Increasing Packet Delivery Ratio in DSR by Link Prediction

Size: px
Start display at page:

Download "Increasing Packet Delivery Ratio in DSR by Link Prediction"

Transcription

1 Increasing Packet Delivery Ratio in DSR by Link Preiction Liang Qin Thomas Kunz Department of Systems an Computer Engineering Carleton University, Ottawa, Ontario, Canaa K1S 5B6 Abstract Most existing on-eman mobile a hoc network routing protocols continue using a route until a link breaks. During the route reconstruction, packets can be roppe, which will cause significant throughput egraation. In this paper, we a a link breakage preiction algorithm to the Dynamic Source Routing (DSR) protocol. The mobile noe uses signal power strength from the receive packets to preict the link breakage time, an sens a warning to the source noe of the packet if the link is soon-to-be-broken. The source noe can perform a pro-active route rebuil to avoi isconnection. Experiments emonstrate that aing link breakage preiction to DSR can significantly reuce the total number of roppe ata packets (by at least %). The traeoff is an increase in the number of control messages by at most 33.5%. We also foun that the proactive route maintenance oes not cause significant increase in average packet latency an average route length. Enhance route cache maintenance base on the link status can further reuce the number of roppe packets. 1. Introuction In mobile a hoc networks, wireless meia are of limite an variable range, in istinction to existing wire meia. Each mobile noe moves in an arbitrary manner an routes are subject to frequent breakage. During the perio of route reconstruction, packets can be roppe. The loss of packets will cause significant throughput egraation for both real-time an non-real-time ata. This effect on TCP is escribe in [1]. At the time when this research began, few algorithms an protocols trie to improve performance by using link state information. Associativity Base Routing (ABR) propose by Toh [] favors routes with longer-live links accoring to the associativity of the incient noes. He propose a link state preiction moel base on the knowlege of mobile noes position [3]. Flow Oriente Routing Protocol (FORP) [4] is the protocol publishe then that also uses a mobile noe s position information that is provie by Global Position System (GPS) to preict link state. The estination noe can etermine the route expiration time base on the link preiction in the route. It will inform the source noe when a link is preicte to be broken, then the source can select the most reliable route to sen rest packets. The more recent preemptive routing propose by Goof [5] uses signal power strength similar to our metho. It initiates route iscovery early by etecting that a link is likely to be broken an buils an alternative route before the link failure. The preemptive ratio δ is use for efining a preemptive zone that is ajacent to the signal strength threshol. Because δ is a constant, it implies that for mobile noes with ifferent relative spees, the size of the preemptive zone is the same. Their simulation results also show that the increase in overhea coul be as high as three times the overhea of the original DSR protocol. The link availability preiction requires two noes maintain their movement patterns uring the preiction time. Several papers propose probability moel for the link availability [6][7][8]. One moel propose by McDonal [6] efines the path availability as the probability of link is active at time t+t given that it is active at time t. The limitation is that the link coul be broken uring time (t, t+t ), then a packet will be roppe if there is traffic on this link. Another moel propose by Jiang [7] efines the probability of a link that will be active continuously from current time to the time when link is preicte to be broken. In this moel an artificial variable ε is introuce for calculating the path availability, which epens on noe ensity an raio transmission range, an is obtaine from a series of experiments. This paper concentrates on the link state preiction in a hoc networks to reuce the ata packets that woul have been roppe because of link failure. In most existing protocols, a mobile host will keep using the route until the link is broken. Instea, the preiction algorithm propose in this paper will use the power measurement of receive packets to preict the topological change in Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

2 orer to perform a route rebuil prior to the link breakage, to avoi the ata packets being roppe. In more etail, a link failure happens when two mobile noes A an B move out of their raio transmission ranges. Noe B monitors the packets coming from A, preicts the link breakage time of link A-B, an then sens a warning message to the source noe of this active route. The source noe can rebuil a new route before the link breaks. We call this pro-active route maintenance. As our simulation results show, pro-active route maintenance reuces the number of roppe packets because of link failure with little averse effect on other routing protocol evaluation criteria (number of control packets, packet latency, an route optimality). Also, the link status information can be use to avoi using stale routes in a noe s route cache to further reuce the number of roppe packets. We o not propose a new routing protocol; instea, we suggest moifications to one popular on-eman routing protocol, DSR [9]. However the preiction algorithm can also be applie to other mobile a hoc routing protocols. This paper focuses on the link state preiction, its implementation an evaluation in the DSR protocol. Section is a brief introuction of the DSR protocol. Section 3 proposes the link state preiction algorithm base on the receive signal power strength, algorithm parameter settings, the preiction accuracy an its limitations. Section 4 presents the preiction algorithm implementation in DSR. Scenarios of exception are analyze. We compare the simulation results uner ifferent mobility rates of DSR with an without preiction algorithm implemente. This section also shows an enhance route cache maintenance base on link status to increase packet elivery ratio. Section 5 raws our conclusion an proposes irections for future research.. Dynamic source routing (DSR) protocol The a hoc routing protocols may be generally categorize as table-riven an source-initiate on-eman riven. The simulation results reporte in several papers [1][11][1] show that normally oneman routing protocols have higher packet elivery ratio an nee less routing messages than table-riven routing protocols. DSR is one on-eman routing protocol. It is base on the concept of source routing, The sener explicitly lists the route in the packet s heaer, ientifying each forwaring hop by the aress of the next noe to which to transmit the packet on its way to the estination host. The DSR protocol consists of two mechanisms: Route Discovery an Route Maintenance. When a mobile noe wants to sen a packet to some estination, it first checks its route cache to etermine whether it alreay has a route to the estination. If it has one, it will use this route to sen the packet. Otherwise, it will initiate route iscovery by broacasting a route request packet. When receiving a request packet, a noe appens its own aress to the route recor in the route request packet if it i not receive this request message before, an rebroacasts the query to its neighbors. Alternatively, it will sen a reply packet to the source without propagating the query packet further if it can complete the query from its route cache. Furthermore, any noe participating in route iscovery can learn routes from passing packets an gather this routing information into its route cache. Each noe along the route, when transmitting the packet to the next hop, is responsible for etecting if its link to the next hop has broken. When the retransmission an acknowlegement mechanism etects that the link is broken, the etecting noe returns a Route Error message to the source of the packet. Then it will search its route cache to fin if there is an alternative route to the estination of this packet. If there is one, the noe will change the source route in the packet heaer an sens it using this new route (this is calle salvaging a packet). When a Route Error packet is receive or overhear, the link in error is remove from the local route cache an all routes, which contain this hop, must be truncate at that point. The source can then attempt to use any other route to the estination that is alreay in its route cache, or can invoke Route Discovery again to fin a new route. 3. Link preiction algorithm The GPS an signal strength methos both use physically measure parameters to preict the link status. The noe with GPS can know the position of itself irectly. But GPS currently is not a stanar component of mobile evices, an in the metropolitan area an inoor, the signal can be too weak to be receive. The signal strength metho only consumes receiving noe s computing power, an oes not epen on any a-on evice. It will be use in this paper. First, we propose a link preiction algorithm that can preict the link breakage time between two mobile noes on an active route. The concept that uses receive signal strength to preict link failure has been propose in cellular networks to perform hanover [13]. At first we assume that the sener power level is constant. Receive signal power samples are measure from packets receive from the sener. From this information it is possible to compute the rate of change for a particular neighbor s signal power level. Because the signal power threshol for the wireless network interface is fixe, the time when the power level rops below the acceptable value can be compute. Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

3 3.1. Link preiction algorithm Vay Va In our preiction algorithm, an optimistic raio transmission moel is use. Assume noe A has a transmission range with raius R. If noe B is locate within this circle, it is assume to correctly receive noe A s transmission. So the link availability of two mobile noes can be simply etermine by the istance between them. noe A noe B Vax Vbx Raio propagation an mobile noe movement moels. Two Ray Groun Reflection Approximation is use as raio propagation moel [11]. At near istances, Friss free-space attenuation (1/r ) is use, at far istance we employ an approximation to Two Ray Groun (1/r 4 ). The approximation assumes specula reflection off a flat groun plane. Because we are only concerne about the situation that two mobile noes move out of their raio transmission range, only the Two Ray Groun moel is use. The signal power strength at the receiver is: Pt * Gt * Gr * ( ht * hr ) P = (1) 4 P: signal power at the receiver. P t : signal power at the transmitter. G t : gain for a signal to a noe from the transmitter. G r : gain for a signal to a noe from the receiver. ht: height of transmitter antenna. hr: height of receiver antenna. is the istance between transmitter an receiver. We assume that P t is a constant (as in IEEE 8.11 raios). Also, in our wireless a hoc network simulation, an omniirectional antenna is use. Further, we assume the groun is flat, an that hr an ht are constants. So we can simplify equation 1) uner the conitions of a hoc wireless network simulation: Pt P = k () 4 Where: k = Gt * Gr * ( ht * hr ) is a constant. This equation shows that the signal power at the receiver noe has relation (1/ 4 ) with the istance between the sener noe an receiver noe. A ranom waypoint moel [9] is use to simulate the mobile movement of noes. A mobile noe will move at a constant spee ranomly selecte up to a given maximum value to a ranom estination, then stops for a preefine pause time an moves again. Let noe B be the receiver noe, noe A be a sener, an also one of noe B s neighbors. Noe A is moving at spee υ a, noe B is moving at spee υ b. υ a can be ecompose to υ ax υ ay, same for υ b, see Figure 1. Then the spee of an noe B relative to noe A is: υ = υ υ ) + ( υ υ ) (3) ( bx ax by ay Figure 1. Mobile noes moving at ranom spees an irections Accoring to equation (3), we can assume that relative to noe B, noe A is still, noe B is moving an at relative spee an irection υ Preicting link breakage. The preiction time is efine as the time when two noes are moving out of the raio transmission rage. Because the signal power threshol for a wireless network interface is fixe, the preiction time is a constant if two noes keep their moving spees an irections uring this perio of time. noe A θ noe B t Figure. Relative movements of two mobile noes As illustrate in Figure, at time T 1, noe B receives a signal from noe A, assumes the istance between them is, then: Pt (4) = k 4 If noe B knew its spee an irection, relative to noe A, base on equation (4), it coul calculate the current istance an the preicate link breakage time. However, in our moel, we assume that this relative movement information is not known, so we nee to collect further samples to account for these unknown parameters. At time T, noe B receives the secon signal from noe A, let t =T -T 1, Vby t3 Vb t V Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

4 P = k P t ( + ( vt ) vt cosθ ) At time T 3, noe B receives the thir signal from noe A, let t 3 =T 3 -T 1, an t 3 is not necessarily a multiple of t (i.e., the spacing in time is arbitrary). P = k 3 P t ( + ( vt3) vt3 cosθ ) At time T, the noe B will receive a signal which power equivalent to the threshol P s, let t = T - T 1, also assume uring time T 1 to T that noes A an B maintain their spees an irections: (5) (6) Pt (7) Ps = k ( + ( vt) vt cosθ ) From equation (4), we obtain: 4 P 1 = kp t (8) Substituting (8) into equations (5), (6) an (7): (9) P = + vt ) vt cosθ P3 = ( ( 3 3 ( vt) vt + vt ) vt cosθ (1) (11) P s = + cosθ From (9) an (1) we obtain: v = β (1) Where: ( P t + P P3 t3 P3 t3 P P3 t ) is a β = ( t t3 t3t ) P P3 constant. From (9) an (11) we obtain: P t (13) P s = ( t P t P + t ) + ( t P t t P t) v Substituting (1) into (13): P t (14) P s = ( t P P t + t) + ( P t t P t t)β We can reformulate this into the equation: at + bt + c = (15) Where: a = t P P s β 1 P ) t P ) b = P (( P β s c = t P Ps t P Finally the preiction time is: b b ac t = ± 4 (16) a Because t is not negative (we are only intereste in future preictions): b 4ac b t = (17) a In the rest of the paper, we call the calculation of link preiction time base on equation (17), using three receive packets signal power strength, our preiction algorithm. With more sophisticate raios, power management may be applie to both sener an receiver so that the power will be controlle with the istance between them. We can moify the original equations an still obtain link breakage preictions in this case, if the source noe attaches its transmission power value with the packet Implementing the preiction algorithm. In our implementation, a noe only monitors unicast packets from its neighbors an it is the next hop of the packets, because in DSR, only active routes are maintaine. Most of these unicast packets are ata packets, the rest are Route Reply an Route Error messages. Also, a noe runs the preiction algorithm only when the istance between two noes is bigger than the crossover point (i.e., the istance at which the physical layer uses Two Ray Groun approximation) to save computing power. From the preiction algorithm, at least three packets are neee to correctly preict future isconnection to the neighboring noe. In the implementation, each mobile noe will keep a table (calle signalinfo Table). Each entry of the table hols information such as signal power strength an reception time, of three packets from the same neighboring noe. When noe B receives packets from noe A, it upates its signalinfo array accoring to: P 3 P P 1 an T 3 >T >T 1 (18) When two mobile noes are moving closer, the latest signal power strength will be greater than the previous one. In this case, we set P 1 to the latest signal power value an set P an P 3 to zero, no preiction is necessary. The preiction algorithm assumes that uring T 1 an preiction time T two noes maintain their spees an irections. In reality, two noes may change their spee or/an their irection uring this time. Accoring to the algorithm, the preiction base on the first one or two packets just after the changes may not be correct an cause a false preiction. Our algorithm also assumes there is no noise uring the packet transmission. This is a simplistic assumption. Some experiments that a ranomly prouce noise (5% to 1% of signal power strength) to the signal have been conucte. The simulation results show that the preiction accuracy, as is to be expecte, suffers. We also conucte some experiments to improve the preiction by applying regression metho on the receive signal power strength. This example shows one of effective ways to improve the accuracy in real application environment. More research an experiments are currently being one on this topic. The purpose of our research was to explore whether pro-active route maintenance has the potential to reuce roppe packets by making using of link status information. So we assume in the following the case of a Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

5 noise-free environment, recognizing that this will result in optimistic results. All the moification an simulation we i in this paper is base on The Network Simulator (NS). NS is a iscrete event simulator evelope by the University of California at Berkeley an the VINT project [15]. The Monarch research group at Carnegie-Mellon University evelope support for simulation of multihop wireless networks in NS [1]. It provies tools for generating ata traffic an mobile noe mobility scenario patterns for the simulation. DSR is one of the a hoc routing protocols that have been implemente. In NS, the Distribute Coorination Function (DCF) of IEEE 8.11 for wireless LANs is use as the MAC layer protocol. The raio moel uses characteristics similar to a commercial raio interface, Lucent s WaveLAN [16], which is moele as a share-meia raio with nominal bit rate of Mb/s an a nominal raio range of 5 meters with omniirectional antenna. Because any on-eman a hoc network protocol nees a perio of time to set up a new route, a time parameter critical time t s is introuce. t s shoul be big enough for noe B to sen a route error message to the source of the packet an the source to fin a new route. When noe B receives a unicast packet from noe A at time T r, it calculates the preiction that the link between noe A an noe B will be lost at time T. If T - T r t s, we say the link enters the critical state. We implemente the preiction algorithm in DSR, an ae preiction time to the packet trace format. When two noes, which are on a link of an active route, are moving away, the link breakage time will be printe in the tracefile when the receiver receives a packet. Then we compare the preicte value with the time a packet really roppe because of a broken link. Base on these experiments, we foun that active links (efine as links with packet transmissions uring the last secon), more than 9% of the roppe packets are preicte accurately, no matter what the mobility patterns are, unlike the preemptive ratio in [5], which is erive empirically. Because noes move ranomly, two noes may be moving closer though they were moving apart when the preiction is mae, then a false preiction will be mae. Choosing smaller critical time t s can reuce the possibility of false preictions. Though the most appropriate value will be ifferent for ifferent network configurations, in the remainer of the paper, t s is set to 1 secon. 4. Preiction algorithm application After verifying the accuracy of the preiction algorithm, we implemente the pro-active route maintenance in DSR. In the original DSR protocol, the source noe will keep using one route until the link is broken or Route Reply an Route Error messages are receive. Applying the preiction algorithm to the DSR protocol, if a noe preicts that the link with its neighbor that it receive a packet from will break, it can inform the source noe of the packet. Then the source noe can fin a new route to sen other packets to avoi packets being roppe over a broken link Preiction of link status As escribe in Section 3, every noe maintains a table that contains the information of receive packets (previous hop noe aress, packet signal power an reception time) from its active neighbors. Every time a noe receives a unicast packet, it puts upate packet information in its table an upates the preiction time (obviously, if two noes maintain their movement patterns, the preiction time will be the same). At the beginning, every preiction time for the link with an active neighboring noe is set to infinity, inicating that the link will be vali all the time. The preiction algorithm uses a sliing winow with a winow size of three. Every time noe B receives a packet from noe A, it moves the winow one forwar to compute the preiction time by using the latest three packets with ecreasing signal power strength accoring to conition (18). When noes are moving closer, the receive packet s signal power value will increase. Then the preiction algorithm will set the winow size to one an preiction time to the efault value. When it receives the next packet with a receive signal power value lower than the last packet s, no preiction is possible yet (two packets are not enough for getting an accurate preiction). In this case, the preiction time will also be set to a efault value, but we re-open the winow to three again. If two noes are moving apart but suenly slow own or spee up, the preiction algorithm will yiel inaccurate results until a total of three new packets transmitte after the change are receive. 4.. Initiating route error messages Every mobile noe maintains a table calle Link Table. Each entry of the Link Table has the source noe aress, previous hop noe aress, an the packet reception time. Because ifferent routes may share a common link, there may be entries that have the same previous hop noes but with ifferent source noes in the Link Table. Maintaining the source noes in the Link Table can prevent noe B from repeately sening Route Error messages to the same source noe in case it receives more than one packet from noe A after the link A-B enters critical state. When mobile noe B receives a unicast packet from its previous hop noe A, it will monitors its link status with Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

6 noe A using the preiction algorithm. If the link is in the critical state (link breakage preicte in less than t s secons), noe B first will check if this packet is a Route Error message. If it is, noe B will not sen another Route Error message to prevent Route Error messages neig sent back an forth between them (noe A may also have enough information an preict this link will be broken). Next noe B will check if the source noe an previous hop noe pair is in its Link Table. If it is, noe B has alreay sent a Route Error message to the source about the imminent link A-B breakage recently. If it cannot fin an entry, noe B will insert the source noe an previous hop noe pair with the current time into the Link Table. Then noe B sens a Route Error message to the source noe of this packet using the source route in the packet heaer. To ifferentiate from the original Route Error message, we call the latter Preiction Route Error message. As the DSR protocol specifies, when a Route Error message is sent to the source noe, the noes on its route will remove the routes with link A-B from their route caches Hanling route reply messages When a source noe receives the Preiction Route Error message, similar to the original DSR protocol, if it cannot fin an alternative route that oes not contain the flagge link A-B, it will initiate a Route Request message an broacast it. We piggyback the information about link A-B preicte to break soon onto the Route Request to allow other noes in the network to clear their route cache as well. When the source noe sens a Route Request message, the A-B link is still alive, so there are still Route Request messages that are sent over this link. Consequently, some Route Reply messages may have routes that contain the A-B link. When a source noe receives this kin of Route Reply messages, it may use this soon-to-be-broken link again, an a packet still will be roppe. We use the Link Table in every mobile noe to solve this problem. When noe B receives a Route Request message, it first checks if the previous hop noe is in the link table. If it is, it stops propagating this Route Request message further an oes not reply from its route cache. The new routes will not contain the A-B link anymore. Because of the ranom characteristics of the mobile noe mobility, two noes move closer again sometime later. A time-out mechanism is applie to the Link Table entries. Entries will be remove when they time out. As long as the two noes are moving away from each other, one noe cannot be the next hop of the other. If at a later point they are moving closer, they may become neighbors in a new route again. Because we alreay set the critical time to 1 secon, we set the Link Table timeout to secons Experimental results We implemente the proactive route maintenance in DSR an ran simulations. Exploring the results, we gaine aitional insights into the interaction between DSR an pro-active route maintenance. For example, because of the salvage mechanism use in DSR, once the noe salvages the packet, the source route in the packet heaer will be change to the new route foun in its route cache. If a Preiction Route Error message is initiate by one of the noes on the new route, this message will reach the noe that salvages the packet, instea of the source noe. So the source noe is still not aware of the soon-to-be-broken link, if a new route contains this link, a packet will be roppe. A more complicate example is illustrate in Figure 3; the ashe line inicates that there may be more than one hop between two noes. Suppose that noe B alreay sent a Preiction Route Error message to source noe S via noe D, an S receive it. Because noe S ha an alternative route, which oes not contain the ba link A-B, to the estination via noes X an Y, it uses it to sen packets. Sometime later, link X-Y breaks, an noe X happens to have a route in its route cache via Z an containing link A-B. Because noe X is not aware of this ba link. It will use this route to salvage the packet. At this time the link A-B might have broken, then the packet will be roppe. D S Z A Figure 3. Exceptional scenario of pro-active route maintenance in DSR X Timing-relate complications can also occur, to some extent these (or similar) issues exist in the original DSR protocol as well. For example, source noe S receives a Preiction Route Error message, shortly after it receive a elaye Route Reply message which replies to a previous Route Request issue by S. Noe S might use this route to sen packets. If this route contains a ba link that was reporte in the Preiction Route Error message, the packet will be roppe on this link. Base on these an other observations, we set the B Y R Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

7 number of Preiction Route Error messages a noe can sen to the same source noe to 3 times, which also increases the probability for the source to receive this message in case of transmission error. Table 1 compares the packet loss rates when sening the Preiction Route Error message once an at most 3 times. The pause time is s, maximum spee is m/s. The entries in the table are explaine below. Table 1 shows that sening multiple Preiction Route Error messages can further reuce roppe packets, but also increases the number of control messages. The total number of packets roppe on the active link is reuce almost by half. We ran simulations with ifferent mobility patterns in NS to verify the pro-active maintenance in DSR. The a hoc networks use in our simulation consist of 5 wireless noes, moving in a rectangular (15m x 3m) flat space. We choose the traffic sources to be constant bit rate (CBR) sources. The transmission rate is 4 packets per secon. Each packet is 64 bytes big. In Tables an 3, the format of scenarios is: number of source noes-pause time-maximum spee (the first row in the table). The Table 1. Comparison of sening preiction route error message times simulation time is 9 secons using NS version.1b6. We mainly choose the high mobility scenarios, because they cause more link breakages. We ae a higher ata traffic scenario with 3 source noes. In total 5 scenarios are simulate, each with seven ranomly generate scenario files. To compare the performance with the original DSR protocol, the following four metrics are use: Total number of ata packets roppe, an the number of ata packets roppe because of no route. Total control message: total number of control packets transmitte. Each hop-wise transmission of a control packet is counte as one transmission. Hop count ratio: The ratio between the total number of hops all packets travel to reach their estinations an the total length of the shortest path that physically existe through the network when the packets are originate. NS will provie the length of the shortest possible path between all noes in the network. Average packet latency: average ata packet latency. Original Once Three Times Percentage % Total Data Packets Droppe Total Data Packets Droppe (No Route) Total Control Messages Hop Count Ratio Active Link (less than 1 secon) Table. Simulation results of DSR protocol with preiction algorithm: part Total Data Packets Droppe Original DSR Protocol Improvement (%) % Confience Interval (-1.58, ) (5.73, 4.694) (.776, ) Total Data Packets Droppe (No Route) Original DSR Protocol Improvement (%) % Confience Interval (7.94, ) (7.3, ) (3.17, ) Total Control Messages Original DSR Protocol Increase (%) % Confience Interval (3.99, ) (1.68, 9.87) (17.767, 3.951) Hop Count Ratio Original DSR Protocol Increase (%) Average Packet Latency Increase (%) Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

8 From Table an Table 3, we raw the following conclusions: Every scenario shows an improvement for the total number of no route roppe packets. The improvement is at least %, an reaches up to 44.95%. These improvements are statistically significant at a 95% confience level. Similarly, the control messages increase up to 33.5%. The improvement ratio for the total number of roppe packets is less than the ratio for the no route roppe packets. There are three cases in the low mobility scenarios (two in -3-1, the other in - 3-) where the total number of roppe packets increase because of packets roppe in the network interface queue of a few noes. The two exceptions also result in a negative overall average for the scenario. However, as shown by the 95% confience interval, this result is not statistically significant. The variation of hop count ratio is below 1%. Similarly, the average packet latency oes never increase significantly, but is reuce substantially in a number of scenarios, espite the increase overall traffic in the network. For the same mobility scenario ( secon pause time an up to m/s spee), a scenario with more sources benefits more from pro-active route maintenance than one with fewer sources. Scenario 3--, compare to --, is one such example. For 3 sources (i.e., 3 active flows), noes have more recent information about links to make goo preictions. Accoring to the simulation results, the preiction algorithm implemente in the DSR routing protocol successfully reuces no route roppe packets by at least %, with a cost of increasing route message by at most 33.5%. For the scenarios stuie, this increase in messages (an therefore network traffic) oes not cause aitional packet losses or packet latency increases Enhance route cache maintenance base on link status In DSR, the route cache plays an important role. If there is a route to the request estination in the route cache, a source noe can use it to sen packets without starting Route Discovery; intermeiates noes can use it to reply to Route Request messages, which will reuce latency an overhea. Also, a mobile noe can salvage a packet by using its route cache if the next hop in the source route is broken. On the other han, because of mobility, the routes in the route cache may be stale. If the mobiles use these routes, packets may be roppe on the broken links. DSR oes not have an explicit mechanism to remove stale routes from the route cache. To evaluate the effect of stale routes on the packet elivery ratio, we analyze the tracefiles of NS simulation. We o not count the percentage of stale routes in each route cache, because there is no guarantee that a noe actually uses a stale route from the route cache. We explore how many stale routes actually are use an also cause packet losses. Figure 4 shows the roppe packet ratio cause by stale routes. Packet loss occurs when the source noe uses the stale route to sen packets, or intermeiate noes use stale route to sen Route Replies an/or salvage a packet along a stale route. We ran simulations for ifferent pause times with maximum spee of 1m/s an m/s respectively, for each scenario we ran two simulations, an then compare the results with the total number of roppe packets because of no route. The result shows that for high mobility, packet loss ue to stale routes accounts for between 3% to 4% of all packet losses; for low mobility, links will be more stable, the ratio becomes lower. We can use the link status base on the preiction algorithm to avoi using these stale routes in the route cache. We have moifie the route cache so that a noe only uses a vali route. In the route cache, every route associates with a route expiration time. When the estination noe sens a Route Reply message to the source noe, it will set the route expiration time (RET) to a big value. When an intermeiate noe receives this message, it also probably can get the link breakage preiction time base on the packets it receive from this sener, if they are moving apart an the preiction algorithm has enough packets to make a preiction. The noe compares the value with RET in the Route Reply message, if this value is smaller, the noe will replace RET with it, an this link is the weakest link in the route so far. Finally the source noe gets a route with RET characterizing the shortest-live link on that route. When a source noe sens packets, or intermeiate noes reply to a Route Request message, they will not use stale routes by checking RET. In our implementation, we only use routes that will be vali for at least 3 more secons. If a noe replies to a Route Request from its route cache, it will sen the route s RET with the Route Reply message. Figure 5 shows our simulation results. Three mobility scenarios are simulate. The format shown in Figure 5 is pause time-max spee. We ran two simulations for each scenario, an the total number of roppe packets is the sum of both runs. For all three scenarios, selecting vali routes from the route cache can reuce by on average 8% the total number of packets being roppe, compare to only using the pro-active route maintenance. Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

9 Table 3. Simulation results of DSR protocol with preiction algorithm: part Total Data Packets Droppe Original DSR Protocol Improvement (%) % Confience Interval (17.5, 31.84) (3.17, 38.37) Total Data Packets Droppe (No Route) Original DSR Protocol Improvement (%) % Confience Interval (.63, ) (33.354, ) Total Control Messages Original DSR Protocol Increase (%) % Confience Interval (17.187, 3.664) (17.1, 6.31) Hop Count Ratio Original DSR Protocol Increase (%) Average Packet Latency Increase (%) Droppe Ratio % max m/s max 1m/s Pause Time (s) strength. It preicts the link status after receiving three packets. When the link enters critical state, the noe will sen a Preiction Route Error message to the source noe of the packet. After receiving a Route Error message, the source noe will initiate a Route Request message an broacast it if it cannot fin an alternative route to the estination an also has packets to eliver. When a noe receives a Route Request, it will check if it comes from an upstream noe of a soon-to-be-broken link. If it is, the Route Request is iscare. Figure 4. Droppe packet ratio because of stale routes Figure 5 shows our first stage of implementing enhance route cache maintenance base on link status information. Further work will be on (1) upating RET values base on new link status, () removing stale routes from the route cache, (3) using probe message to valiate routes before they expire. We expect further improvement to be achieve. 5. Conclusions an future work In most mobile a hoc network routing protocols, sources will use a route until a link is broken or a shorter route is foun. A link failure will cause packets to be roppe an results in transmission elays while a new route is foun. In this paper, a link status preiction algorithm is evelope an ae to DSR. Every mobile noe monitors the receive unicast packets signal power Number of Packets Droppe original with preiction vali cache Mobility Pattern Figure 5. The total number of roppe of packets because of no route for original DSR (original), DSR with preiction algorithm (with preiction) an DSR with preiction algorithm an selecting vali route in the route cache Simulations have been one for low an high mobility scenarios. The results show that the total no route packets roppe are reuce by at least %, an up to 44.95%. Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

10 At the same time, the total number of control messages increase up to 33.5%, an the hop count ratio staye at the same level. The increase control messages o not cause network congestion, significantly increase average packet latency an packets loss. So pro-active route maintenance can significantly improve overall routing performance. We also enhance the route cache management base on the link status information. The first stage implementation further reuces by on average 8% the total number of roppe packets because of no route. Because the preiction algorithm is general, it can be applie to other mobile a hoc network routing protocols. We are currently implementing the pro-active route maintenance in the A Hoc On-eman Distance Vector (AODV) protocol [17]. We are exploring how to eal with noise. One avenue is to use curve-fitting techniques, base on a winow of recent (noisy) packet reception power levels. We can then base the link preiction on the fitte curve, assuming that the fit is reasonably goo (as expresse by the SSR value). We are also working on (1) soft-hanover: when a source noe receives a Preiction Route Error message, it will continue use the existing route until a new route is foun to further reuce packet latency, () using the preiction algorithm to remove stale routes in route caches by piggy-backing preicte route error message with control massages even if the to-bebroken link is not on the active route, (3) more simulations an analysis on the value of critical time to increase preiction accuracy, an (4) how the reuction of packet loss impacts the performance of TCP in a hoc environments. 6. References [1] G. Hollan an N. Vaiya, Analysis of TCP Performance over Mobile A Hoc Networks, Proc. of the Fifth Annual ACM/IEEE International Conference on Mobile Computing an Networking, Seattle, Washington, August 1999, pp [] C.-K Toh. Associativity-Base Routing for A-Hoc Networks, Wireless Personal Communications Journal, Special Issue on Mobile Networking an Computing Systems, vol. 4, no., March 1997, pp [3] H. Dajing, J. Shengming an R. Jianqiang, A Link Availability Preiction Moel for Wireless A Hoc Networks, Proc. of the International Workshop on Wireless Networks an Mobile Computing, Taipei, Taiwan, April, D7-D11. [4] W. Su an M. Gerla, IPV6 Flow Hanoff in A-Hoc Wireless Networks Using Mobility Preiction, Proc. of IEEE Global Communications Conference, Rio e Janeiro, Brazil, December 1999, pp Conference on Mobile Computing an Networking, Rome, Italy, July 1, pp [6] A. B. McDonal an T. Znati, A Path Availability Moel for Wireless A-Hoc Networks, Proc. of IEEE Wireless Communications an Networking Conference, New Orleans, LA, September 1999, pp [7] S.M. Jiang, D.J. He an J.Q. Rao, A Preiction-Base Link Availability Estimation for Mobile A-Hoc Networks, Proc. of IEEE Infocom, Anchorage, AK, April 1, pp [8] A. B. McDonal an T. F. Znabi, A Mobility-Base Framework for Aaptive Clustering in Wireless A hoc Networks, IEEE Selecte Areas in Communications (JSAC), vol. 17, no. 8, August 1999, pp [9] D. B. Johnson an D. A. Maltz, Dynamic Source Routing in A Hoc Wireless Networks, in Mobile Computing, eite by Tomas Imielinski an Hank Korth, Kluwer Acaemic Publishers, Chapter 5, pp , ISBN: , [1] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu an J. Jetcheva, A Performance Comparison of Multi-Hop Wireless A Hoc Network Routing Protocols, Proc. of the Fourth Annual ACM/IEEE International Conference on Mobile Computing an Networking, Dallas, TX, Oct. 1998, pp [11] S. R. Das, C. E. Perkins an E. M. Royer, Performance Comparison of Two On-eman Routing Protocols for A Hoc Networks, Proc. of the IEEE Conference on Computer Communications, Tel Aviv, Israel, March, pp [1] E. M. Royer an C.-K. Toh, A Review of Current Routing Protocols for A-Hoc Mobile Wireless Networks, IEEE Personal Communications Magazine, April 1999, pp [13] B. Narenran, P. Agrawal an D. K. Anvekar, Minimizing cellular hanover failures without channel utilization loss, Proc. of IEEE Global Communications Conference, San Francisco, CA, December 1994, pp [14] T. S. Rappaport. Wireless Communications: Principle an Practice. Prentice Hall, New Jersey, [15] K. Fall an K. Varahan, eitors. NS Notes an Documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, an Xerox PARC, November 1997, see [16] B. Tuch, Development of WaveLAN, an ISM Ban Wireless LAN, AT&T Technical Journal, vol. 7, no. 4, July/August 1993, pp [17] C. E. Perkins an E. M. Royer, A-hoc On-Deman Distance Vector Routing, Proc. of the n IEEE Workshop on Mobile Computing Systems an Applications, New Orleans, LA, February 1999, pp [5] T. Goff an N. B. Abu-Ghazaleh etc., Preemptive Routing in A Hoc Networks, Proc. of the Seventh Annual International Proceeings of the 36th Hawaii International Conference on System Sciences (HICSS 3) /3 $17. IEEE

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks

Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Effective Link Operation Duration: a New Routing Metric for Mobile Ad Hoc Networks Xiaoqin Chen, Haley M. Jones, A.D.S. Jayalath Department of Information Engineering, CECS Department of Engineering, CECS

More information

Load-Balanced Routing through Virtual Paths: Highly Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks

Load-Balanced Routing through Virtual Paths: Highly Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks Load-Balanced Routing through Virtual Paths: Highly Adaptive and Efficient Routing Scheme for Ad Hoc Wireless Networks Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans,

More information

Natarajan Meghanathan Assistant Professor of Computer Science Jackson State University Jackson, MS 39217, USA nmeghanathan@jsums.

Natarajan Meghanathan Assistant Professor of Computer Science Jackson State University Jackson, MS 39217, USA nmeghanathan@jsums. A Simulation Based Performance Comparison Study of Stability-Based Routing, Power-Aware Routing and Load-Balancing On-Demand Routing Protocols for Mobile Ad hoc Networks Natarajan Meghanathan Assistant

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith y, and Louise E. Moser y Department of Computer Science y Department of Electrical and Computer

More information

Robust Routing in Wireless Ad Hoc Networks

Robust Routing in Wireless Ad Hoc Networks Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Example Optimization Problems selected from Section 4.7

Example Optimization Problems selected from Section 4.7 Example Optimization Problems selecte from Section 4.7 19) We are aske to fin the points ( X, Y ) on the ellipse 4x 2 + y 2 = 4 that are farthest away from the point ( 1, 0 ) ; as it happens, this point

More information

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes previous inex next Calculating Viscous Flow: Velocity Profiles in Rivers an Pipes Michael Fowler, UVa 9/8/1 Introuction In this lecture, we ll erive the velocity istribution for two examples of laminar

More information

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks Natarajan Meghanathan 1 and Leslie C. Milton 2 1 Jackson State University, 1400 John Lynch

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks

Performance and Scalability of Self-Organizing Hierarchical Ad Hoc Wireless Networks Performance and Scalability of Self-Organizing archical Ad Hoc Wireless Networks Suli Zhao, Ivan Seskar and Dipankar Raychaudhuri WINLAB, Rutgers University 7 Brett Road, Piscataway, NJ 8854 {sulizhao,

More information

Routing with Load Balancing in Wireless Ad hoc Networks

Routing with Load Balancing in Wireless Ad hoc Networks Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks

A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks Thomas D. Dyer Computer Science Division The Univ. of Texas at San Antonio San Antonio, TX 8249 tdyer@cs.utsa.edu

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Performance Evaluation of Mobility Speed over MANET Routing Protocols

Performance Evaluation of Mobility Speed over MANET Routing Protocols International Journal of Network Security, Vol., No.3, PP.28 38, Nov. 2 28 Performance Evaluation of Mobility Speed over MANET Routing Protocols Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz 2, and Ahmed

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently

More information

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University

More information

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks : an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

AODV-BR: Backup Routing in Ad hoc Networks

AODV-BR: Backup Routing in Ad hoc Networks AOV-BR: Backup Routing in Ad hoc Networks Sung-Ju Lee and Mario Gerla ireless Adaptive Mobility Laboratory Computer Science epartment University of California, Los Angeles Los Angeles, CA 90095-596 http://www.cs.ucla.edu/nrl/wireless

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Samir R. Das Division of Computer Science The University of Texas at San Antonio San Antonio, TX 7849-667 U.S.A. Charles E.

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Performance comparison and analysis of routing strategies in Mobile ad hoc networks

Performance comparison and analysis of routing strategies in Mobile ad hoc networks 2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department

More information

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols

Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols Vol. 7, No., 200 Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols Sumon Kumar Debnath, Foez Ahmed 2, and Nayeema Islam 3 Dept. of Computer Science and Telecommunication

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

Modeling RED with Idealized TCP Sources

Modeling RED with Idealized TCP Sources Moeling RED with Iealize TCP Sources P. Kuusela, P. Lassila, J. Virtamo an P. Key Networking Laboratory Helsinki University of Technology (HUT) P.O.Box 3000, FIN-02015 HUT, Finlan Email: {Pirkko.Kuusela,

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Realistic Mobility for Mobile Ad Hoc Network Simulation

Realistic Mobility for Mobile Ad Hoc Network Simulation Realistic Mobility for Mobile Ad Hoc Network Simulation Michael Feeley, Norman Hutchinson, and Suprio Ray Computer Science Department, University of British Columbia, Vancouver, Canada Abstract. In order

More information

Scalable live video streaming to cooperative clients using time shifting and video patching

Scalable live video streaming to cooperative clients using time shifting and video patching calable live vieo streaming to cooperative clients using time shifting an vieo patching Meng Guo, Mostafa H. Ammar {mguo, ammar}@cc.gatech.eu Networking an Telecommunication Group ollege of omputing, Georgia

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

zupdate: Updating Data Center Networks with Zero Loss

zupdate: Updating Data Center Networks with Zero Loss zupate: Upating Data Center Networks with Zero Loss Hongqiang Harry Liu Yale University hongqiang.liu@yale.eu Lihua Yuan Microsoft lyuan@microsoft.com Xin Wu Duke University xinwu@cs.uke.eu Roger Wattenhofer

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information