Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Size: px
Start display at page:

Download "Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)"

Transcription

1 CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal Aiyappath Narain ( ) Mahit Murthy ( ) The University of California, Irvine, CA 92697

2 Index Introduction...3 Motivation and Related Work...4 Models and Assumptions...6 The Problem...7 Our Solution...8 Results...11 Conclusion and Future Work

3 Introduction Third-Generation (3G) CDMA wide-area wireless networks has experienced explosive growth in the recent times. CDMA users have crossed over 100 million in number. As the user population builds up, group communications such as on-demand video streaming, group messaging, and gaming through hand-held wireless devices have been spurring the development of multicast functions in the 3G network infrastructure. 3G standard bodies 3GPP and 3GPP2 have been actively standardizing multicast services. Existing multicast strategy in 3G networks suffers in terms of decreased downlink channel utilization as the size of the multicast group increases. In order for the multicast receiver with the worst downlink channel condition to correctly decode data frames from 3G downlink, a conservative strategy for the 3G base station is to use the lowest data rate among all the receivers in the multicast group. Due to path loss and fast fading of the wireless medium, the likelihood that at least one receiver experiences bad downlink channel condition increases as the multicast group size increases, resulting in decreased throughput for the multicast group. This phenomenon is in stark contrast to the unicast scenarios where increasing the number of users increases the downlink channel utilization using Proportional Fairness Scheduling One approach to increasing 3G throughput is through the use of ad hoc relays. In this model, mobile devices are assumed to have both 3G and IEEE interfaces. The mobile receiver first discovers a proxy client with better 3G downlink channel condition. On behalf of the receiver, the proxy client receives data packets from the base station at higher data rate. The proxy then forwards the packets through the IEEE based ad hoc network to the mobile receiver. While this model has been shown to significantly improve throughput for 3G unicast traffic, extending this model for multicast traffic is not trivial since multicast traffic can easily overload an IEEE based ad hoc network, limiting the achievable throughput gains. Thus, in order to maximize throughput in ICAM, it is not sufficient to choose the proxy with the highest 3G data rate connection. The 3G data rate of the proxy must be balanced by the throughput achievable over the interference-prone ad hoc relay network. Therefore, it is important that the choice of the proxies and the construction of the multicast forest be performed jointly with explicit awareness of the capacity limitations of the ad hoc relay network. A polynomial-time approximation algorithm is implemented in this project that outputs near optimal multicast relay strategy. The algorithm is based on a very general interference model and has an approximation factor of four. This is also the first multicast routing design that explicitly considers multi-hop wireless interference in ad hoc networks. The algorithm is equally applicable when the underlying wireless MAC supports broadcast or unicast, single rate or multiple rates and even when there are multiple simultaneous multicast sessions. 3

4 Motivation and Related Work 3G multicast is inherently limited by the worst channel rate of the multicast group. More precisely, assume that there are n clients covered by a 3G base station, and l of these clients (denoted by the set R) belongs to a multicast group. If multicast receiver v Є R has an instantaneous downlink channel rate of r i v at time slot i, then the data rate for the multicast at time slot i is min vєr r i v. Due to path loss and fast wireless channel fading, the likelihood that at least one multicast receiver experiences bad downlink channel condition increases as the multicast group size increases. Therefore, increasing the number of receivers results in lower throughput for the multicast group. 3G multicast s inefficiency motivates us to use relays to improve throughput. Specifically, for each multicast receiver v with average downlink channel rate r v, find a proxy client with higher average downlink channel rate p(v) and an ad hoc relay route from the proxy to the receiver. The traffic in future cellular networks is expected to be unbalanced. In a cellular system, a Mobile Host (MH) can use only the data channels of the base transceiver station (BTS) located in the same cell, which is a subset of the data channels available in the system. No access to data channels in other cells by the MH limits the channel efficiency and consequently the system capacity. Specifically, some cells may be heavily congested (called hot spots), while the other cells may still have enough available data channels (DCH). Even though the traffic load does not reach the maximum capacity of the entire system, a significant number of calls may be blocked and dropped due to localized congestion. Since the locations of hot spots vary from time to time it is difficult to provide the guarantee of sufficient resources in each cell in a cost-effective way. ICAR attempts to solve this issue of balancing traffic loads between cells by using ad hoc relaying stations (ARS) to relay traffic from one cell to another dynamically based on need. ARS is a specialized hardware that can communicate with both MHs and Base Station using different channels. The mobile node hence needs an additional radio interface to communicate with ARS. In UCAN, a mobile client has both 3G cellular link and IEEE based peer-to-peer links. The 3G base station forwards packets for destination clients with poor channel quality to proxy clients with better channel quality. The proxy clients then use an ad-hoc network composed of other mobile clients and IEEE wireless links to forward the packets to the appropriate destinations, thereby improving cell throughput. The 3G base station scheduling algorithm is refined so that the throughput gains of active clients are distributed proportional to their average channel rate, thereby maintaining fairness. With the UCAN architecture in place, novel greedy and on-demand protocols for proxy discovery and ad-hoc routing that explicitly leverage the existence of the 3G infrastructure to reduce complexity and improve reliability are proposed. Multicast over ad hoc networks has been intensively studied in recent years. The proposed multicast routing protocols can be classified into two categories. One category 4

5 is tree-based, including Reservation-Based Multicast (RBM), Lightweight Adaptive Multicast (LAM), Ad hoc Multicast Routing Protocol (AMRoute), Ad hoc Multicast Routing protocol utilizing Increasing id-numbers (AMIS), and multicast extension of Ad hoc On-demand Distance Vector (MAODV). They all build a shared or core-based tree to deliver multicast data, but differ in detailed mechanisms for tree construction, maintenance, and adaptation to the network topological dynamics. The other category is mesh-based, including Core-Assisted Mesh Protocol (CAMP), and On-demand Multicast Routing Protocol (ODMRP). They enhance the connectivity by building a mesh with multiple forwarding paths and, therefore, improve the resilience as the network topology changes. LAM is a multicast protocol which is built upon the temporally ordered routing algorithm (TORA). The protocol termed Lightweight Adaptive Multicast routing algorithm is designed for use in a Mobile Ad Hoc network and conceptually can be thought of as an integration of the Core Based Tree multicast routing protocol and TORA. The integration with TORA increases reaction efficiency as the new protocol can benefit from TORA's mechanisms while reacting to topological changes. LAM does not require timer based messaging during its execution and hence does not incur additional group membership and stable topology period overhead. The Core-Assisted Mesh Protocol (CAMP) is introduced for multicast routing in ad-hoc networks. CAMP generalizes the notion of core-based trees introduced for internet multicasting into multicast meshes that have much richer connectivity than trees. CAMP consists of the maintenance of multicast meshes and loop-free packet forwarding over such meshes. Within the multicast mesh of a group, packets from any source in the group are forwarded along the reverse shortest path to the source, just as in traditional multicast protocols based on source-based trees. CAMP guarantees that, within a finite time, every receiver of a multicast group has a reverse shortest path to each source of the multicast group. Multicast packets for a group are forwarded along the shortest paths from sources to receivers defined within the group s mesh. CAMP uses cores only to limit the traffic needed for a router to join a multicast group; the failure of cores does not stop packet forwarding or the process of maintaining the multicast meshes. 5

6 Models and Assumptions Interference Model We assume a general proximity-based interference model for the IEEE based multi-hop wireless network. In this model, the transmission of a node u does not cause interference to the transmission of a node x, if their distance is greater than R I, where R I is the maximal interference range. We assume that R I is qxr t, where R t is the transmission range of each node and q >= 1. Hop limit for Proxy Discovery We assume that the hop distance between a proxy and any of its receivers is upperbounded by a small number h. There are several reasons for h being small. First, due to interference, wireless channel error, and lack of scheduling, IEEE ad hoc network throughput decreases very fast as the number of hops increases. Thus, if the ad hoc throughput decreases to the minimal HDR downlink channel rate in less than h number of hops, the IEEE ad hoc network would become the bottleneck, contradicting the need for relays to increase 3G multicast traffic. Second, paths of length exceeding a certain number of hops are not desirable because of the increased probability of route breakage due to mobility, latency, overhead of proxy discovery, and routing update overhead over the HDR uplink. Our simulation study shows that, for a 500m radius cell, using a proxy beyond a h=4 hop neighborhood of the multicast receiver does not further increase throughput. Minimal Separation and Location The near optimal algorithm makes two more assumptions. We assume a minimal separation of distance sr t between any pair of transmitters where s > 0. This assumption is natural since the two transmitters can not be co-located in space. We also assume the base station knows the location of each node. Clearly, this is not an issue when the relays are fixed as part of the infrastructure. For the case where relays are mobile nodes, location information has to be obtained in other ways such as through the base station s estimate using signal strength and angle of arrival as part of the E911 service, or through GPS and other localization mechanisms. 6

7 The Problem An ad hoc network is represented as a graph G = (V, E) where V is the set of (n) nodes and E the set of (m) links. If (u, v) Є E, then node u and v are at most R t apart. The set R V is the set of receivers of a given 3G multicast group. The average 3G downlink rate of node v Є V is r v >= 0. A receiver v Є R may receive data either directly from the 3G base station at rate r v, or through a proxy. The ad hoc relay sub-network for a given multicast group is graph G = (V, E ), where (u, v) Є E iff u, v Є V and (u, v) Є E. Relay sub-network G is composed of a (forest) collection of directed trees F spanning node set V. Along each tree T Є F, data (received from the 3G base station) is multicasted from the root (proxy) to all the receivers in T. Receivers in R - R 3G receive data at the rate of max{r v, r a v}, where r a v is the rate at which data is received through the ad hoc relay sub-network G. For a given G, we denote max{r v, r a v} as r v (G ). We denote by I = (V, A) the interference graph for the ad hoc network. Thus, two ad hoc nodes u and v interfere with each other iff (u, v) Є A. (u, v) A if u and v are at least qr t apart for some fixed constant q. Given G = (V, E ), let k(g ) denote the minimum number of colors required to color the nodes in V such that two nodes u, v Є V have the same color iff (u, v) A. Therefore, the best multicast rate that can be achieved in G is at most f=k(g ). To be precise, only non-leaf nodes need to be colored since the leaf nodes (receivers) do not participate in transmissions. Our results, although applicable to this more precise model, are more involved and hence for ease of presentation we will use the model where all leaf receivers, except R 3G, are colored. We make the assumption that the best proxy for receiver v is no more than h hops away for some small value h, e.g., h = 4. For receiver v Є R - R 3G, let p(v) be the rate of the 3G proxy for v. Then, r a v = min{f/k(g ); p(v)}. Hence, the multicast rate for v in G is r v (G ) = max{r v, min{f/k(g ), p(v)}} Denote r(g ) = min vєr r v (G ). The ICAM problem is to compute G0 such that the multicast rate r(g ) for its associated ad hoc sub-network G is maximized. The ICAM problem is NP-hard. 7

8 Our Solution The basic idea behind our polynomial-time approximation algorithm is to leverage the property that for each multicast receiver the best proxy can be at most h-hops away. We perform localized proxy search and construct the optimal multicast trees for the receivers within certain locality. All local optimal multicast trees are then combined to form the global multicast forest. The whole algorithm can be described as follows: It first divides the coverage area of a 3G base station into a two-dimensional grid of (2h + q + Є)R t X (2h + q + Є)R t cells, where Є > 0. It makes the algorithm polynomialtime by choosing the above mentioned size for the grid cells as it restricts the number of receivers per cell by placing an upper bound on the distance within which the proxy for each receiver in the cell exists. It then computes a solution for each cell of the grid that contains at least one receiver. In other words, it computes the optimal solution for ICAM when restricted only to the receivers R C R in a cell C Є Γ. Finally, the algorithm merges these solutions for all cells to compute a feasible solution to the original instance of the problem. A description of the scenario is as shown below: 8

9 (2h+q+ ε )R t The base station covers the whole area Mobile node selected as Proxy (2h+q+ ε )R t Mobile Receiver which directly receives from the base station Base Station Mobile node which receives from the proxy Let C be a cell with at least one receiver ( R C > 0) and V C V be the set of all nodes that are at most h hops from at least one receiver in R C. Note that in any optimal solution the set of proxies for the receivers in R C and any intermediate relay nodes must be in V C. The algorithm computes the optimal solution for a cell C as follows: It enumerates all subsets V C of nodes in V C. For a given subset V C, let G C be its associated ad hoc relay sub-network. The algorithm computes the minimum number of colors k(g C ) needed to color the vertexes of G C based on the interference graph I. 9

10 The algorithm then computes the best proxy p(v) in G C for every receiver v Є V C. Note that all this information is sufficient to compute r v (G C ) for every receiver v Є V C. The r v (G C ) of all receivers v Є R C that are not in V C is r v (G C ) = r v. Taking the minimum of r v (G C) for all receivers v Є R C, the algorithm is able to compute the multicast rate r(g C ) for the ad hoc relay sub-network for the receivers in R C. The algorithm then selects the subset V C V C, whose associated ad hoc relay sub-network has the highest rate, to generate the optimal multicast strategy for the receivers R C in cell C. We will show later that all this can be done in constant time. Finally it outputs the union of the sub-networks computed for each grid cell, i.e., V 0 = CЄΓ V C V as the solution for the original problem instance. The set of receivers R 3G that receive directly from 3G base station is R (V V 0 ). 10

11 Results We implemented the Near Optimal algorithm for ICAM. We were not able to configure the 3G simulation settings on Qualnet. For that reason, now we are using Wi-Fi interfaces for both. For Wi-Fi, nodes have to be within transmission range of each other. We simulated with different setups and compared our algorithm with the original 3G algorithm. We were able to achieve up to 600% improvement in the throughput with the node setup having a total of 30 nodes being served by the base station. Following are the graphical representation of our results: The messages are used for sending coordinates by the mobile nodes to the base station and by the base station to inform the nodes about how they are going to receive their data and if they are going to transmit their received data to anyone else. 11

12 The setup time increases exponentially with the increase in the number of nodes. Hence, this algorithm does not scale very well and it does not work really well when the scenario is highly mobile. It is because nodes continuously keep moving and hence they keep leaving one multicast group and joining other multicast groups and the base station has to recalculate the whole algorithm again and again. The greedy algorithm outperforms the near optimal algorithm in such a setting. But, in static scenarios, our algorithm works very well. 12

13 The above graph shows the comparison of performance with the original 3G. It can be clearly seen that the near optimal algorithm outperforms the original 3G rates. We are able to achieve about 600% improvement in the 3G downlink rate when compared to the original 3G downlink rates. 13

14 Conclusions and Future Work In this project, we implemented the ICAM architecture for improving 3G multicast throughput using ad-hoc relays. The near-optimal algorithm can be extended to multi-rate ad-hoc networks and to networks with multiple multicast groups. 3G multicast throughput is limited by the receiver with the worst channel rate. By finding proxies for receivers with poor channel quality and relaying multicast packets through an IEEE based ad hoc network, the throughput of multicast sessions can be significantly improved. We implement a near-optimal algorithm that runs in polynomial time. Through extensive simulations, we showed that the near-optimal algorithm improves the average 3G multicast throughput by up to 840 percent and outperforms the greedy heuristics up to 92 percent in static scenarios, while the greedy algorithm achieves throughput gains of as much as 410 percent in relatively high mobility scenarios. 14

ICAM: Integrated Cellular and Ad-Hoc Multicast

ICAM: Integrated Cellular and Ad-Hoc Multicast ICAM: Integrated Cellular and Ad-Hoc Multicast Randeep Bhatia, Li Erran Li, Haiyun Luo, Ram Ramjee,, Paul Sanjoy Bell Labs, Lucent Technologies. Emails: {erranlli,ramjee,randeep,sanjoy}@bell-labs.com Department

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

THIRD-GENERATION (3G) CDMA wide-area wireless networks

THIRD-GENERATION (3G) CDMA wide-area wireless networks 1004 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 8, AUGUST 2006 ICAM: Integrated Cellular and Ad Hoc Multicast Randeep Bhatia, Member, IEEE, Li (Erran) Li, Member, IEEE, Haiyun Luo, Member, IEEE,

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

ROMR: ROBUST MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS

ROMR: ROBUST MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS ROMR: ROBUST MULTICAST ROUTING IN MOBILE AD-HOC NETWORKS by Gretchen H. Lynn BS, BSEd, Concord College, 1978 MS, University of Tennessee - Knoxville, 1984 Submitted to the Graduate Faculty of the School

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Preemptive Multicast Routing in Mobile Ad-hoc Networks Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks

Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks Mobile Networks and Applications 6, 251 263, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks JEFFREY

More information

A Stability-based Distributed Routing Mechanism to Support Unicast and Multicast Routing in Ad Hoc Wireless Network

A Stability-based Distributed Routing Mechanism to Support Unicast and Multicast Routing in Ad Hoc Wireless Network A Stability-based Distributed Routing Mechanism to Support Unicast and Multicast Routing in Ad Hoc Wireless Network Krishna Paul #, S. Bandyopadhyay *, A. Mukherjee *, D. Saha + Abstract An ad hoc network

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

SV-BCMCS: Scalable Video Multicast in Hybrid 3G/Ad-hoc Networks

SV-BCMCS: Scalable Video Multicast in Hybrid 3G/Ad-hoc Networks SV-BCMCS: Scalable Video Multicast in Hybrid 3G/Ad-hoc Networks Sha Hua, Yang Guo, Yong Liu, Hang Liu and Shivendra S. Panwar Abstract Mobile video broadcasting service, or mobile TV, is a promising application

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies. Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Energy Efficient Utilization of IEEE Hot Spots in 3G Wireless Packet Data Networks

Energy Efficient Utilization of IEEE Hot Spots in 3G Wireless Packet Data Networks Energy Efficient Utilization of IEEE 802.11 Hot Spots in 3G Wireless Packet Data Networks F. Ozan Akgül and M. Oğuz Sunay Koç University, Department of Electrical & Electronics Engineering, Rumeli Feneri

More information

Wireless Mesh Networks

Wireless Mesh Networks Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless

More information

WIRELESS broadband networks are being increasingly

WIRELESS broadband networks are being increasingly 1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications

More information

A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS

A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS Dave Cavalcanti 1, Carlos Cordeiro 2, Anup Kumar 3, Dharma Agrawal 1 OBR Center for Distributed and Mobile Computing

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

WITH the increase in the bandwidth of wireless channels

WITH the increase in the bandwidth of wireless channels 2 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 17, NO. 1, JANUARY 2007 Multiple Tree Video Multicast Over Wireless Ad Hoc Networks Wei Wei and Avideh Zakhor, Fellow, IEEE Abstract

More information

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]

presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing Sudipta Sengupta Shravan Rayanchu,2 Suman Banerjee 2 Bell Laboratories, Lucent Technologies, Murray Hill,

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks IEEE International Conference on Ad hoc and Sensor Systems 19-22 October 2015, Dallas, USA GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks Boutheina Dab Ilhem Fajjari,

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Wireless Transmission and Mobility

Wireless Transmission and Mobility Mobile and Ubiquitous Computing Wireless Transmission and Mobility Modulation, MAC and IPv6" George Roussos! g.roussos@dcs.bbk.ac.uk! Modulation" Digital modulation! digital data is translated into an

More information

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Supporting multicasting in mobile ad-hoc wireless networks: issues, challenges, and current protocols

Supporting multicasting in mobile ad-hoc wireless networks: issues, challenges, and current protocols WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2002; 2:115 130 (DOI: 10.1002/wcm.26) REVIEW Supporting multicasting in mobile ad-hoc wireless networks: issues, challenges, and

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

CHAPTER 6 ROUTING ALGORITHMS FOR WIMAX NETWORKS

CHAPTER 6 ROUTING ALGORITHMS FOR WIMAX NETWORKS CHAPTER 6 ROUTING ALGORITHMS FOR 802.16 WIMAX NETWORKS 6.1. INTRODUCTION The worldwide interoperability for microwave access (WiMAX) [34, 85, 86, 87], a new technology and solution for broadband wireless

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM

ADAPTIVE ROUTING IN COMMUNICATION NETWORKS USING CELL BREATHING BASED BACKPRESSURE ALGORITHM Indian Journal of Communications Technology and Electronics (IJCTE) Vol.2.No.1 2014pp 13-17. available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

Survey on Multicast Routing Protocols in MANETs

Survey on Multicast Routing Protocols in MANETs Survey on Multicast Routing Protocols in MANETs A Viswanath, Dept of CSE, Sree Vidyanikethan Engineering College, Tirupati, AP, India. N Papanna, M.Tech, Assistant Professor, Sree Vidyanikethan Engineering

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information