AN EFFICIENT APPROACH FOR THINNING WIRELESS MOBILE MESSAGES. P P Abdul Haleem and M P Sebastian. Received October 2008; accepted December 2008

Size: px
Start display at page:

Download "AN EFFICIENT APPROACH FOR THINNING WIRELESS MOBILE MESSAGES. P P Abdul Haleem and M P Sebastian. Received October 2008; accepted December 2008"

Transcription

1 ICIC Express Letters ICIC International c 2009 ISSN X Volume 3, Number 1, March 2009 pp AN EFFICIENT APPROACH FOR THINNING WIRELESS MOBILE MESSAGES P P Abdul Haleem and M P Sebastian Department of Computer Science and Engineering National Institute of Technology Calicut NIT Campus P O, Calicut, Kerala , India ppabdulhaleem@gmail.com; sebasmp@nitc.ac.in Received October 2008; accepted December 2008 Abstract. Increasing popularity and wide usage make wireless mobile devices as quintessential entities of today s network. Formulating a uniform platform for messaging across a wide range of wireless mobile devices with varying standards, is a potential challenge. The extensible Markup Language (XML), though a legacy technology still is in use as a universal solution for the representation of heterogeneous data formats. But the storage requirements and processing requirements make XML less acceptable to the designers. This paper presents a method (based on YAML Ain t Markup Language - YAML) for thinning the message size in heterogeneous wireless mobile devices. The proposed scheme yields better results than XML as a message format. Keywords: Wireless networks, Mobile messaging, Thinning of messages, Knowledge representation, Mobile computing, XML 1. Introduction. Being active members of every network, the presence of wireless mobile devices cause several issues for the existing network protocols and applications. This is mainly due to the inherent deficiencies of the wireless mobile environment. Poor quality of wireless networks, particularly the bandwidth and latency are the major limiting factors in their performance. The usage of heterogeneous wireless mobile devices poses new challenges to the research community. The search for an acceptable standard for a heterogeneous network naturally converges to XML. In Simple Object Access Protocol (SOAP), XML is already in use as a message syntax format [3]. But XML, in its present format, has many limitations, particularly in wireless mobile devices. Increased verbosity of XML results in the generation of more number of packets, which overloads the various layers of the network protocol. This consumes more battery power also. Several attempts are in progress to arrive at an energy efficient communication scheme for wireless mobile devices [16]. Transmission and reception of messages consume the biggest chunk of battery power. Thinning of messages is helpful for devices under heavy use. This paper introduces a new scheme for optimizing the message sizes in wireless mobile devices. The proposed message format must retain the strong points of XML, but improve upon its limitations, specific to the wireless mobile environment. Our messaging format intends to have the following features: (i) simple and flexible - both for user and application programmer (ii) legible and easily editable (iii) schema aware (iv) consumes less bandwidth by reducing the verbosity of content without using any compression techniques and(iv)secureandfast. Our scheme is based on YAML. The proposed message format simplifies the message preparation, with less storage requirements. The thinning measures used in our scheme yields significant improvements in terms of schema size, message size and transmission time in comparison with XML. 99

2 100 P P ABDUL HALEEM AND M P SEBASTIAN 1.1. extensible Markup Language. The traditional use of XML is for the representation of data-oriented facts. Users are free to develop their own structures and generating huge databases over the web. Currently, XML is widely perceived as a message syntax format. SOAP is an example where XML is used as a message syntax format. The most attractive feature of XML is that it is compatible with the latest Internet technologies. It is the defacto standard to represent data over heterogeneous systems. Studies on XML based packet routing and filtering establishes its viability and applicability. However, XML has limitations when used in the wireless mobile environments [2]. These limitations include (i) highly textual nature, requiring string parsing for further processing (ii) strict structuring and adherence of the document to the accompanying structure needs verification by parsers, which makes XML parsing a heavyweight activity (iii) XML buffers need to be flushedmoreoftenatthetimeofinputand output due to the verbosity, leading to lesser throughput (iv) larger messages are vulnerable to retransmissions, particularly in wireless environments and (v) an easy target for hackers. The rest of the paper is organized as follows: Section 2 outlines the related work. Section 3 describes the problem definition. Performance evaluation of the results obtained are discussed in Section 4. Section 5 concludes the paper with a brief discussion on the future work. 2. Related Work. Several solutions are proposed in the literature to address the verbosity of messages in wireless mobile devices. They can be broadly classified into the following categories: (i) Standard compression techniques (ii) Alternative formats for XML and (iii) Binary Encoding. However, these methods are not very effective in the wireless mobile environment. For instance, standard compression techniques such as Millau [12], Gzip [13], XMill [13] yield better performance with larger messages with a high redundancy rate. More over, a compression/decompression layer will be an additional burden for the resource intensive wireless mobile devices [4]. In order to achieve a messaging format that demands less bandwidth requirements, several alternative serialization formats have been proposed. Wireless Application Protocol(WAP)BinaryXML(WBXML),alsocalledBinaryXML[15],istheoldestknown format in this area. Prominent examples using WBXML are Fast Web Services [5] and Fast InfoSet [7] proposals of Sun. WBXML is a good attempt in killing the verbosity of XML, but suffers from inadequate support for the XML name-spaces [6]. The Xebu [8] format builds up its tokenization using a stream of messages, instead of considering each XML document in isolation as most other formats. The compression/decompression layer will be an additional burden for the resource intensive wireless mobile devices [4]. Alternative formats for XML, including binary formats are suffered from the lack of self descriptive nature and easy readability that exists in XML. 3. The Proposed Method for Thinning of Wireless Mobile Messages. We propose a messaging protocol that retains the features of XML such as self descriptive nature, readability, ease of preparation and schema awareness, but with less verbosity. YAML Ain t Markup Language (YAML) [9], a data serialization language which is both human readable and computationally powerful, is utilized to achieve this goal. Apart from introducing YAML as a viable alternative, we plan to make significant value additions to the standard in order to achieve maximum throughput YAML. YAML (rhymes with camel ) is a human-readable data serialization format that takes concepts from languages such as XML, C, Python, Perl, as well as the format for electronic mail as specified in RFC YAML is a straightforward machine parsable data serialization format designed for human readability and interaction. YAML

3 ICIC EXPRESS LETTERS, VOL.3, NO.1, is optimized for data serialization, configuration settings, log files, Internet messaging and filtering [9]. The decision to make use of YAML for our work is motivated by the following (i) it is easily readable and editable by any standard word processor (ii) it interacts well with scripting languages (iii) it uses host languages native data structures. (iii) it has a consistent information model (iv) it enables stream-based processing (v) it is as expressive and extensible as XML (vi) its serialization reduces the verbosity of the message considerably, that too without affecting its readability System design. The design includes three main stages: (i) bifurcation of structure and content (ii) thinning - Phase I and (iii) thinning - Phase II Bifurcation of structure and content. YAML data serialization includes both data description and content. The aim of this stage is to achieve separation of structure and content. This reduces the message size, particularly, when there is a set of messages as per some common structure. This is a technical improvement over YAML in its original format. For this, the document is scanned one node at a time. There are three kinds of nodes in YAML - scalar, sequence, and mapping. Apart from this, there are mappings of sequences and sequences of mappings. The message structure is to be evaluated to decide the type of schema to be constructed. Thetypecanbeofanyofthethreekinds-scalar, sequence and mapping. Mappings of sequences and sequences of mappings are considered as special cases. Primitive details likenameofthe field, its data type and an ID value are added to the schema for every member in the node. Further details to the schema could be added in the validation and verification stages. Once this process is completed, we get a schema description of the message to be transmitted YASchema. Kuwata-lab developed a schema validator for YAML. This schema validator is known as Kwalify [10]. Our method, christened as YASchema, is designed with the objective of making YAML schema aware. The structure of the document and the primitive details regarding the elements of each node are defined in the schema. Additional information like expected pattern of inputs to the attribute values can also be added to the schema definition. YASchema has significant advantages over the other method which include (i) use of thinning techniques to define schema definitions in flow styles (ii) require only minimum bytes and is human readable (iii) facility to define ID codes for elements of YAML, and (iv) reuse of the same schema across multiple sessions are envisioned. Apart from constructing the schema entries, identification of squeezable elements are also being done in this stage. For e.g., if the file contains several occurrences of items with the same format like item details in an invoice, these records will be marked as squeezable. This information is utilized in the next stage for further thinning of the contents Thinning phase I. The attempts for thinning the message size is initiated in this stage. Different styles of serializations are possible in YAML [14]. YAML s natural approach of representing information is as per the guidelines of legacy XML, to a certain extent. This adherence to the XML style, provides high degree of readability, at the same time boosts the memory requirements needed for representing the information. The Flow style method specified in YAML helps one to squeeze the size considerably. When reorganizing the contents to this style, some cases may yield better performance. For e.g., a complex message consisting of customer invoice having many product details can be presented to this stage for better conservation of message size. The entire document is scanned and squeezable portions are squeezed into flow style.

4 102 P P ABDUL HALEEM AND M P SEBASTIAN Thinning phase II. Phase I capitalizes on the inherent properties of YAML in thinning the message size. In Phase II, the enhancements over YAML are employed to maximize the results. In this stage, the possibilities of making use of YASchema for thinning the messages are explored. All primitive details regarding each element in the message are defined in the schema, in the schema creation stage itself. In addition to this, special ID codes are provided for each element. Together with these facilities, a scan over the message is done and the elements are encoded with the ID codes. ID codes can be referred from the accompanying schema, or if the sender likes to reuse a schema that has been sent earlier, the schema to be referred can be specified in the message itself. 4. Performance Evaluation. There are different types of messages exchanged between users with varying features such as size, complexity, structure etc. To establish consistency across all these diverse kinds of messages, messages are categorized into five types. Short type represents the simple messaging format with only text. Small category consists of a single record consisting of String, Float and DateTime types of data. Medium category contained the details of about 25 customer records. Large and Composite categories are constituted as invoice records with varying degrees of complexity. These categories are designed to apply test data to all the stages of the proposed scheme, thus ensuring consistency in the results. For each category of messages listed in Table 1, YAML (original, Phase I and Phase II) and XML versions are serialized. Since our objective is to propose a simple standard, with less verbosity, XML is selected as the benchmark. YAML serializations have been done in three stages - original, after applying Phase I of thinning and after applying Phase II of thinning. The parameters used for performance evaluation are (i) schema size (ii) message size and (iii) transmission speed Schema size. The gain in terms of number of bytes as per the YASchema definition is compared with the Kwalify definitionsinfigure1. ItisobservedthatYASchema performs much better than Kwalify for all types of messages. For e.g., the gain in schema size in Short, Small, Medium, Large and Composite categories over Kwalify are estimated to be 245, 539, 601, 1023 and 1089 bytes, respectively. The Short category reported the maximum advantage (66.94%). In the cases of repeated occurrences of records in Large and Composite categories, the performance gain (53.23% and 54.78%, respectively) is better. In the Medium category, the gain is above 50%. From the results, it is observed that YASchema outperforms its counterpart in all the 5 message types. The average overall performance is above 50%. This gain is significant, particularly when transmitting a set of messages with a common schema Message size. Each category of messages are coded in YAML and XML. The performance is evaluated under the following scenarios: (i) YAML Vs XML (ii) YAML (Phase II) Vs XML and (iii) YAML (Phase II) Vs YAML. The gain in message size (in bytes) using original YAML over XML is given in Table 1. The gain in size of messages (in YAML original format) in Short, Small, Medium, Large and Composite categories over XML are 46, 153, 2816, 5024 and bytes, respectively. The results after the Phase II thinning are very critical as far as the viability of the proposed method is concerned. After Phase II, schema size is also a part of the message. Hence the message size excluding and including schema size are compared. The message size comparison excluding the schema size is shown in Figure 2. It is seen that the gain is maintained at 62% against XML, for message categories of larger sizes. The comparison including the schema size is shown in Figure 3. It is to be noted that additional overhead needed for the schema results in a loss of about 40% in the Short

5 ICIC EXPRESS LETTERS, VOL.3, NO.1, and no gain in the Small category, respectively, over XML. But there is a gain in all the remaining categories. The reduced gains in Short and Small categories, need not be taken negatively; this trade off is advantageous when there is a need to send multiple messages with the same structure - as transmission of schema will only be a one-time payload. For other categories of messages (in particular, for larger types, the gain is of the order of 60%), this scheme works well due to the thinning measures adopted in two phases. It can be seen that the additional payload is a necessity, in order to maintain the correctness of the message after transmission. The performance gain in thinning the size of messages after the two phases of thinning compared to original YAML is shown in Figure 4. There is advantage in size after Thinning Phase I and Phase II over original YAML for categories Medium, Large and Composite. As expected, the additional payload of schema reports gains of (-56%) and (-35%) in Short and Small categories, respectively. These gains will become positive, when messages with same structure are streamed multiple times Transmission time. Transmission time is a very important factor in real time applications. Our measurements use three classes of record sets with varying levels of complexity - Simple, Medium and Complex. The bytes required for the representation of record sets are considered for the measurement of transmission speed. The number of bytes needed to represent each of these record sets are tabulated in Table 2. Assuming that there is no packet loss, transmission times of theoretical constant link speeds of 64kbps and 256kbps, are assumed for this analysis. It is to be noted that the actual performance would be inferior to the theoretical performance due to the overheads like packet loss, retransmission, noise etc. It is seen from Table 2 that each of the YAML data sizes, particularly the Complex type, just fits well into the limits of a single TCP/IP MSS, after two phases of thinning. The record sizes of XML in Complex category are greater than the MSS, which forces the data to be segmented into multiple packets. The transmission speed (64kbps link) comparison between the record sets of YAML and XML formats are shown in Table 3. It is observed from the Table 3 that the YAML record sets outperform the XML record sets by a factor of 1.3 for Small type, 1.4 for Medium type and 2.71 for Complex type. After applying phase II of thinning, we have the maximum advantage (refer Table 4) - by a factor of 2.18 for Small type, 1.71 for Medium type and 5.14 for Complex type. The advantages in the performance of YAML (after two phases of thinning) over XML, are clear for all categories. One interesting factor is the improvement of the transmission speeds of the thinned YAML (after applying the two phases of thinning) record sets over the original YAML (refer Table 5) - by a factor of 1.65 (Small), 1.23 (Medium) and 1.9 (Complex). These gains are significant as they are achieved without applying any binary encoding to the original message (i.e., without hampering the readability and user friendliness). One observes that the thinned YAML has significant advantages over the original YAML. 5. Conclusions. This paper presents an alternative messaging system to XML for the mobile wireless environment. The proposed system is based on YAML, a user friendly and light weight messaging format. YAML simply makes the process of preparing the message quite easier, with much less bytes of storage size. Thinning measures are applied to the original YAML format, including the introduction of a schema definition for the files. Introduction of a light weight platform for wireless mobile messaging, separation of data and content, formulation of a schema construction mechanism and further thinning measures helped in thinning the overall message size, sizes of various types of record sets and schema constructs. Interestingly, the experiments revealed that the proposed thinning

6 104 P P ABDUL HALEEM AND M P SEBASTIAN measures contribute considerable gains over the original YAML without hampering the readability of the original message format. Several modifications may be necessary to make this a real time messaging protocol. This requires improvements including facility for a better encoding to Abstract Syntax Notation One (ASN.1), in the circumstances where ultimate squeezing of message is most needed (we would like to include the binary encoded serialization as a benchmark), security standards to be embedded to the message format at par with the specifications of XML Encryption and other related specifications,andintroductionofapolicybasedsecurity mechanism by utilizing the schema constructs. REFERENCES [1] T. Phan, L. Huang and C. Dulan, Requirements and design for XML messaging in the mobile environment, Workshop on Next Generation Networking Middleware, Helsinki Institute for Information Technology, Finland, [2] J. Kangasharju, Mobile XML messaging, Technical Report, Department of Computer Science, University of Helsinki, Available at [3] C. C. Albrecht, How clean is the future of SOAP?, Communications of ACM, vol.47, no.2, pp.66-68, [4] R. Schmelzer, Will Binary XML Solve XML Performance Woes?, November, 2004, Available at gci ,00.html. [5] P. Sandoz, S. Pericas-Geertsen, K. Kawaguchi, M. Hadley and E. Pelegri-Llopart, Fast Web Services, August, 2003, Available at [6] P. Sandoz and S. Pericas-Geertsen, Fast Java.net, XTech 2005: XML, the Web and Beyond, Available at [7] P. Sandoz, A. Triglia and S. Pericas-Geertsen, Fast Infoset, June, 2004, Available at [8] Xebu Serialization Format, Available at [9] Yaml, Available at [10] Kwalify, Available at [11] Adjusting IP MTU, TCP MSS, and PMTUD on Windows and Sun Systems, February, 2006, Available at [12] Girardot and Sundaresan, Millau: An encoding format for efficient representation and exchange of XML over the web, Pro. of the 9th International World Wide Web Conference on Computer Networks, The International Journal of Computer and Telecommunications Networking, pp , [13] Cai, Ghandeharizadeh, Girardot, Schmidt, SongGirardot and Sundaresan, A comparison of alternative encoding mechanisms for web services, Proc. of the 13th International Conference on Database and Expert Systems Applications, Aix en Provence, France, [14] YAML Ain t Markup Language (YAML) Version 1.1, Available at [15] WAP Binary XML Content Format, Available at [16] Y. Jin, J. Jo, and Y. Kim, Energy-efficient multi-hop communication scheme in clustered sensor networks, International Journal of Innovative Computing, Information and Control, vol.4, no.7, pp , Table 1. Comparison - Gain achieved in message size (in bytes) with YAML Message YAML XML Gain Over Category XML (a) (b) (b - a) Short Small Medium Large Composite

7 ICIC EXPRESS LETTERS, VOL.3, NO.1, Table 2. Record sets - Categories (size in bytes) Type YAML XML Original Thinning I Thinning II Small Medium Complex Table 3. Comparison (YAML vs XML) - Transmission speed (in msecs) using 64kbps link Record Set YAML XML Gain Over (a) (b) XML (b/a) Small Medium Complex Table 4. Comparison (YAML Phase II vs XML) - Transmission speed (in msecs) using 64kbps link Record Set YAML Phase II XML Gain Over (a) (b) XML (b/a) Small Medium Complex Table 5. Comparison (YAML vs YAML Phase II) - Transmission speed (in msecs) using 64kbps link Record Set YAML YAML Phase II Gain (a) (b) (a/b) Small Medium Complex

8 106 P P ABDUL HALEEM AND M P SEBASTIAN Figure 1. Schema size - YASchema vs Kwalify Figure 3. Message size - XML vs YAML Phase II (including schema) Figure 4. Message size - YAML vs YAML Phase II (including schema) Figure 2. Message size - XML vs YAML Phase II (excluding schema)

Performance Evaluation of XHTML encoding and compression

Performance Evaluation of XHTML encoding and compression Performance Evaluation of XHTML encoding and compression Sathiamoorthy Manoharan Department of Computer Science, University of Auckland, Auckland, New Zealand Abstract. The wireless markup language (WML),

More information

The Effects of Data Compression on Performance of Service-Oriented Architecture (SOA)

The Effects of Data Compression on Performance of Service-Oriented Architecture (SOA) The Effects of Data Compression on Performance of Service-Oriented Architecture (SOA) Hosein Shirazee 1, Hassan Rashidi 2,and Hajar Homayouni 3 1 Department of Computer, Qazvin Branch, Islamic Azad University,

More information

W3C Workshop on the Web of Things

W3C Workshop on the Web of Things W3C Workshop on the Web of Things Enablers and services for an open Web of Devices 25 26 June 2014, Berlin, Germany Position Paper by Kheira Bekara, and Chakib Bekara - Centre de de Dveloppement des Technologies

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2

Information Technology Department, PCCOE-Pimpri Chinchwad, College of Engineering, Pune, Maharashtra, India 2 Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Adaptive Huffman

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION

CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION Maija Metso, Antti Koivisto and Jaakko Sauvola MediaTeam, MVMP Unit Infotech Oulu, University of Oulu e-mail: {maija.metso, antti.koivisto,

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Rashmi Gadbail,, 2013; Volume 1(8): 783-791 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFECTIVE XML DATABASE COMPRESSION

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

Efficient XML and Weather: Efficient XML Report 1.0

Efficient XML and Weather: Efficient XML Report 1.0 : Efficient XML Report 1.0 Aaron Braeckel Briefing to WXXM/AIXM Conference 04 May 2010 National Center for Atmospheric Research Boulder, CO Background and Motivation XML Benefits: Extensible Human-readable

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Jay Lofstead under the direction of Calton Pu

Jay Lofstead under the direction of Calton Pu Literature Survey XML-based Transformation Engines Jay Lofstead (lofstead@cc) under the direction of Calton Pu (calton@cc) 2004-11-28 Abstract Translation has been an issue for humans since the dawn of

More information

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012

Protocol Data Hiding. By Chet Hosmer Article Posted: March 06, 2012 Protocol Data Hiding By Chet Hosmer Article Posted: March 06, 2012 On Cinco de Mayo in 1997, which happened to be the first Monday in May that year, the Hacker Publication First Monday included an article

More information

TCP Congestion Control Evolution

TCP Congestion Control Evolution TCP Congestion Control Evolution (from Steven Low presentation) Junho Suh (jhsuh@mmlab.snu.ac.kr) MMLAB 1 Overview Internet History TCP basics & history Some trends in the Internet Implication from some

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 72-78 TJPRC Pvt. Ltd., MEASUREMENT STUDY OF A P2P IPTV SYSTEM: SOPCAST

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

Protection Schemes for 4G Multihop wireless Networks

Protection Schemes for 4G Multihop wireless Networks Protection Schemes for 4G Multihop wireless Networks Sridevi, Assistant Professor, Department of Computer Science, Karnatak University, Dharwad Abstract:-This paper describes the relay node protection

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

ANTIK Web Framework. BE Student, 4 Assistant Professor CSE, BMSCE

ANTIK Web Framework. BE Student, 4 Assistant Professor CSE, BMSCE ANTIK Web Framework Rashmi A. P [1], Achala Rao [2], Faiz Ur Rahman [3], Saritha A. N [4] 1,2,3 BE Student, 4 Assistant Professor CSE, BMSCE Abstract: ANTIK stands for Advanced Network Testing Framework

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

MILCOM October 2002 (Anaheim, California) Subject

MILCOM October 2002 (Anaheim, California) Subject MILCOM 2002 7-10 October 2002 (Anaheim, California) Subject PERFORMANCE ANALYSIS OF A NEW HEADER COMPRESSION SCHEME FOR TCP STREAMS IN IP BASED WIRELESS NETWORKS Authors: Prof. Pietro Camarda, Ing.. Sandro

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Domain-specific Concept-based Information Retrieval System

Domain-specific Concept-based Information Retrieval System Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

Distributed Computing: PVM, MPI, and MOSIX. Multiple Processor Systems. Dr. Shaaban. Judd E.N. Jenne

Distributed Computing: PVM, MPI, and MOSIX. Multiple Processor Systems. Dr. Shaaban. Judd E.N. Jenne Distributed Computing: PVM, MPI, and MOSIX Multiple Processor Systems Dr. Shaaban Judd E.N. Jenne May 21, 1999 Abstract: Distributed computing is emerging as the preferred means of supporting parallel

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

VIRTUALIZATION IN OPENFLOW NETWORKS

VIRTUALIZATION IN OPENFLOW NETWORKS VIRTUALIZATION IN OPENFLOW NETWORKS Miladin Tomić, Milutin Radonjić, Neđeljko Lekić, Igor Radusinović Keywords: FlowVisor, OpenFlow, SDN, virtualization. Abstract: Network virtualization allows network

More information

Thesis Defense: Developing Real-Time Collaborative Editing Using Formal Methods

Thesis Defense: Developing Real-Time Collaborative Editing Using Formal Methods Thesis Defense: Developing Real-Time Collaborative Editing Using Formal Methods Lars Tveito September 9th, 2016 Department of Informatics, University of Oslo Outline Introduction Formal Semantics of Editing

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Streaming Video and TCP-Friendly Congestion Control

Streaming Video and TCP-Friendly Congestion Control Streaming Video and TCP-Friendly Congestion Control Sugih Jamin Department of EECS University of Michigan jamin@eecs.umich.edu Joint work with: Zhiheng Wang (UofM), Sujata Banerjee (HP Labs) Video Application

More information

Goal: Offer practical information to help the architecture evaluation of an SOA system. Evaluating a Service-Oriented Architecture

Goal: Offer practical information to help the architecture evaluation of an SOA system. Evaluating a Service-Oriented Architecture Evaluating a Service-Oriented Architecture Paulo Merson, SEI with Phil Bianco, SEI Rick Kotermanski, Summa Technologies May 2007 Goal: Offer practical information to help the architecture evaluation of

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

INTRODUCTION. Chapter GENERAL

INTRODUCTION. Chapter GENERAL Chapter 1 INTRODUCTION 1.1 GENERAL The World Wide Web (WWW) [1] is a system of interlinked hypertext documents accessed via the Internet. It is an interactive world of shared information through which

More information

Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400

Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400 The International Arab Journal of Information Technology, Vol. 6, No. 3, July 2009 289 Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400 Kandasamy Anusuya, Karupagouder

More information

TCP Flavors Simulation Evaluations over Noisy Environment

TCP Flavors Simulation Evaluations over Noisy Environment International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen

More information

Requirements and Design for XML Messaging in the Mobile Environment

Requirements and Design for XML Messaging in the Mobile Environment Requirements and Design for XML Messaging in the Mobile Environment Jaakko Kangasharju Tancred Lindholm Sasu Tarkoma Helsinki Institute for Information Technology PO Box 9800, 02015 TKK Finland jkangash@hiit.fi,tancred.lindholm@hiit.fi,sasu.tarkoma@hiit.fi

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet Network and Communication Technologies; Vol. 1, No. 2; 2012 ISSN 1927-064X E-ISSN 1927-0658 Published by Canadian Center of Science and Education Timestamp Retransmission Algorithm for TCP-Cherry over

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Lecture 2: Network Protocols and Layering

Lecture 2: Network Protocols and Layering Lecture 2: Network Protocols and Layering Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks What is a Network Protocol? A protocol is the set of rules

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Unified QoS Provision in Wireless Access Networks

Unified QoS Provision in Wireless Access Networks Unified QoS Provision in Wireless Access Networks Nikos Passas and Lazaros Merakos Dept. of Informatics & Telecommunications University of Athens Athens, Greece {passas,merakos}@di.uoa.gr Abstract A scheme

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Protocol Buffers, grpc

Protocol Buffers, grpc Protocol Buffers, grpc Szolgáltatásorientált rendszerintegráció Service-Oriented System Integration Dr. Balázs Simon BME, IIT Outline Remote communication application level vs. transport level protocols

More information

Efficacious Transmission Technique for XML Data on Networks

Efficacious Transmission Technique for XML Data on Networks 14 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3B, March 2006 Efficacious Transmission Technique for XML Data on Networks Xu Huang, Alexander Ridgewell, and Dharmendra

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine Tapio Sokura, Taneli Korhonen, Mikael M. Nordman, and Matti Lehtonen Power Systems and High Voltage Engineering Laboratory P.O.Box 3000

More information

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol

Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Improving TCP End to End Performance in Wireless LANs with Snoop Protocol Dejan Jaksic, Zeljko Ilic and Alen Bazant Department of Telecommunications, Faculty of Electrical Engineering and Computing Unska

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Estimation of worst case latency of periodic tasks in a real time distributed environment

Estimation of worst case latency of periodic tasks in a real time distributed environment Estimation of worst case latency of periodic tasks in a real time distributed environment 1 RAMESH BABU NIMMATOORI, 2 Dr. VINAY BABU A, 3 SRILATHA C * 1 Research Scholar, Department of CSE, JNTUH, Hyderabad,

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

Comparison of Online Record Linkage Techniques

Comparison of Online Record Linkage Techniques International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.

More information

Performance Evaluation of Bluetooth Low Energy Communication

Performance Evaluation of Bluetooth Low Energy Communication SCITECH Volume 7, Issue 2 RESEARCH ORGANISATION April 28, 2018 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Performance Evaluation of Bluetooth Low Energy

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Chapter 2. Architecture of a Search Engine

Chapter 2. Architecture of a Search Engine Chapter 2 Architecture of a Search Engine Search Engine Architecture A software architecture consists of software components, the interfaces provided by those components and the relationships between them

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Development of Emulation Network Analyzer Tool for Computer Network Planning

Development of Emulation Network Analyzer Tool for Computer Network Planning Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 5, No. 2, June 2016, pp. 219~229, DOI: 10.11591/eei.v5i2.557 219 Development of Emulation Network Analyzer Tool for Computer Network

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope.

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope. Motion Imagery Standards Board Engineering Guideline Delivery of Low Bandwidth Motion Imagery MISB EG 0803 24 April 2008 1 Scope This Motion Imagery Standards Board (MISB) Engineering Guideline (EG) provides

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Comparative analysis of centralized and distributed clustering algorithm for energy- efficient wireless sensor network

Comparative analysis of centralized and distributed clustering algorithm for energy- efficient wireless sensor network Research Journal of Computer and Information Technology Sciences ISSN 2320 6527 Comparative analysis of centralized and distributed clustering algorithm for energy- efficient wireless sensor network Abstract

More information