Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN
|
|
- Ursula Stevenson
- 5 years ago
- Views:
Transcription
1 MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney
2 Introduction MARIAN is an on-demand, multi-agent, metric-driven routing protocol in ad-hoc networks. It utilises both static and mobile agents to determine optimal routes and to actually route the data. Each mobile device is equipped with a: Proxy agent. responsible for forwarding network traffic. Java-based, multithreaded allowing multiple connections. Benchmarking multi-agent Software System (BASS). Executing standard performance tests (memory, CPU, processing capabilities, etc.). Monitoring the utilisation of the device. Producing a metric of the performance of the devices in real-time. The purpose of this presentation is to introduce this novel research area and to present the novel findings concerning: Proxy capabilities of resource-constrained devices. The effect the OS and the JVM may have in performance. The resources consumption rates while routing, in terms of: Battery discharge rate, CPU utilisation, heap memory usage, and temperature.
3 Research Hypothesis Is it possible to create an automatically configuring system which will route data through ad-hoc networks in an optimal way? For this we propose: A framework using static and mobile agents that can be used for routing, network discovery, and automatic network reconfiguration in ad-hoc networks, in an efficient, effective, and secure way. Virtual Internet domain wireless domain
4 Possible benefits and outcomes (1) Maximize network performance Mobile agents could filter huge amounts of data locally to the devices, generated by BASS. Thus, benefit from local interactions. Determination of low and high bandwidth routes. Low bandwidth routes will be used for asynchronous network traffic ( s, text), while high bandwidth routes for synchronous network traffic (real-time audio, video). Scalability MAs are inherently distributed, thus there is a scope for a totally distributed system. The workload will be distributed evenly:» High performance devices will be responsible for complex calculations and tasks.» Low performance devices will be used as an alternative when high performance devices are unavailable or busy. Dynamic Mobile agents are reactive, that is, they sense the environment, and react in changes of the environment. Reliable end-to-end communications Mobile agents will migrate to other network nodes and communicate locally. Mobile agents can wait until the network is available, and migrate then.
5 Possible benefits and outcomes (2) QoS guarantees The transmitting device could request an estimate of the available bandwidth through a certain route. Security Only authenticated agents will participate in the routing process. A guard static agent will protect device s resources from potential malicious agents. Balance between security and performance. Reconfigurability Mobile agents can be easily dispatched to install updates in the routing protocol. Energy efficient Devices with low performance characteristics, or low battery life will not be overutilised by the routing protocol.» Busy devices will not participate in routing, as long as other devices can do the same job.» If battery life of a device is low, the routing protocol will consider that device as a weak link.
6 Background Wireless networks and the usage of mobile devices are becoming increasingly popular, especially in creating ad-hoc networks The great benefit of wireless networks is the ability of users to communicate, cooperate, and access the networked services in an anytime and anywhere fashion. Wireless networks can be grouped into two categories: Infrastructured networks Fixed and wired gateways, with access points A mobile unit connects to, and communicates with, the nearest access point that is within its communication radius. Infrastructure-less networks (typically known as ad-hoc networks) A collection of geographically distributed mobile nodes that communicate with one another over a wireless medium without the need of fixed networking equipment, such as routers and switches. Mobile nodes could act as gateways to other networks.
7 Routing in Ad-hoc networks Routing is the most important function in ad-hoc networks, however a challenging issue: Mobility e.g. A route that is considered as good now, may become unavailable or not optimal some time later Routing requires a lot of processing power Mobile nodes running on batteries may not be able to cope Multimedia traffic? Asynchronous A traffic? B Secure traffic?
8 Applications of Ad-hoc networks Military Battlefield Terrorism & Rescue Operations Hospitals Evacuation of a building on fire Retrieve patient s information from hospital s database while in surgery Conference meetings Share information quickly Schedule meetings Networking while on the road Inter-vehicle communication
9 Mobile Agents (1) Proposed as a promising solution for distributed computing over open and heterogeneous networks. Proposed to overcome certain limitations of traditionally designed distributed systems such as client-server. A mobile agent can be defined as a software program that can suspend its execution on a host computer, transfer itself to another agentenabled host on the network, and resume its execution on the new host. The key features of mobile agents are: Mobility; networks awareness; communication; intelligence; reactivity; autonomous; goal-oriented; temporarily continuous; learning; flexible; and character A mobile agent consists of its code and state, which carries with it during the self-initiated migration
10 Mobile agents v. client/server? Server Agent migrates to the server Agent Agent communicates with the server, on the server Mobile agents in a client/ server architecture Network Response message Get message Traditional agent in a client/ server architecture Server Client
11 Mobile Agents Systems (MAS) Mobile agent systems provide an environment in which mobile agents can exist and offer standardized services to agents docking on Services include: communication; migration; security; creation and termination of agents Many mobile agent systems have been developed from academic and industrial background. According to a comprehensive list on MAS (Fritz Hohl, Stuttgart): There exist approximately 70 mobile agents systems (commercial & educational). Most MAS are implemented in Java due to platform independence. Some well-know are: MOLE, Telescript, Aglets Workbench, ffmain, D Agents, Tracy, and Grasshopper. However, only few support mobile devices: Grasshopper ME (PocketPC)» The most comprehensive MAS for PDAs.» Well-documented. AgentSpace (PocketPC)» Insufficient documentation. Tracy 2 (PocketPC)» Under development. No real support for other Operating Systems (OSs): Familiar Linux. Embedded Linux.
12 Mobile agent applications Mobile agent paradigm has been proposed for a number of applications: Internet-wide collaboration systems. Network management. Monitoring systems. Information retrieval. Intrusion detection systems. E-commerce. A new potential application that mobile agents are ideal is wireless networks Mobile agents support asynchronous communication, and flexible query processing. User tasks can be delegated to mobile agents, and then a mobile client can disconnect. Can reduce network traffic under some certain circumstances. Maintain load balancing.
13 JVM support for handhelds Most mobile agent systems are developed in Java: Platform independence. Portability of code, which is the nature of mobile agents. Therefore a JVM is necessary to provide the: Execution environment for MAS. Familiar Linux Pocket PC 2003 Pocket PC 2002 Grasshopper ME/SE J9 JRE 1.3 Grasshopper ME J9 CrEme Jeode Grasshopper ME J9 CrEme IBM J9, Insignia Jeode, NSIcom CrEme, and Blackdown JRE 1.3 are Sun certified JVMs. Jeode is only available for PocketPC J9 does not officially support Familiar Linux. JRE 1.3 is the implementation of the full Java 1.3 version. The rest are J2ME compatible.
14 Resource-constrained devices (PDAs): Limited bandwidth Average when operating in a client-server mode. Approximately 4-5Mbits/s. Dramatically reduced when acting as a proxy. Ranges between 3-70Kbits/s. Workstations and laptops achieve up to 10 times more. Power consumption (Familiar Linux, ipaq). When IDLE: Battery lasts 5 hours and 40 minutes. When IDLE, wireless on: Battery lasts 3 hours and 20 minutes. When routing, wireless on: Battery lasts 2 hours. Computational deficiency Small-scale processing power, low memory capacity, and slow internal busses may be just a few of the reasons that prohibit the execution of complex calculations. Complex computational tasks such as the 4D bubble sort of 30,000 random integers: PDA requires 15 times more time than a laptop. PDA requires 40 times more time than a workstation.
15 Routing software vs. Proxy Routing software: It requires complex and power intensive calculations. It takes into account low layers of the OSI model. Resource-constrained devices may not be able to efficiently execute them. It requires high implementation effort. Proxy It bases its functionality on simple TPC/IP socket implementation. They can be light-weighted. They can be efficiently executed on resource-constrained devices. Proxies can be designed as Java-based stationary agents.
16 Agent diagram Bandwidth and Resources monitoring Temperature agent 2 Battery agent 5 3 CPU utilisation agent 4 Heap memory usage agent Resources monitoring agent 6 Proxy agent 7 TTCP transmitter agent 9 8 TTCP receiver agent 10 9 Bandwidth calculation agent 10 Data gathering agent 11 Librarian agent 11 File output Benchmarking bandwidth and Resource Consumptions multi-agent Software System (RCASS) is designed with purpose to benchmark bandwidth proxy-pdas in adhoc networks. It also has the capability of monitoring resources consumption of the PDA in terms of: Battery discharge rate, CPU utilisation, heap memory usage, and temperature.
17 Overview of the Bandwidth and Resources monitoring functionality TTCP receiver listens on a fixed port Proxy agents listens on a fixed port 1000, and forwards incoming traffic to the receiver at port TTCP transmitter sends network traffic to the proxy on port Once the proxy establishes a connection with the transmitter and receiver: It forwards incoming network traffic to the receiver. It creates the resource monitoring agent, which in turn creates: Temperature agent*. Battery agent. CPU utilisation agent. Heap memory agent. The transmitter and receiver calculate the bandwidth through the proxy for each iteration. The data gathering agent collects the results and passes them to the librarian agent. The librarian agents stores the results in output text files.
18 Proxy-based Bandwidth of PDAs Bandwidth Kbits/s Jeode CrEme JRE 1.3 Familiar Linux PocketPC 2003 PocketPC 2002 J9 The bandwidth offered by the proxy device highly depends on: The JVM used. The OS used. The highest bandwidth is achieved by PocketPC 2003 CrEme The lowest bandwidth is achieved by Jeode and J9 for PocketPC 2002.
19 Discharge rates for PDAs while acting as proxies Discharge rate (s) Familiar Linux PocketPC 2003 PocketPC 2002 The battery discharge rate ranges from 60 (s) - 70 (s). Familiar Linux applies better battery conservation mechanisms: Extends battery life by 30%, compared to PPC2003. Extends battery life by 35%, compared to PPC2002. J9 extends the battery life by 15%, compared to CrEme for PPC2003. However, the bandwidth is significantly lower
20 CPU utilisation of PDAs while acting as proxies CPU (%) Familiar Linux PocketPC 2003 PocketPC 2002 CPU utilisation while routing is ranging between 65% - 85%. JRE is the heaviest JVM. The lightest are Jeode and J9. CrEme is heavy as well requiring 80% of the CPU. Routing is a CPU-intensive task. The OS does not play a significant role in CPU utilisation.
21 Heap memory usage of PDAs while acting as proxies Heap (KB) Familiar Linux PocketPC 2003 PocketPC 2002 Heap memory is the memory used by Java objects to perform their tasks. Significant differences can be observed from the graph: CrEme and JRE 1.3 are the most heap-intensive JVMs. Others, are utilising similar heap memory. Heap memory usage seems to have a strong link to bandwidth: The higher the Heap memory usage the higher the bandwidth.
22 Internal temperature variation of PDAs while acting as proxies Celsius (C 0 ) J9 JRE 1.3 JRE 1.3 J9 Temperature readings were taken for each battery discharge by 1%. The overall variation in battery has been calculated. The proxy devices running J9 experiences faster increases in the overall temperature. This may be associated to the fact that J9 provides higher bandwidth than JRE 1.3/
23 Overview - Bandwidth of C/S and Proxy-PDAs Bandwidth (Mbits/s) Bandwidth (Kbits/s) PDA: Client - Server PDA: Proxy Minimum Maximum Client-Server, PDA: 4-5 Mbits/s. Client-Proxy-Server, PDA: 3-70 Kbits/s. Client-Proxy-Server, Laptop (medium powered device): Kbits/s. Client-Proxy-Server, Workstation (high powered device): Kbits/s Workstation Laptop PDA
24 06:00:00 04:48:00 03:36:00 02:24:00 01:12:00 00:00:00 Overview- Battery life of PDAs hh/mm/ss IDLE Wireless Routing Familiar PPC2003 PPC2002 Familiar Linux. IDLE: 5 hours and 25 minutes Wireless: 3 hours and 12 minutes. Routing: 2 hours and 18 minutes. PocketPC 2003 IDLE: 4 hours and 32 minutes. Wireless: 2 hours and 03 minutes. Routing: 1 hour and 50 minutes. PocketPC IDLE 3 hours and 58 minutes. Wireless: 1 hour and 58 minutes. Routing: 1 hour and 45 minutes.
25 Overview - Proxy results Proxy efficiency depend on: JVM used. OS used. Resources consumption on proxy-pdas is high in terms of: Battery life, CPU utilisation, Heap memory usage, and Temperature. PocketPC 2002 Jeode and J9 perform equally for PocketPC CrEme provides almost 3 times more bandwidth and utilises 3 times more heap memory than Jeode and J9. PocketPC J9 improves its bandwidth by 30% compared to PocketPC CrEme provides 6 times more bandwidth compared to PocketPC and utilises 4 times more heap memory. Familiar Linux. J9 provides 12 times more bandwidth compared to PocketPC 2002 and 8 times more compared to PocketPC It also adds 25 minutes battery life. JRE 1.3 is quite efficient for such a heavy JVM. It provides moderate bandwidth and doesn t over-consume resources. The stronger combination bandwidth-wise, is PocketPC 2003 with CrEme. A second alternative is Familiar Linux with J9, which achieves moderate bandwidth keeping the utilisation of resources quit low.
26 BASS Benchmarking multi-agent Software System BASS is a Java-based, light-weighted, multi-agent software system that is able to run on mobile devices. The purpose of BASS is to: Determine the fitness of mobile devices by performing standard tests: Group level tests: Operating System version. JVM version, and so on. Kernel-level tests: CPU tests: bubble sort and merge test. Memory and hard-drive tests. Monitor utilisation of devices: Network level tests: Bandwidth and latency. Error packets monitoring. Internet connectivity. Utilisation monitoring: Overall memory and CPU usage. Produce metrics which can later be used by the routing protocol to decide on optimal routes.
27 S Routing scenario (1) X S X Z Z Y Y W W High bandwidth Moderate bandwidth Low bandwidth Node OS JVM X Pocket PC 2003 CrEme Y PocketPC 2002 Jeode Z Familiar Linux J9 D Node X Y Z W Device PDA Laptop PDA PDA OS JVM Pocket PC 2003 CrEme Windows XP JRE 1.4 Familiar Linux JRE 1.3 PocketPC 2002 CrEme W PocketPC 2002 Optimal route from S to D: S -> X -> Z -> D J9 Optimal route from S to D: S -> Y ->W or Z -> D D
28 S Node X Y Z W X Battery life low high high moderate Y CPU utilisation high low low low Z Routing scenario (2) Node OS JVM X Pocket PC 2003 CrEme Y PocketPC 2002 Jeode Z Familiar Linux J9 W W PocketPC 2002 J9 Memory usage high low low low D Temperature moderate low low low Optimal route from S to D, bandwidth-wise: S -> X -> Z -> D However, X has: Low battery. High CPU utilisation. High memory usage. To be energy efficient, and light-weighted: Route will be: S -> Y -> Z -> D
29 Conclusions We have proved the concept of a proxy-pda and showed that it may be a good alternative to proper routing software due to its: Low implementation effort. Light-weighted nature. We have ported various JVMs to various OSs for ipaq PDAs. Familiar Linux: Blackdown JRE 1.3 and IBM J9. PocketPC 2003: IBM J9 and NSIcom CrEme. PocketPC Insignia Jeode, IBM J9, and NSIcom CrEme. We have proved that the OS and the JVM used can play an important role in the efficiency of the proxy-pda in terms of bandwidth, battery discharge rate, CPU utilisation, heap memory, and temperature. We have identified the best pair as being: PocketPC 2003 with CrEme and as an alternative to lower utilisation of PDA s resources with moderate bandwidth being: Familiar Linux with J9. We have shown the importance of BASS, which can be incorporated with MARIAN, in order to assist in metric-driven routing taking into account: Performance characteristics. Current Utilisation. Extensive research will now be concentrated in building up a scalable model for direct and indirect communication range network discovery and indirect. The next stage includes simulating MARIAN using Network Simulation (NS 2) and compare its performance to traditional routing protocols such as DSR, AODV, and so on.
30 Publications IEEE ECBS 2003 Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS WWW/Internet 2003 MARIAN: A framework using Mobile Agents for Routing In Ad-hoc Networks. IEEE ECBS 2004 Migration of Mobile Agents in Adhoc, Wireless Networks Elsevier Journal of Ad-Hoc Networks (2004) Analysis of an Agent-based Metric- Driven Method for Ad-hoc, On- Demand Routing
31 Questions Thank you!!!
SUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationKEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION
Mobile commerce approach based on mobile Oussama Zerdoumi, Department of Mathematics and Computer Science, University of Kasdi Merbah Ouargla, 30000 Algeria Okba Kazar, Saber Benharzallah Department of
More informationA PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS
A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS Marios D. Dikaiakos Department of Computer Science University of Cyprus George Samaras Speaker: Marios D. Dikaiakos mdd@ucy.ac.cy http://www.cs.ucy.ac.cy/mdd
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationDesign and Implementation of a Simulator for Ad Hoc Network Routing Protocol
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing
More informationUsing Tcl Mobile Agents for Monitoring Distributed Computations
Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationA Novel Review on Routing Protocols in MANETs
Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract
More informationOpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student
OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater
More informationDiffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading
Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India
ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Review on Congestion Control in MANET
More informationC3PO: Computation Congestion Control (PrOactive)
C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationOverview of MOSIX. Prof. Amnon Barak Computer Science Department The Hebrew University.
Overview of MOSIX Prof. Amnon Barak Computer Science Department The Hebrew University http:// www.mosix.org Copyright 2006-2017. All rights reserved. 1 Background Clusters and multi-cluster private Clouds
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationFinding Optimal Tour Length of Mobile Agent in Wireless Sensor Network
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department
More informationDelay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks
Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,
More informationRemote Health Monitoring for an Embedded System
July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction
More informationAgent Technology for Network Management. Stuart Wagner Sudha Ramesh
Agent Technology for Network Management Stuart Wagner ssw@research.telcordia.com Sudha Ramesh sudha@research.telcordia.com Keith Landgraf kflandg@lts.ncsc.mil October 10, 2002 An SAIC Company Outline Some
More informationAgent-based Ad-hoc On-demand routing over Ad-Hoc Wireless Networks. Graham Sinclair
Agent-based Ad-hoc On-demand routing over Ad-Hoc Wireless Networks Graham Sinclair Submitted in partial fulfilment of the requirements of Napier University for the Degree of BEng with Honours in Software
More informationA tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With
More informationCOMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK
COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,
More information[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationMaximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication
Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationA New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm
A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short
More informationIntroduction to Mobile Ubiquitous Computing Systems
CPET 565 Mobile Computing Systems CPET/ITC 499 Mobile Computing Lecture 1 Introduction to Mobile Ubiquitous Computing Systems Paul I-Hai Lin, Professor Spring 2016 A Specialty Course Purdue University
More informationCo-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud
571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,
More informationGeospatial Information Service Based on Ad Hoc Network
I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling
More informationWireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 20 UAV Networks- Part- III So we come to finally,
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationDistributed Computing: PVM, MPI, and MOSIX. Multiple Processor Systems. Dr. Shaaban. Judd E.N. Jenne
Distributed Computing: PVM, MPI, and MOSIX Multiple Processor Systems Dr. Shaaban Judd E.N. Jenne May 21, 1999 Abstract: Distributed computing is emerging as the preferred means of supporting parallel
More informationTowards Introducing Code Mobility on J2ME. Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland
Towards Introducing Code Mobility on J2ME Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland www.mccg.ucc.ie Mobile Ad Hoc Networks Heterogeneous mobile devices No fixed
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationCSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges
CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationResource management issues in mobile ad hoc networks (MANET)
Autonomic Communication and Knowledge Plane Resource management in autonomic communication Resource management issues in mobile ad hoc networks (MANET) S-38.4030 The aim of this presentation is to give
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationThe Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact
More informationMobile Ad-Hoc Wireless Network
Mobile Ad-Hoc Wireless Network Krunal N. Chandewar, H.R. Deshmukha Computer science Computer science,amravati university Amravati university Satkar Nagar, Nagpur Road Bhandara, India Abstract An ad hoc
More informationSecurity improvement in IOT based on Software
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the
More informationMobile and Heterogeneous databases
Mobile and Heterogeneous databases Heterogeneous Distributed Databases Transaction Processing A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures.
More informationSTUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless
More informationBroad Objectives/Outcomes of the course
Broad Objectives/Outcomes of the course Course Aims: Introduces the basic concepts and principles in mobile computing. The major techniques involved, and networks & systems issues for the design and implementation
More informationReliable and Efficient flooding Algorithm for Broadcasting in VANET
Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,
More informationWhite Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0
White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationA Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationComprehensive Study and Review Various Routing Protocols in MANET
126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet
More informationWireless Embedded Systems ( x) Ad hoc and Sensor Networks
Wireless Embedded Systems (0120442x) Ad hoc and Sensor Networks Chaiporn Jaikaeo chaiporn.j@ku.ac.th Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationWHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures
ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director
More informationA Review Paper on Secure Routing Technique for MANETs
A Review Paper on Secure Routing Technique for MANETs Sonali Sharma 1, Simranjit Kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani),
More informationAdaptive Cluster Computing using JavaSpaces
Adaptive Cluster Computing using JavaSpaces Jyoti Batheja and Manish Parashar The Applied Software Systems Lab. ECE Department, Rutgers University Outline Background Introduction Related Work Summary of
More informationAn Analysis of Peer-to-Peer Traffic. over an Ad-Hoc Network
An Analysis of Peer-to-Peer Traffic Ensc 427 : Communication Networks Spring 2013 Final Presentation Team 13 www.sfu.ca/~yha64/ensc327 over an Ad-Hoc Network Ian Brown, 301072798 itb at sfu dot ca Yumin
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationChapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS
Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationA Review paper on Routing Protocol Comparison
A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna
More informationDISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA
DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678
More informationBandwidth Overview. Rev Whitepaper
Rev. 1.03 Whitepaper About the Arel ICP Platform Arel s Integrated Conferencing Platform TM (ICP) is an advanced platform that combines the critical aspects of verbal and visual communication video and
More informationCentralized System in MANET with GRP Protocol
ISSN (e): 2250 3005 Volume, 06 Issue, 11 November 2016 International Journal of Computational Engineering Research (IJCER) Centralized System in MANET with GRP Protocol 1 Vipin Verma, 2 Saurabh Sharma
More informationPerformance evaluation of reactive and proactive routing protocol in IEEE ad hoc network
Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationDYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS
DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS Melvin John Supervised By Dr. Cheryl Pope & Dr. Cruz Izu Submitted to the School of Computer Science The University
More informationAn Energy Efficient Intrusion Detection System in MANET.
An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationRealizing the Promise of SANs
Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry
More informationCollaborative Conferencing
CHAPTER 8 Revised: March 30, 2012, When there are three or more participants involved in a call, the call becomes a conference. In collaborative conferencing, the audio, video and content from some or
More informationLocation-based Services in Ubiquitous Computing Environments
Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.
More informationImplementation of Quality of Services (QoS) for Based Wireless Mesh Network
Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh
More informationCommunication issues in Large Scale Wireless Ad hoc Networks
Communication issues in Large Scale Wireless Ad hoc Networks Abstract M. Adda, G. Owen, M. Kasassbeh, A. Paraskelidis, A. Peart University of Portsmouth Ad-hoc networks are networks that are formed automatically
More informationNETWORKING COMPONENTS
1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More information