[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for

Size: px
Start display at page:

Download "[1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for"

Transcription

1 References [1] Chowdhury, A. K., Ibrahim, M., Shanmugam, V., Singh, A. K. (2013). Multiple valued logic (MVL) reduction operator, its synthesis and application on network congestion. Proceeding of 7th Global Conference of Power Control and Optimization. [2] Chowdhury, A. K., Raj, N., Singh, A. K., Area efficient MAX operator for multi-valued logic realization, 4 th International Conference on Eco-friendly Computing and Communication Systems. July 2015 (Submitted) [3] Chowdhury, A. K., Raj, N., Singh, A. K. (2015). A novel high deduction algorithm for synthesizing multi-valued logic and circuit realization. Journal of Materials. (Submitted) [4] Natiq H. J., Ahamd Z. Z., Othman M., Subramaniam, S. (2008). The TCPbased new AIMD congestion algorithm. International Journal of Computer Science and Network Security. vol.8, no.10, pp [5] Lablan, P. ( ). Multi-Valued Logic [Online]. Available: [6] Smith, K.C. (1988). A multiple valued logic: a tutorial and appreciation. Computer. vol. 21, no.4, pp [7] Chowdhury, A. K., Raj, N., Singh, A. K. (2014). A review on synthesis methods and application of multi-valued logic. Journal of Engineering Science and Technology. (Submitted)

2 [8] [Besslich, P.W. (1986). Heuristic minimization of MVL functions: A direct cover approach. IEEE Transactions on Computer. pp [9] Chowdhury, A. K., Raj, N., Singh, A. K. (2015). Synthesis and reduced logic gate realization of multi-valued logic (MVL) functions using neural network deployment algorithm (NNDA). Journal of Engineering Science and Technology. (In Press) [10] Abd-El-Barr, M., Sarif, B. A. B. (2006). Synthesis of MVL functions - Part II: The ant colony optimization approach. International Conference on Microelectronics. pp [11] Chowdhury, A. K., Raj, N., Singh, A. K. (2014). Non-zero multi-valued decision diagram (NZMDD) based synthesis of multi-valued logic (MVL) functions. Advance Materials Research. vol. 980, pp [12] Sarif, B.A.B.; Abd-El-Barr, M. (2006). Synthesis of MVL functions - Part I: The genetic algorithm approach. International Conference on Microelectronics. pp [13] Chowdhury, A. K., Raj, N., Singh, A. K. (2015). Design of low power MAX operator for Multi-Valued Logic System. International Conference on Ecofriendly Computing and Communication Systems. (Submitted) [14] Chowdhury, A. K., Razali M. S., Loh, G. C. W., Gopal L., Madon, B., Singh, A. K. (2015). An analysis of novel MVL neural operators using feed forward back-propagation, realization and application of logic synthesis. IEEE International Conference on Smart Sensors and Application.

3 [15] Jain, A. K., Bolton, R. J., Abd-El-Barr, M. H. (1993). CMOS multiplevalued logic design. II. Function realization. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications. vol. 40, no.8, pp [16] Jain, A. K., Bolton, R. J., Abd-El-Barr, M. H. (1993). CMOS multiplevalued logic design. I. Circuit implementation. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications. vol. 40, no. 8, pp [17] Gawande, A. D., Ladhake, S. A. (2008). Constraints in the design of CMOS MVL circuits. 7th WSEAS International Conference on Instrumentation, Measurement, Circuits and Systems. pp [18] Temel, T., Morgul, A., Aydin, N. (2006). Signed higher-radix full-adder algorithm and implementation with current-mode multi-valued logic circuits. IEE Proceedings Circuits, Devices and Systems. vol. 153, no. 5, pp [19] Temel, T., Morgul, A. (2002). Multi-valued logic function implementation with novel current-mode logic gates. IEEE International Symposium on Circuits and Systems. vol. 1, pp. I-881-I-884. [20] Abd-El-Barr, M., Al-Awami, L. (2003). Analysis of direct cover algorithms for minimization of MVL functions. Proceedings of the 15th International Conference on Microelectronics. pp [21] Nakahara, H., Sasao, T., Matsuura, M. (2011). A Comparison of Heterogeneous Multi-valued Decision Diagram Machines for Multiple-Output

4 Logic Functions. 41st IEEE International Symposium on Multiple-Valued Logic. pp [22] Wang, J., Wen, J., Zhang, J., Han,Y. (2010). TCP-FIT A novel TCP congestion control algorithm for wireless networks. IEEE GLOBECOM Workshops (GC Wkshps). pp [23] Lai, C., Leung, K-C., Li, V.O.K. (2013). Design and analysis of TCP AIMD in wireless networks. IEEE Wireless Communications and Networking Conference. pp [24] Leung, K-C., Li, V.O.K. (2006). Transmission control protocol (TCP) in wireless networks: Issues, approaches, and challenges. IEEE Communications Surveys & Tutorials. vol.8, no.4, pp [25] Sun, X. (2012). TCP congestion control algorithm research. 8th International Conference Information Science and Digital Content Technology. vol.3, pp [26] Kassa, D.F., Wittevrongel, S. (2006). An analytical model of TCP performance. 25th IEEE International Performance, Computing, and Communications Conference. pp [27] Wang, J., Wen, J., Zhang, J., Han,Y. (2011). TCP-FIT:An improved TCP congestion control algorithm and its performance. Proceedings IEEE INFOCOM. pp

5 [28] Zhou, C-M. (2013). Fairness improvement of high speed TCP congestion control algorithm, Fifth International Conference on Computational and Information Sciences. pp [29] Wang, J., Wen, J., Zhang, J., Han,Y. (2010). TCP-FIT :An improved TCP congestion control algorithm and its performance. IEEE GLOBECOM Workshops (GC Wkshps). pp [30] Zhang, H., Bian, Z. (2002). Evaluation of Different TCP Congestion Control Algorithms Using NS-2. CMPT 885-3: High-Performance Networks. [31] Yun, L., Rui, Z., Zhanjun, L., Qilie, L., (2009). An improved TCP congestion control algorithm over mixed wired/wireless networks. 2nd IEEE International Conference on Broadband Network & Multimedia Technology. pp

6 APPENDICES Simulated Network Congestion #Create a simulator object set ns [new Simulator] #creating nam objects set nf [open tcpred1.nam w] $ns namtrace-all $nf #open the trace file set nt [open tcpred1.tr w] $ns trace-all $nt #Define different colors for data flows $ns color 1 Blue $ns color 2 Red $ns color 3 green $ns color 4 brown $ns color 5 yellow #finish procedure proc finish {} { global ns nf nt $ns flush-trace close $nf close $nt puts "running nam..." exec nam tcpred1.nam & exit 0

7 } #creating client- router- end server node set Sender1 [$ns node] set Sender2 [$ns node] set Sender3 [$ns node] set Sender4 [$ns node] set Sender5 [$ns node] set Router1 [$ns node] set Router2 [$ns node] set Receiver1 [$ns node] set Receiver2 [$ns node] set Receiver3 [$ns node] set Receiver4 [$ns node] set Receiver5 [$ns node] #creating duplex link $ns duplex-link $Sender1 $Router1 5Mb 30ms DropTail $ns duplex-link $Sender2 $Router1 5Mb 30ms DropTail $ns duplex-link $Sender3 $Router1 5Mb 30ms DropTail $ns duplex-link $Sender4 $Router1 5Mb 30ms DropTail $ns duplex-link $Sender5 $Router1 5Mb 30ms DropTail $ns duplex-link $Router1 $Router Mb 2.875ms DropTail $ns duplex-link $Router2 $Receiver1 5Mb 30ms DropTail $ns duplex-link $Router2 $Receiver2 5Mb 30ms DropTail $ns duplex-link $Router2 $Receiver3 5Mb 30ms DropTail $ns duplex-link $Router2 $Receiver4 5Mb 30ms DropTail $ns duplex-link $Router2 $Receiver5 5Mb 30ms DropTail

8 #creating orientation $ns duplex-link-op $Sender1 $Router1 orient right $ns duplex-link-op $Sender2 $Router1 orient right $ns duplex-link-op $Sender3 $Router1 orient right $ns duplex-link-op $Sender4 $Router1 orient right $ns duplex-link-op $Sender5 $Router1 orient right $ns duplex-link-op $Router1 $Router2 orient right $ns duplex-link-op $Router2 $Receiver1 orient right $ns duplex-link-op $Router2 $Receiver1 orient right $ns duplex-link-op $Router2 $Receiver1 orient right $ns duplex-link-op $Router2 $Receiver1 orient right $ns duplex-link-op $Router2 $Receiver1 orient right #Labelling $ns at 0.0 "$Sender1 label Sender1" $ns at 0.0 "$Sender2 label Sender2" $ns at 0.0 "$Sender3 label Sender3" $ns at 0.0 "$Sender4 label Sender4" $ns at 0.0 "$Sender5 label Sender5" $ns at 0.0 "$Router1 label Router1" $ns at 0.0 "$Router2 label Router2" $ns at 0.0 "$Receiver1 label Receiver1" $ns at 0.0 "$Receiver2 label Receiver2" $ns at 0.0 "$Receiver3 label Receiver3" $ns at 0.0 "$Receiver4 label Receiver4" $ns at 0.0 "$Receiver5 label Receiver5" #Configuring nodes $Receiver1 shape hexagon

9 $Receiver2 shape hexagon $Receiver3 shape hexagon $Receiver4 shape hexagon $Receiver5 shape hexagon $Router1 shape square $Router2 shape square #Establishing queues $ns duplex-link-op $Sender1 $Router1 queuepos 0.5 $ns duplex-link-op $Sender2 $Router1 queuepos 0.5 $ns duplex-link-op $Sender3 $Router1 queuepos 0.5 $ns duplex-link-op $Sender4 $Router1 queuepos 0.5 $ns duplex-link-op $Sender5 $Router1 queuepos 0.5 $ns duplex-link-op $Router1 $Router2 queuepos 0.5 $ns duplex-link-op $Router2 $Receiver1 queuepos 0.5 $ns duplex-link-op $Router2 $Receiver2 queuepos 0.5 $ns duplex-link-op $Router2 $Receiver3 queuepos 0.5 $ns duplex-link-op $Router2 $Receiver4 queuepos 0.5 $ns duplex-link-op $Router2 $Receiver5 queuepos 0.5 #Establishing communication set tcp0 [new Agent/TCP] $tcp0 set maxcwnd_ 16 $tcp0 set fid_ 1 $ns attach-agent $Sender1 $tcp0 set sink0 [new Agent/TCPSink] $ns attach-agent $Receiver1 $sink0 $ns connect $tcp0 $sink0 set ftp0 [new Application/FTP]

10 $ftp0 attach-agent $tcp0 $ns add-agent-trace $tcp0 tcp $tcp0 tracevar cwnd_ set packetsize_ 100 $ns at "$ftp0 start" $ns at "$ftp0 stop" set tcp1 [new Agent/TCP] $tcp1 set maxcwnd_ 16 $tcp1 set fid_ 2 $ns attach-agent $Sender2 $tcp1 set sink1 [new Agent/TCPSink] $ns attach-agent $Receiver2 $sink1 $ns connect $tcp1 $sin set ftp1 [new Application/FTP] $ftp1 attach-agent $tcp1 $ns add-agent-trace $tcp1 tcp $tcp1 tracevar cwnd_ set packetsize_ 100 $ns at "$ftp1 start" $ns at "$ftp1 stop" set tcp2 [new Agent/TCP] $tcp2 set maxcwnd_ 16 $tcp2 set fid_ 3 $ns attach-agent $Sender3 $tcp2

11 set sink2 [new Agent/TCPSink] $ns attach-agent $Receiver3 $sink2 $ns connect $tcp2 $sink2 set ftp2 [new Application/FTP] $ftp2 attach-agent $tcp2 $ns add-agent-trace $tcp2 tcp $tcp2 tracevar cwnd_ set packetsize_ 100 $ns at "$ftp2 start" $ns at "$ftp2 stop" set tcp3 [new Agent/TCP] $tcp3 set maxcwnd_ 16 $tcp3 set fid_ 4 $ns attach-agent $Sender4 $tcp3 set sink3 [new Agent/TCPSink] $ns attach-agent $Receiver4 $sink3 $ns connect $tcp3 $sink3 set ftp3 [new Application/FTP] $ftp3 attach-agent $tcp3 $ns add-agent-trace $tcp3 tcp $tcp3 tracevar cwnd_ set packetsize_ 100 $ns at "$ftp3 start" $ns at "$ftp3 stop" set tcp4 [new Agent/TCP]

12 $tcp4 set maxcwnd_ 100 $tcp4 set fid_ 5 $ns attach-agent $Sender5 $tcp4 set sink4 [new Agent/TCPSink] $ns attach-agent $Receiver5 $sink4 $ns connect $tcp4 $sink4 set ftp4 [new Application/FTP] $ftp4 attach-agent $tcp4 $ns add-agent-trace $tcp4 tcp $tcp4 tracevar cwnd_ set packetsize_ 100 $ns at "$ftp4 start" $ns at "$ftp4 stop" #Calling finish procedure $ns at "finish" $ns run

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro. Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

An Introduction to NS-2

An Introduction to NS-2 An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:

More information

The Network Simulator Fundamentals. Downloads and further info at:

The Network Simulator Fundamentals. Downloads and further info at: ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,

More information

Simple Data Link Protocols

Simple Data Link Protocols Simple Data Link Protocols Goals 1) Become familiar with Network Simulator 2 2) Simulate Stop & wait and Sliding Window 3) Investigate the effect of channel with loss on link utilization Introduction Data

More information

EE 122: Computer Networks Network Simulator ns2

EE 122: Computer Networks Network Simulator ns2 EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.

More information

The Transport Control Protocol (TCP)

The Transport Control Protocol (TCP) TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable

More information

ns-2 Tutorial Exercise (1)

ns-2 Tutorial Exercise (1) ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of

More information

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students

More information

1 What is network simulation and how can it be useful?

1 What is network simulation and how can it be useful? CESNET Technical Report 26/2003 Experience with using simulations for congestion control research Sven Ubik, ubik@cesnet.cz Jan Klaban, xklaban@quick.cz December 5, 2003 Abstract As part of the CESNET

More information

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A

More information

LAN-WAN-LAN end-to-end Network Simulation with NS2

LAN-WAN-LAN end-to-end Network Simulation with NS2 International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 17 (2018) pp 13136-13140 Research India Publications http://wwwripublicationcom LAN-WAN-LAN end-to-end Network Simulation

More information

Part 6. Confidence Interval

Part 6. Confidence Interval Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit

More information

Simulations: ns2 simulator part I a

Simulations: ns2 simulator part I a Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...

More information

Brief Overview and Background

Brief Overview and Background Brief Overview and Background In this assignment you will be studying the performance behavior of TCP, using ns 2. At the end of this exercise, you should be able to write simple scripts in ns 2 as well

More information

LAMPIRAN. set ns [new Simulator]

LAMPIRAN. set ns [new Simulator] LAMPIRAN set ns [new Simulator] $ns color 0 pink $ns color 1 red $ns color 2 green $ns color 3 yellow $ns color 4 brown $ns color 5 purple $ns color 6 black $ns color 7 grey $ns color 8 maroon set n0 [$ns

More information

Modeling of data networks by example: NS-2 (II)

Modeling of data networks by example: NS-2 (II) Modeling of data networks by example: NS-2 (II) Holger Füßler H. Füßler Course overview 1. Introduction 7. NS-2: Fixed networks 2. Building block: RNG 8. NS-2: Wireless networks 3. Building block: Generating

More information

NS-2 Tutorial. Kumar Viswanath CMPE 252a.

NS-2 Tutorial. Kumar Viswanath CMPE 252a. NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.

More information

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

Iterative Synthesis Techniques for Multiple-Valued Logic Functions A Review and Comparison

Iterative Synthesis Techniques for Multiple-Valued Logic Functions A Review and Comparison Iterative Synthesis Techniques for Multiple-Valued Logic Functions A Review and Comparison Mostafa Abd-El-Barr Department of Information Science, Kuwait University, Kuwait. Abstract - A number of heuristics

More information

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore. Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple

More information

UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS

UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS UNIVERSITY OF NAIROBI STABILITY OF TCP/IP PROTOCOLS PROJECT INDEX: PRJ 148 BY NAME: NJERU PATRICK MAGOCHI REG. NO: F17/1360/2010 SUPERVISOR: DR. G.S. ODHIAMBO EXAMINER: PROF. V.K. ODUOL Project report

More information

Part 3. Result Analysis

Part 3. Result Analysis Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1 Outline A Simulation and its results The Format of Trace File The AWK language

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse

NSIS for NS-2. N4 TCP connection. Figure 1: TCP connection reuse NSIS for NS-2 NSIS (Next Steps in Signalling) is a signalling framework being developed by the IETF, based on various signalling protocols, of which the Resource Reservation Protocol (RSVP) is the corner

More information

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project)

CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) CSE 573S Protocols for Computer Networks (Spring 2005 Final Project) To Investigate the degree of congestion control synchronization of window-based connections bottlenecked at the same link Kumar, Vikram

More information

An Application of the Modification of Slow Start Algorithm in Campus Network

An Application of the Modification of Slow Start Algorithm in Campus Network Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 1326 1331 2012 International Conference on Future Electrical Power and Energy Systems An Application of the Modification of Slow Start

More information

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2002 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.3148 Ns2 simulation exercise Fall 2007 1 Table of contents 1. Introduction... 3 2. Theoretical background... 3 2.1. IEEE 802.11 MAC protocol... 3 2.2. Overview of TCP s congestion control... 4 2.3.

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS

More information

Selective-TCP for Wired/Wireless Networks

Selective-TCP for Wired/Wireless Networks Selective-TCP for Wired/Wireless Networks Rajashree Paul rpaul2@cs.sfu.ca Communication Networks Laboratory Roadmap Motivation Background and related work Selective-TCP overview implementation Simulation

More information

Congestion Control for High Bandwidth-delay Product Networks

Congestion Control for High Bandwidth-delay Product Networks Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Presented by Chi-Yao Hong Adapted from slides by Dina Katabi CS598pbg Sep. 10, 2009 Trends in the Future

More information

Analysis of Reno: A TCP Variant

Analysis of Reno: A TCP Variant International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 3 (2012), pp. 267-277 International Research Publication House http://www.irphouse.com Analysis of Reno:

More information

DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL

DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL 32 International Journal on, Vol.3, No.1, January 2009 Information Sciences and Computing DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL

More information

Comparing ad-hoc wireless to wiredwireless

Comparing ad-hoc wireless to wiredwireless TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script

More information

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK

More information

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2) CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation

More information

Iterative Synthesis Techniques for Multiple-Valued Logic Functions

Iterative Synthesis Techniques for Multiple-Valued Logic Functions International Journal of Information and Electronics Engineering, Vol. 4, No., March 04 Iterative Synthesis Techniques for Multiple-Valued Logic Functions Mostafa Abd-El-Barr Abstract A major challenge

More information

S Ns2 simulation exercise

S Ns2 simulation exercise S-38.148 Ns2 simulation exercise 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start and congestion avoidance...4 2.1.2. Fast Retransmit...4

More information

International Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using.

International Journal of Intellectual Advancements and Research in Engineering Computations. Efficient routing protocol for MANET using. www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-1 International Journal of Intellectual Advancements and Research in Engineering Computations Efficient routing protocol for MANET using STP and BRM First

More information

IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS

IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS K. UMAPATHY, Research scholar, Department of ECE, Jawaharlal Nehru Technological University, Anantapur,

More information

John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002

John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 QVWKHQHWZRUNVLPXODWRU,3$07XWRULDO 1HWZRUN0RGHOLQJDQG7UDIILF $QDO\VLVZLWKQV John Heidemann, USC/ISI and Polly Huang, ETH-Zurich 14 March 2002 a discrete event simulator simple model focused on modeling

More information

QoS in Network Simulator 2

QoS in Network Simulator 2 QoS in Network Simulator 2 This experiment provides experience in how to apply and simulate QoS mechanisms in communication networks by means of NS2. We focus on RSVP in this experiment. 1. RSVP in NS2

More information

Simulation in Cyber Security

Simulation in Cyber Security Simulation in Cyber Security Andres Ojamaa Institute of Cybernetics, Tallinn University of Technology CS Theory Days, 25 Jan 2008, Põlva Outline Cyber Security and Simulation What is this thing called

More information

Performance of high-speed TCP Protocols over NS-2 TCP Linux

Performance of high-speed TCP Protocols over NS-2 TCP Linux Performance of high-speed TCP Protocols over NS-2 TCP Linux Masters Project Final Report Author: Sumanth Gelle Email: sgelle@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu Project

More information

Design and Simulation Implementation of an Improved PPM Approach

Design and Simulation Implementation of an Improved PPM Approach I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt

More information

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some

More information

Performance Comparison of TFRC and TCP

Performance Comparison of TFRC and TCP ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS FINAL PROJECT Performance Comparison of TFRC and TCP Spring 2002 Yi Zheng and Jian Wen {zyi,jwena}@cs.sfu.ca

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Congestion Control Without a Startup Phase

Congestion Control Without a Startup Phase Congestion Control Without a Startup Phase Dan Liu 1, Mark Allman 2, Shudong Jin 1, Limin Wang 3 1. Case Western Reserve University, 2. International Computer Science Institute, 3. Bell Labs PFLDnet 2007

More information

Comparison of different congestion control mechanisms: TFRC and TCP(a, b) ENSC835 and CMPT885 project team 15 Jian(Jason) Wen and Yi Zheng

Comparison of different congestion control mechanisms: TFRC and TCP(a, b) ENSC835 and CMPT885 project team 15 Jian(Jason) Wen and Yi Zheng Comparison of different congestion control mechanisms: TFRC and TCP(a, b) ENSC835 and CMPT885 project team 15 Jian(Jason) Wen and Yi Zheng Motivation Congestion control in packet networks has been proven

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

A UDP-Based Protocol for improving packets loss in unstable networks

A UDP-Based Protocol for improving packets loss in unstable networks International Conference on Internet Studies, July 18-19, 2015, Tokyo, Japan A UDP-Based Protocol for improving packets loss in unstable networks Wei-Chung Cheng, Wei-Tsong Lee, Hsin-Wen Wei Tamkang University,

More information

Enabling Large Data Transfers on Dynamic, Very High-Speed Network Infrastructures

Enabling Large Data Transfers on Dynamic, Very High-Speed Network Infrastructures Enabling Large Data Transfers on Dynamic, Very High-Speed Network Infrastructures D. M. Lopez-Pacheco INRIA RESO/LIP, France Email:dmlopezp@ens-lyon.fr C. Pham, Member, IEEE LIUPPA, University of Pau,

More information

Adaptive RTP Rate Control Method

Adaptive RTP Rate Control Method 2011 35th IEEE Annual Computer Software and Applications Conference Workshops Adaptive RTP Rate Control Method Uras Tos Department of Computer Engineering Izmir Institute of Technology Izmir, Turkey urastos@iyte.edu.tr

More information

Congestion Control Techniques In Transport Layer For Wired Connections

Congestion Control Techniques In Transport Layer For Wired Connections Congestion Control Techniques In Transport Layer For Wired Connections Sweeti Sah 1, Aman Verma 2, Jitendra Kurmi 3 1 M.Tech Student, BBAU, Vidya Vihar Raibareily Road Lucknow 2 M.Tech Student, BBAU, Vidya

More information

ADVANCED TOPICS FOR CONGESTION CONTROL

ADVANCED TOPICS FOR CONGESTION CONTROL ADVANCED TOPICS FOR CONGESTION CONTROL Congestion Control The Internet only functions because TCP s congestion control does an effective job of matching traffic demand to available capacity. TCP s Window

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK

GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK GENERAL SELF-ORGANIZING TREE-BASED ENERGY BALANCE ROUTING PROTOCOL WITH CLUSTERING FOR WIRELESS SENSOR NETWORK A PROJECT REPORT Submitted by DIVYA P Register No: 14MCO010 in partial fulfillment for the

More information

A Simplification Method of Polymorphic Boolean Functions

A Simplification Method of Polymorphic Boolean Functions A Simplification Method of Polymorphic Boolean Functions Wenjian Luo and Zhifang Li Abstract Polymorphic circuits are a special kind of circuits which possess multiple build-in functions, and these functions

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

TCP Window Estimation for Burst Assembly in OBS Networks

TCP Window Estimation for Burst Assembly in OBS Networks TCP Window Estimation for Burst Assembly in OBS Networks Maurizio Casoni (maurizio.casoni@unimore.it) Department of Information Engineering University of Modena and Reggio Emilia Italy Outline Introduction:

More information

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation

More information

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7 www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...

More information

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh

More information

Quantifying the Impact of Flood Attack on Transport Layer Protocol

Quantifying the Impact of Flood Attack on Transport Layer Protocol Quantifying the Impact of Flood Attack on Transport Layer Protocol KULDEEP TOMAR 1 AND S.S TYAGI 2 1 Research Scholar, Department of CSE, MRIU, Faridabad, Haryana, India 2 Professor & Head, Department

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How

More information

Design and Performance Evaluation of High Efficient TCP for HBDP Networks

Design and Performance Evaluation of High Efficient TCP for HBDP Networks Design and Performance Evaluation of High Efficient TCP for HBDP Networks TaeJoon Park 1, ManKyu Park 2,JaeYongLee 2,, and ByungChul Kim 2 1 Electronics and Telecommunications Research Institute 161 Gajong-Dong,

More information

Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network

Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network Y. Suryanto, R.R. Nasser, R.F. Sari Yohan Suryanto Department Electrical Engineering Faculty of

More information

Software Implementation of Break-Up Algorithm for Logic Minimization

Software Implementation of Break-Up Algorithm for Logic Minimization vol. 2, no. 6. 2, pp. 141-145, 2017 DOI: https://doi.org/10.24999/ijoaem/02060034 Software Implementation of Break-Up Algorithm for Logic Minimization Koustuvmoni Bharadwaj and Sahadev Roy Abstract In

More information

Fuzzy based Tuning Congestion Window for Improving End-to-End Congestion Control Protocols

Fuzzy based Tuning Congestion Window for Improving End-to-End Congestion Control Protocols Fuzzy based Tuning Congestion Window for Improving End-to-End Congestion Control Protocols Tharwat Ibrahim Department of Computer Systems Faculty of Computer and Information, Benha University Gamal Attiya

More information

TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS

TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 232-7345 TM ALGORITHM TO IMPROVE PERFORMANCE OF OPTICAL BURST SWITCHING (OBS) NETWORKS Reza Poorzare 1 Young Researchers Club,

More information

ANALYSIS OF SMART DEVICE GAME PROTOCOL

ANALYSIS OF SMART DEVICE GAME PROTOCOL ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

NS-2: A Free Open Source Network Simulator

NS-2: A Free Open Source Network Simulator : A Free Open Source Network Simulator srinath@it.iitb.ac.in Open Source Software Research Center Workshop on FOSS tools for Engineering June 27, 2005 Simulation Introduction Definition A simulation imitates

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Xiuchao Wu, Mun Choon Chan, and A. L. Ananda School of Computing, National University of Singapore Computing 1, Law Link,

More information

TCP Congestion Control

TCP Congestion Control 6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different

More information

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Introduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities

Introduction. Ns Tutorial Ns Goals. SAMAN and CONSER Projects. Ns Status. Ns functionalities Introduction Ns Tutorial 2002 Padmaparna Haldar (haldar@isi.edu) Xuan Chen (xuanc@isi.edu) Nov 21, 2002 1989: REAL network simulator 1995: DARPA VINT project at LBL, Xerox PARC, UCB, and USC/ISI Present:

More information

Analyze the Effect of Varying Misbehavior nodes on VOD over Wi max using SVC Code

Analyze the Effect of Varying Misbehavior nodes on VOD over Wi max using SVC Code e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 01-06(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Analyze the Effect of Varying Misbehavior

More information

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet Network and Communication Technologies; Vol. 1, No. 2; 2012 ISSN 1927-064X E-ISSN 1927-0658 Published by Canadian Center of Science and Education Timestamp Retransmission Algorithm for TCP-Cherry over

More information

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning

More information

Keywords- NS2, OPNET, NETSIM, JSIM

Keywords- NS2, OPNET, NETSIM, JSIM Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Comprehensive

More information

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016)

International Journal of Current Trends in Engineering & Technology Volume: 02, Issue: 01 (JAN-FAB 2016) Survey on Ant Colony Optimization Shweta Teckchandani, Prof. Kailash Patidar, Prof. Gajendra Singh Sri Satya Sai Institute of Science & Technology, Sehore Madhya Pradesh, India Abstract Although ant is

More information

Video Streaming in Wireless Environments

Video Streaming in Wireless Environments Video Streaming in Wireless Environments Manoj Kumar C Advisor Prof. Sridhar Iyer Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay Mumbai 1 Motivation Refers to real-time

More information

Incorporation of TCP Proxy Service for improving TCP throughput

Incorporation of TCP Proxy Service for improving TCP throughput Vol. 3, 98 Incorporation of Proxy Service for improving throughput G.P. Bhole and S.A. Patekar Abstract-- slow start algorithm works well for short distance between sending and receiving host. However

More information

Network Simulator 2 (NS2)

Network Simulator 2 (NS2) Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)

More information

Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links

Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links Differentiating Congestion vs. Random Loss: A Method for Improving TCP Performance over Wireless Links Christina Parsa J.J. Garcia-Luna-Aceves Computer Engineering Department Baskin School of Engineering

More information

TCP Veno: Solution to TCP over Wireless

TCP Veno: Solution to TCP over Wireless TCP Veno: Solution to TCP over Wireless Franklin FU Presented by Franklin Fu Asst Professor School of Computer Engineering Nanyang Technological University Singapore January 31, 2004, 5:00am Singapore

More information