Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization

Size: px
Start display at page:

Download "Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization"

Transcription

1 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS Using a Managed Peer-to-Peer Protocol to Deliver s within an Organization Chih-Chin Liang a, Chia-Hung Wang b, Hsing Luh b and Ping-Yu Hsu a a Department of Management, National Central University,Taoyuan, Taiwan b Department of Mathematical Sciences, National Chengchi University, Taipei, Taiwan Abstract Content delivery for front-line staff is difficult to handle adequately in a large-scaled organization. Existing P2P methods have been utilized for delivering contents between peers passively. However, such P2P approaches have a problem about network congestion. That is, P2P approaches are easy to cause outbound traffic of a peer congested, because of large quantity of unmanaged passive connections for content delivery. This passive method causes a peer potentially retrieves no contents form a congested peer having the needed files because of long waiting time. Existing P2P method has a solution to manage the outbound traffic through limiting the number of connections for retrieving content from other peers. However, such solution is still inefficient. allowed connections are still easy to be exhausted because of requests for retrieving files from too many peers. congestion problem is still existed. Such congested network still stops a peer from retrieving needed contents. refore, the existing P2P approach is inefficient for a large-scaled organization because a congested network is forbidden in such company. This work proposes a hybrid protocol composed with passive and active mechanisms can help a starving peer to have the needed contents. That is, through this proposed protocol, an unmanaged passive connection can change to an active method by a peer having the needed contents to reduce the consumption of its outbound traffic. This work simulates the network behavior of this proposed mechanism. Through such protocol, no starving peers receiving no needed parts can be guaranteed because of the managed network behavior. Hence, utilizing this mechanism to deliver contents could be considered by an organization Keywords: P2P, telecommunication,.content delivery I. INTRODUCTION A. Pages - Printing Area Content distribution between staff members within a large-scaled company is difficult to implement because of the complex intranet environment [1]-[3], which consists of different network segments connected by various bandwidth [4]. However, the environment may cause critical contents being lost or postponed reaching destination during transmission while utilizing improper content delivery approach [5]-[10]. Existing peer-to-peer (P2P) application, such as BitTorrent (BT), is widely utilized to transmit contents between peers but no organizations apply it as the content delivery approach [6], [7]. application is unsuitable for an organization because it consumes large network bandwidth [11]. Basically, P2P is efficient because it divides a file into numerous parts in order to transmit such parts among peers. Each part of a file can be transmitted and shared between peers through a passive retrieving method. But this method occupies the outbound traffic of a peer and then sharing no contents between the peer with congested outbound traffic and other peers. Existing P2P method has a solution to manage the outbound traffic through limiting the connections for retrieving content from other peers. However, such

2 228 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 solution is still inadequate. allowed connections are easy to be exhausted because of requests for retrieving files from too many peers. Such congested network still stops a peer from retrieving needed contents [12]-[19]. In this work, a hybrid protocol named Managed Peer-to-Peer (MP2P), composed with passive and active mechanisms is proposed [20], [21], which can be utilized to transfer contents between peers with no network congestion. That is, through MP2P, a passive connection managed by a retriever peer can change to an active connection managed by a sender to reduce the consumption of the outbound traffic of the sender. This work also models network behavior of MP2P. Through MP2P, no starving peers having no needed parts can be guaranteed because of no network congestion. Hence, utilizing MP2P to deliver contents could be considered by an organization with sparse network resource. rest of this paper is organized as follows. In Section II the related works about content delivery are illustrated. In Section III, the MP2P mechanism is described. In Section IV, the simulation result is presented. In Section V, the experiment results are discussed. Finally, conclusions are drawn in Section VI. II. RELATED WORKS A. Active Content Delivery An active content delivery method indicates a sender actively sends items to receivers. That is a push-based method [6], [7]. To adopt such method to transmit content on the network, the consumption of outbound bandwidth of a sender is managed by itself. However, in such method, a sender manages no packets that have already been sent [6], [7]. Thus, an active content delivery method must be fault-tolerant that ensures a packet is transmitted [20], [21]. To improve the accuracy of delivered contents, two mechanisms are typically employed, namely: adding information to the contents being sent to verify their accuracy and status, and utilizing the signal, and an acknowledgement, to let senders and receivers decide the next action [20]. B. Passive Content Delivery passive content delivery method indicates that the receiver sends requests to a sender for retrieving an item, and then the needed item is retrieved by the receiver actively. That is a pull-based method [6], [7]. To adopt a passive method to transmit content on the network, the outbound bandwidth of a sender is managed by receivers. correctness of the retrieved content is verified by checking the file size after the process of file transmission is completed. receiver retrieves the content again whenever the file size is incorrect [20]. However, the passive content delivery approach has a defect that exhausting the outbound network bandwidth of a sender when numerous retrievers retrieve contents from it currently [6], [7]. C. P2P Content Delivery Method modern P2P method can speed up the transmission of a large file within peers because the file is divided into parts and each part could be transmitted independently. A file is retrieved successfully after all parts of the file are collected and merged. Such P2P content delivery method utilizes the passive approach to transfer contents through the Internet [12]-[19]. However, such P2P method has the original drawback caused by the passive method: the outbound network traffic of a sender is managed by receivers and potentially congested when quantities of receivers retrieve contents from the sender simultaneously [12]-[19]. Above P2P approach focuses on ensuring that one peer can receive a completed content. However, the content delivery within an organization must consume network resource as precisely as possible. Existing solution for limiting the network congestion is simply control the allowed connection number of the file provider. However, such solution is still inadequate. A congested network within limited connection number still stops a peer from retrieving needed contents. Hence, this work adopts an active method to solve such problem because the outbound traffic can be managed by the sender, but previous studies discuss few about changing such passive method to active method [12]-[19].

3 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS III. THE MP2P MECHANISM This work proposes an adjusted P2P protocol named MP2P employing both passive and active methods to deliver contents effectively. In MP2P mechanism, each peer has to share the information includes file name, sender name, file status, retrieving part, completed parts, receiver name, transmission method, file size, and transmission status (Table 1). TABLE 1 SHARED FILE STATUS Shared file name Status owning parts of the shared file of the sender Sender peer providin g files Receiver peer receiving files Retrieving part retrieving part of the shared file Completed parts completed parts of the shared file owned by the receiver Transmission Method file transferring mechanism of MP2P which has following methods: the passive mechanism, and the active mechanism Size file size of each receive d part Transmission Status situation of transferring part currently. status includes: the file is ready for retrieving, prepare for sending file, ready for receiving, and successful transmission design of MP2P is described as follows. MP2P is launched whenever one file needs to be transmitted. For example, Peer A is sender, Peer B is receiver, and I is the file needs to be transmitted. Peer A shares information described in Table I to neighboring peers after Peer A divides the file I into parts. Peer A records peer A as sender name, the owning parts of I as file status, the name of I as file name, passive mechanism as transmission method, and the file is ready for retrieving as transmission status. Because Peer A is the starting node, the owning parts of I of Peer A are completed. After receiving above information from Peer A, each neighboring peer of Peer A records itself as the receiver name, and records a divided part of I as the retrieving part, then passes these modifications back to Peer A. In this case, the passive procedure for transferring I begins after Peer B records it as the receiver name, the part 1 of I as the retrieving part, and passes these modifications back to Peer A. passive procedure is as follows. Peer B retrieves part 1 of I from Peer A. Whenever part 1of I is transferred successfully by Peer B, the retrieving part is changed to part 2 of I and recording part 1 into completed parts by Peer B then passed these modifications to neighboring peers including peer A. retrieving procedure of part 2 of I from Peer A is started by Peer B after above modifications are transferred to Peer A completely. In case Peer A is unavailable to share 1, Peer B will retrieve part 2 of I from other peers having the part. transmission status will change to successful transmission whenever I is transferred completely. In MP2P protocol, the active procedure is used whenever the outbound bandwidth is consumed heavily. That is, too many connections established by receivers to use the outbound traffic. To utilize active procedure, the usage of the outbound bandwidth can be managed by the sender because the manage of file transmission is changed from receivers to the sender active procedure is described as follows. transmission method is changed from passive method to active one, whenever Peer C needs to connect to Peer A for retrieving part 3 of I, but too many connections established by receivers using the outbound bandwidth of Peer A to be available to transfer part 3 of I through passive method. transmission method is changed to active method by Peer A. Peer A is then sending this modification to Peer C. passive procedure of the part 3 of I between Peer A and Peer C stops. Peer C is then waiting for part 3 of I sent by Peer A. Peer A delivers the needed parts to Peer C when the network is available to transfer content. Peer A changes the transmission status to prepare for sending file to Peer C. Peer C sends ready for receiving to Peer A, when Peer C is available to receive the content. Peer A is then sending part 3 of I to Peer C. In addition, in the MP2P mechanism, if Peer A is malfunctioned, one of the neighboring peers of Peer A, excepts Peer C, sends the request part to Peer C actively. Whenever the size of the received part is the same as the file size, Peer C sends successful transmission to Peer A. push-base procedure is finished.

4 230 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 III. SIMULATION RESULTS To understand the difference, this work simulates the bandwidth consumption of a sender adopting MP2P and P2P. MP2P simulation describes as follows. This work uses ProModel as the simulation tool (Fig.1). We assign 5 peers, AAA is the sender, BBB, CCC, DDD and EEE represent the receivers. This work assigns peer AAA has one outbound connection and observes the network consumption of the connection. All peers use the only one connection to transfer packets. peer AAA sends packets to EEE through passive protocol and sends packets to the rest of peers through active one. inter arrival time assumes following exponential distribution, one packet arrives at one time. Obviously, because this simulation assumes one peer has only one connection and time is limited, arrived packets might queue at AAA. A packet deliver to BBB, CCC, DDD, or EEE depend on the packet designated to deliver through active method or passive one. transmission rate is 9 KB/seconds, the distance of each peer is the same. In addition, the P2P simulation is similar as MP2P, but all receivers use passive method to transfer packets. Figure. 1. Simulation Environment Simulating 100 hours, to compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to compare with P2P and MP2P, the average delivered packets could be up 39.6% within a fixed time slot while adopting MP2P. IV. CONCLUSIONS This work proposes a managed peer-to-peer protocol (MP2P) to send packets instead of the passive P2P approach. To eliminate defects of the unmanaged bandwidth consumption caused by P2P method using passive protocol, the MP2P method using both passive and active protocols. Finally, the simulation result shows the MP2P has outstanding performance on packets delivery. To compare with the delivered packets and total issued packets, the result shows the packets can be delivered is 15.2% in MP2P and 5.4% in P2P. In addition, to adopting MP2P, the average delivered packets could be up 39.6%.

5 ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS REFERENCES [1] M. Agrawal, H.R. Rao, G. L. Sanders, Impact of Mobile Computing Terminals in Police Work, J. Organ. Comput. Electron. Commer, vol.13, pp , [2] W. M. Wang, C. C. Liang, H. Z. Lu, W. S. Chow, K. Y. Chang, Research of Testing Process Case of TOPS-System Delivery Process, TL tech J, vol. 34, no. 1, pp. 7-34, [3] H. Z. Lu, C. C. Liang, C. C. Chuan, W. M. Wang, Discussion of TOPS/Order Software Deployment, news publish and operation mechanism, TL tech J, vol. 35, no.5, pp , [4] C. C. Liang, C. R. Chuan, H. Z. Lu, W. M. Wang, A Software Deploy Model on TOPS/Order System and Its Practice, TL tech J, vol. 35, no.5-1, pp , [5] J. Cao, X. Feng, J. Lu, H. C. B. Chan, S. K. Das, Reliable Message Delivery for Mobile Agents: Push or Pull?, IEEE Trans. Syst., Man, Cybern A, Syst., Humans, vol. 34, no. 5, pp , [6] C. C. Liang, P. Y. Hsu, J. D. Leu, H. Luh, An effective approach for content delivery in an evolving intranet environment- a case study of the largest telecom company in Taiwan, Lect Notes Comput Sci, vol. 3806, pp , [7] C. C. Liang, C. H. Wang, H. Luh, P. Y. Hsu, A Robust Web-based Approach for Broadcasting Downward Messages in a Large-Scaled Company, Lect Notes Comput Sci, vol. 4255, pp , [8] S. Herrería-Alonso, A. Suárez-González, M. Fernández-Veiga, R. F. R. Rubio, C. López-García, Improving aggregate flow control in differentiated services networks, Comput Netw, vol. 44, no.4, pp , [9] N. Saxena, C. M. Pinotti, S. K. Das, A Probabilistic Push-Pull Hybrid Scheduling Algorithm for Asymmetric Wireless Environment, in 2004 Proc. IEEE Conf. GLOBALCOM, pp [10] M. Bhide, P. Deolasee, A. Katkar, A. Panchbudhe, K. Ramamritham, P. Shenoy, Adaptive Push-Pull: Disseminating Dynamic Web Data, IEEE Trans Comput, vol. 51, no.6, pp , [11] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay networks, Comput Netw, vol. 50, no. 6, [12] A. R. Bharambe, Some observations on BitTorrent performance, Perform Eval Review, vol. 33, no. 1, [13] K. Ragab, N. Kaji, Y. Horikoshi, H. Kuriyama, K. Mori, Autonomous decentralized community communication for information dissemination, IEEE Internet Comput, vol , pp , [14] E. Turcan, N. Shahmehri, R. L. Graham, Intelligent software delivery using P2P, in 2002 Proc. IEEE Conf. P2P, pp [15] J. Lan, X. Liu, P. Shenoy, K. Ramamritham, Consistency Maintenance in peer-to-peer sharing network, in 2003 Proc. IEEE Conf. WIAPP, pp [16] A. Datta, M. Hauswirth, K. Aberer, Beyond web of trust : Enabling P2P E-commerce, in 2003 Proc. IEEE Conf. CEC. [17] X. Liu, J. Lan, P. Shenoy, K. Ramaritham, Consistency maintenance in dynamic peer-to-peer overlay network, Comput Netw, vol. 50, pp , [18] X. Liu, Y. Liu, L. Xiao, Improving query response delivery quality in peer-to-peer systems, IEEE Trans Para Dist Syst, vol.17, no. 11, pp [19] A. Bar-Noy, A. Freund, J. Naor, On-line Load Balancing in a Hierarchical Server Topology, SIAM J. Comput., vol. 31, no. 2, pp , [20] L. Guo, S. Chen, Z. Xiao, E. Tan, X. Ding, X. Zhang, A performance study of BitTorrent-like peer-to-peer systems, IEEE J Select Areas Commun, vol. 25, no. 1, pp , [21] X. Défago, A. Schiper, P. Urbán, Total Order Broadcast and Multicast Algorithms; Taxonomy and Survey, ACM Comput Surv, vol. 36, pp , 2004.

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM Anburaj. S 1, Kavitha. M 2 1,2 Department of Information Technology, SRM University, Kancheepuram, India. anburaj88@gmail.com,

More information

AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS

AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETWORKS Tomoyuki Ishiiand Atsushi Inoie * Department of Network Engineering, Kanagawa Institute of Technology, Atsugi-city, Japan

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Preliminary Research on Distributed Cluster Monitoring of G/S Model Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

High Efficient Broadcasting Protocols for Mobile ADHOC Network

High Efficient Broadcasting Protocols for Mobile ADHOC Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 2 (2013), pp. 243-248 Research India Publications http://www.ripublication.com/aeee.htm High Efficient Broadcasting Protocols

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 89 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 162 169 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) A Distributed Minimum

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064

More information

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

A Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks

A Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks Volume 119 No. 12 2018, 707-716 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A Survey on Routing Issues and Associated Protocols for Best-effort Delivery in IP Networks MajidhaFathima

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering

More information

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE 802.15.4 FOR WIRELESS SENSOR NETWORK Kamaljit Singh 1, Dr. Sukhvinder Singh Bamber 2, Aman Kaushik 3 1 M.Tech,CSE Department, Baddi University of Emerging

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK

More information

Mobile Ad-Hoc Network Data Communication in Large Geographic Areas

Mobile Ad-Hoc Network Data Communication in Large Geographic Areas Mobile Ad-Hoc Network Data Communication in Large Geographic Areas Leslie D. Fife School of Computing Brigham Young University Hawaii Laie, HI 96762, USA ldfife@cs.byuh.edu Le Gruenwald School of Computer

More information

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks

A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks A Modified DRR-Based Non-real-time Service Scheduling Scheme in Wireless Metropolitan Networks Han-Sheng Chuang 1, Liang-Teh Lee 1 and Chen-Feng Wu 2 1 Department of Computer Science and Engineering, Tatung

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

Priority based Packet Scheduling Approach for Wireless Sensor Networks

Priority based Packet Scheduling Approach for Wireless Sensor Networks Priority based Packet Scheduling Approach for Wireless Sensor Networks R.Karthikeyan 1, R.Nandha Kumar 2,M.Ramesh 3 PG scholar, Department of ECE, Karpagam University, Coimbatore, India 1 Assistant Professor,

More information

Peer Assisted Content Distribution over Router Assisted Overlay Multicast

Peer Assisted Content Distribution over Router Assisted Overlay Multicast Peer Assisted Content Distribution over Router Assisted Overlay Multicast George Xylomenos, Konstantinos Katsaros and Vasileios P. Kemerlis Mobile Multimedia Laboratory & Department of Informatics Athens

More information

Integrated Routing and Query Processing in Wireless Sensor Networks

Integrated Routing and Query Processing in Wireless Sensor Networks Integrated Routing and Query Processing in Wireless Sensor Networks T.Krishnakumar Lecturer, Nandha Engineering College, Erode krishnakumarbtech@gmail.com ABSTRACT Wireless Sensor Networks are considered

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks

Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Dynamic Load-balanced Path Optimization in SDN-based Data Center Networks Yuan-Liang Lan Department of Computer Science National Chiao Tung University Hsinchu, Taiwan kmntree@gmail.com Kuochen Wang and

More information

AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK

AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 5930-5936 AN EFFICIENT MULTILEVEL PRIORITY PACKET SCHEDULING FOR WIRELESS SENSOR

More information

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK

More information

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks Qiaoqin Li 12, Mei Yang 1, Hongyan Wang 1, Yingtao Jiang 1, Jiazhi Zeng 2 1 Department

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

Data Communication and Parallel Computing on Twisted Hypercubes

Data Communication and Parallel Computing on Twisted Hypercubes Data Communication and Parallel Computing on Twisted Hypercubes E. Abuelrub, Department of Computer Science, Zarqa Private University, Jordan Abstract- Massively parallel distributed-memory architectures

More information

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING Seyed Mehran Ronaghi 1 and Behzad Akbari 2 1 Department of Electrical and Computer Engineering, Qazvin Islamic Azad University, Qazvin,

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimal Round

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 , pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

A Super-Peer Selection Strategy for Peer-to-Peer Systems

A Super-Peer Selection Strategy for Peer-to-Peer Systems , pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks

Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Efficient Dynamic Multilevel Priority Task Scheduling For Wireless Sensor Networks Mrs.K.Indumathi 1, Mrs. M. Santhi 2 M.E II year, Department of CSE, Sri Subramanya College Of Engineering and Technology,

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Ping-Chen Lin and Ray-Guang Cheng Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology,

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p. Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information