Reliable Broadcast Protocols for Mobile Ad Hoc Networks with Liveness Property

Size: px
Start display at page:

Download "Reliable Broadcast Protocols for Mobile Ad Hoc Networks with Liveness Property"

Transcription

1 Poznań University of Technology Institute of Computing Science Michał Kalewski Reliable Broadcast Protocols for Mobile Ad Hoc Networks with Liveness Property Doctoral Dissertation Submitted to the Council of the Faculty of Computing Science of Poznań University of Technology Supervisor: Ph. D., Dr. Habil., Professor Jerzy Brzeziński Poznań 2014

2

3 Politechnika Poznańska Instytut Informatyki Michał Kalewski Niezawodne protokoły rozgłaszania dla mobilnych sieci ad hoc z właściwością żywotności Rozprawa doktorska Przedłożono Radzie Wydziału Informatyki Politechniki Poznańskiej Promotor: prof. dr hab. inż. Jerzy Brzeziński Poznań 2014

4

5 There s a Legion that never was listed, That carries no colours or crest, But, split in a thousand detachments, Is breaking the road for the rest. Rudyard Kipling The Lost Legion (1895) To Patrycja, Wiktoria, and Jakub

6 A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Computing Science. Michał Kalewski Distributed Systems Group Institute of Computing Science Poznań University of Technology Typeset by the author in L A TEX. Copyright 2014 by Michał Kalewski This dissertation and associated materials can be downloaded from: Institute of Computing Science Poznań University of Technology Piotrowo 2, Poznań, Poland The research presented in this dissertation was partially supported by the European Union in the scope of the European Regional Development Fund program no. POIG /08. The use in this dissertation of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

7 Acknowledgements I would like to first express my special gratitude and thanks to my supervisor, Prof. Jerzy Brzeziński, in recognition and appreciation of his kind support, enduring commitment, and continued guidance. I am sure that everyone reading this thesis will benefit from his constant assistance towards making the reasoning more apparent and unambiguous, and the text more clear and comprehensive. I am also very grateful to all the members of the Distributed Systems Group, whose cooperation, during our seminars and meetings, went way beyond the call of duty. Amongst them, I would like to direct my particular thanks to Dr. Michał Sajkowski for his friendly attitude, continued encouragement, and all his advice. My special thanks go to my favourite distributed system my family, for their continuous support and motivation, for their faith in my abilities and my work. Finally, the most important everyday help, which I received, was from my wife Patrycja, who made my work and writing possible. For your patience, tolerance and understanding, help and support, and countless other big and small things, thank you, Patrycja.

8

9 Abstract Mobile ad hoc networks are composed of autonomous and mobile hosts which communicate through wireless links without any additional network infrastructure or central points. Each pair of such hosts, between whom the distance is less than their transmission range, can communicate directly with each other. In mobile ad hoc networks, hosts are free to move and organise themselves arbitrary, so the resulting network topology may change rapidly and can get partitioned and reconnected unpredictably. One of the fundamental communication operations in mobile ad hoc networks is broadcasting a process of sending a message from one host to all hosts in a network. Since broadcast is also a basic communication requirement to construct other and more complex distributed algorithms, it is important for any broadcast protocol to provide some message delivery guarantees, especially if host failures are taken into account. In the case of mobile and dynamic environments, however, this can be hard or even impossible to achieve. On the other hand, if it can be assumed that a group of collaborating hosts in a mobile ad hoc network can be partitioned and that partitions heal eventually, it is then possible to develop broadcast protocols with deterministic guarantees, even if hosts are unreliable. Informally, the assumption that any partition is not allowed to be permanently isolated is called the network liveness property. The broadcast protocols for mobile ad hoc networks with the network liveness property proposed till now guarantee, unconventionally, that only at least an arbitrary majority of operative hosts (i.e. hosts that have not failed) receives each broadcast message. This means that the guarantees of these protocols are different from those of uniform reliable, regular reliable, and best-effort reliable broadcasts. Moreover, in all these protocols, it is assumed that the minimum time of direct connectivity between any neighbouring hosts is much longer than maximum message transmission time. This assumption covers, however, the dependence of the required minimum time of direct communications, and hence of the correctness of these proto-

10 x Abstract cols, on some system parameters. In the context of the above observations, in this dissertation we propose novel reliable broadcast protocols for mobile ad hoc networks with the network liveness property. Towards the end, we first explicitly define a formal model of mobile ad hoc networks and the network liveness property. Additionally, we also present some results on the estimation of select parameters of the property, determined experimentally by simulation of several entity and group mobility models. Next, we scrutinise the broadcast protocols that have so far been proposed for mobile ad hoc networks with the network liveness property, thoroughly analyse their time constraints, and prove that the minimum time of direct connectivity, required by the protocols, depends on the total number of hosts in a network and on the total number of messages that can be disseminated by each host concurrently. Based on this observation, we then propose time-adjusted versions of the protocols by eliminating the dependencies of their time constraints. Since the guarantees of these protocols are unconventionally defined in terms of operative hosts, we thereafter design a set of new uniform reliable and regular reliable broadcast protocols, and discuss the implementation of best-effort reliable broadcast. For the proposed protocols, we show that their time constraints are independent of system parameters, prove analytically their correctness, and evaluate experimentally their performance in simulation tests. Finally, we describe Service-Oriented Ad Hoc System, a system that allows its users to create, publish, and access web services in mobile ad hoc networks, which was created to serve as a proof of the concept of the introduced broadcast solutions.

11 Contents 1 Introduction 1 2 System Model and Foundational Concepts Connectivity graph Processing abstractions Node failures Direct connectivities Network liveness property Mobility models Entity models Group models Distribution of the connectivity time interval Reliable broadcast abstractions Best-effort reliable broadcast Regular reliable broadcast Uniform reliable broadcast Safety and progress Crash-Tolerant Broadcast Protocols Crash-tolerant broadcast Proactive Dissemination Protocol Reactive Dissemination Protocol Proactive Knowledge and Reactive Message Optimised PKRM Analysis of time constraints of the crash-tolerant broadcast protocols Related work Concluding remarks

12 xii Contents 4 Time-Adjusted Crash-Tolerant Broadcast Protocols Time-Adjusted Proactive Dissemination Protocol Time constraints of the TAPDP protocol Correctness of the TAPDP protocol Protocol modifications and improvements Time-Adjusted Reactive Dissemination Protocol Time-Adjusted Proactive Knowledge and Reactive Message Time-Adjusted Uniform Reliable Broadcast Protocols Time-Adjusted Proactive Uniform Reliable Broadcast Protocol Time constraints of the TAPURBP protocol Correctness of the TAPURBP protocol Protocol modifications and improvements Time-Adjusted Reactive Uniform Reliable Broadcast Protocol Time-Adjusted PKRM Uniform Reliable Broadcast Protocol Time-Adjusted Regular Reliable Broadcast Protocols Time-Adjusted Proactive Regular Reliable Broadcast Protocol Correctness of the TAPRRBP protocol Protocol modifications and improvements A note on the implementation of best-effort reliable broadcast Performance Evaluation of the Proposed Protocols The simulator Simulation parameters Performance measures and simulation tests Simulation results T T m and T T pi measures U Rpi and M 0 p i ratios Concluding remarks Service-Oriented Ad Hoc System System overview Replication Modes of communication System architecture Service interface Exemplary applications Conclusions 107 STRESZCZENIE (Extended Abstract in Polish) 113 REFERENCES 131

13 List of Symbols C L The preceding relation according to sequence counters and node identifiers The preceding relation according to Lamport logical clocks and node identifiers e a, b An event named e consisting of two attributes a and b f l m p i α β δ B The assumed maximum number of faulty nodes The concurrent dissemination limit A broadcast message The i-th node The threshold of transmission suppression The time of periodic transmissions The maximum message transmission time between neighbouring nodes The application-specified parameter of direct connectivity time D i I K i (m) KK i (m) KR i (m) L M The delivery vector of node p i The network liveness property connectivity time interval The knowledge vector of node p i for message m The knowledge vector on the propagation knowledge of message m of node p i The knowledge vector on the realisation of message m of node p i The total number of messages that can be disseminated concurrently in an ad hoc network A number of additional messages sent periodically

14 xiv List of Symbols N R i C i C(m) L i L(m) The total number of nodes in an ad hoc network The realisation vector of node p i The sequence counter of node p i A sequence counter value associated with m by its originator Lamport logical clock of node p i Lamport logical clock value associated with m by its originator A i E E The knowledge array of node p i A set of links between neighbouring nodes A product set of V Γ (E ) The set of all subsets (power set) of E E i G O P P Realised i Received i Selected i Unrealised i V The dynamic set of node p i The connectivity graph The set of all operative nodes at some time t A non-empty subset of O A complementary set of P in O The set of realised messages of node p i The set of messages received by node p i The set of messages considered for transmission of node p i The set of unrealised messages of node p i The set of all nodes in an ad hoc network

15 1 Introduction Ad hoc (Latin, for this) [adverb]: for the particular end or case at hand without consideration of wider application; [adjective]: concerned with a particular end or purpose; formed or used for specific or immediate problems or needs; fashioned from whatever is immediately available. Merriam-Webster Dictionary In 1964, the famous British science fiction writer and inventor Arthur C. Clarke was asked to ponder the hardest question: to predict the future. In his answer, aired on the BBC s Horizon programme 1, he foresaw that in the future: We could be in instant contact with each other, wherever we may be, where we can contact our friends anywhere on earth, even if we don t know their actual physical location. It will be possible in that age, perhaps only 50 years from now, for a man to conduct his business from Tahiti or Bali just as well as he could from London. In fact, if it proves worthwhile, almost any executive skill, any administrative skill, even any physical skill, could be made independent of distance. I am perfectly serious when I suggest that one day we may have brain surgeons in Edinburgh operating on patients in New Zealand. Half a century later, after an enormous progress in the field of computing and communication technologies and their applications, this vision may seem to be impressively accurate as it is being realised before our very eyes. The greatest manifestation of all these achievements, which enables us to further develop new communication abilities, is the Internet. Nowadays, the Internet technology is (almost) everywhere, it is (almost) always accessible, and it is always on. In fact, we now have entered an era, in which users seek to be provided with trouble-free Internet access from any device, in any place, and at any time. Consequently, as observed by Kleinrock ([Kle03]), emerging communication technologies are heading to form a new invisible global infrastructure, which is formed by the three areas of: nomadicity, embeddedness, and ubiquity. Following Kleinrock, nomadicity (or nomadic computing and communication) is the system support needed to provide a rich set of computing and communication capabili- 1

16 2 1 Introduction ties and services to mobile users, or nomads, as they move from place to place in a way that is transparent, integrated, convenient, and adaptive. Embeddedness (or embedded technology) is made of small intelligent devices embedded in the physical world and interconnected with each other or connected to the Internet. Whereas ubiquity (or ubiquitous access) means Internet service availability wherever the nomads travel on a global basis. One of the new communication technologies that may support and merge nomadicity and embeddedness, extend ubiquity, and provide communication in places where no infrastructure is available are mobile ad hoc networks. Mobile ad hoc networks Mobile ad hoc networks (abbreviated to MANETs) are composed of autonomous and mobile hosts (or communication devices), which communicate through wireless links without any additional network infrastructure or central points ([Per01, Agg04, MM04, BKL06, TF06, BK07, Bou08, MWM09]). The distance from a transmitting host at which its wireless signal strength remains above the minimal usable level is called transmission (or wireless) range of that host. Therefore, each pair of such devices, between whom the distance is less than their transmission range, is referred to as neighbouring hosts and the hosts are able to communicate directly with each other. In mobile ad hoc networks, hosts are free to move and organise themselves arbitrary, so the resulting network topology may change rapidly and can get partitioned (i.e. disconnected into isolated subnets) and reconnected unpredictably. The absence of any centralised coordination is the reason why network operations in MANETs are performed in a distributed, that is decentralised, manner. Similar descriptions of ad hoc networks are in common use in the literature with only minor differences between them. For instance, Stojmenović and Wu point out in [SW04] that ad hoc networks may also contain static devices (e.g. embedded sensors); Gerla et al., in [GLR05], emphasise that an ad hoc network is often built to support a specific application, and thus, the networking is application-driven ; and Gačnik, characterising MANETs in [Gač04], indicates additionally that hosts in such networks may have limited resources, like battery power supply, and security, because of the wireless communication, which is more vulnerable to security issues than wired connections. At last, the Institute of Electrical and Electronics Engineers (IEEE), in the ANSI/IEEE standard on Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications ([ANS99]), defines MANET as: A network composed solely of stations within mutual communication range of each other via the wireless medium. An ad hoc network is typically created in a spontaneous manner. The principal distinguishing characteristic of an ad hoc network is its limited temporal and spatial extent. These limitations allow the act of creating and dissolving the ad hoc network to be sufficiently straightforward and convenient so as to be achievable by non-technical users of the network facilities; i.e., no specialized technical skills are required and little or no investment of time or additional resources is required beyond the stations that are to participate in the ad hoc network.

17 1 Introduction 3 Figure 1.1: Illustration of the hidden and exposed host problems. At present, there are many different wireless technologies which allow professionals as well as laymen for a rapid and simple establishment of mobile networks. Most of them use the Industrial, Scientific, and Medical (ISM) bands that are free from licensing formalities. Most notably, the technologies include the highly popular IEEE and Bluetooth 3 networks, which both contain direct provisions for ad hoc networking. Furthermore, we currently observe the emergence not only of versatile smartphones and tablets equipped with modern wireless communication interfaces, but also open-source hardware development platforms that support construction of mobile devices interconnected by wireless links, such as Arduino 4, BeagleBoard 5, Raspberry Pi 6, Xbee 7, or ZigBee 8, to name only the most notable ones. All these successful technologies provide an opportunity for ad hoc networking and bring the idea of the invisible global infrastructure closer. The same nature of the wireless communication, which makes mobile networks possible, causes also unique issues like the hidden-host and exposed-host problems, meaning that the popular Carrier Sense Multiple Access (CSMA) scheme ([KT75a]) and its variants such as CSMA with Collision Detection (CSMA/CD), developed for wired networks, cannot be directly used in ad hoc networks at the MAC layer. To explain both problems let us refer to Figure 1.1, where host B is within the transmission range of hosts A and C, but hosts A and C are not in each other s transmission ranges. Let us suppose that host A is transmitting data to host B. Host C, being out of the transmission range of host A, cannot

18 4 1 Introduction detect the carrier, and hence, may start sending data to host B, causing a collision at B. This is referred to as the hidden-host (or hidden-terminal) problem ([KT75b]), because hosts A and C are hidden from each other. Let us now suppose another case where host B is transmitting data to host A. Since host C is within the transmission range of host B, it senses the carrier and defers its own transmissions. However, this is unnecessary because transmissions of host C cannot cause collisions at A. This is referred to as the exposed-host (or exposed-terminal) problem ([PKD01]), as host B being exposed to host C caused the latter to needlessly defer its transmissions. In order to solve the problems of the hidden and exposed host, researchers have come up with many protocols, which are contention based, but involve some forms of dynamic channel reservation prior to data transmission or collision resolution techniques (the protocols are surveyed, among others, in [KRD06]). For instance, the ANSI/IEEE standard specifies two different modes of the MAC protocol: Distributed Coordination Function (DCF) as its fundamental method for use also within ad hoc networks, and Point Coordination Function (PCF) as an optional method for use only within centrally coordinated infrastructure-based networks ([ANS99, Che94]). The DCF mode is a combination of the CSMA and Multiple Access Collision Avoidance (MACA) protocol, which has been proposed by Karn in [Kar90] and modified later by Bharghavan et al. in [BDSZ94]. In the DCF mode, three short signalling packets are used: RT S (or Request-To- Send), CT S (or Clear-To-Send), and ACK (or Acknowledgement). In Figure 1.1, if host A needs to transmit data to host B, it first sends a RT S packet to that host. Such packets, however, are also overheard by all other hosts within the sender s transmission range. When host B receives this packet, it responses with a CT S packet to host A. Again, such packets are also overheard by all other hosts within the sender s transmission range, i.e. by host C in Figure 1.1. Next, when host A receives the CT S packet, it immediately commences transmission of the actual data to host B, and on receiving the data, host B sends an ACK packet to host A, which is overheard by host C. Additionally, the protocol applies the concept of virtual carrier sensing implemented in the form of a Network Allocation Vector (NAV), which is maintained by every host. The vector contains a time value that represents the duration up to which the wireless medium is expected to be occupied by transmissions of other hosts. Since every packet contains the duration information for the remainder of the message, each host overhearing a packet continuously updates its own NAV. The key idea of the protocol is that any neighbouring host that overhears a RT S or CT S packet has to defer its own transmissions for the length of the expected data transmission. So, in the hidden-host scenario as in Figure 1.1, host C will not overhear the RT S packet sent by host A, but it would overhear the CT S and ACK packets sent by host B. Thus, host C will defer its transmissions during the communication between hosts A and B. Similarly, in the exposed-host scenario, host C would overhear the RT S packet sent by host B, but not the CT S sent by host A, and hence, will consider the medium to be free for its own transmissions. Usually, medium access protocols, as these mentioned above, are designed to provide delivery of unicast data, i.e. they involve the procedures necessary to transfer data between two interconnected hosts in the network. But if there is a need to transmit data to more than one receiver in an ad hoc network, then MAC protocols that transfer data packets to all neighbouring hosts may instead be used to improve the overall

19 1 Introduction 5 efficiency of the communication. Several such protocols have so far been proposed, e.g., in [TG01, SL05, KK07, LYXX11], and most of them utilise similar RT S, CT S, and ACK control packets, but let the transmitted data to be received by all hosts neighbouring to the sender. For example, the general idea of the Broadcast Medium Window (BMW) protocol, proposed in [TG01], is to transmit each data packet analogously as it is done in DCF, but to all neighbours in a round robin fashion. Despite the additional handicaps at the MAC layer, and due to their unique features, mobile ad hoc networks have vast practical and commercial potential, which has already been recognised and found many applications that range from military systems to sensor networks. Historically, MANETs have primarily been used for tactical network related applications to improve battlefield communications and survivability ([CCL03]). In military, decentralised and mobile networks, which can be set up anywhere, at any time, and without the complexities of infrastructure assembling, are an operative advantage or even a necessity, and thus the emergence of such systems, which may be exemplified by the BOWMAN family of tactical radios 9 used by British Army, or Radio over Internet Protocol Routed Network (RIPRNet), a United States military tactical network ([TTO10]). Another area of applications that has been receiving a lot of attention are search and rescue missions and emergency services, where MANETs can help overcome network impairment. As firefighter and police squads sometimes have to operate in places where no infrastructure is present, e.g. after natural disasters, and operations still need to be coordinated, then with the use of ad hoc networks, mobile units may build up emergency information structures. Examples of such systems are the crisis communication, security, and critical operations applications developed by the AtHoc company 10, or BRICK, a platform for communicating information during a crisis developed by the Ushahidi company 11. Arguably much less complicated, smaller in size, but perhaps the prototypical application requiring the establishment of an ad hoc network is mobile conferencing, when users gather outside their normal office environment, and where they may lack network infrastructure ([Per01]). Personal Area Networks (PANs) are used in an even smaller range, as they are intended to operate in a personal environment, interconnecting electronic devices for everyday use. The most popular and wide-spread technology for this purpose is Bluetooth, which enables users to interconnect devices into so-called piconets ([Blu13]). Recently, Bluetooth technology has a strong competitor in the form of Wi-Fi Direct 12 (or Wi-Fi Peer-to-Peer) networks, i.e. IEEE ad hoc networks with an enhanced security level and additional features designed for easy and convenient establishment of connections between mobile phones, cameras, printers, gaming consoles, and other devices to transfer content and share applications. The other uses of MANETs include multimedia applications and home networking ([Gač04]), Internet connections sharing in places that lack infrastructure ([BABM05]), wireless sensor networks that consist of spatially distributed autonomous sensors to monitor physical or environmental conditions ([APM05]), and vehicular ad hoc networks that use cars as mobile hosts, and which become so popular that gained widely recognised VANETs acronym ([ZLESB13]). A partial list of wireless network commercial products can be

20 6 1 Introduction found, for instance, in [Agg04]. Given the fact that mobile devices outsold in 2011 personal computers for the first time 13, and that most of them, if not all, are equipped with wireless interfaces, the question that arises is what other useful applications can be created having at our disposal such a large potential that is reaching the kind of audience it used to take technologies decades to reach. Responding to this question, in its most basic terms, should, therefore, be regarded as the responsibility of scientists and researchers. Reliable broadcast Broadcast is the process of sending a message from one host to all hosts in a network, and, to quote Lipman et al. from their chapter on broadcast protocols in [MWM09], it is a fundamental operation for communication in ad hoc networks as it can be used for updating network information or for discovering and maintaining routes to support other multi-hop communication primitives. Since broadcast is also a basic communication requirement to construct other and more complex distributed algorithms, like consensus or coherency protocols ([PSSK10]), it is important for any broadcast protocol to provide some message delivery guarantees. Therefore, as in almost any other network or distributed protocol, a key issue consists here in finding concepts and solutions that are resilient enough to allow reducing, or even eliminating, the underlying uncertainty. This uncertainty may be created by asynchrony, unstable behaviours, low computing capability, or scalability requirements ([BBRTP07]). But in mobile ad hoc networks, this uncertainty is mainly caused by highly dynamic network topologies and limited resources, like power supply, which may lead to host failures and temporal or even permanent disconnections resulting in the same effects as failures a permanently disconnected host cannot take part in the processing just as a faulty one. For that reason, providing strong, i.e. deterministic, delivery guarantees in such changeable environments can be hard or even impossible to achieve ([GL02, LS03]). As a result, looking across all the research, one finds that heuristic broadcast protocols with only probabilistic guarantees have been mostly proposed for use in MANETs. The major techniques in this regard comprise gossip (or epidemic) protocols that disseminate messages in a manner similar to the spread of rumours or a virus in a biological community ([CRB01, LEH03]), protocols based on clustering algorithms that constantly group hosts into interconnected clusters with a selected representative host in each of them ([LG97, LW02]), and protocols that resort to other forms of host arrangements like connected dominating sets, where any receiving host either belongs to the set or is directly connected with some host from the set ([SSZ02, Wu03]), or spanning trees, where receiving hosts are connected without cycles ([BJ02, JM05]). For all such protocols, the flooding protocol, where each host resends each broadcast message only once, is a benchmark for various aspects of efficiency and performance analysis, and a comprehensive survey of these kind of broadcast solutions for mobile ad hoc networks is presented, i.a., in [MWM09]. On the other hand, if it can be assumed that a group of collaborating hosts in an ad hoc network can be partitioned and that partitions heal eventually, it is then possible to develop broadcast protocols with deterministic guarantees, even if hosts are unreliable. 13

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Modular Communication Infrastructure Design with Quality of Service

Modular Communication Infrastructure Design with Quality of Service Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Wiereless LAN 802.11

Wiereless LAN 802.11 Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

Spontaneous Group Management in Mobile Ad Hoc Networks

Spontaneous Group Management in Mobile Ad Hoc Networks Wireless Networks 10, 423 438, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Spontaneous Group Management in Mobile Ad Hoc Networks LAURA GALLUCCIO, GIACOMO MORABITO and SERGIO

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Dr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems

Dr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming)

Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming) Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming) Dynamic Load Balancing Dr. Ralf-Peter Mundani Center for Simulation Technology in Engineering Technische Universität München

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Introduction to Engineering System Dynamics

Introduction to Engineering System Dynamics CHAPTER 0 Introduction to Engineering System Dynamics 0.1 INTRODUCTION The objective of an engineering analysis of a dynamic system is prediction of its behaviour or performance. Real dynamic systems are

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Seth Gilbert Nancy Lynch Abstract When designing distributed web services, there are three properties that

More information

Industrial Networks & Databases

Industrial Networks & Databases Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

Heterogeneous network establishment assisted by cellular operators

Heterogeneous network establishment assisted by cellular operators Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed

More information

Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents

Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents Norimichi Ukita Graduate School of Information Science Nara Institute of Science and Technology, Japan ukita@is.aist-nara.ac.jp

More information

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN

PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN PERFORMANCE ANALYSIS OF VIDEO CONFERENCING SOFTWARE IN TECHNOLOGY 802.11N NABILA BINTI RUSLAN This report is submitted in partial fulfilment of the requirements for the Bachelor of Computer Science (Software

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Contents. Load balancing and high availability

Contents. Load balancing and high availability White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the

More information