s conducted through sulaton usng NS2 sulator. Keywords: Deadlne, Fault Tolerance, Message Delvery Probablty, Node Delvery Index. 1. INTRODUCTION Tely delveres of nter-tas essages are the desred requste n real-te councaton. Usual essages, augented wth a new paraeter deadlne, are referred as te-constraned essages. If such essages arrve at ther destnaton after ther deadlne has expred, they ay cause syste falure. However, earler arrvals of such essages also degrade the syste perforance because ths requres bufferng overhead. To delver such essages tely, any approaches have been explored n the lterature. In ths paper we use the floodng approach n whch sae copes of the essages are transtted along dsont routes. Ths approach s naed as ultple-copy approach [1] or replcaton approach. (The ter ultple-copy and replcaton can be use nterchangeably). Sendng duplcate copy through dsont route wll ncrease the probablty of reachng at least one copy of the essage wthn te at ts destnaton. But t ay leads to congeston and ncreases the traffc load. It ay also possble that essages wth later deadlnes affect the essages wth shorter deadlne. So, t s benefcal to send only requred nuber of copes along dsont routes. Such nuber should be estated based on the current networ load and essage deadlne. Sendng out optal nuber of copes through dsont routes wll ncreases the probablty of reachng essages wthn ther deadlne and networ load wll rean under control. Aong nuerous applcatons of te-constraned essages over real-te councaton, we are usng voce applcatons runnng over the Internet. It s referred as Internet telephony or Voce over Internet Protocol (VoIP). VoIP s defned as the transport of voce as pacets n the IP based networ. The IP networ perfors ISSN : Vol. 3 No. 6 June

2 varous functons such as collect callng, gateways nto the publc voce networs and assocated events [2]. In addton to the antenance of a relable voce councaton n a broadband envronent, the developent of the best cost-beneft relatonshp s ensured by the VoIP networ. Assurance for specfc qualty s provded by the QoS paraeter along wth the supportng provders and users to attan Servce Level Agreeent (SLA). Based on the codec used for the copresson technque, the preferred QoS and the channel capacty ndeed vary n the VoIP networ. In case of channel securty, the encrypton ethod can be changeable whch n turn changes the throughput and the copresson rate [3]. The paper s organzed as follows: In the next secton (secton 2), we gve the overvew of related wors fro the lterature about fault tolerant strateges opted by varous routng protocols (used for te-constraned essages explctly for VoIP data). In secton 3, we explore the proposed algorth. Based on the wor on secton 3, we frae out the proposed Adaptve Fault Tolerant Replcaton Technque (AFTRT) n secton 4. Secton 5 explores the sulaton paraeters used for perforance study of the proposed algorth and a coparatve study s gven. Secton 6 concludes our wor. 1.1 VoIP n MANET A oble ad hoc networ (MANET) s a oble, ulthop wreless networ that does not rely on any preexstng nfrastructure. Such networs are characterzed by dynac topologes due to uncontrolled node oblty, lted and varable shared wrless channel bandwdth and wreless devces controlled by battery power [4]. In [5], QoS requred for Real-te voce conversatons n IP networs s explored and the perforance of VoIP n wreless ad hoc networ s consdered. Unle the conventonal VoIP pleentaton on fxed nodes, VoIP s pleentng n MANET n the current scenaro that guarantee the user about conveyng the relablty of voce. Faults n MANET In order to exchange nforaton, a node requres ultple hops n the MANETs due to restrcted transsson power n the networ. Therefore, routng dscovery and antenance are the aor challenges to consder n MANETs [6]. Due to ssues le unpredctablty of envronent, unrelablty of wreless edu, resourceconstraned nodes and dynac topology, MANETs are susceptble to varous types of faults. These faults can be grouped as follows [7]: Transsson errors Due to hgh transsson contenton and congeston, the MANET systes suffer fro hgh transsson error rate. Therefore, t s portant to provde hgher relablty for broadcastng operaton under dynac MANET syste but t nvolves severe probles. In [8], a sple broadcast algorth s proposed to prove the delvery rato n an envronent that has hgh transsson error rate. Node or ln falures In ad hoc networs, pacet losses occur anly due to ln falures or node falures. Due to such falures, the effect on the networ perforance s based on varous factors. Aong such factors, one of the s the routng protocol. In [9], the behavor of routng protocol s studed n case of path falure and presented an proveent schee. Route breaages One of the portant causes of route falure s the node falure whch ay be because of power shortage. By deternng resdual power n a partcular node, the node falure can be predcted when the resdual power goes lower than threshold value [10]. Congested nodes or lns Congeston ay occur when certan nodes or lns ay over utlze. Ths ay lead to long delay or any pacet losses. In [11], a routng protocol for MANET s suggested that s aware and adaptve about networ congeston. 1.2 Proble defnton and Proposed soluton The proposed strategy s explored n [12] but t was desgned for wred networ and worhole swtchng technque was used. Such concepts are not sutable for current scenaro. The proposed strategy s developed for wreless networ. In [13], the contenton based routng n oble ad hoc networs wth ultple copes s proposed. It s based on spray-select-focus algorth where source sprays a few essage copes nto the networ. Neghbors of that ISSN : Vol. 3 No. 6 June

3 node receve a copy towards the destnaton. The technque of selectng neghbors s not specfed n ths paper. In ost of the prevous wors based on replcaton technque assued that the replcaton nodes (.e. nodes responsble to replcate a essage) are statc. Unle statc nodes, the replcaton nodes should be adaptvely estates the nuber of copes based on the delvery probablty. Our obectve s to desgn a replcaton technque for VoIP data n MANET by estatng the nuber of copes to be replcated. Ths s estated by deternng the optu nuber of replcaton nodes. The proposed technque offers an adaptve fault tolerance ethod for replcaton of VoIP data pacets as the optu nuber of copes and the nubers of nodes responsble for replcaton process are changng accordng to the networ load n hop be hop anner. The proposed strategy s naed here as Adaptve Fault Tolerant Replcaton Technque (AFTRT). A essage wll be replcated at ether source node or at nteredate node. The source node replcates the ultple copes of the pacet and they are destnng to the nteredate nodes. The source antans a forward node counter (FNC) wth ntal value dependng upon the current networ load. Intally, the pacets are replcated and send to -hop neghborhood. Fro the neghbor nodes, the pacets focus to reach the destnaton. On reachng the destnaton node, the average delay taen by the pacet and the nuber of pacets successfully receved are send as feedbac to the source. If the nuber of pacets and the average delay are below soe threshold, then source ncreases the FNC sequentally untl the feedbac goes above the threshold. 2. Related Wors A store-and-forward based routng (e.g. ult-copy relayng) for Interttent Connected MANETs (ICMANs) s proposed n [14]. It replaces tradtonal routng technologes that were desgned for fully connected paths. However, such ult-copy relayng strateges do not adapt to the frequent varatons of the networ condtons as they rely solely on the source to control the relayng process. The proposed approach provdes an effcent way for pacet delvery. An adaptve codng control schee s proposed n [15], to prove the qualty of voce transport over wreless ad hoc networ. The basc dea used here s to adapt the voce codng bt rate to the avalable networ bandwdth so as to axze the voce qualty. The MOS standard s used here for appng between the pacet losses rates to the MOS value to control voce encodng bt rate. A robust and secure fraewor for voce transsson over ultpath MANET s proposed n [16]. The fraewor s robust not only aganst dynacally changng topology but also aganst adverse envronent. A securty analyss of the proposed schee and the perforance evaluaton of fraewor are provded. A fault tolerant ult path protocol to reduce the pacet loss due to route breaage s proposed n [17] whch uses a new route dscovery echans. Nodes deterne ultple dsont routes wth ore battery power and resdual energy, to every actve destnaton. In ths fault-tolerant echans, the receved sgnal strength s easured and based on ths value t can send warnng pacets to the prevous node. The AOMDV protocol s used as a base for the ultpath routng. In [18], a novel bo-nspred protocol naed as Eraoble (Epdeac based Relable and Adaptve Multcast for Moble ad hoc networs) s proposed that as to delver ultcast data relably wth nal networ overhead, even under adverse networ condtons. Wth an epdec-based ultcast ethod, t copes wth dynac and unpredctable topology changes due to oblty. Also the echans used doesn t requre antanng any tree-le or esh-le structure for ultcastng. Equpped wth any other dstngushed features, the protocol s capable to delver data relably n both sparse and dense networs. 3. Proposed Wor In ths secton, we descrbe the topology learnng, estaton of delay, end-to-end latency, Node Delvery Index, Message Delvery probablty. On the bass of these paraeters, an optal nuber of replcated copes wll be forulzed. 3.1 Topology Learnng Usng relable path based topology learnng technque, t s essental to enable the source to deterne the path towards the destnaton. Consderng the networ consstng of several nodes, the source learns the topology n order to deterne the possble effcent route to the sn by the followng technque: Intally the source sends a Topology Learnng request () essage to the nearest neghbors. The essage ncludes the nforaton related to the source d, destnaton d and wll also append the d of the nodes that forward the essage towards the destnaton. Thus as the essage oves towards the destnaton, t ncludes all the nforaton about the nodes nvolved n the transsson. On recepton of the essage at the sn, t responds by sendng a route reply () essage to the source through the reverse path. ISSN : Vol. 3 No. 6 June

4 Based on the nuber of essages receved at the source, the source ncreents or decreents the forward node count (FNC). The source has a threshold value (threshold ) for the nuber of RREP essages and ntally the FNC s set to a value by the source. If nuber of < threshold, then FNC = FNC + 1 If nuber of > threshold, then FNC = FNC 1 (The FNC s the nuber of nodes that wll receve the replcated copes.) Fg. 1 shows the essage transsson fro the source to the sn through the nteredate nodes. Durng the transsson, request transtted across src-d---n-sn, src-a-f-l-sn and src-e-g---sn successfully reaches the sn. But the request transtted across src-b-h and src-c are lost n the networ. As the essage gets forwarded, the d of every node s appended n the essage. b h d n src a f l sn c e g Fg.1: Transsson of essage fro source to sn Fg. 2 shows the essage transsson fro the sn to the source. On recepton of the essage at the sn, t reples bac by sendng the essage to the source through the sae path used by the essage. The sn sends the essage through the path used for correspondng essage by usng the nforaton appended durng the transsson of the essage towards the sn. Out of the 5 essages sent by the source, the total nuber of responses receved s 3. The source on recevng the essage now copares t wth the total nuber of essages receved wth the threshold value set by t. If the threshold value set up by the source s 2 then snce the nuber of receved essage s greater than 2, the FNC s reduced by 1. ISSN : Vol. 3 No. 6 June

5 b h d n src a f l sn c e g Fg.2: Transsson of essage fro sn to source Ths process contnues untl the nuber of receved essages at the source s greater than the threshold value threshold. The a of threshold s to pre-defne the axu nuber of reply receved before a fractonal part of deadlne. It s not possble to wat for as uch as reply those are recevng beyond deadlne. Its value should be set by source based on tas deadlne and essage deadlne. Here, we have used soe fxed value for the sae of splcty. 3.2 Estatng Delay We calculate the delay based on the probablty functon as follows. Intally we consder the delay n transsson to a node through one ln [routng path =1]. Let us consder two hops and n such that there exsts a ln l = (,n). Hence the transsson latency of the essage fro to n s characterzed by the rando varable defned as D and probablty dstrbuton functon (pdf) s defned as the P(D ) such that the probablty that ntroduces a delay of at ost n forwardng the essage to the next hop.e., p ( D ) ( ) = P.. (1) The te nterval between the essages enterng the node t n and acnowledge essage recepton fro the recever t ac s regarded as the transsson latency of a essageδ. But an extra te wll be consued for the recepton of the acnowledge essage and t s depcted by ρ. Hence transsson latency of the essage s gven by δ = t t ρ ac n.. (2) Eq (2) depcts the delay at only one hop for every essage, hence for the calculaton of the delay durng the transsson of the essage through several hops.e., throughout ts path fro source to destnaton. Therefore the total delay n the essage transsson s obtaned by the suaton of the delay nvolved n every hop ISSN : Vol. 3 No. 6 June

6 durng the transsson fro the source to the destnaton. For every hop, a partcular value of ρ s obtaned, so overall an ncreasng sequence of value ρ, ρ 0 1,..., ρ s generated. Each of these values represents a saple of the rando varable D for the gven hop. If the dstrbuton of D was nown, fndng out the expected value and ts probablty or the probablty of any gven delay would be reduced to trval. But f the value of D s not nown then the saple ean and saple varance whch characterzes the dstrbuton should be used for calculaton. 3.3 Estatng End-to-end latency The end-to-end latency of a path rp (say) s also a rando varable, D rp, fored by the coposton of the delays of ts nteredate lns: = Drp D rp p Drp (, ) (, ) ( τ ) P( τ ) = D rp (3) (4) Eq (4) ndcates the probablty for end to end latency where τ represents the at ost value of end-to-end latency ntroduced n forwardng the essage. 3.4 Estatng Node Delvery Index () The data transsson s based on the paraeter Node Delvery Index (). It s the probablty that a node correctly delvers data to the destnaton. s useful n selectng routes based on ts value. Let denotes the delvery ndex of a node N. The value of ntally set to zero and updated whenever there s a essage transsson or ter expraton. Whenever a node N transts a data pacet to another node N, should be updated such that K = ( 1 ρ ) + λ, (5) Where s the of node N and 0 < λ < 1 s a constant eployed to eep partal eory of hstorc status. Clearly, s always between 0 and 1. So f N s the destnaton, = 1, snce the essage s already delvered to the destnaton successfully, otherwse, < 1. Also each node antans a ter t 1. If there s no essage transsson wthn an nterval of, then the ter t 1 expres. The ter expraton ndcates that the node couldn t transt any data durng. So should be updated as = ( 1 λ) (6) So fro (1) and (2), we arrve that, the node delvery ndex ( ) of node N s updated as = ( 1 λ ) + λ, f there s a data Transsson = ( 1 λ), f there s a Teout.. (7) 3.5 Estatng Message Delvery Probablty (MDP) The Message Delvery Probablty (MDP) s used to represent the aount of redundancy and to ndcate the portance of a gven essage. The MDP s defned to be the probablty that at least one copy of the essage ISSN : Vol. 3 No. 6 June

7 s delvered to the destnaton wthn te n the networ. We assue that each essage copy carres a feld to denote the MDP. When a essage s generated, ts MDP s ntalzed to be zero. Let us consder a node N whch s transttng copes of a data essage. Let MDP denote the MDP of essage n the ready queue of essages n node N. The essage transtted to a node N r s assocated wth a MDP of = 1 and the MDP of the essage at node N s updated as MDP Nr = 1 (1 MDP ) (1- ) (1 ) (8) 1 (1 MDP ) (1- MDP = 1 MDP MDP =.. (9) The above process repeats at each te when essage s transtted to another node. In general, the ore tes a essage has been forwarded, the ore copes of the essage are created, thus ncreasng ts delvery ndex. As a result, t s assocated wth a larger MDP. Further, MDP s used to estate the nuber of copes to replcate. 4. Algorth of Proposed Adaptve Fault Tolerance Replcaton Technque (AFTRT) The algorth for our fault tolerant replcaton technque n the MANET consders the latency nvolved and the data delvery rato n the networ. The steps nvolved n the algorth are as follows: Step 1: The source (S) n need of servce sends a Topology Learnng Request () to all ts nearest neghbors (N). Ths essage s then forwarded by the neghbor node to ts neghbor and t contnues tll the destnaton (S ) s reached. ) S N 1.. N n S Step 2: In response to the request, the destnaton sends the Topology Learnng Reply () essage through the path used for correspondng essage by usng the nforaton appended durng the transsson of the essage towards the sn. S N 1.. N n S Step 3: Based on the nuber of the essages receved, the source ncreents or decreents the forward node count (FNC). The source antans a threshold value (threshold ) for the nuber of essages and ntally the FNC s set to a value by the source. If nuber of < threshold, FNC = FNC + 1 else FNC = FNC 1 p Step 4: For any ln l = (,n), probablty ( ) essage to the next hop s calculated as p ( ) = P ( D ) that ntroduces a delay of at ost n forwardng the where D s the rando varable whch characterzes the transsson latency of the essage fro to n ISSN : Vol. 3 No. 6 June

8 Step 5: Transsson latency of the essage,δ s gven by δ = t t ρ ac n where t n s the te at whch the essage enters the node t ac s the te at whch the acnowledge essage s receved fro the recever ρ s the extra te consued for the recepton of the acnowledge essage Step 6: The end to end latency, Drp = of the path rp (say) s represented as Drp D(, ) (, ) rp Step 7: The probablty of end to end latency s represented as p D rp ( τ ) P( τ ) = D rp Step 8: The Node Delvery Index ( ) represents the probablty that a node correctly delvers data to the destnaton. If there s a data transsson = ( 1 λ ) + λ else = ( 1 λ) Step 9: The MDP represents the probablty that at least one copy of the essage s delvered to the destnaton by other nodes n the networ. The essage delvery probablty (MDP) of essage n the queue of node N, whch s transttng copes to node Nr s gven by MDP Nr = 1 (1 MDP ) = 1 (1 and the MDP of the essage at node N s updated as MDP = ) (1-1 (1 MDP ) (1- MDP = 1 MDP Step 10: The destnaton deternes the overall Node Delvery Index ( ) along the path by addng the values at every node. = n = 1 11] The calculated end to end latency, MDP and the values of the path are transtted as a feedbac to the source by the destnaton. Based on ths feedbac, FNC value s ncreented or decreented by the source accordngly. The source antans a threshold for the latency value threshold LATENCY and threshold for the as threshold If Drp > threshold LATENCY and Else FNC = FNC +f FNC = FNC f ) < threshold Where f s the scale factor used to ncreent or decreent. ) ISSN : Vol. 3 No. 6 June

9 Then the source replcates the pacets accordng to the value of MDP and transts to FNC nuber of nodes. Nuber of replcated copes = MDP θ Where θ s the nuber of edate neghbors of node N. Thus, the algorth consders the latency and the node delvery ndex value to replcate the pacet n order to effcently enable data transsson through relable paths. 5. Sulaton In ths secton, we conduct the sulaton-based perforance evaluaton of the proposed AFTRT schee. 5.1 Defnng paraeters for sulaton odel The perforance of AFTRT schee s evaluated through NS2 [19], networ sulator. The channel capacty of oble hosts s set fxed as 2 Mbps. For wreless LAN, the dstrbuted coordnaton functon (DCF) of IEEE s used here as MAC layer protocol. Moble nodes are assued to ove n a regon for 100 seconds sulaton te. We perfored the analyss by varyng the networ sze as 25, 50, 75 and 100 nodes and the pause te for the oble node s assued to be 10 seconds. Nodes are randoly dstrbuted n squared area. For the sae of splcty, the speed of the oble node s set fxed as 5 /s. All the nodes are assued to have the sae transsson range of 250 eters. Each and every node ay behave le a source or an nteredate or a recevng node. The data traffc used here for sulaton s VoIP. The VoIP Codec used s GSM.AMR, VoIP odel used s one-to-one, VoIP Encoder used s Applcaton/VoIPEncoder and VoIP Decoder used s Applcaton/VoIPDecoderOptal. The pacet sze s consdered as 512 b and rate of transsson s taen as 250 b whch can changes to 500 b for another run of experent. The nuber of VoIP fraes per pacet used s 2 and nuber of flows consdered are 5. Paraeters defned n algorth are ntalzed as: λ=0.2, = 1, = Perforance etrcs used for sulaton The perforance of the AFTRT schee s studed regardng ts ablty to adapt the networ condtons and copared wth the Adaptve Mult-Copy Routng (AMR) [18] protocol. To show that the proposed wor s relable and ore pacets delvered wthn te, t s requred to choose soe paraeters. We use four etrcs as overhead, average end-to-end delay, Pacet delvery rato and drop. Overhead ay be defned as the total nuber of routng pacets noralzed by the total nuber of receved pacets. The average end-to-end delay s averaged over all survvng data pacets fro source to the destnatons. The pacet delvery rato s the rato of the nuber of pacets receved successfully and the total nuber of pacets sent. Drop s defned as the nuber of pacets drop or not receved wthn te. We perfor the analyss n two segents.e. these etrcs are studed for two protocols on the bass of varyng the nuber of nodes and on the bass of changng the rates. 5.3 Results A. Based on varyng the nuber of nodes Frst, we ll study the perforance of etrcs on varyng the nuber nodes. The dea behnd varyng the nuber of nodes s to study the perforance when networ sze ncreases gradually (not nfntely). Fg. 3 represents the pacet delvery rato for the two protocols. It s clear that AFTRT acheves good delvery rato as copared to AMR. Fg. 3: Nodes vs. Delvery rato ISSN : Vol. 3 No. 6 June

10 Fg. 4: Nodes vs. Delay Fg. 4 shows that average end-to-end delay of the proposed AFTRT protocol s less than copared to the AMR protocol. Fg. 5: Nodes vs. Drop Fg. 5 shows the result of drop etrc, whch shows that AFTRT schee has lower drop rate than that of AMR schee. Fg. 6: Nodes vs. overhead Fg. 6 ensures us that the overhead s less for AFTRT than that of AMR. B. Based on varyng the Rate Now, n the second experent we study the behavor of etrcs when rate s vared as 250, 300, 350, 400, 450 and 500. Fg. 7 shows the delvery rato for the two protocols under varyng the rates. It s clear that AFTRT acheves good delvery rato as copared to AMR protocol agan. ISSN : Vol. 3 No. 6 June

11 Fg. 7: Rate vs. Delvery rato Fg. 8: Rate vs. Delay Fro fg. 8, we can observe that the average end-to-end delay of the proposed AFTRT protocol s less copared to the AMR protocol. Fg. 9: Rate vs. Drop Fg. 9 represents the result of pacet drop. Agan AFTRT schee perfor superor to AMR schee regardng drop etrc. ISSN : Vol. 3 No. 6 June

12 Fg. 10: Rate vs. overhead Fro fg. 10, we can ensure that the overhead s less for AFTRT as copared to AMR. 6. Concluson Tely delvery of te-constraned essages s the foreost requreent for real-te councaton applcatons. To ae routng as fault tolerant, we proposed a ultple-copy or replcaton strategy that s adaptve. In ths paper, we proposed Adaptve Fault Tolerance Replcaton Technque (AFTRT) to replcate the data pacets wth fault tolerance. Adaptve n the sense that t adapts current networ condtons to estate the nuber of replcate copes. Intally, the source n need of servce perfors topology leanng by ssung the topology learnng request (). After the recepton of the topology learnng reply () fro the destnaton, the source calculates the delay and node delvery ndex (). One the for a partcular par of ln s deterned, and then overall s calculated fro source to destnaton. The source antans the threshold for the latency and values. On estatng the latency and the overall value, the source copares t wth the threshold value and then the FNC value s ncreented or decreented accordngly. Ths process s contnued untl the threshold value s reached. The source also estates the essage delvery probablty (MDP). Then t replcates the pacets accordng to the value of MDP and transts to FNC nuber of nodes. 7. References [1] K.G. Shn, C. M. Krshna, Real-te Systes, Tata McGraw Hll Publcatons [2] Eduardo B. Fernandez, Juan C. Pelaez and Mara M. Larrondo-Petre, Securty Patterns for Voce over IP Networs, Vol 2, No.2, August 2007 [3] Edward Paul Gullen, Dego Alandro Chacon, VoIP Networs Perforance Analyss wth Encrypton Systes, World Acadey of Scence, Engneerng and Technology [4] Mahesh K. Mshra, Sar R. Das, Ad hoc on-deand ultpath dstance vector routng, Wreless Councatons and Moble Coputng, 2006 pp , publshed onlne n Wley InterScence. [5] Hu Yao Zhang, Mare E. Balows, Garry A. Ence and John Hoer, An Extended AODV Protocol for VoIP Applcaton n Moble Ad Hoc Networ, Transactons on Electrcal, Engneerng, Electroncs and Councatons ECTI, vol 7, No. 2, August [6] Fuan Qn and Youyuan Lu, Multpath Based QoS Routng n MANET, Journal of Networs, vol. 4, no. 8, October [7] Stephen Mueller, Rose P. Tsang, Dpa Ghosal, Multpath Routng n Moble Ad hoc Networs: Issues and Challenges, Lecture Notes n Coputer Scence, vol. 2965, Aprl 2004, pages: [8] R. Balarshna and U. Raeswara Rao, G. A. Raachandra, Relablty n MANET s Usng Enhanced Double Coverage Broadcastng (EDCB), Internatonal Journal of Advanced Networng and Applcatons, vol 01, Issue 03, pg: , [9] X. Hou and D. Tpper, Ipact of Falures on Routng n Moble Ad Hoc Networs Usng DSR, Proceedngs of Councaton Networs and Dstrbuted Systes Modelng and Sulaton Conference, January 2003, Orlando, FL. [10] M. A. Razzaque, Son Dobson and Paddy Nxon, Cross layer self routng: a self-anaged routng approach for MANETs, In proceedngs of the 4 th IEEE Internatonal Conference on Wreless and Moble Coputng, Networng and Councatons. IEEE Press. pp , [11] Duc A. Tran, Harsh Raghavendra, Routng wth Congeston Awareness and Adaptvty n Moble Ad hoc Networs, Journal of IEEE Transactons on Parallel and Dstrbuted Systes archve, vol 18, Issue 7 July [12] Swat Saxena, An Approach to Fault-tolerant Routng n te-constraned essages (usng ultple-copy), Natonal Conference on Advanceents ninforaton & Councaton Technology (NCAICT ), organzed by Coputer Socety of Inda, Allahabad Chapter, March [13] Ms. E. Jenefa Jeba Joth, Dr. V. Kavtha and Ms. T. Kavtha, Contenton Based Routng n Moble Ad Hoc Networs wth Multple Copes, Internatonal Journal of Engneerng and Technology vol.2(2), pp.93-96, 2010 [14] Zhoqun L, Lngfen Sun, Eanuel C. Ifeachor, Adaptve Mult-Copy Routng for Interttently Connected Moble Ad Hoc Networs, In Proceedngs of GLOBECOM [15] Hongq Zhang, Jyng Zhao and Olver Yang, Adaptve Rate Control for VoIP n Wreless Ad Hoc Networs, In Proceedngs of GLOBECOM ISSN : Vol. 3 No. 6 June

13 [16] Bnod Vadya, Meso K. Deno and Joel J.P.C. Rodrgues, Secure Fraewor for Voce Transsson Over Multpath Wreless Ad-Hoc Networ, Proceedngs of the 28 th IEEE conference on Global telecouncatons (GLOBECOM), pp , [17] G. Rauar, K. Durasay, A Fault Tolerant Multpath Routng Protocol to Reduce Route Falures n Moble Ad Hoc Networs, European Journal of Scentfc Research, Vol.50, no. 3, pp , [18] Öznur Özasap, Zülüf Genç, Ere Atsan, Epdec-based relable and adaptve ultcast for oble ad hoc networs, Journal of Coputer Networs 53(9): pp (2009). [19] Networ Sulator, AUTHOR S PROFILE: Swat Saxena Research Scholar AIM & ACT, Banasthal Vdyapth, Banasthal, (Ra.) Dr. Madhav Snha She receved her Ph.D. degree fro Banasthal Vdyapth, Banathal (Ra.) and currently worng as Assocate Professor and Head of Departent (Coputer Scence & Engneerng) at Brla Insttute of Technology, Japur (Ra.). She has 25 years of teachng experence and publshed any Natonal and Internatonal publcatons. Her research nterests are Artfcal Intellgence, soft and language coputng. ISSN : Vol. 3 No. 6 June

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks

More information

1 Calculation and Analysis of Buffer

1 Calculation and Analysis of Buffer Sep. 5 Journal of Electronc Scence and Technology of Chna Vol.3 No.3 ` Calculaton and Analyss of Destnaton Buffer for ulteda Servce n ole Ad Hoc Network ZHOU Zhong, AO Yu-ng, JIANG Zh-qong. School of Councaton

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs ALM-FastReplca: Optzng the Relable Dstrbuton of Large Fles wthn CDNs Ludla Cherkasova Internet Systes and Storage Laboratory HP Laboratores Palo Alto HPL-005-64 Aprl 4, 005* E-al: cherkasova@hpl.hp.co

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Secure Communication over Heterogeneous Networks with Clustered Mobile Ad hoc Extensions

Secure Communication over Heterogeneous Networks with Clustered Mobile Ad hoc Extensions Secure Councaton over Heterogeneous Networs wth Clustered Moble Ad hoc Extensons Dtros Vogatzs, Spyrdon Vasslaras and Gregory S. Yovanof Athens Inforaton Technology e-al: {dvog, svas, gyov}@at.edu.gr Abstract

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2

Light Weight Distributed QoS Adapter in Large-Scale Ad hoc Networks. Seyed Hossein Hosseini Nazhad Ghazani 1, R.M.Alguliev 2 Lght Weght Dstruted QoS Adapter n Large-Scale Ad hoc Networs Seyed Hossen Hossen Nazhad Ghazan, R.M.Algulev 2 Ph.D. Canddate, Insttute of Inforaton Technology of ANAS, Bau, Azerajan 2 Doctor of Techncal

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, 373-1 Kusung Dong, Taejon, Korea Abstract Overlay ultcast

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Tracing Anonymous Mobile Attackers in Wireless Network

Tracing Anonymous Mobile Attackers in Wireless Network Internatonal Journal of Dgtal Content Technology and ts Applcatons Volue 4, uber 4, July 2010 Tracng Anonyous Moble Attacers n Wreless etwor Mng Hour Yang *1, Shuhpyng Sheh *2 *1 Departent of Inforaton

More information

Monte Carlo inference

Monte Carlo inference CS 3750 achne Learnng Lecture 0 onte Carlo nerence los Hauskrecht los@cs.ptt.edu 539 Sennott Square Iportance Saplng an approach or estatng the epectaton o a uncton relatve to soe dstrbuton target dstrbuton

More information

A Cluster Tree Method For Text Categorization

A Cluster Tree Method For Text Categorization Avalable onlne at www.scencedrect.co Proceda Engneerng 5 (20) 3785 3790 Advanced n Control Engneerngand Inforaton Scence A Cluster Tree Meod For Text Categorzaton Zhaoca Sun *, Yunng Ye, Weru Deng, Zhexue

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Human Face Recognition Using Radial Basis Function Neural Network

Human Face Recognition Using Radial Basis Function Neural Network Huan Face Recognton Usng Radal Bass Functon eural etwor Javad Haddadna Ph.D Student Departent of Electrcal and Engneerng Arabr Unversty of Technology Hafez Avenue, Tehran, Iran, 594 E-al: H743970@cc.au.ac.r

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS

A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS A STUDY OF THE SCALABILITY AND PERFORMANCE OF MULTI-LEVEL HIERARCHY FOR SCALABLE MOBILITY MANAGEMENT IN WIRELESS IPv6 NETWORKS E.N. Onwua and Z. Nu State Key Lab on Mcrowave and Dgtal Communcaton Department

More information

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory

Optimization of Local Routing for Connected Nodes with Single Output Ports - Part I: Theory U J.T. (: 33- (pr. 0 Optmzaton of Local Routng for Connected odes wth Sngle Output Ports - Part I: Theory Dobr tanassov Batovsk Faculty of Scence and Technology ssumpton Unversty Bangkok Thaland E-mal:

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks

Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks Effcent QoS Provsonng at the MAC Layer n Heterogeneous Wreless Sensor Networks M.Soul a,, A.Bouabdallah a, A.E.Kamal b a UMR CNRS 7253 HeuDaSyC, Unversté de Technologe de Compègne, Compègne Cedex F-625,

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

The Utility based AHP& TOPSIS Methods for Smooth Handover In Wireless Networks

The Utility based AHP& TOPSIS Methods for Smooth Handover In Wireless Networks Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volue: 04 Issue: 07 July -2017 www.ret.net p-issn: 2395-0072 The Utlty based AHP& TOPSIS Methods for Sooth Handoer In

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

Large Margin Nearest Neighbor Classifiers

Large Margin Nearest Neighbor Classifiers Large Margn earest eghbor Classfers Sergo Bereo and Joan Cabestany Departent of Electronc Engneerng, Unverstat Poltècnca de Catalunya (UPC, Gran Captà s/n, C4 buldng, 08034 Barcelona, Span e-al: sbereo@eel.upc.es

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations

Access Delay Analysis of IEEE DCF in the Presence of Hidden Stations Access Delay Analyss of IEEE 82. DCF n the Presence of Hdden tatons Fu-Y Hung and Ivan Marsc CAIP Center, ECE Deartent, Rutgers Unversty Pscataway, NJ 8854-888 {fuyhung, arsc}@ca.rutgers.edu Abstract In

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients Low tranng strength hgh capacty classfers for accurate ensebles usng Walsh Coeffcents Terry Wndeatt, Cere Zor Unv Surrey, Guldford, Surrey, Gu2 7H t.wndeatt surrey.ac.uk Abstract. If a bnary decson s taken

More information

Multi-Constraint Multi-Processor Resource Allocation

Multi-Constraint Multi-Processor Resource Allocation Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks

Efficient Backoff Algorithm in Wireless Multihop Ad Hoc Networks 1 Chen-Mn Wu, 2 Hu-Ka Su, 3 Wang-Has Yang *1,Correspondng Author Nanhua Unversty, cmwu@mal.nhu.edu.tw 2 Natonal Formosa Unversty, hksu@nfu.edu.tw 3 Hsupng Insttute of Technology, yangwh@mal.ht.edu.tw do:10.4156/jact.vol3.

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Voice capacity of IEEE b WLANs

Voice capacity of IEEE b WLANs Voce capacty of IEEE 82.b WLANs D. S. Amanatads, V. Vtsas, A. Mantsars 2, I. Mavrds 2, P. Chatzmsos and A.C. Boucouvalas 3 Abstract-There s a tremendous growth n the deployment and usage of Wreless Local

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon Unversty College Abstract: The subject of the paper s the features of netork archtecture

More information

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks

Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks Moblty Based Routng Protocol wth MAC Collson Improvement n Vehcular Ad Hoc Networks Zhhao Dng, Pny Ren, Qnghe Du Shaanx Smart Networks and Ubqutous Access Rearch Center School of Electronc and Informaton

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Theory of Non-Deterministic Networks

A Theory of Non-Deterministic Networks A Theory of Non-Deternstc Networs Alan Mshcheno and Robert K rayton Departent of EECS, Unversty of Calforna at ereley {alan, brayton}@eecsbereleyedu Abstract oth non-deterns and ult-level networs copactly

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Nighttime Motion Vehicle Detection Based on MILBoost

Nighttime Motion Vehicle Detection Based on MILBoost Sensors & Transducers 204 by IFSA Publshng, S L http://wwwsensorsportalco Nghtte Moton Vehcle Detecton Based on MILBoost Zhu Shao-Png,, 2 Fan Xao-Png Departent of Inforaton Manageent, Hunan Unversty of

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMC.25.2388476, IEEE Transactons

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement *

IEEE Distributed Coordination Function(DCF): Analysis and Enhancement * IEEE 802. Dstrbuted Coordnaton Functon(DCF): Analyss and Enhanceent * Hatao Wu, Shduan Cheng, Yong Peng, Keng Long, Jan Ma 2 Natonal Key Lab of Swtchng Technology and Telecouncaton Networks, P.O.Box 206,

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Adaptive Network Resource Management in IEEE Wireless Random Access MAC

Adaptive Network Resource Management in IEEE Wireless Random Access MAC Adaptve Network Resource Management n IEEE 802.11 Wreless Random Access MAC Hao Wang, Changcheng Huang, James Yan Department of Systems and Computer Engneerng Carleton Unversty, Ottawa, ON, Canada Abstract

More information

Journal of Engineering Science and Technology Review 10 (5) (2017) Research Article

Journal of Engineering Science and Technology Review 10 (5) (2017) Research Article Jestr Journal of Engneerng Scence and Technology Revew 0 (5) (07) 4-49 Research Artcle Study on Fault Tolerance Method n Cloud Platfor based on Worload Consoldaton Model of Vrtual Machne Zhxn L,,*, Le

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS 1 HENDRA RAHMAWAN, 2 KUSPRIYANTO, 3 YUDI SATRIA GONDOKARYONO School of Electrcal Engneerng and Inforatcs, Insttut Teknolog Bandung,

More information

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs Communcatons and Network, 2013, 5, 1-8 http://dx.do.org/10.4236/cn.2013.51001 Publshed Onlne February 2013 (http://www.scrp.org/journal/cn) QoS Bandwdth Estmaton Scheme for Delay Senstve Applcatons n MANETs

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information