INVESTIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL STATION FOR RANDOM FAILURE
|
|
- Morgan Chambers
- 5 years ago
- Views:
Transcription
1 International Journal of Computer cience and Communication Vol. 2, No. 2, July-December 2011, pp INVETIGATION ON THROUGHPUT OF A MULTI HOP NETWORK WITH IDENTICAL TATION FOR RANDOM FAILURE Manish hrivastava 1 and Ravi ahu 2 1,2 LNCT, Bhopal maneesh.shreevastava@yahoo.com, ravisahucs2@gmail.com ABTRACT In Multi-hop networks stations may pump more traffic into the networks that can be supported, resulting in high packet-loss rate, re-routing instability unfairness and random failures problems due to this effect system efficiency. In this paper formula s has been used for numerical simulation from [2], by using this formula s we obtain throughput of a multi hop network with identical station against random failure and perform numerical simulation and identify bottlenecks for a multi hop network composed of a series of workstations separated by buffers, the stations which is subject to random failures. The extended formula is used to compute throughput and analyzes the flow of jobs in the network. The simple analytical result that shows the mathematical relationship between the key system parameters, These include the ratio λ/µ that is used to determines a station s efficiency and the ratio Bµ/ that provides a measure of buffer effectiveness during failures of the multi hop network. The comparisons show when number of station increases the efficiency of the network rapidly drop against low frequent failure and slightly drop against high infrequent failure. The results also show that increasing the buffer size provides a much bigger improvement in throughput for short frequent failures than for long infrequent failures. Keywords: Wireless Networks, Ad Hoc Networks, Multi-hop Network, Random Failure, Low Frequent Failure, High in Frequent Failure. 1. INTRODUCTION An important measure of performance for a multi hop network is the system throughput. Various analytical models have been developed to analyze throughput and identify bottlenecks for a multi hop network composed of a series of workstations separated by buffers the stations which are subject to random failures. The throughput of a network depends on each station s speed (processing rate) and reliability, the sizes of the buffers and the number of stations. In this paper formula s has been used for numerical simulation from [2], by using this formula s we obtain a throughput and then perform simulation. The basic throughput formula given by Alden s model [1] this model considers two workstations and provides a building block for design a model for multi workstation. Alden s model is developed for the general case in which stations can have different speeds and reliabilities, and buffers can have different sizes. ince the model yields analytical equation for throughput performances, it can be used to compute throughput for two such workstation very efficiently and the use of this model to derive a throughput formula for multi hop network with identical station against random failure. The extended formula is used to compute throughput and analyzes the flow of jobs in the network. In this paper formula s has been used to compute throughput for a special case of a multi hop network with identical stations and buffers of equal sizes which is subject to random failure from the general equations of the model. The paper utilizes simplifications for the special case in which simple analytical result that shows the mathematical relationship between the key system parameters. These include the ratio λ/µ that determines a station s efficiency and the ratio Bµ/ that provides a measure of buffer effectiveness during failures of the multi hop network. 2. RELATED WORK Alden s model developed by [1] [2] it is a network consisting of two stations in series, separated by a buffer. Jobs flow to be processed at each station. The two stations are each subject to failures, which affect the throughput. Each station is characterized by its fixed speed (processing rate) and reliability parameters (failure rate and repair rate). depicts the two-station line. The buffer holds jobs processed at the first station and waiting to be processed at the second station. If the buffer is full, the first station is blocked and cannot release a job or process new jobs. If the buffer is empty, the second station is starved and has no new jobs to process. Alden s model captures the impact of blocking and starving on the number of jobs in the buffer, and uses results on the buffer content to obtain the line s throughput. The equations are developed in the model for a two-station line in general and for a line where the two stations have equal speeds. In his work, the parameters for the general
2 560 International Journal of Computer cience and Communication (IJCC) two-station model are first defined, and the assumptions are stated. The basic equations developed in the model for stations with equal speeds are then presented. These equations are used to derive a formula for throughput in the special case of identical stations (i.e., stations with equal speeds, and also equal failure rates and repair rates). In this section, J. J. Garcia-Luna-Aceves & Yu Wang [3] presents the work on throughput and fairness of collision avoidance protocols in ad hoc networks. In the first part of his work, he use a simple model to derive the saturation throughput of MAC protocols based on an RT-CT-data-ACK handshake in multi-hop networks. The results show that these protocols outperform CMA protocols, even when the overhead of RT/CT exchange is rather high, thus showing the importance of corrects collision avoidance in random access protocols. More importantly, it is shown that the overall performance of the sender initiated collision avoidance scheme degrades rather rapidly when the number of competing nodes allowed within region increases, in contrast to the case of fully-connected networks and networks with limited hidden terminals reported in the literature, where throughput remains almost the same for a large number of nodes. The significance of the analysis is that the scalability problem of contention-based collision-avoidance MAC protocols looms much earlier than people might expect. the performance gap is smaller as perfect collision avoidance protocols also begins to suffer from exceedingly long waiting time. In the second part of his work, he proposes a framework to address the fairness problem in ad hoc networks systematically. The framework includes four key components: Exchange of flow contention information, adaptive and stable back off algorithm, hybrid collision avoidance handshake, and special processing for two-way flows. He proposed some specific algorithms to realize the framework and the resulting scheme, called topology aware fair access (TAFA), was evaluated through computer simulations against the IEEE MAC protocol and a hybrid channel scheme proposed in his literature. In this section Ping Chung Ng [4] presents his work on to identify the maximum throughput that can be sustained in an multi-hop network. His contributions are three-folds: he has shown that uncontrolled, greedy sources can cause unacceptably high packet-loss rate and large throughput oscillations. Judicious offered load control at the sources, however, can eliminate these problems effectively without modification of the multi-access protocols. He has established an analytical framework for the study of the effects of hidden nodes and carrier-sensing operation. This analysis allows one to determine whether the system throughput is hidden-node limited or spatial-reuse limited. In particular, he has shown that the maximum sustainable throughput is limited by two factors: (i) the vulnerable periods which depend on the numbers of hidden nodes and the fraction of airtime in the time horizon when hidden-node collisions may occurs; (ii) the number of nodes within a carrier-sensing region and the total airtime used up by them. 3. PERFORMANCE PROBLEM IN MULTI HOP NETWORK In a multi-hop network, sources may inject more traffic into the network that can be supported. This may result following problems: 1) High packet loss rate due to selective packet dropping Attack, 2) Re-routing instability, 3) Random failure, 4) hort frequent failure, 5) High infrequent failure. 4. FORMULA FOR NUMERICAL IMULATION In this paper formula s has been used for numerical simulation from [2], by using this formula s we obtain throughput and perform numerical simulation, the purpose of this section is to extend the two-station Throughput formula into multi station throughput formula, so that it applies to a multi hop network with any number of stations. The extension holds under the same assumptions given by [1,2] as for the two-station model. We consider again the special case of identical stations, and assume also that the buffers between stations all have the same size. Figure 1 depicts the multi hop network of general length. The parameters for this case are: (i), the station speed (jobs per hour), (ii) λ, the failure rate (failures per hour), (iii) µ, the repair rate (repairs per hour), (iv) B, the buffer size (number of jobs), (v) M, (number of stations) To obtain a formula for throughput that includes the additional parameter M, we analysis the two station formula & extended to derive a throughput formula for multi hop network with identical station against random failure. Figure 1: Multi Hop Network of General Length with Identical tations and Buffers of Equal ize [2]
3 Investigation on Throughput of a Multi Hop Network with Identical tation for Random Failure 561 Functional form: ρ 2λ 1 + λ /(() µ + /)/ f1 M1() λ 1( µ /) + f2 M + Bµ µ (1) Where f 1 (M) and f 2 (M) are functions to be determined. The function f 1 (M) provides the M-station generalization for the impact of station failures, independent of the buffers in the line, while f 2 (M) accounts for the impact of buffers specifically. Consider first the standard result for an M-station with no buffers. The throughput in this case is given by [2]. ρ = (2) 1 + M λ / µ Putting B = 0 in (1) gives ρ = 1 + λ / µ + [() f M/ ] λ µ (3) Compare (1) & (2) with the Buzacott result, and then obtain the following form for the function f 1 (M) : f 1 (M) = M 1 and substitute it in (3) 1 ρ = 1 + λ / µ + [( M 1) λ / µ ] (4) The simplest form for f 2 (M) is a linear function, f 2 (M) = km, where k is a constant. Function, the Impact of buffers is proportional to M. For the special case of M = 2, With this comparing Alden s model equation and (1) gives f 2 (2) = 1/2. Thus, in terms of k, we have 2k = 1/2 or k = 1/4, and hence f 2 (M) is given by f 2 (M) = M/4 (5) Putting f 1 (M) and f 2 (M) in (1), then obtain the following approximate expression for throughput of an M-station network: ρ M 2λ 1 + λ / µ + [( M 1) λ / µ ]/ 1 + 1( + /) Bµ 4 µ (6) Note: In this paper formula s has been used for numerical simulation from [2], by using this formula s we obtain throughput and perform numerical simulation and the extension given by formula preserves the basic relationships between parameters, as seen in the Alden s model Formula s from [1]. These include the ratio / that determines a station s efficiency, and the ratio B / that provides a measure of buffer effectiveness during failures. 5. REULT & DICUION Table 1 tation Parameter Values used in Throughput Comparisons [2] MTBF(mean time MTTR (mean / between failures) time to repair) ( jobs/h) ( failures/h) (repairs/h) (min) (min) hort frequent failures Long infrequent failures This section compares the throughput using formula given by (6). The comparisons are made for the given values of the station parameters, λ, and µ, and a range of different No. of station M and buffer sizes B. Following figures show the efficiency of multi hop network, is to perform numerical simulation had done with different values and data against random failure, short frequent failures and long infrequent failures Figure 2: Throughput Comparison
4 562 International Journal of Computer cience and Communication (IJCC) respectively. The continuous curves show throughput of the multi hop network, the results indicate that the throughput of the network rapidly drops with the increase in the number of station for different buffer sizes B against random failure. The comparisons show when number of station increases the efficiency of the network rapidly drop against low frequent failure and slightly drop against high infrequent failure. These results show that increasing the buffer size provides much bigger improvement in throughput for short frequent failures than for long infrequent failures. Figure 2 depicts the performance results for the throughput of the network rapidly drops with the increasing number of station. Figure 2(b) depicts the size is 1, The comparisons show at instant when number of station is M=16 the efficiency of the network is almost 30% against low frequent failure at the same instant the efficiency of the network is almost 45% against high infrequent failure. Figure 3 depicts the performance results for the throughput of the network rapidly drops with the increasing number of station. Figure 3(b) depicts the size is 3, The comparisons show at instant when number of station is M=16 the efficiency of the network is almost 39 % against low frequent failure at the same instant the efficiency of the network is almost 54% against high infrequent failure. Figure 4 depicts the performance results for the throughput of the network slightly drops with the increasing number of station. Figure 4(b) depicts the size is 6, The comparisons show at instant when number of station is M=16 the efficiency of the network is almost 40% against low frequent failure at the same instant the efficiency of the network is almost 57% against high infrequent failure. Figure 3: Throughput Comparison Figure 4: Throughput Comparison
5 Investigation on Throughput of a Multi Hop Network with Identical tation for Random Failure 563 Figure 5: Throughput Comparison Figure 6: Throughput Comparison Figure 5 depicts the performance results indicate that the throughput of the network slightly drops with the increasing number of station. Figure 5(b) depicts the size is 12, the comparisons show at instant when number of station is M=16 the efficiency of the network slightly improve when size of buffer increases at present scenario the efficiency is almost 45% against low frequent failure at the same instant the efficiency of the network is almost more than 60% against high infrequent failure. These following figures show that increasing the buffer size has a much improvement in throughput for short frequent failures than for long infrequent failure. Figure 6 depicts the performance results for the throughput of the network rapidly increases with the increasing number of buffers. Figure 6(a) and 6(b) shows the performance of throughput for high infrequent failure is good as compare as low frequent failure when increasing the buffer size and fix the number of station is 20 for these present scenario, The comparisons show at instant when number of Buffer is B=16 the efficiency of the network is almost 45% against low frequent failure at the same instant the efficiency of the network is almost more than 60% against high infrequent failure. These following figures show that increasing the buffer size has gives a bigger improvement in throughput for short frequent failures than for long infrequent failures. 6. CONCLUION In multi-hop networks, stations may pump more traffic into the networks that can be supported, resulting in high packet-loss rate, re-routing instability unfairness and random failures problems due to this effect system efficiency. In this paper formula s has been used for numerical simulation from [2], by using this formula s we obtain throughput and perform numerical simulation and identify bottlenecks for a multi hop network composed of a series of workstations separated by buffers and the stations which is subject to random failures. Following above Figures depicts the performance results for the efficiency of the network against low frequent failure and high infrequent failures, the results indicate that the throughput of the network slightly drops with the increase in number of station. Above figures shows the performance of throughput for high infrequent failures is good as compare as low frequent failures when increasing buffer size. The comparisons show when number of station increases the efficiency of the network rapidly drop against low frequent failure and slightly drop against high infrequent failure. These results also show that increasing the buffer size provides much bigger improvement in throughput for short frequent failures than for long infrequent failures.
6 564 International Journal of Computer cience and Communication (IJCC) REFERENCE [1] J. M. Alden, Estimating Performance of Two Workstations in eries with Downtime and Unequal peeds, Research Publication R&D-9434, General Motors R&D Center, Warren, Michigan, [2] Dennis E. Blumenfeld And Jingshan Li, An Analytical Formula for Throughput of a Production Line with Identical tations and Random Failures, [3] J. J. Garcia-Luna-Aceves And Yu Wang, Throughput and Fairness of Collision Avoidance Protocols in Ad hoc Network. [4] Ping Chung Ng, Throughput Analysis of IEEE Multi-hop Ad hoc Networks, Paper Identification Number: TNET [5] J. A. Buzacott, Prediction of the Efficiency of Production ystems Without Internal torage, International Journal of Production ystems, Vol. No. 3, [6] J. A. Buzacott and J. G. hanthikumar, tochastic Models of Manufacturing ystems, Prentice-Hall, New Jersey, [7] N. Bhalaji and Dr. A. hanmugam, Reliable Routing against elective Packet Drop Attack in DR based MANET, Journal of oftware, 4, No. 6, August [8] Bounpadith Kannhavong and Abbas Jamalipour, A- OLR: ecurity Aware Optimized Link tate Routing for MANET, IEEE Communications ociety Publication in the ICC [9] Akansha aini and Harsh Kumar, Effect of Black Hole Attack on AODV Routing Protocol in MANET, IJCT, 1, Issue 2, December [10] N. Bhalaji, Dr. A. hanmugam, Defense trategy using Trust based Model to Mitigate Active Attacks in DR Based MANET, Journal of Advances in Information Technology, 2, No. 2, May [11] Jiejun Kong, Xiaoyan Hong, An Identity-Free and On- Demand Routing cheme against Anonymity Threats in MANET, IEEE Transaction on Mobile Computing, 6, August 2007.
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels
More informationP B 1-P B ARRIVE ATTEMPT RETRY 2 1-(1-P RF ) 2 1-(1-P RF ) 3 1-(1-P RF ) 4. Figure 1: The state transition diagram for FBR.
1 Analytical Model In this section, we will propose an analytical model to investigate the MAC delay of FBR. For simplicity, a frame length is normalized as a time unit (slot). 1.1 State Transition of
More informationNew CDMA-Based MAC Protocol for Ad Hoc Networks
ew CDMA-Based MAC Protocol for Ad Hoc etworks Thamer Al-Meshhadany and Wessam Ajib Computer ciences Department, Université du Québec à Montréal 2, avenue du Président-Kennedy Montréal, Québec, Canada H2X
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationH-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks
H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More information2 Related Work. 1 Introduction. 3 Background
Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model
More informationAn Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks
An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11
More informationZone-based Proactive Source Routing Protocol for Ad-hoc Networks
2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationDecision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless Multi-Hop Networks
34 International Journal of Information Processing Systems, Vol.2, No.1, March 2006 Decision of Maximum Congestion Window Size for TCP Performance Improvement by Bandwidth and RTT Measurement in Wireless
More informationCollisions & Virtual collisions in IEEE networks
Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing
More informationPerformance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,
More informationCollision Free and Energy Efficient MAC protocol for Wireless Networks
110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationReview of Medium Access Control protocol for MANET
Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationRegression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique
Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationPerformance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu
More informationA Comparative Analysis on Backoff Algorithms to Optimize Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771
More informationPerformance Analysis for Channel Utilization in Wireless LAN
Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people
More informationIntroduction and Scope of Research
TCP Performance over Wi-Fi Shiva Raj Pokhrel spokhrel@swin.edu.au Supervisors Prof. Hai L. Vu & Dr. Manoj Panda Introduction and Scope of Research Setup Wi-Fi, Up-Downloads. Infrastructure mode, DCF. Loss-based
More informationDeepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationKeywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges
More informationMedium Access Control in Ad Hoc Networks with Omni-directional and Directional Antennas
Medium Access Control in Ad Hoc Networks with Omni-directional and Directional Antennas Dissertation Proposal Yu Wang Department of Computer Engineering School of Engineering University of California Santa
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationDirectional Antenna based Time Division Scheduling in Wireless Ad hoc Networks
Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationA Measurement Study of Multiplicative Overhead Effects in Wireless Networks
A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier
More informationPerformance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks
Computer Technology and Application 6 (2015) 37-44 doi: 10.17265/1934-7332/2015.01.006 D DAVID PUBLISHING Performance Analysis under MAC Layer Misbehavior Attack in Mobile Ad-Hoc Networks Mohammed-Alamine
More informationCapacity of Grid-Oriented Wireless Mesh Networks
Capacity of Grid-Oriented Wireless Mesh Networks Nadeem Akhtar and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford, GU2 7H, UK Email: n.akhtar@surrey.ac.uk, k.moessner@surrey.ac.uk
More informationModeling the protocol under different capture and sensing capabilities
Modeling the 82. protocol under different capture and sensing capabilities Mathilde Durvy EPFL CH-5 Lausanne, Switzerland mathilde.durvy@epfl.ch Olivier Dousse Deutsch Telekom Laboratories 587 Berlin,
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationKey-Words: Ad hoc network, multimedia, QoS, routing protocol.
Proceedings of the 5th WSEAS International Conference on Applications of Electrical Engineering, Prague, Czech Republic, March 12-14, 26 (pp117-122) Hidden Route Aware QoS Routing Protocol for Mobile Multimedia
More informationRECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION
RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function
More informationNode Clustering in Mobile Peer-to-Peer Multihop Networks
Node Clustering in Mobile Peer-to-Peer Multihop Networks Chansu Yu, Kang G. Shin, Ben Lee, Seung-Min Park * and Heung-Nam Kim * Department of Electrical and Computer Engineering, Cleveland State University,
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule
More informationThe Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs
I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar
More informationAdaptive Mechanism for Aggregation with fragments retransmission in high-speed wireless networks
Int. J. Open Problems Compt. Math., Vol. 4, No. 3, September 2011 ISSN 1998-6262; Copyright ICSRS Publication, 2011 www.i-csrs.org Adaptive Mechanism for Aggregation with fragments retransmission in high-speed
More informationAnalysis of the IEEE e EDCA Under Statistical Traffic
Analysis of the IEEE 82.11e EDCA Under tatistical Traffic Juki Wirawan Tantra, Chuan Heng Foh Centre for Multimedia and Network Technology chool of Computer Engineering Nanyang Technological University
More information$ " Capacity of Ad Hoc Networks. Physical Layer Issues. Layer 1 Capacity. Path Loss Model. Path Loss Model. Bandwidth of 802.
Capacity of Ad Hoc Networks Quality of Wireless links Physical Layer Issues The Channel Capacity Path Loss Model and Signal Degradation 802.11 MAC for Ad-hoc Networks DCF (Distributed Coordination Function)
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationImplementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies
European Wireless 2009 1 Implementation and Performance Analysis of Cooperative Medium Access Control protocol for CSMA/CA based Technologies Anders Grauballe, Mikkel Gade Jensen, Achuthan Paramanathan,
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationPerformance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment
Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment N Charan 1, Dr. Sreerangaraju M.N 2, Nagesh R 3 P.G. Student, Department of Electronics & Communication
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationIEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks
IEEE/ACM TRANSACTIONS ON NETWORKING 1 On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member, IEEE Abstract This paper
More informationPerformance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator
Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationA Literature survey on Improving AODV protocol through cross layer design in MANET
A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,
More informationCongestion Control in Mobile Ad-Hoc Networks
Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationNEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi
IRTF ANS WG Meeting, November 12, 2003 Notes on Scalability of Wireless Ad hoc Networks Onur Arpacioglu, Tara Small and Zygmunt J. Haas , which extends
More informationMAC Protocol Switching: A Novel Tool for Performance Adaptation in Wireless Sensor Networks
MAC Protocol Switching: A Novel Tool for Performance Adaptation in Wireless Sensor Networks Fan Yu and Subir Biswas Electrical and Computer Engineering Michigan State University, USA {yufan,sbiswas}@egr.msu.edu
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationAnalysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio
Analysis of TCP and UDP Traffic in MANETs Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio MANET Routing Protocols Proactive protocols Maintain routes to all nodes Distance vector, link
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationPerformance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme
World Engineering & Applied Sciences Journal 6 (2): 97-103, 2015 ISSN 2079-2204 IDOSI Publications, 2015 DOI: 10.5829/idosi.weasj.2015.6.2.22146 Performance Analysis of Distributed Mac Protocol with Physical
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationUnavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
More informationReview:- EN-efficient Approaches for MANETs in Rushing Attacks
Review:- EN-efficient Approaches for MANETs in Rushing Attacks Rashmi Vishwakarma Sumit Dhariwal Mohmmed.Imran Deptt.Of CSE Deptt.Of CSE HOD,Deptt.Of CSE JNCT Rewa M.P, India SIRTE Bhopal M.P, India JNCT
More informationCONCLUSIONS AND SCOPE FOR FUTURE WORK
Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this
More informationLocation Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System
Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationA Performance Analysis of IEEE Networks in the Presence of Hidden Stations
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland
More informationSecurity Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationCHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER
32 CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER This proposed work describes the techniques used in the data link layer to improve the performance of the TCP in wireless networks and MANETs. In the data link
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationCongestions control through cloud computing with MANET
Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc
More informationPerformance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,
More information