Buffered Based Routing and Resiliency Approach for WMN
|
|
- Owen Carpenter
- 6 years ago
- Views:
Transcription
1 Buffered Based Routing and Resiliency Approach for WMN 1 eetanjali Rathee, Ankit Mundra (MIEEE) 1, Department of Computer cience and Engineering Jaypee University of Information Technology Waknaghat, India eetanjali.rathee1@gmail.com, ankit.mundra@ieee.org Nitin Rakesh (LMCI, MIEEE), 4.P. hrera (FBC, MIEEE), 4 Department of Computer cience and Engineering & ICT Jaypee University of Information Technology Waknaghat, India nitin.rakesh@ieee.org, 4 sp.ghrera@rediffmail.com Abstract everal approaches to effectively perform communication in Wireless Mesh Network (WMN) have been proposed. Further communication failures and possibilities of minimum services during such failures are very hard to maintain. Recently resilient multicasting and Resilient Opportunistic Mesh Routing for WMN (ROMER) approaches proposed routing and resilient methods over WMN. Resilient multicasting approach establishes two node disjoint path between each source-destination pair. But this approach can immune from any single link or intermediate node failure. While ROMER approach provides redundant copies of data in randomized manner to increase WMN throughput. We have proposed Buffer Based Routing method in which instead of maintaining routing table at each node we provide buffering at each node which reduces routing cost. At specific interval of time (after specified communication steps) it clears the buffer to increase performance and prevent overhead in network. Using this approach we effectively perform resiliency and exploits advantages of WMN. The performance of the proposed approach is studied by evaluating the cost involved in routing and resiliency using these approaches and compared with the proposed approach. Index Terms WMN; Resiliency; Buffers; Routing I. INTRODUCTION When considering a Wireless Mesh Network (WMN) [1], resiliency [] is becoming a key requirement and service primitive for various applications. everal algorithms [-11] based on resiliency for WMN have been proposed. We have considered two of these recently proposed approaches; 1) Resilient Multicasting in WMN [1]; ) Resilient Opportunistic Mesh Routing for Wireless Mesh Networks (ROMER) [1]. To examine resilient multicasting approach [1] over WMN, we consider a WMN (figure 1) with source node and multiple destination nodes D = {,,... } to reach from source to destination. Resilient multicast [1] will select at least two disjoint-node path for each {, D} pair. In case of failure,traffic will switch to another path to reach the destination. But one of the major drawbacks of resilient multicast is that it increases the network congestion and can immune from any single node/link failure in network. While ROMER [1] define credit based forwarding approach to transmit data from source to destination D. ource node will forward the packet by taking maximum credit cost. At each node, value of and will be calculated; where is the credit cost to reach from one node to its sink node and is the threshold value. ource node will forward data with maximum credit to its sink node. As the sink node will get the data it will calculate value of and compare value of and. If then only node will forward the packet, otherwise it will simply discard the packet. The drawback of this algorithm is that if node cost is higher, there is a possibility to discard the packet even at initial stage. In this paper we studied various drawbacks of these approaches and proposed a Buffer Based Routing Approach which removes disadvantage of previous approaches and is more advantageous than these two approaches. Fig. 1. Example of a Wireless Mesh Network. The paper is divided in five sections. In section two we demonstrate execution of recently proposed approaches: Resilient Multicasting in WMN [1] and ROMER [1] and study their performance using a common network example.. In section three we have proposed our Buffer Based Routing (BBR) approach. In section four we analyze the performance of proposed approach. Finally we conclude the paper and discuss the future scope of the work. II. COMPARATIVE ANALYI OF PREVIOU APPROACHE In this section we have compared the performance of previous approaches (Resilient Multicasting in WMN [1] and ROMER [1]). This comparative study evaluates disadvantage of these popular approaches to communicate data in WMN. For this study we have considered a WMN as shown in figure 1. The B F
2 network consists of one source () node and three destination,, nodes. Remaining nodes of this network are intermediate nodes. We have firstly evaluated [1] and then [1]. Resilient multicast [1] proposed resiliency based routing approach with two node disjoint-paths for each, pairs. Let us examine this approach using WMN as in figure1 where,, are three disjoint-paths between,. The possible steps to communicate data between, in WMN using [1] are path estimation and failure recovery. tep1: Path Estimation This step calculates two node disjoint-paths for each,. Output: possible disjoint-paths for figure 1 are as in Table 1: Path\, TABLE I. PATH EVALUATION ource Destination Pair 1 According to Table1 from there exist two paths and [ and packets will be flooded over both paths concurrently. This approach will increase traffic over two node disjoint path to send packet to a destination. The major drawback of this approach is increase in network congestion. Another drawback with this approach is that it estimates only first two disjoint paths even if other shortest paths exist. tep : Failure Recovery In previous step two distinct paths are generated to communicate from source to all three destinations,, (as shown in Table1). Failures may always exist in network during communication. Resilient multicast considers two types of failures in network i.e. node failure and link failure. To explain node/link failure and its recovery let us consider an example where source is and destination is. Now according to step1 there exist two disjoint paths and. B F B F The below given cases show the consequences of node/link failure and its recovery using resilient multicast approach [1]. Case 1: (Node Failure) initially both and paths were followed concurrently to communicate the data between. If node fails, destination node switches to the unaffected path i.e..imilarly will follow and will follow path. Thus even during failure of node, data communication from source to destination,, can be achieved (see figure ). Case : (Node Failure) if node C fails, in of case, traffic will switch to the path that excludes node C i.e. it will follow path to reach. imilarly } will follow and will follow path. Therefore during node failure the approach will switch to another path (as evaluated in step1) which excludes the failure node to communicate between source to destination (figure ). Case : (Link Failure) if link between fails, then it will affect, } and. Traffic will automatically switch to unaffected path i.e. to reach. is the path for while is the path for. Case 4: (Link Failure) if link fails, then path will switch to, } will follow and will follow. If both links and fails then there is no path available to communicate between,, and network communication will fail. imilarly if nodes and fails (in case 1 and ) then entire communication fails. Furthermore, there will be no possible path available to reach to destination except nodes and C which means it can immune at most one node/link failure in the network. Now let us evaluate ROMER [1] which is another routing approach for WMN. It describes credit based forwarding approach to reach from,.where is the source node and M, M and M 5 are intermediate nodes and D is node (see figure ) M M M 5 Fig.. Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER). B F B F Fig.. Failure Cases in Wireless Mesh Network. Each node is assigned some cost and the packet traverses from one node to another by consuming this cost. To explain this approach let us assume that cost of source node is 100 units and credit limit is also 100 units. Now packet may consume 00 units of cost to reach from.the
3 possible steps to communicate data between, in WMN using [1] are as follows: tep 1: Let us assume that to reach from node to M (intermediate node), packet has consumed 10.5 units. Node M broadcasts packet by consuming unit of cost to its next node i.e. M and M 5. At each node the value of remaining credit ratio ( ) and threshold ( ) are computed and compared. Let us discuss cases of computation at node M which means that there exist two paths i.e. M M and M M 5. We have shown it using two cases: Case 1: (when ) i.e. discard the packet.the cost of M is 50 units, M has 55 units. In this case it will follow M, M path. o, M will forward packet consuming unit of cost to M. After receiving the packet, M will calculate R and T. ee detail as below. At M,. / (1) 77. / () 77. /. /. Where ( ) =77.5 is the amount of credit needed; ( 100-(77.5)) =.5 is the remaining credit available for M and.5/100 is the ratio of remaining credit to initial credit. Further threshold value is calculated as T = =.05, where 55 is M cost and 100 is the cost of the source. Case : (when R>=T) i.e. packet will be forwarded to next node. The cost of M is 50 units, M 5 has 50 units. In this case it will follow M M 5 path. o, M will forward the packet by consuming unit of cost to M 5. After receiving the packet, M 5 will calculate R and T. At M 5 R= (100-( ))/100 () 7. / 7. / 7. /. 7 Where. 7. is the amount of credit needed.. is the cost consumed by packet by reaching from source node to intermediate node (M ) ;50 is the cost of node M 5 and is the source cost (1)) ; is the remaining credit available for M 5 and 7. /. 7 is the ratio of remaining credit to initial credit. The threshold value T= =.500, where 50 is M 5 cost and 100 is the cost of the source. Now, here, so packet will be forwarded to next node. The major drawback of ROMER[1] approach are;1) discarding the packet (when the node cost becomes higher, see figure ); )during node or link failure the possibility of successful packet delivery till the destination node reduces based on the predefined credit cost; comparative study of resilient multicast [1] and ROMER [1] in WMN is shown in table. In section we have proposed Buffer Based Routing (BBR) as a solution to overcome these disadvantages. TABLE II. COMPARION BETWEEN REILIENT MULTICAT AND ROMER.No. Resilient Multicasting in WMN ROMER 1. It follows two node disjoint-path It follows credit based approach, in which packet forwards concurrently on both paths to reach the destination.. Resilient multicast can tolerate maximum of 1 node/link failure in network.. Network congestion problem occurs as it broadcasts data concurrently on both paths. forwarding approach in which packets reached to destination by consuming credit cost. During node or link failure the possibility of successful packet delivery till the destination node reduces based on the predefined credit cost. Discarding the packet when the node cost becomes higher. III. BUFFER BAED ROUTIN APPROACH In previous section we have evaluated several drawbacks allied with both resilient multicasting [1] and ROMER [1] approaches in WMN. In order to provide an efficient solution over these drawbacks, we have proposed Buffer Based Routing (BBR) approach which adopts routing technique based on buffer allocation. The routing approach starts with the selection of the route with minimum number of buffered nodes. The proposed approach consists of three steps: i) buffer allocation to the network nodes; ii) selecting optimum path for routing; and iii) resilient packet transmission. A. Buffer Based Allocation Buffers are placed alternatively according to least cost path selection. The buffer allocation is achieved in five steps: 1. elect a node randomly, where =1,, in network, assign buffer to it and mark it as visited node.. Choose least cost path of node and move to next node, make next node as, skip buffer assignment to that node and mark it as visited node.. Again choose least cost path and move to next node, make next node as, assign buffer at that time.(place buffer at alternate positions) and mark it as visited node. 4. If next node are _ is visited then rollback to its parent node else move forward. 5. Repeat steps until total buffer placement in network are where are number of nodes in the network. B. Buffer Based Routing In BBR approach we have customized the routing table according to include the buffer field with respect to node. The routing table consist of seven parts i.e. 1) node; ) node address; ) next hop; 4) next hop buffered?; 5) next hop address; 6) cost; and 7) buffered node?. The construction of routing table involves following steps: 1. Columns node id; node address; next hop id; next hop address; and cost; describe the id of current node, address of the node, id of next hop, address of next hop, cost to the next hop respectively. We do not go in detail of the explanation for updating these fields.. Now, the remaining two fields i.e. next hop buffered?; buffered node?; are initialized with the value No.
4 These fields are updating recurrently with the buffer allocation process (shown in Table and Table 4).. When the buffer allocation algorithm terminates, the last node broadcast the information of these two fields in the network. 4. All the nodes update their routing table accordingly. We have shown the routing table of two nodes i.e. source node and destination node d. We assume that we start the buffer allocation process form node. The routing tables of each node are updated as the buffer allocation process progresses. For example table shows the routing table of node. Node is the starting node of buffering process so the entries of column Next hop buffered and Buffered node is updated accordingly. Table 4 shows the routing table of node. It is the last buffered node, hence it contain the latest updated routing table. Further, after termination of algorithm node broadcast the routing table information (of two columns i.e. Next hop buffered? and Buffered node?) to entire network. After receiving the updated information each node updates its routing table according to table 4. TABLE III. NODE A ROUTIN TABLE Node Node Next Next hop Next hop Cost Buffered ID address hop ID buffered? address node? A C No 1 Yes A D No Yes B D No 1 No B No No B E No 1 No C F No/Yes No C H No No D A No/Yes No D B No/Yes 1 No D F No/Yes No D No 1 No E B No/Yes 1 No E J No/Yes No F C No No F D No No F H No 4 No F I No No D No 1 No B No/Yes No I No 1 No J No/Yes 1 No H C No No H F No/Yes 4 No I F No/Yes No I No 1 No J No 1 No J E No No imilarly the routing table of each node have constructed. Here we shown the routing table of an intermediate node i.e. D. TABLE IV. NODE J ROUTIN TABLE Node ID Node address Next hop ID Next hop buffered? Next hop address Cost Buffered node? A C No 1 Yes A D No Yes B D No 1 Yes B No Yes B E No 1 Yes C F Yes No C H No No D A Yes No D B Yes 1 No D F Yes No D No 1 No E B Yes 1 No E J Yes No F C No Yes F D No Yes F H No 4 Yes F I No Yes D No 1 No B Yes No I No 1 No J Yes 1 No H C No No H F Yes 4 No I F Yes No I No 1 No J No 1 Yes J E No Yes Figure 4 shows the buffer allocation process in our network. Buffer allocation algorithm tep 1 a) select random node N i from the network. b) Assign buffer (N i ); c) Visited list [] =N i ; tep d) if (next [Ni]! =null) e) Ni min_cost_next [N i ]; f) If (Ni=visited list []) g) elect next_min_cost (N i ); h) o to step (d); i) end if; j) Else k) If (previous [Ni] =buffered array []) l) kip (N i ); m) Visited list [] +1=N i ; n) oto step (d); o) end if; p) Else q) Allocation(N i ); r) otostep(d); s) end else; t) end else; u) end if; v) Else w) Rollback (N i ); x) end else; tep Repeat step until two rollbacks occur at the same node; tep 4 Return; Allocation (Ni) begin if (Ni!=visited_list[]) assign_buffer(n i );
5 visited_list [] +1=N i ; end if; else rollback (previous N i ); end else; end; assign_buffer (Ni) begin assign buffer to N i ; array_buffer [] N i ; update_routing_table(); end; C. Buffer Based Resilient packet transmission In our approach we have customized buffer based routing path along with packet content. To understand resilient packet transmission, let us consider a WMN of 10 nodes (figure 4). Here source and destination are randomly selected throughout the network. Our aim is to send data packets from the source node A to destination node J. For packet transmission the routing path need to have following characteristics: 1. The route must contain minimum number of buffered node.. If more than one path has same number of buffered node than it will select the least cost path. The acknowledgement (ack) message consist ack as well as the id of sender node. Round trip time is defined (RTT) as transmission time of packets from one node to its succeeding node and then receiving acknowledgement back from that succeeding node. Routing form node to node is progressed in following steps: tep 1: According to buffer allocation process for WMN network as in figure 4 is the buffered node so it store packets until it receive acknowledgement from the next buffer node. By considering its routing table, it will select path [ and wait for ack from node and buffered node. tep : Node is the next hop so it receives the packet and lookup the routing table for the next hop which tends towards destination. As it is a non-buffered node it forwards the packet to the next node i.e. and send ack to node. tep : When node receives the packet it stores that packet into its buffer. Further it sends ack to node, and forward the packet to next node i.e.. Meanwhile after receiving the ack from node. Node will send an ack to previous buffered node. Further node deallocate packet from its buffer. tep 4: After receiving the packet, node forwards this to next hop i.e. node. tep 5: Node forwards the packets to node which is the destination node. Note: In our approach the ack is send by both buffered and non- buffered nodes. But buffer node stores the data packet until it receives the ack of next buffered node. It confirms the delivery of message to the next buffered node. Following cases: (by considering figure 4) Case1: Node Failure: if a node fails during communication in network. Let us suppose node fails. tep 1: As node will not able to get ack within its RTT (Round Trip Time) then node will send packet one more time, even if it is not able to get an ack then it will assume that node has been failed. tep : Node will select its next least cost and will send packet to route. Further we consider another situation, if node fails, node will not able to get ack within RTT, then node will roll back because there is no other path exist other than node to reach to destination. Then node will follow path. Advantage of having buffer in network is that in case of node failure there is no need to re-establish the path and can simply access packet from buffers present at intermediate nodes. Case : Link Failure: when a link fails inside a network during communication between source and destination. Let us take an example when link fails. Link failure case is similar to node failure tep 1: let be source node and be the destination node. Node will follow its routing table and see that intermediate buffered nodes are in two different paths so it will follow a path with minimum cost path i.e. and send packet through this path. tep : As the packet reaches to node, there is a link failure so; node will not be able to get ack within RTT. o node will follow another path by seeing its routing table i.e. which is next highest least cost distance between,. IV. PERFORMANCE ANALYI We have evaluate performance analysis of BBR (Table 5) in terms of network performance parameters i.e. throughput, resiliency against node/link failure, network congestion and delay. These parameters are defined as: Throughput: throughput is defined as how fast we can actually send data through a network. Resiliency against node/link failures: how resiliency implemented in case of failures. Network congestion: how much load on network exists during transmission of data between source and destination? Delay: how long it takes for an entire message to completely arrive at destination. ince [1] follows two-node disjoint path, packets broadcast to the network and follows both paths concurrently to reach the destination. In case when any intermediate node/link fails, then packets will automatically switch to unaffected path due to which load on that path increases and throughput decreases. In ROMER [1] throughput is higher
6 than resilient multicast and all packets follow single path. In the proposed approach buffers are placed according to least cost path selection and during packet transferring,it choose path which has less number of intermediate buffers from {, D}, so throughput increases because it sends data according to least cost path. In resilient multicasting packets [1] flows parallel and concurrently through -node disjoint path, in case of any node/link failure packets will shift to single path due to which cost of resilient multicast increases. But in ROMER [1] packets follows single path and forward packets according to credit limit. In case when initial credit limit is less, cost at each node is very high and number of failures exists in network, there are more chances of discarding packets by the node. In the proposed approach we employ buffers for storing the packets coming from previous nodes. In case any nonbuffered node fails, then we can get data from its preceding buffer and if buffered node fails then we get data from previous buffered node due to which re-establishment cost decreases. TABLE V. PERFORMANCE ANALYI OF BBR Parameters Performance Reasons Throughput Increases Because of least cost buffered path selection during transmission process. Resiliency against node/link failure Network congestion Increases Decreases Because transmission starts from previously buffered node. Due to limited buffer capacity, number of packets in network are less. Delay Decreases Due to transmission of packets (after transmission of first packet) Reliability and robustness Increases Because of implementation of resiliency, network is more reliable, chances of network failure are less C D E F C D E F C D E F C D E F C D E F C D E F C D E F C D E F Fig. 4. Buffer Allocation using BBR. V. CONCLUION In this paper we have proposed a resilient Buffer Based Routing Approach which ensures effective communication in WMN. We have allocated buffers according to minimum cost path into network that provides shortest path to reach destination. Each node maintains its own routing table which keeps additional information about buffered nodes in the network. We provide shortest path into network without using any shortest path routing algorithms. In the proposed BBR approach buffers are allocated alternatively which reduces reestablishment cost in network against node/link failures. We have shown comparisons between previous proposed approaches (resilient Multicast and ROMER) and the proposed BBR approach. BBR provides high throughput, reduces network congestion during node/link failures and ensure robustness into network. Further practical implementation of BBR approach for wireless mesh network is to be analyzed for accurate and absolute results. REFERENCE [1] Akyildiz, Ian F., and Xudong Wang. "A survey on wireless mesh networks."communications Magazine, IEEE 4.9 (005): -0. [] Trivedi, Kishor., Dong eong Kim, and Rahul hosh. "Resilience in computer systems and networks." Proceedings of the 009 International Conference on Computer-Aided Design. ACM, 009.
7 [] Jaggi, idharth, et al. "Resilient network coding in the presence of byzantine adversaries." INFOCOM th IEEE International Conference on Computer Communications. IEEE. IEEE, 007. [4] chaeffer-filho, Alberto, et al. "A framework for the design and evaluation of network resilience management." Network Operations and Management ymposium (NOM), 01 IEEE. IEEE, 01. [5] Yu, Yue, et al. "An adaptive approach to network resilience: Evolving challenge detection and mitigation." Design of Reliable Communication Networks (DRCN), 011 8th International Workshop on the. IEEE, 011. [6] Fick, David, et al. "A highly resilient routing algorithm for fault-tolerant NoCs."Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association, 009. [7] Lee, anghwan, et al. "Proactive vs reactive approaches to failure resilient routing." INFOCOM 004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications ocieties. Vol. 1. IEEE, 004. [8] Rao,. iva Nageswara, Y K undara Krishna, and K. Nageswara Rao. "A urvey: Routing Protocols for Wireless Mesh Networks." International Journal of Research and Reviews in Wireless ensor Networks (IJRRWN) 1. (011). [9] Rakesh, Nitin, and Vipin Tyagi. "Failure recovery in XOR'ed networks." ignal Processing, Computing and Control (IPCC), 01 IEEE International Conference on. IEEE, 01. [10] upta, Bhagvan Krishna, Ankit Mundra, and Nitin Rakesh. "Failure Detection and Recovery in Hierarchical Network Using FTN Approach." (01). [11] Rakesh, Nitin, and Vipin Tyagi. "Failure Detection using Contour Approach on Network Coded Parallel Networks." Procedia Engineering 8 (01): [1] Zhao, Xin, et al. "Resilient multicasting in wireless mesh networks." Proc. 1th International Conference on Telecommunications [1] Yuan, Yuan, et al. "ROMER: resilient opportunistic mesh routing for wireless mesh networks." IEEE Workshop on Wireless Mesh Networks (WiMesh). Vol
Efficient Shortest Path Routing (ESPR) Algorithm for Multicasting in Wireless Mesh Network
ISSN:2229-6093 Efficient Shortest Path Routing () Algorithm for Multicasting in Wireless Mesh Network 1 Geetanjali Rathee, 2Ninni Singh, 3Hemraj Saini 1, 2, 3 Department of Computer Science and Engineering
More informationComparative Study of Routing Protocols for WMN
06 Comparative Study of Routing Protocols for WMN Meenu Chawla, mit Taneja, 3 Naunita Bansal Department of Computer Science and Engineering GZS PTU Campus, Bathinda Punjab meenuchawla0@gmail.com, amit_t9@yahoo.com,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationCo-Leader Based Leader Election Algorithm in Distributed Environment
Co-Leader Based Leader Election Algorithm in Distributed Environment Gajendra Tyagi, Ankit Mundra, Jitendra Kr. Tyagi and Nitin Rakesh Department of Computer Science and Engineering, Jaypee University
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationAR-TP: An Adaptive and Responsive Transport Protocol for Wireless Mesh Networks
AR-TP: An Adaptive and Responsive Transport Protocol for Wireless Mesh Networks Vehbi C. Gungor Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More informationIndex terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Fuzzy Logic
More informationA Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks
A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks Sushma K M, Manjula Devi T H [PG Student], [Associate Professor] Telecommunication Department Dayananda Sagar College of
More informationDISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK
DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK Takeshi Ikenaga 1, Koji Tsubouchi 1, Daiki Nobayashi 1, Yutaka Fukuda 2 1 Graduate School of Engineering, Kyushu Institute
More informationDesign and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs
Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationA ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China
More informationEnergy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR
Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationBackup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1.
A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks Gummadi P. Krishna M. Jnana Pradeep and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationDetection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
More informationWITH the evolution and popularity of wireless devices,
Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile
More informationA SECURE MULTICAST ROUTING PROTOCOL AGAINST GREY HOLE ATTACK
A SECURE MULTICAST ROUTING PROTOCOL AGAINST GREY HOLE ATTACK Geetanjali Rathee and Hemraj Saini Department of Computer Science and Engineering and Information Technology, Jaypee University of Information
More informationAchieving Distributed Buffering in Multi-path Routing using Fair Allocation
Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois
More informationRCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks
RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationNovel Techniques for Fair Rate Control in Wireless Mesh Networks
Novel Techniques for Fair Rate Control in Wireless Mesh Networks Mohiuddin Ahmed Computer Science and Engineering Department Islamic University of Technology Gazipur, Bangladesh K.M.Arifur Rahman Electrical
More informationRouting Protocols for Wireless Mesh Networks: Performance Study
24 st International Congress on Computer, Electronics, Electrical, and Communication Engineering (ICCEECE24) IPCSIT vol. 59 (24) (24) IACSIT Press, Singapore DOI:.7763/IPCSIT.24.V59.26 Routing Protocols
More informationSurvey on Multicast Routing Protocols in MANETs
Survey on Multicast Routing Protocols in MANETs A Viswanath, Dept of CSE, Sree Vidyanikethan Engineering College, Tirupati, AP, India. N Papanna, M.Tech, Assistant Professor, Sree Vidyanikethan Engineering
More informationSIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS
SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh
More informationThe Novel HWN on MANET Cellular networks using QoS & QOD
The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,
More informationAn Iterative Greedy Approach Using Geographical Destination Routing In WSN
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationDesign and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationEvaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET
Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET Saurav Ghosh & Chinmoy Ghorai A.K Choudhury School of Information Technology, University of
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationA Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
More informationA Reliable And Trusted Routing Scheme In Wireless Mesh Network
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 3, ISSUE 04 135 A Reliable And Trusted Routing Scheme In Wireless Mesh Network Syed Yasmeen Shahdad, Gulshan Amin,
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationQoS Based Congestion Control Algorithm for Video Traffic in Wireless Mesh Network
QoS Based Congestion Control Algorithm for Video Traffic in Wireless Mesh Network Jerrin Sebastian 1, Deepu Job 2, Smitha Jacob 3 1Student, Dept of Computer Science & Engineering, St. Joseph's College
More informationPerformance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering
More informationNew Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks
J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired
More informationPerformance Evaluation in MANET by Using NCPR Scheme with Cluster Technique
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR
More informationSparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms
Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More informationOVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS
OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS 1 Anupam Jain, 2 Minakshi Halder 1 M.E. Scholar, 2 Assistant Professor Electronics and Communication Engineering (ECE) Acropolis Institute of Technology
More informationExpected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network
Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)
More informationSECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK
SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationTo address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,
Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen
More informationKey words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali
More informationMulticast over Vehicle Ad Hoc Networks
1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationQos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks
Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication
More informationBIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks
BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks Abstract HANY MORCOS IBRAHIM MATTA AZER BESTAVROS {hmorcos, matta, best}@cs.bu.edu Computer Science Department, Boston University
More informationDelay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet
Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationProtocol Design and Optimization for
Protocol Design and Optimization for Yu Wang, Hongyi Wu*, Feng Lin, and Nian-Feng Tzeng Center for Advanced Computer Studies University of Louisiana at Lafayette Mobile Sensor Networks Applications: Air
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationPrioritized Sweeping Reinforcement Learning Based Routing for MANETs
Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 383 ~ 390 DOI: 10.11591/ijeecs.v5.i2.pp383-390 383 Prioritized Sweeping Reinforcement Learning Based
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationAN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING
International Journal of Latest Research in Science and Technology Volume 3, Issue 3: Page No. 201-205, May-June 2014 http://www.mnkjournals.com/ijlrst.htm ISSN (Online):2278-5299 AN EVOLUTIONARY APPROACH
More informationThe Effect of Number of Hops per Path on Remind Energy in MANETs Routing Protocols
The Effect of Number of Hops per Path on Remind Energy in MANETs Routing Protocols Khafaei Taleb Department of Computer Engineering Islamic Azad University, Bushehr Branch ABSTRACT Bushehr, Iran In mobile
More informationA Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes
A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationA Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN
A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationPerformance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,
More information(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)
Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions
More informationData Gathering for Wireless Sensor Network using PEGASIS Protocol
Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&
More informationReview: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model
Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model Rakesh K Scholar (M.Tech) The Oxford College of Engineering Bangalore Mrs. Kalaiselvi Asst. Prof,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationXORs in the Air: Practical Wireless Network Coding
XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we
More informationStudy on Wireless Sensor Networks Challenges and Routing Protocols
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 5 (7): 824-828 Science Explorer Publications Study on Wireless Sensor Networks
More informationFast, Efficient, and Robust Multicast in Wireless Mesh Networks
fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms
More informationImpact of transmission errors on TCP performance. Outline. Random Errors
Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random
More informationIntrusion Detection System for Rushing Attack in MANETs
Intrusion Detection System for Rushing Attack in MANETs D.Shiny, K. Ganesh Reddy, Dept. of Computer Science and Engineering Shri Vishnu Engineering College for Women,Bhimavaram, India Abstract MANETs are
More information