Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization
|
|
- Alexander Sparks
- 6 years ago
- Views:
Transcription
1 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS Using a Managed Peer-to-Peer Protocol to Deliver s within an Organization Chih-Chin Liang a, Chia-Hung Wang b, Hsing Luh b and Ping-Yu Hsu a a Department of Management, National Central University,Taoyuan, Taiwan b Department of Mathematical Sciences, National Chengchi University, Taipei, Taiwan Abstract Content delivery for front-line staff is difficult to handle adequately in a large-scaled organization. Existing P2P methods have been utilized for delivering contents between peers passively. However, such P2P approaches have a problem about network congestion. That is, P2P approaches are easy to cause outbound traffic of a peer congested, because of large quantity of unmanaged passive connections for content delivery. This passive method causes a peer potentially retrieves no contents form a congested peer having the needed files because of long waiting time. Existing P2P method has a solution to manage the outbound traffic through limiting the number of connections for retrieving content from other peers. However, such solution is still inefficient. allowed connections are still easy to be exhausted because of requests for retrieving files from too many peers. congestion problem is still existed. Such congested network still stops a peer from retrieving needed contents. refore, the existing P2P approach is inefficient for a large-scaled organization because a congested network is forbidden in such company. This work proposes a hybrid protocol composed with passive and active mechanisms can help a starving peer to have the needed contents. That is, through this proposed protocol, an unmanaged passive connection can change to an active method by a peer having the needed contents to reduce the consumption of its outbound traffic. This work simulates the network behavior of this proposed mechanism. Through such protocol, no starving peers receiving no needed parts can be guaranteed because of the managed network behavior. Hence, utilizing this mechanism to deliver contents could be considered by an organization Keywords: P2P, telecommunication,.content delivery I. INTRODUCTION A. Pages - Printing Area Content distribution between staff members within a large-scaled company is difficult to implement because of the complex intranet environment [1]-[3], which consists of different network segments connected by various bandwidth [4]. However, the environment may cause critical contents being lost or postponed reaching destination during transmission while utilizing improper content delivery approach [5]-[10]. Existing peer-to-peer (P2P) application, such as BitTorrent (BT), is widely utilized to transmit contents between peers but no organizations apply it as the content delivery approach [6], [7]. application is unsuitable for an organization because it consumes large network bandwidth [11]. Basically, P2P is efficient because it divides a file into numerous parts in order to transmit such parts among peers. Each part of a file can be transmitted and shared between peers through a passive retrieving method. But this method occupies the outbound traffic of a peer and then sharing no contents between the peer with congested outbound traffic and other peers. Existing P2P method has a solution to manage the outbound traffic through limiting the connections for retrieving content from other peers. However, such
2 228 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 solution is still inadequate. allowed connections are easy to be exhausted because of requests for retrieving files from too many peers. Such congested network still stops a peer from retrieving needed contents [12]-[19]. In this work, a hybrid protocol named Managed Peer-to-Peer (MP2P), composed with passive and active mechanisms is proposed [20], [21], which can be utilized to transfer contents between peers with no network congestion. That is, through MP2P, a passive connection managed by a retriever peer can change to an active connection managed by a sender to reduce the consumption of the outbound traffic of the sender. This work also models network behavior of MP2P. Through MP2P, no starving peers having no needed parts can be guaranteed because of no network congestion. Hence, utilizing MP2P to deliver contents could be considered by an organization with sparse network resource. rest of this paper is organized as follows. In Section II the related works about content delivery are illustrated. In Section III, the MP2P mechanism is described. In Section IV, the simulation result is presented. In Section V, the experiment results are discussed. Finally, conclusions are drawn in Section VI. II. RELATED WORKS A. Active Content Delivery An active content delivery method indicates a sender actively sends items to receivers. That is a push-based method [6], [7]. To adopt such method to transmit content on the network, the consumption of outbound bandwidth of a sender is managed by itself. However, in such method, a sender manages no packets that have already been sent [6], [7]. Thus, an active content delivery method must be fault-tolerant that ensures a packet is transmitted [20], [21]. To improve the accuracy of delivered contents, two mechanisms are typically employed, namely: adding information to the contents being sent to verify their accuracy and status, and utilizing the signal, and an acknowledgement, to let senders and receivers decide the next action [20]. B. Passive Content Delivery passive content delivery method indicates that the receiver sends requests to a sender for retrieving an item, and then the needed item is retrieved by the receiver actively. That is a pull-based method [6], [7]. To adopt a passive method to transmit content on the network, the outbound bandwidth of a sender is managed by receivers. correctness of the retrieved content is verified by checking the file size after the process of file transmission is completed. receiver retrieves the content again whenever the file size is incorrect [20]. However, the passive content delivery approach has a defect that exhausting the outbound network bandwidth of a sender when numerous retrievers retrieve contents from it currently [6], [7]. C. P2P Content Delivery Method modern P2P method can speed up the transmission of a large file within peers because the file is divided into parts and each part could be transmitted independently. A file is retrieved successfully after all parts of the file are collected and merged. Such P2P content delivery method utilizes the passive approach to transfer contents through the Internet [12]-[19]. However, such P2P method has the original drawback caused by the passive method: the outbound network traffic of a sender is managed by receivers and potentially congested when quantities of receivers retrieve contents from the sender simultaneously [12]-[19]. Above P2P approach focuses on ensuring that one peer can receive a completed content. However, the content delivery within an organization must consume network resource as precisely as possible. Existing solution for limiting the network congestion is simply control the allowed connection number of the file provider. However, such solution is still inadequate. A congested network within limited connection number still stops a peer from retrieving needed contents. Hence, this work adopts an active method to solve such problem because the outbound traffic can be managed by the sender, but previous studies discuss few about changing such passive method to active method [12]-[19].
3 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS III. THE MP2P MECHANISM This work proposes an adjusted P2P protocol named MP2P employing both passive and active methods to deliver contents effectively. In MP2P mechanism, each peer has to share the information includes file name, sender name, file status, retrieving part, completed parts, receiver name, transmission method, file size, and transmission status (Table 1). TABLE 1 SHARED FILE STATUS Shared file name Status owning parts of the shared file of the sender Sender peer providin g files Receiver peer receiving files Retrieving part retrieving part of the shared file Completed parts completed parts of the shared file owned by the receiver Transmission Method file transferring mechanism of MP2P which has following methods: the passive mechanism, and the active mechanism Size file size of each receive d part Transmission Status situation of transferring part currently. status includes: the file is ready for retrieving, prepare for sending file, ready for receiving, and successful transmission design of MP2P is described as follows. MP2P is launched whenever one file needs to be transmitted. For example, Peer A is sender, Peer B is receiver, and I is the file needs to be transmitted. Peer A shares information described in Table I to neighboring peers after Peer A divides the file I into parts. Peer A records peer A as sender name, the owning parts of I as file status, the name of I as file name, passive mechanism as transmission method, and the file is ready for retrieving as transmission status. Because Peer A is the starting node, the owning parts of I of Peer A are completed. After receiving above information from Peer A, each neighboring peer of Peer A records itself as the receiver name, and records a divided part of I as the retrieving part, then passes these modifications back to Peer A. In this case, the passive procedure for transferring I begins after Peer B records it as the receiver name, the part 1 of I as the retrieving part, and passes these modifications back to Peer A. passive procedure is as follows. Peer B retrieves part 1 of I from Peer A. Whenever part 1of I is transferred successfully by Peer B, the retrieving part is changed to part 2 of I and recording part 1 into completed parts by Peer B then passed these modifications to neighboring peers including peer A. retrieving procedure of part 2 of I from Peer A is started by Peer B after above modifications are transferred to Peer A completely. In case Peer A is unavailable to share 1, Peer B will retrieve part 2 of I from other peers having the part. transmission status will change to successful transmission whenever I is transferred completely. In MP2P protocol, the active procedure is used whenever the outbound bandwidth is consumed heavily. That is, too many connections established by receivers to use the outbound traffic. To utilize active procedure, the usage of the outbound bandwidth can be managed by the sender because the manage of file transmission is changed from receivers to the sender active procedure is described as follows. transmission method is changed from passive method to active one, whenever Peer C needs to connect to Peer A for retrieving part 3 of I, but too many connections established by receivers using the outbound bandwidth of Peer A to be available to transfer part 3 of I through passive method. transmission method is changed to active method by Peer A. Peer A is then sending this modification to Peer C. passive procedure of the part 3 of I between Peer A and Peer C stops. Peer C is then waiting for part 3 of I sent by Peer A. Peer A delivers the needed parts to Peer C when the network is available to transfer content. Peer A changes the transmission status to prepare for sending file to Peer C. Peer C sends ready for receiving to Peer A, when Peer C is available to receive the content. Peer A is then sending part 3 of I to Peer C. In addition, in the MP2P mechanism, if Peer A is malfunctioned, one of the neighboring peers of Peer A, excepts Peer C, sends the request part to Peer C actively. Whenever the size of the received part is the same as the file size, Peer C sends successful transmission to Peer A. push-base procedure is finished.
4 230 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 III. SIMULATION RESULTS To understand the difference, this work simulates the bandwidth consumption of a sender adopting MP2P and P2P. MP2P simulation describes as follows. This work uses ProModel as the simulation tool (Fig.1). We assign 5 peers, AAA is the sender, BBB, CCC, DDD and EEE represent the receivers. This work assigns peer AAA has one outbound connection and observes the network consumption of the connection. All peers use the only one connection to transfer packets. peer AAA sends packets to EEE through passive protocol and sends packets to the rest of peers through active one. inter arrival time assumes following exponential distribution, one packet arrives at one time. Obviously, because this simulation assumes one peer has only one connection and time is limited, arrived packets might queue at AAA. A packet deliver to BBB, CCC, DDD, or EEE depend on the packet designated to deliver through active method or passive one. transmission rate is 9 KB/seconds, the distance of each peer is the same. In addition, the P2P simulation is similar as MP2P, but all receivers use passive method to transfer packets. Figure. 1. Simulation Environment Simulating 100 hours, to compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to compare with P2P and MP2P, the average delivered packets could be up 39.6% within a fixed time slot while adopting MP2P. IV. CONCLUSIONS This work proposes a managed peer-to-peer protocol (MP2P) to send packets instead of the passive P2P approach. To eliminate defects of the unmanaged bandwidth consumption caused by P2P method using passive protocol, the MP2P method using both passive and active protocols. Finally, the simulation result shows the MP2P has outstanding performance on packets delivery. To compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to adopting MP2P, the average delivered packets could be up 39.6%.
5 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS REFERENCES [1] M. Agrawal, H.R. Rao, G. L. Sanders, Impact of Mobile Computing Terminals in Police Work, J. Organ. Comput. Electron. Commer, vol.13, pp , [2] W. M. Wang, C. C. Liang, H. Z. Lu, W. S. Chow, K. Y. Chang, Research of Testing Process Case of TOPS-System Delivery Process, TL tech J, vol. 34, no. 1, pp. 7-34, [3] H. Z. Lu, C. C. Liang, C. C. Chuan, W. M. Wang, Discussion of TOPS/Order Software Deployment, news publish and operation mechanism, TL tech J, vol. 35, no.5, pp , [4] C. C. Liang, C. R. Chuan, H. Z. Lu, W. M. Wang, A Software Deploy Model on TOPS/Order System and Its Practice, TL tech J, vol. 35, no.5-1, pp , [5] J. Cao, X. Feng, J. Lu, H. C. B. Chan, S. K. Das, Reliable Message Delivery for Mobile Agents: Push or Pull?, IEEE Trans. Syst., Man, Cybern A, Syst., Humans, vol. 34, no. 5, pp , [6] C. C. Liang, P. Y. Hsu, J. D. Leu, H. Luh, An effective approach for content delivery in an evolving intranet environment- a case study of the largest telecom company in Taiwan, Lect Notes Comput Sci, vol. 3806, pp , [7] C. C. Liang, C. H. Wang, H. Luh, P. Y. Hsu, A Robust Web-based Approach for Broadcasting Downward Messages in a Large-Scaled Company, Lect Notes Comput Sci, vol. 4255, pp , [8] S. Herrería-Alonso, A. Suárez-González, M. Fernández-Veiga, R. F. R. Rubio, C. López-García, Improving aggregate flow control in differentiated services networks, Comput Netw, vol. 44, no.4, pp , [9] N. Saxena, C. M. Pinotti, S. K. Das, A Probabilistic Push-Pull Hybrid Scheduling Algorithm for Asymmetric Wireless Environment, in 2004 Proc. IEEE Conf. GLOBALCOM, pp [10] M. Bhide, P. Deolasee, A. Katkar, A. Panchbudhe, K. Ramamritham, P. Shenoy, Adaptive Push-Pull: Disseminating Dynamic Web Data, IEEE Trans Comput, vol. 51, no.6, pp , [11] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay networks, Comput Netw, vol. 50, no. 6, [12] A. R. Bharambe, Some observations on BitTorrent performance, Perform Eval Review, vol. 33, no. 1, [13] K. Ragab, N. Kaji, Y. Horikoshi, H. Kuriyama, K. Mori, Autonomous decentralized community communication for information dissemination, IEEE Internet Comput, vol , pp , [14] E. Turcan, N. Shahmehri, R. L. Graham, Intelligent software delivery using P2P, in 2002 Proc. IEEE Conf. P2P, pp [15] J. Lan, X. Liu, P. Shenoy, K. Ramamritham, Consistency Maintenance in peer-to-peer sharing network, in 2003 Proc. IEEE Conf. WIAPP, pp [16] A. Datta, M. Hauswirth, K. Aberer, Beyond web of trust : Enabling P2P E-commerce, in 2003 Proc. IEEE Conf. CEC. [17] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay network, Comput Netw, vol. 50, pp , [18] X. Liu, Y. Liu, L. Xiao, Improving query response delivery quality in peer-to-peer systems, IEEE Trans Para Dist Syst, vol.17, no. 11, pp [19] A. Bar-Noy, A. Freund, J. Naor, On-line Load Balancing in a Hierarchical Server Topology, SIAM J. Comput., vol. 31, no. 2, pp , [20] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, X. Zhang, A performance study of BitTorrent-like peer-to-peer systems, IEEE J Select Areas Commun, vol. 25, no. 1, pp , [21] X. Défago, A. Schiper, P. Urbán, Total Order Broadcast and Multicast Algorithms; Taxonomy and Survey, ACM Comput Surv, vol. 36, pp , 2004.
A Method of Identifying the P2P File Sharing
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationpresented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]
presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationThe Improved WCMRP Protocol for Mobile Wireless Sensor Networks
152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,
More informationWeb-based Energy-efficient Cache Invalidation in Wireless Mobile Environment
Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationSpectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks
Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade
More informationCollaborative Multi-Source Scheme for Multimedia Content Distribution
Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx
More informationSECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK
SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationDynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing
More informationQoS-Enabled Video Streaming in Wireless Sensor Networks
QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationTO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM
TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,
More informationAN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishiiand Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan
More informationDISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS
DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless
More informationA Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs
A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationDynamic Broadcast Scheduling in DDBMS
Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationPreliminary Research on Distributed Cluster Monitoring of G/S Model
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationWaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks
WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationDistributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks
Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer
More informationCross-Layer QoS Support in the IEEE Mesh Network
Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering
More informationHigh Efficient Broadcasting Protocols for Mobile ADHOC Network
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 2 (2013), pp. 243-248 Research India Publications http://www.ripublication.com/aeee.htm High Efficient Broadcasting Protocols
More informationCLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS
http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,
More informationUpdate Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems
Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationAvailable online at ScienceDirect. Procedia Computer Science 89 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 162 169 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) A Distributed Minimum
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationEfficient Message Caching Scheme for MANET
Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationAn Approach to Efficient and Reliable design in Hierarchical Mobile IPv6
An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationGROUP MANAGEMENT IN MOBILE ADHOC NETWORKS
American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064
More informationComparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey
Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of
More informationThree-section Random Early Detection (TRED)
Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationA Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks
Volume 119 No. 12 2018, 707-716 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks MajidhaFathima
More informationNovel Cluster Based Routing Protocol in Wireless Sensor Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationPerformance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering
More informationIMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK
IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE 802.15.4 FOR WIRELESS SENSOR NETWORK Kamaljit Singh 1, Dr. Sukhvinder Singh Bamber 2, Aman Kaushik 3 1 M.Tech,CSE Department, Baddi University of Emerging
More information(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)
Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationPerformance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35
Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK
More informationMobile Ad-Hoc Network Data Communication in Large Geographic Areas
Mobile Ad-Hoc Network Data Communication in Large Geographic Areas Leslie D. Fife School of Computing Brigham Young University Hawaii Laie, HI 96762, USA ldfife@cs.byuh.edu Le Gruenwald School of Computer
More informationA Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks
A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationA CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK
Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,
More informationESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS
ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer
More informationPriority based Packet Scheduling Approach for Wireless Sensor Networks
Priority based Packet Scheduling Approach for Wireless Sensor Networks R.Karthikeyan 1, R.Nandha Kumar 2,M.Ramesh 3 PG scholar, Department of ECE, Karpagam University, Coimbatore, India 1 Assistant Professor,
More informationPeer Assisted Content Distribution over Router Assisted Overlay Multicast
Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens
More informationIntegrated Routing and Query Processing in Wireless Sensor Networks
Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered
More informationReversing Ticket Based Probing Routing Protocol for MANET
Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking
More informationDynamic Load-balanced Path Optimization in SDN-based Data Center Networks
Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Yuan-Liang Lan Department of Computer Science National Chiao Tung University Hsinchu, Taiwan kmntree@gmail.com Kuochen Wang and
More informationAN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 5930-5936 AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR
More informationPower Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul
Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK
More informationMinimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks
Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationA ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS
A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More informationData Communication and Parallel Computing on Twisted Hypercubes
Data Communication and Parallel Computing on Twisted Hypercubes E. Abuelrub, Department of Computer Science, Zarqa Private University, Jordan Abstract- Massively parallel distributed-memory architectures
More informationA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING Seyed Mehran Ronaghi 1 and Behzad Akbari 2 1 Department of Electrical and Computer Engineering, Qazvin Islamic Azad University, Qazvin,
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimal Round
More informationLocation-aware In-Network Monitoring in Wireless Sensor Networks
Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,
More informationTDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1
, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationA Super-Peer Selection Strategy for Peer-to-Peer Systems
, pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationAddressing Asymmetric Link in Wireless Mesh Networks
Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,
More informationEfficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks
Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Mrs.K.Indumathi 1, Mrs. M. Santhi 2 M.E II year, Department of CSE, Sri Subramanya College Of Engineering and Technology,
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationDynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks
Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Ping-Chen Lin and Ray-Guang Cheng Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology,
More informationAn Adaptive and Optimal Distributed Clustering for Wireless Sensor
An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationH-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationThe 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.
Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More information