Network analysis for context and content oriented wireless networking
|
|
|
- Marjorie Stone
- 10 years ago
- Views:
Transcription
1 Network analysis for context and content oriented wireless networking Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Network analysis and applications July 3 rd, 2014
2 2 The smartphone phenomenon Multiple sensing and communication capabilities Sensors, camera, GPS, microphone 3G, WiFi, Bluetooth, etc. Storage capabilities (several Gbytes) Computing power 2 2
3 Mobile Traffic is growing constantly Increasing volume of mobile data between worldwide mobile data traffic will increase nearly 11-fold over the next four years and reach an annual run rate of 190 exabytes (10 18) by % of mobile connections will be smart connections by 2018 [Cisco VNI Global Mobile Data Traffic Forecast ( )] + = In 2013, 4.1 billion users worldwide 3
4 1. If data is not delay sensitive: Next Big Networking Challenge: meet traffic demand! e.g. Videos, Application / system updates, music, podcasts, etc. Leverage opportunistic encounters to route or flood delay tolerant data hop by hop Benefit: Reduce downloads from infrastructure wireless network 2. If several connectivity options exist: e.g. 3G/4G, WiFi, Femto cells Offload / Pre-fetch data using the best available connectivity, at the best time and location Benefit: Load balancing between available infrastructures 4
5 Smartphones are carried by humans Opportunistic wireless networks a.k.a. Pocket Switched Networks 1) Large scale and highly dynamic 2) Connections between the network entities are neither purely regular nor purely random 3) Evolve according to semi-rational decisions of entities random networks Semi-rational decisions tend to be regular and to repeat themselves Random decisions deviate from the regular pattern and are unlikely to repeat Leverage social interactions to improve opportunistic networking, pre-fetching and offloading solutions 5
6 Outline 1. Measure and classify social interactions - RECAST algorithm 2. Transfer information in opportunistic wireless networks 3. Context and content wireless networking 6
7 1. Measure and classify social interactions Objective: understand human interactions from measurements What we record: Intermittent physical wireless links Intermittency originates from human mobility and habits Main problem: Extract a social graph from measured physical interactions Determine which intermittent link relates to regular vs. random interactions s Graph TE2 A B E D C C TE3 D A B C D E G(contact) G(contact) A 0 0 2/3 1/3 B C D 0 1/3 0 1 B E 0 1/ A 3 C TE 1 Wireless Graph Contact Graph (CG) E 2/31/ / /3 TE1 B E G( TE) A C TE2 A B D A E C C G( contact) Time TE3 D 1 3 D A A B 0 CB 0 D EE G(contact) 1 G( contact) 3 G(contact) 2/3 1/3 B C DSocial E Graph (SG) A 0 0 2/31/3 A D 1/ / /3 3 C TE /3 G( TE) B E Contact Graph (CG) C G( contact) 1 3 D B E G( contact) 1 3 7
8 Record interactions Open datasets exist (cf. Crawdad Different types of temporal contact measurements Measure a direct link between User A and B (e.g. Bluetooth, WiFi Direct connectivity) Assume a link exists between User A and User B if they are connected to the same WiFi access point False positives! User A User B Measure location of users (GPS): if users are close enough, assume they are connected Distance-based threshold is unrealistic 8
9 Example data sets 9
10 Rationale and related initiatives 10
11 Rationale and related initiatives 11
12 RECAST classifier [1] Characterizes the interactions of nodes based on their probability to originate from a random or social behavior Identify different kinds of social interactions (friends, acquaintances, bridges or random) No geographical dependency, i.e., is of general validity Together with Pedro O. Vaz de Melo, Antonio Loureiro UMFG Brazil Aline Viana - Inria, Marco Fiore - CNR Italy Frédéric Le Mouël INSA Lyon [1] RECAST: Telling Apart Social and Random Relationships in Dynamic Networks, P. Olmo Vaz de Melo, A. Viana, M. Fiore, K. Jaffrès-Runser, F. Le Moüel and A. A. F. Loureiro, 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM MSWim 2013), Barcelona, Spain, 3-8 November
13 Graphs extracted from contact traces 13
14 Graphs extracted from contact traces 14
15 Graphs extracted from contact traces 15
16 Social graph and its random counterpart 16
17 Comparison social vs. random graphs 17
18 Social network features: Regularity and Similarity 18
19 CCDF of edge persistence after 4 weeks 19
20 CCFD of topological overlap after 4 weeks 20
21 Social vs. Random Edges 21
22 RECAST classification algorithm 22
23 Classification after 2 weeks Only social Only random Friends edges are in blue Bridges edges are in red Acquaintance edges are in gray Random edges are in orange Social-edges network Complex structure of Friendship communities, linked to each other by Bridges and Acquaintanceship Random-edges network No structure appears, looking like random graphs 23
24 Cluster coefficient analysis for random edges only 24
25 Impact of p rnd 25
26 Outline 1. Measure and classify social interactions - RECAST algorithm 2. Transfer information in opportunistic wireless networks 3. Context and content wireless networking 26
27 2. Transfer information in opportunistic wireless networks Two different problems exist in wireless networking: Information dissemination (i.e. broadcast) Transfer a set of messages to all nodes of the network Information routing (unicast or multicast) Transfer a set of messages to a unique destination (unicast) or a set of destinations (multicast) D Multi-hop communication S 27
28 2. Transfer information in opportunistic wireless networks BUT in opportunistic wireless networks, there is no end-to-end path available at all times only delay tolerant data can be forwarded in such conditions T = 0 T = t 1 T = t 2 28
29 Social agnostic opportunistic routing protocols - Direct delivery: the source node carries its data until it meets the destination, eventually - The slowest but no overhead - Lowest delivery ratio - Epidemic (flooding) - The fastest but highest overhead (i.e. nb of replicates) - Best delivery ratio for infinite buffers T = 0 T = t 1 T = t 2 S D 29
30 Social-agnostic opportunistic routing protocols Objective : Keep the same delivery ratio than epidemic, but with as little replicates as possible Best solution known so far: Spray and Wait Source emits L copies of the message: Spray phase Gives a copy to the L first encountered nodes. All message carriers wait to deliver their copy to D: Wait phase Alternative binary spray phase: The source gives L/2 copies to the 1 st encountered node. Then, at each encounter, a carrier node gives the half of its copies to be new carrier. Wait phase start once a node has only one copy left 30
31 Spray and Wait performance Spray and Wait beats Epidemic because of limited buffer size 31
32 Social-aware routing Is it worth accounting for the social graph? Let s assume we start an epidemic transmission between a source and a destination that share a edge in the social network. (Social graph calculated with 4 first weeks of data set) Which edges participate in the forwarding in the following 2 weeks? S and D are friends 32
33 Social-aware routing Is it worth accounting for the social graph? The routing is much faster between nodes that share a social relationship Edge persistence has a strong impact on the routing efficiency. But random help as well 33
34 How to design a social-aware routing protocol? Rely on centrality metrics and community detection Betweenness Similarity Persistence K-cliques,... State of the art solutions SimBetTS [1] BUBBLE Rap [2] Peoplerank [3] Key issues : 1. How to calculate these metrics in a distributed manner? 2. How to use them to route data efficiently? [1] E. Daly and M. Haahr, Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs, IEEE Transactions on Mobile Computing, vol. 8, no. 5, pp , May [2] P. Hui, J. Crowcroft, and E. Yoneki, BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks, IEEE Transactions on Mobile Computing, Dec [3] Mtibaa, A., May, M., Diot, C., Ammar, M.: Peoplerank: social opportunistic forwarding. In: Proceedings of the 29th conference on Information communications, INFOCOM 10, pp IEEE Press, Piscataway, NJ, USA (2010) 34
35 SimBetTS Social metrics considered Similarity (~ topological overlap) Number of common neighbors between two nodes Betweenness Number of times a node lies on the shortest path between any source-destination pair of the network Tie strength = Frequency + Intimacy + Recency (how frequent, how long and how recent) Decentralized computation Use of an ego-network [1] Each node stores the adjacency matrix relative to the contacts encountered made together [1] P. V. Marsden. Egocentric and sociocentric measures of network centrality. Social networks, 24(4): , October
36 SimBetTS Egocentric computation [1] [1] E. Daly and M. Haahr, Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs, IEEE Transactions on Mobile Computing, vol. 8, no. 5, pp , May
37 SimBetTS Routing with SimBetTS metrics - As two nodes n and m encounter, each node calculates for each destination the sum of these three utilities: The message is kept or transferred to the node with the highest utility. - An initial replication value R is assigned to a message. If R>1, the message is replicated and R is divided between the two nodes dependent on the SimBetTS utility value. 37
38 BUBBLE Rap Social metrics considered Node centrality (betweenness, degree ) Community detection: k-clique community detection Newman s weighted network analysis Decentralized computation For node centrality: (no betweenness approx.) number of encoutered nodes in the last 6 hours average of the number of encountered nodes in the last 4 periods of 6 hours (last day) For community detection A variation of Clauset s [1] community detection with local modularity Detection accuracy can be up to 85% of centralized K-clique algorithm. [1] A. Clauset. Finding local community structure in networks. Physical Review E, 72:026132,
39 BUBBLE Rap Routing with centrality metrics only Forward data only to nodes with higher centrality metric Hierarchical path issue Shortest end-to-end paths see an increase of node centralities, then a decrease for final delivery Consequence: in large networks, messages may get stuck in a high degree node with no edge to the destination node. Routing with community labels only Achieves bad performance if people of different communities do not mix together Main idea of BUBBLE Rap: Use a Label per community and 2 centrality metrics Global centrality metric calculated for the whole network Local centrality metric calculated only per community 39
40 BUBBLE Rap Correlation of global centrality and local centrality of a given community A If you choose D or E, which are outside community A -> Never get to a destination of community A You are more lucky if you pick A,B or C. As soon as you reach the community of your destination, use local centrality 40
41 BUBBLE Rap Illustration of Bubble rap forwarding 41
42 BUBBLE Rap Bubble with replication Bubble no replication 42
43 Social opportunistic routing Conventional routing fails in opportunistic wireless networks The knowledge of social dynamics improves data forwarding performance But only considering social edges for data forwarding is not enough Non socially connected edges can bring connectivity Random edges in RECAST could thus be leveraged as well Most of the solutions do not investigate the daily routines of nodes It would be good to learn and then forecast future encounter periods of nodes Maybe have several social graphs depending on the time of the day? 43
44 Outline 1. Measure and classify social interactions - RECAST algorithm 2. Transfer information in opportunistic wireless networks 3. Context and content wireless networking 44
45 3. Context and content wireless networking In wireless networking Previous research has leveraged CONTEXT information Mobility, Spectrum, Available wireless technologies Now, what can be do if we can predict a portion of the content users will look for? Content can be linked to a community s interests So I can push data to a community (implicit multicast) If there are several networks available (WiFi, 3G,..) I can pre-load data in the network using the less expensive technology 45
46 3. Context and content wireless networking MACACO project EU FP7, CHIST-ERA call, started Nov Our focus : a more intelligent data offloading strategy Build data offloading mechanisms that take advantage of context and content information Users Interest Mobility information: Time and location Intuitions: to extract and forecast the behaviour of mobile users in the threedimensional space of time, location and interest what, when and where users are pulling data from the network to pre-fetch the identified data and cache it at an earlier time at the mobile terminals or at the edge nodes of the network 46
47 Project contributions 1. To acquire real world data sets to model mobile node behavior in the three-dimensional space 2. To derive appropriate social models for the correlation between user interests and their mobility. 3. To derive simple and efficient prediction algorithms to forecast the node s mobility and interests 4. To output data pre-fetching mechanisms 1. To integrate content-centric caching approach with social context awareness and opportunistic resource availability 5. To design a federated testbed for (no commercial interest): 1. Content and context data collection 2. Assessment of off-loading solutions 47
48 Gather context and content data A smartphone application that measures: Context data Location (GPS, Internet) WiFi connectivity Bluetooth connectivity Cellular network towers Content data Name of applications that have generated traffic Browser history Facebook network 48
49 Next Having this data, exhibit the correlations between content and context Do users have regular habits in data usage? If yes, is it possible to model these networks with the content plane in mind? Using network models, deriving data pre-fetching strategies to adjust the load off available networks. 49
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Traffic Driven Analysis of Cellular Data Networks
Traffic Driven Analysis of Cellular Data Networks Samir R. Das Computer Science Department Stony Brook University Joint work with Utpal Paul, Luis Ortiz (Stony Brook U), Milind Buddhikot, Anand Prabhu
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Vehicular Cloud. Fan Zhang
Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Flexible mobility management strategy in cellular networks
Flexible mobility management strategy in cellular networks JAN GAJDORUS Department of informatics and telecommunications (161114) Czech technical university in Prague, Faculty of transportation sciences
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Exploring Big Data in Social Networks
Exploring Big Data in Social Networks [email protected] ([email protected]) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Social-based Data Routing Strategies in Delay Tolerant Networks
Social-based Data Routing Strategies in Delay Tolerant Networks Dissertation for the award of the degree Doctor of Philosophy Ph.D. Division of Mathematics and Nature Science of the Georg-August-Universität
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Graph Theory Applications in Network Security
Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) [email protected]
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Routing in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
