TCP Simulation Evaluations over Ad Hoc Wireless Networks
|
|
- Juliet Jefferson
- 6 years ago
- Views:
Transcription
1 University of Bern & NCCR MICS Summer Internship 24 TCP Simulation Evaluations over Ad Hoc Wireless Networks Student: Derman Akcelik Supervisor: Ruy de Oliveira Professor: Torsten Braun
2
3 TCP Simulation Evaluations over Ad Hoc Wireless Networks Abstract The Transmission Control Protocol (TCP) represents the most deployed transport protocol used in the Internet so far. This popularity motivates its presence in wireless networks, including ad hoc networks. These networks are very promising since they make it possible communication among end systems directly without any infrastructure. However, TCP faces various problems when required to work in such environments. Because of that, it is very important to understand the behaviour of this protocol in wireless networks. This project evaluates TCP performance in ad hoc networks by means of simulation. We compare two TCP flavours, namely Newreno and SACK, under a variety of conditions. Specifically, we assessed throughput, retransmissions, and energy consumption features of TCP. We also evaluated the delayed acknowledgment option for TCP. The results provided some insight into this quite wide subject.
4 4 I. INTRODUCTION In today s world, wireless devices became an evident part of our life. These devices may provide seamless connectivity in environments where wired networks are not possible or desirable. One of the emerging wireless technologies is ad hoc networks. These networks are attractive for not depending on any fixed infrastructure to communicate. As a result, researches on ad hoc wireless networks have gained non-negligible popularity in recent years. Ad hoc networks consist of mobile hosts that communicate with each other over a wireless medium without central control. The utilisation of this medium develops the hidden-node problem and exposed node problems that are investigated in more detail in [1]. In an ad hoc network, the topology may change due to various medium constraints, forcing self-reconstruction adaptness. Because of the distance limit, multihop routing is used where the packets are forwarded towards the next node along a route to the receiver. Energy consumption is also a concern in these networks because the nodes are supposed to be battery powered. The IEEE proposed IEEE as a standard MAC protocol for wireless multihop networks [2]. It defines the link and physical layer specifications. It minimizes the known hidden node problem using a local retransmission strategy with RTS/CTS (request-tosend/clear to send) control frames. It works efficiently for scenarios having at most 3 hops. Therefore, end-to-end communication protocols have to deal with the problem for the best use of network bandwidth. The popularity of the TCP in the Internet motivates its presence on the wireless networks. Since TCP was developed for wired environments, it has distinct behavior in ad hoc networks. In these networks, TCP will see every dropped packet as a congestion sign. It will reduce its sending rate, which means less throughput, more retransmissions and more spent energy. Packet error rate of the wireless channels and link interruptions are other reasons for packet losses. The interaction between TCP and the IEEE MAC protocol is one of the most challenging topics in today s wireless communication systems. TCP Newreno and TCP SACK are two important flavors of TCP protocol. Their features are quite distinct though. TCP Newreno uses a new fast recovery mechanism for speeding up the recovery from losses. TCP SACK has a receiver that gives more information about the lost packets to the sender. A sender of TCP SACK uses this feature for recovering quickly in situation in which multiple packet losses within a single window occur. TCP SACK claim to be very good to deal with a packet loss because of its selective acknowledgement strategy. Nevertheless, adding extra information to be sent imply more spent energy. Both TCP flavors may work with the delayed acknowledgement (DA) option, whichmeans that the receiver acknowledges only one packet out of two two received. This is expected to reduce energy consumption. The aim of this work is to characterize, energy consumption, number of retransmissions and throughput for TCP Newreno and TCP SACK flavors, with and without Delayed Acknowledgement (DA). Because of the time limit, we focused on these two topical flavors. Additionally, we do not address mobility related issues, since the goal here is to evaluate the behavior of TCP over the IEEE MAC protocol.
5 5 The remainder of this report is organized as follows. Section II gives general information about ad hoc networks. Section III describes the concepts that learnt by the student during this study. Section IV presents the simulation environments and the simulated scenarios. Section V contains the simulation results and their discussions. Finally, section VI summarizes our work. II. AD HOC An ad-hoc network is a local area network or other small network that is not dependent on any access point or any server. Fig. 1 shows a typical ad hoc network that communicates over a wireless medium. As the nodes are mobile its topology may change continuously. The devices can join and leave networks readily. Each device is immediately recognized as part of the network when is close enough to one of the network components. Fig. 1. Ad hoc networks In recent years, the number of commercial applications with ad hoc networks raised with the rapid spread of mobile telephone usage, personal digital assistants and the enlargement of inexpensive wireless solutions for monitoring tools. Accordingly, there are many ongoing distributed systems researches. Examples for the ad hoc applications are disaster relief, conferencing, home networking, habitat monitoring, warehouse inventory monitoring, and personal area networks. An ad-hoc network utilises multihop scenarios because of the limit of transmission range (see [1] for more details). The nodes works as a router and forward the packets to the other nodes. By virtue of the centralized entities absence, the commutation methods and routing algorithms are decentralized. They have to deal with the mobility of the participants and the variation in the connectivity. Thus, different routing protocols have been developed. AODV (Ad hoc On Demand Distance Vector routing protocol), DSR (Dynamic Source Routing protocol), DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol), and TORA (Temporally-Ordered Routing Algorithm routing protocol) are the examples of the routing protocols. AODV [3] and DSR [4] routing protocols are cited as the most prominent frameworks to be standardized in the future. The ad hoc networks devices are battery powered. Therefore, the amount of spent energy by the routing protocol affects the bandwidth utilisation. If a node,that is in the shortest
6 6 path, is not active because of the lack of the energy, a longer path will serve to the packet. The longer the transport time, the less the throughput and the more the energy consumption. The energy is one of the metric investigated in [5]. The energy consumption is induced by the well-known hidden node problem and its solution mechanisms. They are presented in [1]. Accordingly, many studies have been dedicated to analyze its characteristics and/or propose new routing methods (see, e.g., [5]). As mentioned in [6], due to the spatial reuse property of [2], the nodes not only communicate but also interfere with other nodes. III. LESSONS LEARNT During the study, we worked with different utilities that I did not have the change to work with before. The LINUX as OS, Perl as text interpreter, ns2 as the simulator program and the Gnuplot as graph designer. I also tried to write a project report in English, which is not obvious at all. Working with LINUX was not only interesting but also hard. We worked with varius shell commands. In order to automate the tasks, we wrote several scripts. Their developments are hard but then changing the parameters for different executions becomes easier. Ns2 [7] is a well-known and developed simulation program. It was used to simulate the different scenarios. Is requires not only the ns2 commands knowledge but also networking concepts knowledge. For example, because of the headers that are added at every level, the physical layer data throughput value has to be bigger then the MAC layer throughput. When a file transfer is finished, we have to close the output files after enough time. This time is necessary to save eveything on the files. Happily we did not have installation problems. The only problem was the size of the traces files. They might be big enough to make impossible to work with a single PC. After certain numbers of trace file, the user might easily reach its hard disk limit. That is why we erased the trace files between each execution after getting the necessary information. Perl was used to obtain the desirable data from the trace files. There are different possible ways to get the same information. Developing the efficient one takes time because we have to have enough experience on it. Because of the lack of the time, and having lots to do, only a little introduction step on it was done. In our case, it was used to get the energy left on the sender node from the trace file. Besides the use of different tools, we studied the main concepts behind ad hoc networks, as explained in detail on section II, and the performance analysis of TCP Newreno and TCP SACK protocols with or without DA. The experiment is realized via three metrics. Those are energy consumption, number of the retransmission and throughput. IV. SIMULATION SETUP We used the ns2 [7] simulator to perform our evaluation. Fig. 2 shows the scenario used in our simulations. Each node is 2 meters apart from its closest neighbors and the wireless data rate is 2 Mbps. In the simulator, the effective transmission range is 25 meters while the interference range is 55 meters as recommended by the IEEE standard [2]. In all evaluations, the throughput bw is computed as bw = seq 8 stime, where seq
7 7 is the maximum sequence number (in bytes) transmitted and acknowledged and stime is the simulated time. We focus our discussions on short chain of nodes containing at most 7 hops, because this is a reasonable limit for today s networks. The first node is the sender and the last node is the receiver of the packets. The sender transfers continuously a file (infinite ftp) to the receiver. For generating ten flows, we used ten ftp agents at the sender. At the receiver, depending on the flow number, we placed one or ten sink receiver agent. During the enery consumption analyses, we used an energy model that computes energy expenditure to transmitted and received packets only. Energy spent in idle state is computed. In this way, the energy related to only TCP operations are better evaluated. The measured energy is the one consumed by the sender n sender node receiver node Fig. 2. Chain topology The parameters settings are as follows. IEEE is the MAC layer protocol. AODV is the routing protocol. The initial energy of nodes is 1 joules, a dynamic flat area computed as (number of hops * 2m + 1m) x (3m). The window limit (WL) for the TCP flavours is 3 packets. To take into account the hidden node problem, we simulated 5 and 6 hops for the measurements of the energy consumption and the throughput. Unless otherwise mentioned, the other parameters were kept as the default of the simulator and all simulation runs lasted 3 seconds. For the simulations with losses, a uniform distribution function is used as error pattern, and 5% of Packet Error Rate (PER) is simulated. A. Energy Consumption V. SIMULATION RESULTS In this section we evaluate the energy consumption pattern for TCP with varying packet sizes and 5 hops in Fig. IV. Energy consumption is a very important aspect for ad hoc networks as the nodes in place are supposed to be battery powered. Fig. 3(a) and Fig. 3(b) depict the results for packet sizes of 25, 5, 1, and 146 bytes under 1 and 1 flows, respectively. A general conclusion from these results, is that the larger the packet the less energy spent, as shown in both Figs. This is intuitive because with short packet size TCP sender has to perform more operations to send the whole data. Both Figs also show that by using the Delayed Acknowledgment (DA) option the two TCP flavours saved some energy. For the one flow evaluation, TCP SACK without DA spent up to 16% more energy than when using DA. Comparing TCP SACK with TCP Newreno, we did not get clear distinction between both performances. In our experiments with DA, TCP Newreno performed slightly better than the TCP SACK for short packet sizes.
8 8 Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows) DA DA 8 (a) 1 flow Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows) DA DA 8 (b) 1 flows Fig. 3. Energy Consumption B. Energy Consumption Including Packet Error Rate of 5% Owing to observe the energy efficiency of TCP Newreno and TCP SACK over an ad hoc network including losses, we simulated the same network that is used in the previous section. There is no congestion but only a packet error rate of 5%. Figs. 4(a) and 4(b) illustrate the results for packet sizes of 25, 5, 1, and 146 bytes under 1 and 1 flows, respectively. We obtained the same general conclusions that we had for the case without error. Yet the energy consumption increased with the packet error constraint. DA option reduced the spent energy under losses as well. Fig. 4(b) shows that TCP SACK with DA performed
9 9 Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows / 5% error) DA DA (a) 1 flow Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows/ 5% error) DA DA (b) 1 flows Fig. 4. Energy Consumption with Packet Error Rate of 5% the best in terms of energy consumption in most cases. Comparing Figs. 4(a) and 4(b) one can say that for small packet sizes TCP Newreno outperformed TCP SACK for the scenario with one flow. The opposite happened for the ten flows case. For large packet sizes we did not notice any difference between the two flavours. In short, the only effective conclusion from these results is that DA is helpfull for energy consumption benefits, even for noisy environments. C. Retransmissions The idea here is to observe the typical behavior of the retransmissions in the ad hoc networks. For that, we simulated flows with packet size of 25, 5, 1, and 146 bytes.
10 1 As in the previous simulations, we considered the DA option a well. The scenario is also the chain topology of Fig. 2 with 5 and 6 hops. The results are shown in Figs. 5 and 6, which include evaluations for 1 or 1 flows, respectively. Retransmissions vs. Paket Size (1 flow) Number of Retransmissions DA DA (a) 5-hop Number of Retransmissions Retransmissions vs. Paket Size (1 flow) DA DA (b) 6-hop Fig. 5. Number of retransmissions for 1 flow For the scenario facing one single flow, we can see in Fig. 5(a) and Fig. 5(b) that the number of retransmissions rise with the increase of the packet size. Furthermore, we obtained the best performances for both flavours with DA option enabled. On the other side, the results for the evaluations with 1 flows exhibited the opposite as illustrated in Figures 6(a) and 6(b). That is, the larger packet size the less retransmissions.
11 11 Number of Retransmissions Retransmissions vs. Paket Size (1 flows) DA DA 6 (a) 5-hop Number of Retransmissions Retransmissions vs. Paket Size (1 flows) DA DA 6 (b) 6-hop Fig. 6. Aggregate number of retransmissions for 1 flows Presumably, this is a result of the high congestion caused by the competing flows, which becomes worse as the packet size increases. In terms of comparison between Newreno and SACK, the results confirm again that their performance are variable in most cases. There are cases in which the former outperforms the latter and vice versa, but no one is definitely better the other.
12 12 D. Retransmissions Including Packet Error Rate of 5% In this section, we investigate the behaviour of the retransmission in ad hoc networks with losses. We used the same topology evaluated in section V-D containing packet error rate of 5%. The results for 2 and 5 hops are shown in Figs. 7 and 8, which includes evaluations for 1 or 1 flows, respectively. Number of Retransmissions Retransmissions vs. Paket Size (1 flows / 5%) DA DA (a) 1 flow 2 hops Number of Retransmission Retransmissions vs. Paket Size (1 flows / 5%) DA DA (b) 1 flows 5 hops Fig. 7. Number of retransmissions for 1 flow with packet error rate of 5% Figs. 7 and 8 show that it is not always possible to get the best results with DA option. Once again the results do not allow us to make clear distinction between TCP Newreno and TCP SACK flavors. It was expected that TCP SACK would perform better under losses,
13 13 mainly for large packet sizes, since its receiver provides better information to the sender about losses. That was observed for the largest packet size in Figs. 7, 8, 8(a) but not in Fig. 8(b). However, this tendency was not observed for the smaller packet sizes. Number of Retransmissions Retransmissions vs. Paket Size (1 flows / 5% ) DA DA (a) 1 flows 2 hops Number of Retransmission Retransmissions vs. Paket Size (1 flows / 5% ) DA DA (b) 1 flows 5 hops Fig. 8. Aggregate number of retransmissions for 1 flows with packet error rate 5% E. Throughput In this section, we investigate the bandwidth utilisation not only with different number of hops but also different number of concurrent flows in the chain topology of Fig. 2. The
14 14 results are shown in Fig. 9, which includes the results for 1, 1 flows and using or not the DA option. It is well known that the throughput decreases as the number of hops go high. The primary reason is that the longer the path the higher delay for the packets to arrive at the destination. Additionally, there is the hidden node problem that becomes worse for larger number of hops. So, the probability of packet loss is significantly higher for large number of hopes. More flows, on the other side, means more congestion which will decrease the throughput as well. Throughput (kbits/s) Throughput vs. Number of hops (1 flow) DA DA Number of hops (a) 1 flow Throughput (kbits/s) Throughput vs. Number of hops (1 flows) DA DA Number of hops (b) 1 flows Fig. 9. End-to-end throughput
15 15 Fig. 9(b) shows that the aggregate throughput, which is the capacity of the network, is nearly the same of that obtained in Fig. 9(a) in which only one flow is crossing the network. The difference between the two flavors, using or not DA, is too small to see from the figures. Once again, the DA option provided better result for both flavors. Fig. 9 shows improvement of up to 7%, which is not very significant. Among the TCP flavors the difference is completely negligible. VI. CONCLUSIONS In this work, we have investigated the performance of TCP Newreno and TCP SACK over ad hoc networks. ns2 was used for simulating the different scenarios. We used three metrics: energy consumption, throughput and retransmissions with or without delayed acknowledgment option DA. We observed the following: The energy consumed at the sender was inverseley proportional to the packet size regardless of the flavor. The energy consumption increased with losses for both flavors as well. The losses increased the retransmissions number in all cases. The two TCP flavors with DA option spent in general less energy and achieved better throughput in many cases. However, the DA option did not guarantee the best result in all circumstances. The difference between the TCP flavors performances were more perceptive in the simulations with losses. TCP SACK performed slightly better than TCP Newreno for large packet sizes. Because of the lack of time, we evaluated only TCP Newreno and TCP SACK protocols with or without DA option. In general the results did not show us meaningful differences between the two TCP flavors. Although TCP SACK uses the selective acknowledgment strategy, it did not outperformed TCP Newreno in most cases as expected. Therefore, the general outcome is that the two flavors work quite the same in the evaluated scenarios, and delayed acknowledgment is indeed helpful in ad hoc networks without high level of bit errors. For future work, more simulation runs and different scenarios with other metrics could be considered. REFERENCES [1] R. Oliveira and T. Braun. Tcp in wireless mobile ad hoc networks. University of Bern, Technical Report IAM-2-3, July 22. [2] IEEE. Wireless lan medium access control (mac) and physical layer (phy) specifications - std The Institute of Electrical and Electronics Engineers, [3] IETF. Rfc ad hoc on-demand distance vector (aodv) routing. The Internet Engineering Task Force, July 23. [4] Maltz Johnson. Internet draft - the dynamic source routing protocol for mobile ad hoc networks. The Internet Engineering Task Force, Apr 23. [5] H.Singh and S.Singh. Energy consumption of tcp reno, newreno and sack in multi-hop wireless networks. California, USA, July 22. ACM SIGMETRICS. [6] R. Oliveira and T. Braun. A dynamic adaptive acknowledgement strategy for tcp over multihop wireless networks. July 24. [7] Kevin Fall and Kannan Varadhan. editors. ns notes and documentation. San Francisco, USA, November The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC.
Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationA Smart TCP Acknowledgment Approach for Multihop Wireless Networks
1 A Smart TCP Acknowledgment Approach for Multihop Wireless Networks Ruy de Oliveira and Torsten Braun Institute of Computer Science and Applied Mathematics University of Bern Neuebruckstrasse 10, CH-3012,
More informationA Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks
A Dynamic Adaptive Acknowledgment Strategy for over Multihop Wireless Networks Ruy de Oliveira and Torsten Braun Abstract Multihop wireless networks based on the IEEE 802.11 MAC protocol are promising
More informationCross-layer TCP Performance Analysis in IEEE Vehicular Environments
24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide
More informationAVC College of Engineering, Mayiladuthurai, India
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationPerformance Improvement of Wireless Network Using Modern Simulation Tools
Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,
More informationWITH the evolution and popularity of wireless devices,
Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationEnergy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks
Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationPERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS
PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationLecture 16: Wireless Networks
&6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationA Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks
A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationBeacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs
Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationA NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET
A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET K. ARULANANDAM 1 and Dr. B. PARTHASARATHY 2 1 Research scholar, Vinayaka Mission University, Salem, Tamilnadu 2 Dean, Mailam Engineering College, Tindivanam.
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationSWAP and TCP performance
SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed
More informationImproving the Multiple Access Method of CSMA/CA Home Networks
Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationImpact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks
Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk
More informationMethods to Resolve Traffic Jams using VANET
Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract - In this paper we have proposed a method to avoid
More informationPERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Md. Abdullah-Al-Mamun, M. Mahbubur Rahman Department of Information and Communication Engineering Islamic University Kushtia
More informationImproving TCP Performance for Multihop Wireless Networks*
Improving TCP Performance for Multihop Wireless Networks* Sherif M. ElRakabawy, Christoph Lindemann University of Dortmund Department of Computer Science August-Schmidt-Str. 1 447 Dortmund Germany http://mobicom.cs.uni-dortmund.de/
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationDesign and Implementation of a Simulator for Ad Hoc Network Routing Protocol
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing
More informationIJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network
More informationA link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks
Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless
More informationENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY
ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands
More informationSecurity Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Punit Rathod 1, Nirali Mody 1, Dhaval Gada 1, Rajat Gogri 1, Zalak Dedhia 1, Sugata Sanyal 2 and Ajith Abraham 3 1 Mumbai University,
More informationHomework #4. Due: December 2, 4PM. CWND (#pkts)
Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless
Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather
More informationTCP Congestion Control in Wired and Wireless networks
TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science
More informationAppendix B. Standards-Track TCP Evaluation
215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationAnalysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol
Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationTCP and UDP Fairness in Vehicular Ad hoc Networks
TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationDesign and Implementation of a Simulator for Ad Hoc Network Routing Protocols
Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationA Multi-homing Extension of Wireless Node Implementation in NS-2
A Multi-homing Extension of Wireless Node Implementation in NS-2 Qinghua Wang, Tingting Zhang Department of Information Technology and Media Mid Sweden University, 85170 Sundsvall, Sweden Email: {qinghua.wang,
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationExamining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train.
Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train. Edwin Hernandez and Abdelsalam (Sumi) Helal Department of Computer and Information Science and Engineering
More informationVariable Step Fluid Simulation for Communication Network
Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr
More informationDYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS
DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationCHAPTER 7 SIMULATION OBSERVATIONS
CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source
More informationTCP challenges in multi-hop wireless networks. Why multi-hop?
TCP challenges in multi-hop wireless networks Konstantinos Psounis Assistant Professor EE and CS departments, USC Joint work with Vlad Balan, Ramesh Govindan, Ki- Young Jang, Apoorva Jindal, Sumit Rangwala
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationThroughput Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network.
Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network. Dr. Atul M Gosai 1, Udit Narayan Kar 2 and Bhargavi H Goswami 3, Assistant Professor 1 Research Fellow 2, Research
More informationFinal Exam: Mobile Networking (Part II of the course Réseaux et mobilité )
Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the
More informationQoS Routing For Mobile Ad Hoc Networks
International Journal of Scientific & Engineering Research Volume 4, Issue3, March-2013 1 QoS Routing For Mobile Ad Hoc Networks Sonali L. Gaiakwad # Electronics Department, Pune University MAE Alandi,
More informationName Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006
Name Student ID Department/Year Final Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday January 16, 2007 Prohibited 1. You are not allowed to write down the
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationNode Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks
Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks Gurleen Kaur Walia 1, Charanjit Singh 2 1,2 UCoE Department, Punjabi University, Patiala, Punjab, India
More informationEFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS
EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationComparison of Various Routing Protocols & Brief of MANET
International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationName Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006
Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday November 14, 2006 Prohibited 1. You are not allowed to write down the
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3
Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics
More informationRED Tuning for TCP Performance on the Mobile Ad Hoc Networks
RED Tuning for TCP Performance on the Mobile Ad Hoc Networks Shin-Jer Yang and Yung-Chieh Lin Dept. of Computer and Information Science, Soochow University, Taipei, Taiwan E-mail: sjyang@cis.scu.edu.tw
More informationEvaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links
Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo
More informationDynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet
African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing
More informationBattery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks
Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationCOMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)
COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be
More informationMitigating Malicious Activities by Providing New Acknowledgment Approach
Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India
More information