Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN

Size: px
Start display at page:

Download "Year, pier University Nikos Migas PhD student 2 Supervisors: School of Computing, Na MARIAN"

Transcription

1 MARIAN Mobile Agents for Routing In Ad-hoc Networks Nikos Migas PhD student 2 nd Year, School of Computing, Napier University n.migas@napier.ac.uk Supervisors: W.Buchanan, K.McArtney

2 Introduction MARIAN is an on-demand, multi-agent, metric-driven routing protocol in ad-hoc networks. It utilises both static and mobile agents to determine optimal routes and to actually route the data. Each mobile device is equipped with a: Proxy agent. responsible for forwarding network traffic. Java-based, multithreaded allowing multiple connections. Benchmarking multi-agent Software System (BASS). Executing standard performance tests (memory, CPU, processing capabilities, etc.). Monitoring the utilisation of the device. Producing a metric of the performance of the devices in real-time. The purpose of this presentation is to introduce this novel research area and to present the novel findings concerning: Proxy capabilities of resource-constrained devices. The effect the OS and the JVM may have in performance. The resources consumption rates while routing, in terms of: Battery discharge rate, CPU utilisation, heap memory usage, and temperature.

3 Research Hypothesis Is it possible to create an automatically configuring system which will route data through ad-hoc networks in an optimal way? For this we propose: A framework using static and mobile agents that can be used for routing, network discovery, and automatic network reconfiguration in ad-hoc networks, in an efficient, effective, and secure way. Virtual Internet domain wireless domain

4 Possible benefits and outcomes (1) Maximize network performance Mobile agents could filter huge amounts of data locally to the devices, generated by BASS. Thus, benefit from local interactions. Determination of low and high bandwidth routes. Low bandwidth routes will be used for asynchronous network traffic ( s, text), while high bandwidth routes for synchronous network traffic (real-time audio, video). Scalability MAs are inherently distributed, thus there is a scope for a totally distributed system. The workload will be distributed evenly:» High performance devices will be responsible for complex calculations and tasks.» Low performance devices will be used as an alternative when high performance devices are unavailable or busy. Dynamic Mobile agents are reactive, that is, they sense the environment, and react in changes of the environment. Reliable end-to-end communications Mobile agents will migrate to other network nodes and communicate locally. Mobile agents can wait until the network is available, and migrate then.

5 Possible benefits and outcomes (2) QoS guarantees The transmitting device could request an estimate of the available bandwidth through a certain route. Security Only authenticated agents will participate in the routing process. A guard static agent will protect device s resources from potential malicious agents. Balance between security and performance. Reconfigurability Mobile agents can be easily dispatched to install updates in the routing protocol. Energy efficient Devices with low performance characteristics, or low battery life will not be overutilised by the routing protocol.» Busy devices will not participate in routing, as long as other devices can do the same job.» If battery life of a device is low, the routing protocol will consider that device as a weak link.

6 Background Wireless networks and the usage of mobile devices are becoming increasingly popular, especially in creating ad-hoc networks The great benefit of wireless networks is the ability of users to communicate, cooperate, and access the networked services in an anytime and anywhere fashion. Wireless networks can be grouped into two categories: Infrastructured networks Fixed and wired gateways, with access points A mobile unit connects to, and communicates with, the nearest access point that is within its communication radius. Infrastructure-less networks (typically known as ad-hoc networks) A collection of geographically distributed mobile nodes that communicate with one another over a wireless medium without the need of fixed networking equipment, such as routers and switches. Mobile nodes could act as gateways to other networks.

7 Routing in Ad-hoc networks Routing is the most important function in ad-hoc networks, however a challenging issue: Mobility e.g. A route that is considered as good now, may become unavailable or not optimal some time later Routing requires a lot of processing power Mobile nodes running on batteries may not be able to cope Multimedia traffic? Asynchronous A traffic? B Secure traffic?

8 Applications of Ad-hoc networks Military Battlefield Terrorism & Rescue Operations Hospitals Evacuation of a building on fire Retrieve patient s information from hospital s database while in surgery Conference meetings Share information quickly Schedule meetings Networking while on the road Inter-vehicle communication

9 Mobile Agents (1) Proposed as a promising solution for distributed computing over open and heterogeneous networks. Proposed to overcome certain limitations of traditionally designed distributed systems such as client-server. A mobile agent can be defined as a software program that can suspend its execution on a host computer, transfer itself to another agentenabled host on the network, and resume its execution on the new host. The key features of mobile agents are: Mobility; networks awareness; communication; intelligence; reactivity; autonomous; goal-oriented; temporarily continuous; learning; flexible; and character A mobile agent consists of its code and state, which carries with it during the self-initiated migration

10 Mobile agents v. client/server? Server Agent migrates to the server Agent Agent communicates with the server, on the server Mobile agents in a client/ server architecture Network Response message Get message Traditional agent in a client/ server architecture Server Client

11 Mobile Agents Systems (MAS) Mobile agent systems provide an environment in which mobile agents can exist and offer standardized services to agents docking on Services include: communication; migration; security; creation and termination of agents Many mobile agent systems have been developed from academic and industrial background. According to a comprehensive list on MAS (Fritz Hohl, Stuttgart): There exist approximately 70 mobile agents systems (commercial & educational). Most MAS are implemented in Java due to platform independence. Some well-know are: MOLE, Telescript, Aglets Workbench, ffmain, D Agents, Tracy, and Grasshopper. However, only few support mobile devices: Grasshopper ME (PocketPC)» The most comprehensive MAS for PDAs.» Well-documented. AgentSpace (PocketPC)» Insufficient documentation. Tracy 2 (PocketPC)» Under development. No real support for other Operating Systems (OSs): Familiar Linux. Embedded Linux.

12 Mobile agent applications Mobile agent paradigm has been proposed for a number of applications: Internet-wide collaboration systems. Network management. Monitoring systems. Information retrieval. Intrusion detection systems. E-commerce. A new potential application that mobile agents are ideal is wireless networks Mobile agents support asynchronous communication, and flexible query processing. User tasks can be delegated to mobile agents, and then a mobile client can disconnect. Can reduce network traffic under some certain circumstances. Maintain load balancing.

13 JVM support for handhelds Most mobile agent systems are developed in Java: Platform independence. Portability of code, which is the nature of mobile agents. Therefore a JVM is necessary to provide the: Execution environment for MAS. Familiar Linux Pocket PC 2003 Pocket PC 2002 Grasshopper ME/SE J9 JRE 1.3 Grasshopper ME J9 CrEme Jeode Grasshopper ME J9 CrEme IBM J9, Insignia Jeode, NSIcom CrEme, and Blackdown JRE 1.3 are Sun certified JVMs. Jeode is only available for PocketPC J9 does not officially support Familiar Linux. JRE 1.3 is the implementation of the full Java 1.3 version. The rest are J2ME compatible.

14 Resource-constrained devices (PDAs): Limited bandwidth Average when operating in a client-server mode. Approximately 4-5Mbits/s. Dramatically reduced when acting as a proxy. Ranges between 3-70Kbits/s. Workstations and laptops achieve up to 10 times more. Power consumption (Familiar Linux, ipaq). When IDLE: Battery lasts 5 hours and 40 minutes. When IDLE, wireless on: Battery lasts 3 hours and 20 minutes. When routing, wireless on: Battery lasts 2 hours. Computational deficiency Small-scale processing power, low memory capacity, and slow internal busses may be just a few of the reasons that prohibit the execution of complex calculations. Complex computational tasks such as the 4D bubble sort of 30,000 random integers: PDA requires 15 times more time than a laptop. PDA requires 40 times more time than a workstation.

15 Routing software vs. Proxy Routing software: It requires complex and power intensive calculations. It takes into account low layers of the OSI model. Resource-constrained devices may not be able to efficiently execute them. It requires high implementation effort. Proxy It bases its functionality on simple TPC/IP socket implementation. They can be light-weighted. They can be efficiently executed on resource-constrained devices. Proxies can be designed as Java-based stationary agents.

16 Agent diagram Bandwidth and Resources monitoring Temperature agent 2 Battery agent 5 3 CPU utilisation agent 4 Heap memory usage agent Resources monitoring agent 6 Proxy agent 7 TTCP transmitter agent 9 8 TTCP receiver agent 10 9 Bandwidth calculation agent 10 Data gathering agent 11 Librarian agent 11 File output Benchmarking bandwidth and Resource Consumptions multi-agent Software System (RCASS) is designed with purpose to benchmark bandwidth proxy-pdas in adhoc networks. It also has the capability of monitoring resources consumption of the PDA in terms of: Battery discharge rate, CPU utilisation, heap memory usage, and temperature.

17 Overview of the Bandwidth and Resources monitoring functionality TTCP receiver listens on a fixed port Proxy agents listens on a fixed port 1000, and forwards incoming traffic to the receiver at port TTCP transmitter sends network traffic to the proxy on port Once the proxy establishes a connection with the transmitter and receiver: It forwards incoming network traffic to the receiver. It creates the resource monitoring agent, which in turn creates: Temperature agent*. Battery agent. CPU utilisation agent. Heap memory agent. The transmitter and receiver calculate the bandwidth through the proxy for each iteration. The data gathering agent collects the results and passes them to the librarian agent. The librarian agents stores the results in output text files.

18 Proxy-based Bandwidth of PDAs Bandwidth Kbits/s Jeode CrEme JRE 1.3 Familiar Linux PocketPC 2003 PocketPC 2002 J9 The bandwidth offered by the proxy device highly depends on: The JVM used. The OS used. The highest bandwidth is achieved by PocketPC 2003 CrEme The lowest bandwidth is achieved by Jeode and J9 for PocketPC 2002.

19 Discharge rates for PDAs while acting as proxies Discharge rate (s) Familiar Linux PocketPC 2003 PocketPC 2002 The battery discharge rate ranges from 60 (s) - 70 (s). Familiar Linux applies better battery conservation mechanisms: Extends battery life by 30%, compared to PPC2003. Extends battery life by 35%, compared to PPC2002. J9 extends the battery life by 15%, compared to CrEme for PPC2003. However, the bandwidth is significantly lower

20 CPU utilisation of PDAs while acting as proxies CPU (%) Familiar Linux PocketPC 2003 PocketPC 2002 CPU utilisation while routing is ranging between 65% - 85%. JRE is the heaviest JVM. The lightest are Jeode and J9. CrEme is heavy as well requiring 80% of the CPU. Routing is a CPU-intensive task. The OS does not play a significant role in CPU utilisation.

21 Heap memory usage of PDAs while acting as proxies Heap (KB) Familiar Linux PocketPC 2003 PocketPC 2002 Heap memory is the memory used by Java objects to perform their tasks. Significant differences can be observed from the graph: CrEme and JRE 1.3 are the most heap-intensive JVMs. Others, are utilising similar heap memory. Heap memory usage seems to have a strong link to bandwidth: The higher the Heap memory usage the higher the bandwidth.

22 Internal temperature variation of PDAs while acting as proxies Celsius (C 0 ) J9 JRE 1.3 JRE 1.3 J9 Temperature readings were taken for each battery discharge by 1%. The overall variation in battery has been calculated. The proxy devices running J9 experiences faster increases in the overall temperature. This may be associated to the fact that J9 provides higher bandwidth than JRE 1.3/

23 Overview - Bandwidth of C/S and Proxy-PDAs Bandwidth (Mbits/s) Bandwidth (Kbits/s) PDA: Client - Server PDA: Proxy Minimum Maximum Client-Server, PDA: 4-5 Mbits/s. Client-Proxy-Server, PDA: 3-70 Kbits/s. Client-Proxy-Server, Laptop (medium powered device): Kbits/s. Client-Proxy-Server, Workstation (high powered device): Kbits/s Workstation Laptop PDA

24 06:00:00 04:48:00 03:36:00 02:24:00 01:12:00 00:00:00 Overview- Battery life of PDAs hh/mm/ss IDLE Wireless Routing Familiar PPC2003 PPC2002 Familiar Linux. IDLE: 5 hours and 25 minutes Wireless: 3 hours and 12 minutes. Routing: 2 hours and 18 minutes. PocketPC 2003 IDLE: 4 hours and 32 minutes. Wireless: 2 hours and 03 minutes. Routing: 1 hour and 50 minutes. PocketPC IDLE 3 hours and 58 minutes. Wireless: 1 hour and 58 minutes. Routing: 1 hour and 45 minutes.

25 Overview - Proxy results Proxy efficiency depend on: JVM used. OS used. Resources consumption on proxy-pdas is high in terms of: Battery life, CPU utilisation, Heap memory usage, and Temperature. PocketPC 2002 Jeode and J9 perform equally for PocketPC CrEme provides almost 3 times more bandwidth and utilises 3 times more heap memory than Jeode and J9. PocketPC J9 improves its bandwidth by 30% compared to PocketPC CrEme provides 6 times more bandwidth compared to PocketPC and utilises 4 times more heap memory. Familiar Linux. J9 provides 12 times more bandwidth compared to PocketPC 2002 and 8 times more compared to PocketPC It also adds 25 minutes battery life. JRE 1.3 is quite efficient for such a heavy JVM. It provides moderate bandwidth and doesn t over-consume resources. The stronger combination bandwidth-wise, is PocketPC 2003 with CrEme. A second alternative is Familiar Linux with J9, which achieves moderate bandwidth keeping the utilisation of resources quit low.

26 BASS Benchmarking multi-agent Software System BASS is a Java-based, light-weighted, multi-agent software system that is able to run on mobile devices. The purpose of BASS is to: Determine the fitness of mobile devices by performing standard tests: Group level tests: Operating System version. JVM version, and so on. Kernel-level tests: CPU tests: bubble sort and merge test. Memory and hard-drive tests. Monitor utilisation of devices: Network level tests: Bandwidth and latency. Error packets monitoring. Internet connectivity. Utilisation monitoring: Overall memory and CPU usage. Produce metrics which can later be used by the routing protocol to decide on optimal routes.

27 S Routing scenario (1) X S X Z Z Y Y W W High bandwidth Moderate bandwidth Low bandwidth Node OS JVM X Pocket PC 2003 CrEme Y PocketPC 2002 Jeode Z Familiar Linux J9 D Node X Y Z W Device PDA Laptop PDA PDA OS JVM Pocket PC 2003 CrEme Windows XP JRE 1.4 Familiar Linux JRE 1.3 PocketPC 2002 CrEme W PocketPC 2002 Optimal route from S to D: S -> X -> Z -> D J9 Optimal route from S to D: S -> Y ->W or Z -> D D

28 S Node X Y Z W X Battery life low high high moderate Y CPU utilisation high low low low Z Routing scenario (2) Node OS JVM X Pocket PC 2003 CrEme Y PocketPC 2002 Jeode Z Familiar Linux J9 W W PocketPC 2002 J9 Memory usage high low low low D Temperature moderate low low low Optimal route from S to D, bandwidth-wise: S -> X -> Z -> D However, X has: Low battery. High CPU utilisation. High memory usage. To be energy efficient, and light-weighted: Route will be: S -> Y -> Z -> D

29 Conclusions We have proved the concept of a proxy-pda and showed that it may be a good alternative to proper routing software due to its: Low implementation effort. Light-weighted nature. We have ported various JVMs to various OSs for ipaq PDAs. Familiar Linux: Blackdown JRE 1.3 and IBM J9. PocketPC 2003: IBM J9 and NSIcom CrEme. PocketPC Insignia Jeode, IBM J9, and NSIcom CrEme. We have proved that the OS and the JVM used can play an important role in the efficiency of the proxy-pda in terms of bandwidth, battery discharge rate, CPU utilisation, heap memory, and temperature. We have identified the best pair as being: PocketPC 2003 with CrEme and as an alternative to lower utilisation of PDA s resources with moderate bandwidth being: Familiar Linux with J9. We have shown the importance of BASS, which can be incorporated with MARIAN, in order to assist in metric-driven routing taking into account: Performance characteristics. Current Utilisation. Extensive research will now be concentrated in building up a scalable model for direct and indirect communication range network discovery and indirect. The next stage includes simulating MARIAN using Network Simulation (NS 2) and compare its performance to traditional routing protocols such as DSR, AODV, and so on.

30 Publications IEEE ECBS 2003 Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-hoc Networks. IADIS WWW/Internet 2003 MARIAN: A framework using Mobile Agents for Routing In Ad-hoc Networks. IEEE ECBS 2004 Migration of Mobile Agents in Adhoc, Wireless Networks Elsevier Journal of Ad-Hoc Networks (2004) Analysis of an Agent-based Metric- Driven Method for Ad-hoc, On- Demand Routing

31 Questions Thank you!!!

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

KEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION

KEYWORDS. Mobile commerce, E-commerce, mobile agent, SMA, Aglet. 1 INTRODUCTION Mobile commerce approach based on mobile Oussama Zerdoumi, Department of Mathematics and Computer Science, University of Kasdi Merbah Ouargla, 30000 Algeria Okba Kazar, Saber Benharzallah Department of

More information

A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS

A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS A PERFORMANCE ANALYSIS FRAMEWORK FOR MOBILE-AGENT SYSTEMS Marios D. Dikaiakos Department of Computer Science University of Cyprus George Samaras Speaker: Marios D. Dikaiakos mdd@ucy.ac.cy http://www.cs.ucy.ac.cy/mdd

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing

More information

Using Tcl Mobile Agents for Monitoring Distributed Computations

Using Tcl Mobile Agents for Monitoring Distributed Computations Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student

OpenCache. A Platform for Efficient Video Delivery. Matthew Broadbent. 1 st Year PhD Student OpenCache A Platform for Efficient Video Delivery Matthew Broadbent 1 st Year PhD Student Motivation Consumption of video content on the Internet is constantly expanding Video-on-demand is an ever greater

More information

Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading

Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Review on Congestion Control in MANET

More information

C3PO: Computation Congestion Control (PrOactive)

C3PO: Computation Congestion Control (PrOactive) C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Overview of MOSIX. Prof. Amnon Barak Computer Science Department The Hebrew University.

Overview of MOSIX. Prof. Amnon Barak Computer Science Department The Hebrew University. Overview of MOSIX Prof. Amnon Barak Computer Science Department The Hebrew University http:// www.mosix.org Copyright 2006-2017. All rights reserved. 1 Background Clusters and multi-cluster private Clouds

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Remote Health Monitoring for an Embedded System

Remote Health Monitoring for an Embedded System July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction

More information

Agent Technology for Network Management. Stuart Wagner Sudha Ramesh

Agent Technology for Network Management. Stuart Wagner Sudha Ramesh Agent Technology for Network Management Stuart Wagner ssw@research.telcordia.com Sudha Ramesh sudha@research.telcordia.com Keith Landgraf kflandg@lts.ncsc.mil October 10, 2002 An SAIC Company Outline Some

More information

Agent-based Ad-hoc On-demand routing over Ad-Hoc Wireless Networks. Graham Sinclair

Agent-based Ad-hoc On-demand routing over Ad-Hoc Wireless Networks. Graham Sinclair Agent-based Ad-hoc On-demand routing over Ad-Hoc Wireless Networks Graham Sinclair Submitted in partial fulfilment of the requirements of Napier University for the Degree of BEng with Honours in Software

More information

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents. A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With

More information

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

Introduction to Mobile Ubiquitous Computing Systems

Introduction to Mobile Ubiquitous Computing Systems CPET 565 Mobile Computing Systems CPET/ITC 499 Mobile Computing Lecture 1 Introduction to Mobile Ubiquitous Computing Systems Paul I-Hai Lin, Professor Spring 2016 A Specialty Course Purdue University

More information

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud 571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 20 UAV Networks- Part- III So we come to finally,

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Distributed Computing: PVM, MPI, and MOSIX. Multiple Processor Systems. Dr. Shaaban. Judd E.N. Jenne

Distributed Computing: PVM, MPI, and MOSIX. Multiple Processor Systems. Dr. Shaaban. Judd E.N. Jenne Distributed Computing: PVM, MPI, and MOSIX Multiple Processor Systems Dr. Shaaban Judd E.N. Jenne May 21, 1999 Abstract: Distributed computing is emerging as the preferred means of supporting parallel

More information

Towards Introducing Code Mobility on J2ME. Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland

Towards Introducing Code Mobility on J2ME. Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland Towards Introducing Code Mobility on J2ME Laurentiu Lucian Petrea and Dan Grigoras Computer Science Department UCC Cork, Ireland www.mccg.ucc.ie Mobile Ad Hoc Networks Heterogeneous mobile devices No fixed

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science

More information

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

Resource management issues in mobile ad hoc networks (MANET)

Resource management issues in mobile ad hoc networks (MANET) Autonomic Communication and Knowledge Plane Resource management in autonomic communication Resource management issues in mobile ad hoc networks (MANET) S-38.4030 The aim of this presentation is to give

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding GTAR-2014, Vol. 1, 463--469 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-30-5 GTAR-14 The Impact

More information

Mobile Ad-Hoc Wireless Network

Mobile Ad-Hoc Wireless Network Mobile Ad-Hoc Wireless Network Krunal N. Chandewar, H.R. Deshmukha Computer science Computer science,amravati university Amravati university Satkar Nagar, Nagpur Road Bhandara, India Abstract An ad hoc

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

Mobile and Heterogeneous databases

Mobile and Heterogeneous databases Mobile and Heterogeneous databases Heterogeneous Distributed Databases Transaction Processing A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures.

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Broad Objectives/Outcomes of the course

Broad Objectives/Outcomes of the course Broad Objectives/Outcomes of the course Course Aims: Introduces the basic concepts and principles in mobile computing. The major techniques involved, and networks & systems issues for the design and implementation

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks Wireless Embedded Systems (0120442x) Ad hoc and Sensor Networks Chaiporn Jaikaeo chaiporn.j@ku.ac.th Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl

More information

Cisco 5921 Embedded Services Router

Cisco 5921 Embedded Services Router Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director

More information

A Review Paper on Secure Routing Technique for MANETs

A Review Paper on Secure Routing Technique for MANETs A Review Paper on Secure Routing Technique for MANETs Sonali Sharma 1, Simranjit Kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani),

More information

Adaptive Cluster Computing using JavaSpaces

Adaptive Cluster Computing using JavaSpaces Adaptive Cluster Computing using JavaSpaces Jyoti Batheja and Manish Parashar The Applied Software Systems Lab. ECE Department, Rutgers University Outline Background Introduction Related Work Summary of

More information

An Analysis of Peer-to-Peer Traffic. over an Ad-Hoc Network

An Analysis of Peer-to-Peer Traffic. over an Ad-Hoc Network An Analysis of Peer-to-Peer Traffic Ensc 427 : Communication Networks Spring 2013 Final Presentation Team 13 www.sfu.ca/~yha64/ensc327 over an Ad-Hoc Network Ian Brown, 301072798 itb at sfu dot ca Yumin

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA

DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA DISTRIBUTED HIGH-SPEED COMPUTING OF MULTIMEDIA DATA M. GAUS, G. R. JOUBERT, O. KAO, S. RIEDEL AND S. STAPEL Technical University of Clausthal, Department of Computer Science Julius-Albert-Str. 4, 38678

More information

Bandwidth Overview. Rev Whitepaper

Bandwidth Overview. Rev Whitepaper Rev. 1.03 Whitepaper About the Arel ICP Platform Arel s Integrated Conferencing Platform TM (ICP) is an advanced platform that combines the critical aspects of verbal and visual communication video and

More information

Centralized System in MANET with GRP Protocol

Centralized System in MANET with GRP Protocol ISSN (e): 2250 3005 Volume, 06 Issue, 11 November 2016 International Journal of Computational Engineering Research (IJCER) Centralized System in MANET with GRP Protocol 1 Vipin Verma, 2 Saurabh Sharma

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS Melvin John Supervised By Dr. Cheryl Pope & Dr. Cruz Izu Submitted to the School of Computer Science The University

More information

An Energy Efficient Intrusion Detection System in MANET.

An Energy Efficient Intrusion Detection System in MANET. An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Realizing the Promise of SANs

Realizing the Promise of SANs Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry

More information

Collaborative Conferencing

Collaborative Conferencing CHAPTER 8 Revised: March 30, 2012, When there are three or more participants involved in a call, the call becomes a conference. In collaborative conferencing, the audio, video and content from some or

More information

Location-based Services in Ubiquitous Computing Environments

Location-based Services in Ubiquitous Computing Environments Location-based Services in Ubiquitous Computing Environments National Institute of Informatics Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Design and Implementation 4. Applications 5.

More information

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh

More information

Communication issues in Large Scale Wireless Ad hoc Networks

Communication issues in Large Scale Wireless Ad hoc Networks Communication issues in Large Scale Wireless Ad hoc Networks Abstract M. Adda, G. Owen, M. Kasassbeh, A. Paraskelidis, A. Peart University of Portsmouth Ad-hoc networks are networks that are formed automatically

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information