Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview"

Size: px
Start display at page:

Download "Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview""

From this document you will learn the answers to the following questions:

  • What was given by Avideh Zakhor Access Delay?

  • What did Bruno Ribeiro do?

  • Who presented the Accomplishments?

Transcription

1 Tools for the Analysis and Design of Complex Multi-Scale Networks: Overview" MURI Annual Review Berkeley, October 27, 2011" J. Walrand, PI" SLIDES:

2 1. Team" Venkat Anantharam, UCB John Doyle, Caltech Weibo Gong, UMASS Steven Low, Caltech R. Srikant, UIUC Don Towsley, UMASS Jean Walrand, UCB Avideh Zakhor, UCB 14 PhD Students, 7 Postdocs 12 Journal Papers, 21 Conference papers

3 2. Scientific Objectives and Technical Approach"

4 2. Scientific Objectives and Technical Approach" High Throughput & Reliability GOALS of PROPOSED WORK: Improve Understanding of Multi-Scale Features of Networks Use that Understanding to Develop Better Protocols

5 2. Scientific Objectives and Technical Approach" High Throughput Methodology for LRD and Performance Evaluation Protocols Game: Attack/Defense Reliability

6 3. Scientific Issues" Local Information - Global Impact Multiple Time Scales Uncertainty & Reliability

7 4. Scientific Accomplishments" High Throughput Methodology for LRD and Performance Evaluation Protocols Game: Attack/Defense Reliability

8 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Methodology for LRD and Performance Evaluation Protocols Game: Attack/Defense Reliability

9 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Methodology for LRD and Performance Evaluation Access Delay in IEEE Stability of a P2P Protocol Target Tracking with Protocols In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Game: Attack/Defense Reliability

10 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Cost of Network Reliability

11 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Goal: Understand Capacity w. Network Coding Access Delay in IEEE Stability of a P2P Protocol Connection-Level Scheduling Effect of Buffers on Stability Approach: o Unicast and multicast well-understood o What about multiple unicast? Presentation by Barlas Oguz Cost of Network Reliability

12 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Access Delay in IEEE Stability of a P2P Protocol Connection-Level Scheduling Effect of Buffers on Stability Goal: Estimation of Distribution with HT Approach: o Study distribution of flow sizes o Sampling central notes in large graphs Cost of Network Reliability Presentation by Bruno Ribeiro

13 4. Scientific Accomplishments" High Throughput Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Access Delay in IEEE Stability of a P2P Protocol Connection-Level Scheduling Effect of Buffers on Stability Goal: Estimation with HT; Role of Layers Approach: o Goodness of fit with HT; o Hard limits; o Essentials of Cost layered of Network architecture. Reliability Presentation by John Doyle

14 Goals: Access delay distribution; CW adaptation 4. Scientific Accomplishments" Approach: High Throughput/ Low Energy o Distributed estimation of access delays o CW adaptation based Network on Sharing collision Bound parameters, not recent collision history. Power Laws in Network Analysis Fat tails, hard limits, thin layers Presentation by Avideh Zakhor Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Cost of Network Reliability

15 Goal: Stable distributed P2P protocol 4. Scientific Accomplishments" Approach: High Throughput/ Low Energy o Avoid rare chunk problem by sampling. Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Presentation by Barlas Oguz Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Cost of Network Reliability

16 Goal: Reduce variance of target location estimate 4. Scientific Accomplishments" Approach: High Throughput/ Low Energy o Aggregate information in network. Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Presentation by Wei Wei Cost of Network Reliability

17 4. Scientific Accomplishments" Goal: Stability when connections come and go. High Throughput/ Low Energy Approach: o MWM with suitable f(q MAC ). Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Presentation by Javad Ghaderi Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Cost of Network Reliability

18 4. Scientific Accomplishments" Goal: Understand stability of TCP with large buffers. High Throughput/ Low Energy Approach: o Understand conditions when TCP remains stable Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Access Delay in IEEE Stability of a P2P Protocol Target Tracking with In-Network Aggregation Connection-Level Scheduling Effect of Buffers on Stability Presentation by Somayeh Sojoudi Cost of Network Reliability

19 4. Scientific Accomplishments" High Throughput Goal: Impact of connectivity value on network design. Network Sharing Bound Power Laws in Network Analysis Fat tails, hard limits, thin layers Approach: o Define value of network and cost of connectivity loss. o Study NE of strategic attack vs. proactive defense. Access Delay and CW Adaptation in IEEE Stability of a P2P Protocol Connection-Level Scheduling Effect of Buffers on Stability Presentation by Assane Gueye Cost of Network Reliability

20 5. Group Synergy" Collaboration UIUC - UCB Delays in Adaptive CSMA Protocol Collaboration UIUC - UMASS Ying Srikant - Towlsey Collaboration UMASS - CALTECH File Partitioning Algorithms Collaboration UCB CALTECH Libin Jiang (UCB PhD) joined Caltech (as postdoc) Collaboration across projects UMASS Shroff: Mutlipath protocols and LRD Jiang Modiano: HT and Q-CSMA Gueye Baras: and Topologies Continued collaboration across projects Exploration of delay-based protocols Combination of LQF and Adaptive CSMA

21 6. Future Plans" 1) Analysis of delays and likelihood of delivery in wireless networks; 2) Design of network topologies for reliability and resiliency to attacks; 3) Improvements of WiFi protocols; 4) Study of LRD of functionals of Markov chains; 5) Development of secure wireless communication algorithms; 6) Design of resilient topologies

22 7. Original Goals" Improve Understanding of Multi-Scale Features of Networks Control protocols that capture the effect of buffers; Analysis of interaction of speed scaling and load balancing; Optimization of consensus algorithm; PCSDE models of heavy tails. Using that Understanding to Develop Improved Protocols Reduced-delay protocols for wireless networks; Stable distributed peer-to-peer algorithms; Stable multipath rate control algorithms; WiFi protocols with carrier sense and packet length adaptation; Geographical load balancing algorithms for renewables; Design of robust scheduling algorithms for heavy-tails; Algorithms for identifying important nodes in large networks; Algorithms for maintaining secure wireless communications.

23 Todayʼs Agenda" Barlas Oguz (Berkeley) Network Sharing Bound and Stability of a P2P Protocol Avideh Zakhor (Berkeley) Access Delay and CW Adaptation in IEEE Break Assane Gueye (NIST) Cost of Network Javed Ghaderi (UIUC) Connection-Level Scheduling Lunch Break Wei Wei (UMASS) Target Tracking with In-network Aggregation Bruno Ribeiro (UMASS) Power Laws in Network Analysis Somayeh Sojoudi (Caltech) Effect of buffers on stability of Internet congestion control Break John Doyle (Caltech) Fat tails, hard limits, thin layers Feedback and Remarks from Dr. Chang

24 Publications" JOURNALS Libin Jiang, Venkat Anantharam and Jean Walrand, ``How Bad are Selfish Investments in Network?", IEEE/ACM Transactions on Networking, Vol. 19, No. 2,pp , April 2011." Amin Aminzadeh Gohari and Venkat Anantharam, Evaluation of Marton's Inner Bound for the General Broadcast Channel. To appear in IEEE Transactions on Information Theory." Venkat Anantharam and Takis Konstantopoulos, Integral representation of Skorokhod reflection, To appear in Proceedings of the American Mathematical Society." Lijun Chen, Na Li, Steven H. Low and John C. Doyle. Two Market Models for Demand Response in Power Networks, IEEE SmartGridComm, 2010".J. J. Jaramillo, R. Srikant and L. Ying, Scheduling for Optimal Rate Allocation in Ad Hoc Networks with Hetergeneous Delay Constraints, IEEE Journal on Selected Areas in Communications, May 2011." J. J. Jaramillo and R. Srikant, Optimal scheduling for fair resource allocation in ad hoc networks with elastic and inelastic traffic, IEEE/ACM Transactions on Networking, 2011."

25 Publications" JOURNALS J. Ni, R. Srikant and X. Wu. Coloring Spatial Point Processes with Applications to Peer Discovery in Large Wireless Networks, IEEE/ACM Transactions on Networking, April 2011." M. Leconte, J. Ni and R. Srikant, Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks, IEEE/ACM Transactions on Networking, June 2011." Y. Cai, Patrick P. C. Lee, W. Gong, D. Towsley. Analysis of Traffic Correlation Attacks on Router Queues, J. Computer Networks, 55(3), , February 2011." B. Jiang, Y. Cai, D. Towsley. On the Resource Utilization and Traffic Distribution of MultipathTransmission Control, to appear in Performance" L. Ying, R. Srikant D. Towsley, Cluster-Based Back-Pressure Routing Algorithm, IEEE/ACM Trans. on Networking, to appear. (Collaborative effort.)" B. Jiang, R. Brockett, W. Gong, D. Towsley. Stochastic differential equations for power law behaviors, submitted to J. Applied Probability."

26 Publications" CONFERENCES" Krishnan, E. Haghani, A. Zakhor, Local Estimation of Collision Probabilities in WLANs: An Experimental Study," IEEE WCNC 2011, Cancun." Krishnan, and A. Zakhor, Adaptive Carrier-Sensing for Throughput Improvement in IEEE Networks," IEEE GLOBECOM 2010, Miami, FL. " E. Haghani, M. Krishnan and A. Zakhor, "A Method for Estimating Access Delay Distribution in IEEE Networks," accepted for publication at IEEE GLOBECOM 2011, Houston, TX, December 2011." M. Krishnan, E. Haghani, A. Zakhor, "Packet Length Adaptation in WLANs with Hidden Nodes and Time- Varying Channels," accepted for publication at IEEE GLOBECOM 2011, Houston, Texas." Somayeh Sojoudi, Steven H. Low and John C. Doyle, "Effects of Buffers on Stability of Internet Congestion Controllers", IEEE International Conference on Computer Communications (INFOCOM), mini conference, China, " Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low and Lachlan L. H. Andrew, "Greening geographic load balancing", Proc. ACM Sigmetrics, 2011"

27 Publications" CONFERENCES" J. Nair, A. Wierman, B. Zwart. Scheduling for the tail: robustness versus optimality, Proceedings of Allerton, 2010 (Invited paper)" V. Borkar, J. Nair and N. Sanketh. Manufacturing consent, Proceedings of Allerton, 2010 (Invited paper)" Sudeep Kamath and Venkat Anantharam,``A new dual to the Gacs-Korner common information defined via the Gray-Wyner system", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing, Urbana, Illinois, September 29 -October 1, 2010." Naryana Santhanam and Venkat Anantharam, ``What risks lead to ruin", Proceedings of the 48th Annual Allerton Conference on Communications, Control and Computing,Urbana, Illinois, September 29 -October 1, 2010." Assane Gueye, Jean C. Walrand and Venkat Anantharam. ``Design of Network Topology in an Adversarial Environment", GameSec2010, Conference on Decision and Game Theory for, November 2010, Berlin, Germany." Assane Gueye, Jean C. Walrand, and Venkat Anantharam, A Network Topology Design Game: How to Choose Communication Links in an Adversarial Environment?,GameNets2011, 2nd International ICST Conference on Game Theory for Networks, April 16-18, 2011, Shanghai, China."

28 Publications" CONFERENCES" Sudeep U. Kamath, David N. C. Tse, and Venkat Anantharam, Generalized Network Sharing Bound and the Two-Unicast Problem". NetCod 2011, The 2011 International Symposium on Network Coding, Beijing, China, July, " T. H. Kim. J. Ni, R. Srikant and N. Vaidya. On the Achievable Throughput of CSMA Under Imperfect Carrier Sensing. Proc. IEEE INFOCOM 2011." L. Jiang, M. Leconte, J. Ni, R. Srikant and J. Walrand. Fast Mixing of Parallel Glauber Dynamics and Low- Delay CSMA Scheduling, Proc. IEEE INFOCOM Mini-Conference (Collaborative Effort)" T. Ji and R. Srikant. Scheduling in Wireless Networks with Connection Arrivals and Departures. Proc. ITA S Xiao, W Gong, D Towsley. Secure Wireless Communication with Dynamic Secrets. INFOCOM (runnerup for best paper award) " S Xiao, W Gong. Mobility Can Help: Protect User Identity with Dynamic Credentials. 11th International Conference on Mobile Data Management (MDM 2010)"

29 Publications" CONFERENCES" J. Tan, W. Wei, B. Jiang, N. Shroff, D. Towsley. Can Multipath Routing Mitigate Power Law Delays? Effects of Parallelism on Tail Performance, ITC 2010, September (collaborative effort)" B. Ribeiro and D. Towsley. "Estimating and Sampling Graphs with Multidimensional Random Walks", ACM SIGCOMM Internet Measurement Conference, Nov, 2010." W Zeng, X Chen, A Russell, S Vasudevan, B Wang and W Wei, "Neighbor Discovery in Wireless Networks with Multipacket Reception", Proceedings of MobiHoc, Paris, France, May 2011." Y.-s. Lim, B. Ribeiro, D.S. Menasche, P. Basu, D. Towsley. Online Estimating The Top k Nodes of a Network, Proc. NSW 2011."

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

Optimization models for congestion control with multipath routing in TCP/IP networks

Optimization models for congestion control with multipath routing in TCP/IP networks Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

A QOS BASED LOAD BALANCED SWITCH

A QOS BASED LOAD BALANCED SWITCH A QOS BASED LOAD BALANCED SWITCH Vishnu Prasath Badri narayanan, Manigandan S K Veltech Hightech Dr.RR and Dr.SR Engineering college,india ABSTRACT The simple architecture with high forwarding capacity

More information

CURRICULUM VITAE. John Musacchio

CURRICULUM VITAE. John Musacchio CURRICULUM VITAE John Musacchio Technology and Information Management email: johnm@soe.ucsc.edu University of California, Santa Cruz url: http://www.soe.ucsc.edu/ johnm/ 1156 High Street, SOE 3 phone:

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Asia-Pacific Advanced Network

Asia-Pacific Advanced Network Frame aggregations in the wireless LANs: A review paper Presented by: Anwar Saif Asia-Pacific Advanced Network Wireless communication 2009 Abstract The overhead induced by the IEEE 802.11 PHY and MAC layer

More information

Backpressure with Adaptive Redundancy Mechanism for Networks in Overload

Backpressure with Adaptive Redundancy Mechanism for Networks in Overload Backpressure with Adaptive Redundancy Mechanism for Networks in Overload G. Arul Selvam 1, M. Sivapriya 2. Assistant Professor, Department of CSE, EGS Pillay Engineering College, India 1 P.G. Scholar,

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects

Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects ACCEPTED FROM OPEN CALL Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects Xueyuan Su, Yale University Sammy Chan, City University of Hong Kong Jonathan H. Manton, The University

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay

Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay Controlling the Internet in the era of Software Defined and Virtualized Networks Fernando Paganini Universidad ORT Uruguay CDS@20, Caltech 2014 Motivation 1. The Internet grew in its first 30 years with

More information

The QoS of the Edge Router based on DiffServ

The QoS of the Edge Router based on DiffServ The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of

More information

Center for Mathematics and Computational Science (CWI) Phone: (+31)20-592-4135

Center for Mathematics and Computational Science (CWI) Phone: (+31)20-592-4135 Peter van de Ven Center for Mathematics and Computational Science (CWI) Phone: (+31)20-592-4135 Stochastics department Amsterdam, The Netherlands 2014-present Research interests ven@cwi.nl Applied probability;

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

A Dynamic Reputation Management System for Mobile Ad Hoc Networks A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric Chiejina School of Computer Science University of Hertfordshire Hatfield, UK e.chiejina@herts.ac.uk Hannan Xiao School of Computer

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring

Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,

More information

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HANDLING HEAVY-TAILED TRAFFIC IN QUEUEING NETWORKS USING MAX WEIGHT ALGORITHM M.Sathish Kumar *, G.Sathish Kumar * Department

More information

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Network congestion, its control and avoidance

Network congestion, its control and avoidance MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue

More information

Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks

Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks Bo Ji Department of ECE The Ohio State University Email: ji@ece.osu.edu Changhee Joo Department of EECE Korea University of Technology

More information

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

A TCP-like Adaptive Contention Window Scheme for WLAN

A TCP-like Adaptive Contention Window Scheme for WLAN A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Dynamic Scheduling and Pricing in Wireless Cloud Computing

Dynamic Scheduling and Pricing in Wireless Cloud Computing Dynamic Scheduling and Pricing in Wireless Cloud Computing R.Saranya 1, G.Indra 2, Kalaivani.A 3 Assistant Professor, Dept. of CSE., R.M.K.College of Engineering and Technology, Puduvoyal, Chennai, India.

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

WIRELESS networks that are widely deployed for commercial

WIRELESS networks that are widely deployed for commercial 342 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 1, JANUARY 2007 Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface Jungmin So and Nitin H. Vaidya,

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks 246 Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks Whoi Jin Jung, Jae Yong Lee and Byung Chul Kim Dept. of Info. Comm. Engineering, Chungnam National University, Korea

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Algorithms for sustainable data centers

Algorithms for sustainable data centers Algorithms for sustainable data centers Adam Wierman (Caltech) Minghong Lin (Caltech) Zhenhua Liu (Caltech) Lachlan Andrew (Swinburne) and many others IT is an energy hog The electricity use of data centers

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (28 December 2012) STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California, Berkeley

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Cross Layer TCP Congestion Control Load Balancing Technique in MANET Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

zhouzg281@nenu.edu.cn,{xugc,dengcy}@jlu.edu.cn,hejx@jlu.edu.cn,jianhuajiang@yahoo.com Anycast Member Server B Anycast Member Server A

zhouzg281@nenu.edu.cn,{xugc,dengcy}@jlu.edu.cn,hejx@jlu.edu.cn,jianhuajiang@yahoo.com Anycast Member Server B Anycast Member Server A ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE

SWASTIK K. BRAHMA PROFESSIONAL EXPERIENCE SWASTIK K. BRAHMA Electrical Engineering & Computer Science Syracuse University Syracuse, NY 13244 Tel: (505) 948-1288 Email: skbrahma@syr.edu Web: http://skbrahma.mysite.syr.edu/ PROFESSIONAL EXPERIENCE

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks I.J. Information Technology and Computer Science, 2,, 4-46 Published Online November 2 in MECS (http://www.mecs-press.org/) Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks Horizon: Balancing TCP over multiple paths in wireless mesh networks Bozidar Radunovic, Christos Gkantsidis, Dinan Gunawardena, Peter Key Microsoft Research Cambridge, UK Wireless Mesh Networks Goals 1.

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

- Assistant Professor (tenure-track), Math and Computer Science Depart., University of Texas-Permian Basin, TX, USA. Aug.

- Assistant Professor (tenure-track), Math and Computer Science Depart., University of Texas-Permian Basin, TX, USA. Aug. QUAN (ALEX) YUAN, PH.D. Assistant Professor Math and Computer Science Department University of Texas-Permian Basin Office: (432) 552-2258 Fax: (432) 552-3230 Email: yuan_q@utpb.edu 1 RESEARCH INTERESTS

More information

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks

A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks International Journal of Information Processing Systems, Vol.3, No.1, June 2007 1 A Scalable Multicasting with Group Mobility Support in Mobile Ad Hoc Networks Kap-Dong Kim*, Kwangil Lee**, Jun-Hee Park**,

More information

Spectrum handoff reduction for cognitive radio ad hoc networks

Spectrum handoff reduction for cognitive radio ad hoc networks Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,

More information

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:

More information