Survey of Applications of Network Coding in Wired and Wireless Networks
|
|
- Elwin Morrison
- 8 years ago
- Views:
Transcription
1 Survey of Applications of Network Coding in Wired and Wireless Networks Zunnun Narmawala and Sanjay Srivastava Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar , India {mohammedzunnun a narmawala, sanjay srivastava}@daiict.ac.in. Abstract We review the basic works in the area of network coding and present a detailed survey of applications of network coding in network problems. It is shown that both in wired and wireless networks, multicast and broadcast protocols perform better with network coding. Even in unicast applications, network coding based protocols perform as well as the protocols without network coding. We also survey the applications of network coding in the domains of Peer-to-Peer Networks, Delay Tolerant Networks and Wireless Sensor Networks. It is apparent from the results that innovative use of network coding can improve the performance of a variety of applications in these domains. Finally, we also suggest a number of interesting open problems in these domains where network coding can be used. A. Fundamental Work I. INTRODUCTION Ahlswede et al. in their pioneering work [1] showed that maximal network flow and sum of cut-edge capacities of any minimal cut that separates sender and receiver are equal and it is the maximum achievable capacity. It is in general not optimal to multicast information as a fluid which can simply be routed or replicated. Rather, by employing coding at nodes, called as network coding, a source can multicast information at a rate approaching the smallest minimum cut between the sender and any receiver as the coding symbol size approaches infinity which is not generally possible with simple routing. The benefit of network coding is illustrated by the following classical example as shown in Fig. 1. All links are of unit capacity and bits b 1 and b 2 are to be sent from s to t 1 and t 2. Without network coding it can be achieved in four time slots while with coding at node 3, i.e. taking XOR of b 1 and b 2, it is achievable in three time slots. B. Coding Li et al. in [2] showed that linear coding with finite field size suffices to achieve max-flow from the source to each receiving node. Koetter and Mèdard in [3] presented algebraic framework for network coding for networks with delays and cycles and showed that if a multicast connection is achievable under different failure scenarios, a single static code can ensure robustness of the connection under all those failure scenarios without re-routing. Ho et al. in [4] presented distributed randomized network coding and provided a lower bound for the success probability of randomized coding, (1 d/q) v, where q is the finite field size, d is the number of receivers, Fig. 1. Example of network coding and v is the number of links involved in the randomized coding. Concurrent independent work by Sanders et al. in [5] and Jaggi et al. in [6] considered single-source multicast on acyclic delay-free graphs, giving centralized deterministic and randomized polynomial time algorithms for network coding. Sanders et al. in [5] showed that for directed multicast networks, the ratio of maximum throughput with coding over that with routing grows as Θ(log V ), where V is the number of nodes in the network and therefore has no constant upper bound. But for undirected networks, Li and Li in [7] showed that improvement is always bounded by a constant factor of 2 for single multicast, unicast and broadcast sessions. Lun et al. in [8] presented capacity achieving distributed coding scheme for multicast or unicast over lossy point to point or broadcast links allowing wired or wireless network modeling respectively with polynomial complexity. All the nodes form random linear combinations of previously received packets whenever they have a transmission opportunity. Chou et al. in [9] pointed out that previous results are based on the following assumptions which are not practical: symbols flow synchronously throughout the network, edges have integer or unit capacities, centralized knowledge of network topology and acyclic graphs. However, techniques suggested in [9] work with random delays and losses, variable capacity edges, node and link failure with addition and deletion of links, unknown broadcast capacity and heterogeneous capacity of receivers. They used distributed random linear coding in which co-efficients are randomly generated and sent with the packet.
2 Fragouli and Soljanin in [10] introduced the idea of decomposing network into regions having same information flow and doing coding only at nodes which are part of more than one flow and presented an algorithm for deterministic decentralized coding with tight field size. C. Multicast in Wired Networks Multicasting using network coding can be divided into two tasks: 1) Routing: Finding minimum-cost subgraphs to support multicast connections, i.e. determining the rate at which to inject coded packets on each arc and 2) Coding: Determining the contents of those packets. Lun et al. in [11] presented decentralized algorithms that compute minimumcost subgraphs for establishing single static multicast connections in wired and wireless networks that use coding. These algorithms, coupled with existing decentralized schemes for constructing network codes, constitute a fully decentralized approach for achieving minimum-cost multicast. They pointed out that multiple simultaneous multicast connections can be treated separately, which is referred to as superposition coding, but it is sub-optimal. For application-layer overlay networks, Zhu et al. in [12] proposed distributed algorithms to construct 2-redundant multicast graph as the multicast topology over which network coding is applied while minimizing cost of link stretch and stress. Their algorithm doubles end-to-end throughput in most cases with small increase in delay, stress and resource usage compared to conventional multicast on overlay networks. Fig. 2. shows performance comparison of network coding and conventional multicast protocols based on the results in [11] and [12]. While DST and Narada exhibit similar delay characteristic, delay of Coded Multicast is significantly greater than network coding protocol in [11]. It is because Coded Multicast uses only sub-optimal 2-redundant multicast graph while network coding protocol in [11] uses optimal multicast subgraph. Li and Li in [13] obtained, through linear programming, a necessary and sufficient condition for multicast rate feasibility and an efficient and distributed sub-gradient algorithm for computing the maximum multicast rate. They concluded that network coding may not be instrumental in achieving better maximum multicast rates in most cases. Rather, it facilitates the design of significantly more efficient algorithms to achieve such optimality. Chi et al. in [14] presented network coding based routing algorithms for multicast when multicast rate is smaller than the multicast capacity. They showed that when the average node degree is high, the achievable throughput of the network coding based multicast is much higher than that of the shortest path distribution tree routing algorithm and slightly greater than that of the maximum rate distribution tree routing algorithm. Noguchi et al. in [15] pointed out that achieving maxflow using network coding can create congestion and proposed a technique for load balancing. For multiple independent unicast transmissions, Li and Li in [16] showed that throughput improvement due to network coding in directed network is Θ( V ) and therefore unbounded. Average delay DST [11] Network Coding [11] Narada [12] Coded Multicast [12] No. of receivers Fig. 2. No. of receivers v/s Average delay for protocols in [11] and [12] For undirected networks with integral routing, there still exist configurations that are feasible with network coding but infeasible with routing only. D. Multicast in Wireless Networks Multi-hop wireless networks face problems like multi-user interference, channel fading, energy constraints and the lack of centralized coordination. Network coding is very useful in such a scenario because the very characteristics of wireless links that complicate optimal data transfer are the very characteristics for which coding is a natural solution. Further, broadcast nature of wireless link can be exploited using network coding. Network coding for single unicast transmission in wired network is not useful but it is useful in lossy wireless networks. Xi and Yeh in [17] used network coding to achieve minimum-cost multicast in interference-limited wireless networks where link capacities are functions of the signalto-interference-plus-noise ratio(sinr). They considered joint optimization of network coding subgraphs with power control and congestion control without excessive control overhead and designed set of distributed, node-based scaled gradient projection algorithms and derived scaling matrices for fast, guaranteed global convergence. Ho et al. in [18] compared multicast network coding for a time-varying wireless network model with interference-determined link capacities instead of collision based wireless model with fixed link capacities and showed that the gap in multicast capacity between network coding and routing decreases relative to a collision-based wireless model with fixed link capacities and the main advantage of network coding is reduction in complexity of optimization and operation as network coding significantly reduces complexity of dynamic back pressure algorithms used for optimization. In order to reduce cost and complexity of coding, Zhang and Fan in [19] proposed to find nodes that need encoding instead of doing coding at all nodes. They used a modified Ford- Fulkerson algorithm to obtain the maximum flow and encoding nodes in undirected graph instead of getting encoding nodes
3 by subtree decomposition as presented by Fragouli et al. in [10]. Yuan et al. in [20] proposed a general modeling and solution framework for the throughput optimization problem in wireless networks instead of cost optimization. In the framework, data routing, wireless medium contention and network coding are jointly considered to achieve the optimal network performance. The cross-layer optimization approach decomposes the original problem into data routing sub-problems at the network layer, and power allocation sub-problems at the physical layer taking into account physical layer interference. Fragouli et al. in [21] argued that main benefits of network coding in a wireless environment might manifest in situations where topology dynamically changes and operation is restricted to distributed algorithms that do not employ knowledge about the network environment. They proved that network coding can offer benefits of a factor of log n in terms of energy efficiency. Park et al. in [22] presented CodeCast, which achieves controlled loss and bounded delay multicast with the help of network coding. It is essentially heuristic implementation of ideas presented in [8] and [11]. They showed that the protocol yields a nearly 100% delivery ratio, as compared to a 94% delivery ratio by traditional multicast and the overhead is reduced by as much as 50%. Fig. 3. shows performance comparison of network coding and conventional multicast protocols based on the results in [11] and [22]. While in both the papers, network coding protocols acheive lower average multicast cost compared to their conventional counterparts, difference in performance between the network coding and the conventional protocol increases, as number of receivers increases in [22] but it decreases in [11]. Wu et al. in [23] showed that mutual exchange of independent information between two nodes can be efficiently performed by exploiting network coding and physical-layer broadcast property of wireless medium which improves upon conventional solutions that separate the processing of the two unicast sessions. They proposed a distributed scheme along with packet formats that eliminates the need for synchronization and is robust to random packet loss and delay etc. The scheme incurs less overhead than the practical network coding scheme presented in [9]. Lun et al. in [24] showed how network coding, combined with distributed flow optimization, gives a practical approach for unicasting that promises to significantly outperform the present approach of end-to-end or link-by-link re-transmission combined with route optimization for any performance measure which increases with the number of transmissions made by each node. Katti et al. in [25] proposed COPE, an architecture for wireless mesh networks. They addressed the common case of unicast traffic, dynamic and potentially bursty flows, and practical issues facing the integration of network coding in the current network stack. The testbed deployment results showed that COPE largely increases network throughput. The gains vary from a few percent to several folds depending on the traffic pattern, congestion level, and transport protocol. Average Multicast Cost Fig. 3. [22] MIP [11] Network Coding [11] ODMRP [22] CodeCast [22] No. of receivers No. of receivers v/s Average multicast cost for protocols in [11] and Due to coding, COPE has to send less number of packets and as a result load on bottleneck link reduces, giving it double advantage. Sengupta et al. in [26] obtained a theoretical formulation for computing the throughput of network coding on any wireless network topology and any pattern of concurrent unicast traffic sessions. They advocated that routing be made aware of network coding opportunities rather than, as in COPE, being oblivious to it. They studied the trade-off between routing flows close to each other for utilizing coding opportunities and away from each other for avoiding wireless interference and presented a method for computing source-destination routes and utilizing the best coding opportunities from available ones so as to maximize the throughput. E. Broadcast in Wireless Networks To realize energy savings in a wireless ad-hoc network, where each node of the network is the source transmitting information to all other nodes, Fragouli et al. in [27] proposed fully distributed algorithm to perform network coding while addressing practical issues such as forwarding factor, managing generations and impact of transmission range. Li et al. in [28] applied network coding to deterministic broadcast approaches, resulting in significant reductions in the number of transmissions in the network. They proposed two algorithms, that rely only on local two-hop topology information and makes use of opportunistic listening to reduce the number of transmissions: 1) a simple XOR-based coding algorithm that provides gains up to 45% compared to a non-coding approach and 2) a Reed-Solomon based coding algorithm that determines the optimal coding gain achievable for a coding algorithm that relies only on local information with gains up to 61%. F. Applications in Peer-to-Peer Networks Gkantsidis and Rodriguez in [29] used network coding for content distribution of large files. The randomization introduced by the coding process eases the scheduling of
4 No. of peers finished Time Network Coding Source Coding Random Fig. 4. No. of nodes finished v/s Time for random, source coding and network coding in [29] block propagation. They showed that expected file download time and robustness of the system is significantly improved with network coding. Fig. 4., taken from [29], shows that significantly higher number of peers can receive complete files within very less amount of time with network coding approach compared to random and source coding approaches. Hamra et al. in [30] showed that network coding can improve the performance of the file sharing application in wireless mesh networks but not as in wired networks [29] inspite of wireless broadcast advantage and cited reasons for the behaviour. They also identified the main parameters that influence the performance of network coding in wireless environment and showed how these parameters interact with each other and influence the behavior of network coding. G. Applications in Delay Tolerant Networks Delay Tolerant Networks are the networks that experience frequent, long-duration partitioning and may never have an end-to-end contemporaneous path. Forwarding mechanisms in such networks usually resort to some form of intelligent flooding, as for example in probabilistic routing. Widmer and Boudec in [31] proposed a network coding based algorithm that significantly reduces the overhead of probabilistic routing algorithms. They showed that the algorithm achieves the reliability and robustness of flooding at a small fraction of the overhead. Zhang et al. in [32] investigated the benefits of using Random Linear Coding (RLC) for unicast in DTN under epidemic routing. Under RLC, DTN nodes store and then forward random linear combinations of packets as they encounter other DTN nodes. They considered two cases: 1) A single block of packets propagating in the network and 2) Blocks of packets arriving according to a Poisson arrival process. They showed that in the first case, when bandwidth is constrained, applying RLC over packets destined to the same node achieves the minimum delay needed to deliver the block of data. They also found that RLC achieves smaller block delivery delay than non-network-coded packet forwarding under bandwidth constraint, and the relative benefit increases further when buffer space within DTN nodes is limited. In the second case, they showed that RLC offers only slight improvement over the non-coded scenario when only bandwidth is constrained, but more significant improvement when both bandwidth and buffers are constrained. H. Applications in Sensor Networks Wang et al. in [33] presented partial network coding (PNC) as a generic tool for continuous data collection. PNC generalizes the existing network coding (NC) paradigm but enables efficient storage replacement for continuous data, which is a major deficiency of the conventional NC. They proved that the performance of PNC is quite close to NC, except for a sub-linear overhead on storage and communication. Shan-Shan et al. in [34] proposed an energy aware method to combine multipath routing with practical network coding. Through this method, same reliability as conventional multipath mechanisms can be guaranteed with significantly reduced energy consumption by decreasing the number of paths needed to deliver data. The method only needs little meta-data overhead and some small-scale linear operations. Toledo and Wang in [35] used network coding to achieve an adaptive equivalent solution to the construction of disjoint multipath routes from a source to a destination. It exploits both the low cost mesh-topology construction, such as those obtained by diffusion algorithms, and the capacity achieving capability of linear network coding. The solution easily adapts to the changing conditions of the wireless sensor network and it can be used by the sinks to increase or decrease capacity and reliability on demand. Xiong et al. in [36] proposed a cluster model and an efficient and implementable network coding algorithm based on it along with other algorithms and found that network coding algorithm allows to realize significant energy and time savings, when each node of the cluster is a source that wants to transmit information to all other cluster member nodes. For under water sensor networks, Guo et al. in [37] showed that network coding is beneficial for error recovery and is better than coding at the source. Ayday et al. in [38] proposed Location-aware Network Coding Security (LNCS) protocol that provides data confidentiality, authenticity, and availability in a resource constrained sensor network using random linear network coding. II. OPEN PROBLEMS Much work has been done in designing algorithms but this has to be translated into practical network coding based protocols so that performance gains can be realized in real networks. Impact of network coding specific parameters such as generation size, type of code etc. on performance measures such as delay, net-throughput etc. needs to be investigated. Existing works in ad hoc networks frequently assume that all nodes co-operate without being selfish. When we allow
5 some of the nodes to be selfish, enforcing co-operation becomes a difficult problem. Network coding can potentially be used to devise more robust co-operation mechanisms as network coding spreads the information of a packet into number of packets. In intelligent flooding based forwarding mechanisms, draining packets out of the system once they are delivered is a challenging issue. It is even more challenging for network coding based flooding because a delivered packet may be part of many coded packets in the system. Multicasting in Delay Tolerant Networks has its own challenges. Benefits of network coding based multicast in traditional networks are well understood. So, network coding based multicast for Delay Tolerant Networks is a promising approach that should be explored. In Network coding based demand driven resource distribution in Peer-to-Peer Networks, efficient mixing of content chunks based on demand pattern is likely to improve performance significantly. For efficient data aggregation in wireless sensor networks, joint application of source and network coding should be considered. For energy conservation, in wireless sensor networks, specialized MAC layer protocols such as SMAC are used. Interaction of network coding based approaches with such protocols needs to be analyzed. REFERENCES [1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, Network information flow, in IEEE Transactions on Information Theory, vol. 46, pp , July [2] S.-Y. R. Li, R. W. Yeung, and N. Cai, Linear network coding, in IEEE Transactions on Information Theory, vol. 49, pp , February [3] R. Koetter and M. Mèdard, Beyond routing: an algebraic approach to network coding, in IEEE Infocom, vol. 1, pp , June [4] T. Ho, R. Koetter, M. Mèdard, D. R. Karger, and M. Effros, The benefits of coding over routing in a randomized setting, in IEEE International Symposium on Information Theory, [5] P. Sander, S. Egner, and L. Tolhuizen, Polynomial time algorithms for network information flow, in Symposium on Parallel Algorithms and Architectures, June [6] S. Jaggi, P. A. Chou, and K. Jain, Low complexity algebraic multicast network codes, in IEEE International Symposium on Information Theory, June [7] Z. Li and B. Li, Network coding in undirected networks, in 38 th Annual Conference on Information Sciences and Systems, [8] D. S. Lun, M. Mèdard, and M. Effros, On coding for reliable communication over packet networks, in 42 nd Annual Allerton Conference on Communication, Control and Computing, October [9] P. Chou, Y. Wu, and K. Jain, Practical network coding, in 51 st Allerton Conference on Communication, Control and Computing, October [10] C. Fragouli and E. Soljanin, Information flow decomposition for network coding, in IEEE Transactions on Information Theory, vol. 52, pp , April [11] D. S. Lun, N. Ratnakar, M. Mèdard, R. Koetter, D. R. Karger, T. Ho, E. Ahmed, and F. Zhao, Minimum-cost multicast over coded packet networks, in IEEE Transactions on Information Theory, vol. 52, pp , June [12] Y. Zhu, B. Li, and J. Guo, Multicast with network coding in applicationlayer overlay networks, in IEEE Journal on Selected Areas in Communications, vol. 22, pp , January [13] Z. Li, B. Li, and L. C. Lau, On achieving maximum multicast throughput in undirected networks, in IEEE Transactions on Information Theory, vol. 52, pp , June [14] K. Chi, C. Yang, and X. Wang, Performance of network coding based multicast, in IEE Communications, vol. 153, pp , June [15] T. Noguchi, T. Matsuda, and M. Yamamoto, Performance evaluation of new multicast architecture with network coding, in IEICE Transactions on Communication, vol. E86-B, pp , June [16] Z. Li and B. Li, Network coding: The case of multiple unicast sessions, in Allerton Conference on Communications, [17] Y. Xi and E. M. Yeh, Distributed algorithms for minimum cost multicast with network coding in wireless networks, in 4 th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, April [18] T. Ho, J.-Q. Jin, and H. Viswanathan, On network coding and routing in dynamic wireless multicast networks, in Workshop on Information Theory and its Applications, UCSD, [19] J. Zhang and P. Fan, On network coding in wireless ad-hoc networks, in International Journal of Ad Hoc and Ubiquitous Computing, vol. 2, pp , [20] J. Yuan, Z. Li, W. Yu, and B. Li, A cross-layer optimization framework for multicast in multi-hop wireless networks, in First International Conference on Wireless Internet, July [21] C. Fragouli, J. Widmer, and J.-Y. L. Boudec, On the benefits of network coding for wireless applications, in Second Workshop on Network Coding, Theory, and Applications, April [22] J.-S. Park, M. Gerla, D. S. Lun, Y. Yi, and M. Médard, Codecast: a network-coding-based ad hoc multicast protocol, in IEEE Wireless Communications, vol. 13, pp , October [23] Y. Wu, P. A. Chou, and S.-Y. Kung, Information exchange in wireless networks with network coding and physical-layer broadcast, in Conference on Information Sciences and Systems, The Johns Hopkins University, March [24] D. S. Lun, M. Mèdard, and R. Koetter, Network coding for efficient wireless unicast, in International Zurich Seminar on Communications, February [25] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Mèdard, and J. Crowcroft, Xors in the air: Practical wireless network coding, in SIGCOMM, September [26] S. Sengupta, S. Rayanchu, and S. Banerjee, An analysis of wireless network coding for unicast sessions: The case for coding-aware routing, in IEEE Infocom, May [27] C. Fragouli, J. Widmer, and J.-Y. L. Boudec, A network coding approach to energy efficient broadcasting: from theory to practice, in IEEE Infocom, March [28] L. E. Li, R. Ramjee, M. Buddhikot, and S. Miller, Network codingbased broadcast in mobile ad-hoc networks, in IEEE Infocom, May [29] C. Gkantsidis and P. Rodriguez, Network coding for large scale content distribution, in IEEE Infocom, [30] A. A. Hamra, C. Barakat, and T. Turletti, Network coding for wireless mesh networks: A case study, in International Symposium on World of Wireless, Mobile and Multimedia Networks, June [31] J. Widmer and J.-Y. L. Boudec, Network coding for efficient communication in extreme networks, in SIGCOMM, August [32] X. Zhang, G. Neglia, J. Kurose, and D. Towsley, On the benefits of random linear coding for unicast applications in disruption tolerant networks, in Fourth International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, April [33] D. Wang, Q. Zhang, and J. Liu, Partial network coding: Theory and application for continuous sensor data collection, in 14 th IEEE International Workshop on Quality of Service, June [34] L. Shan-Shan, Z. Pei-Dong, and L. Xiang-Ke, Energy efficient multipath routing using network coding in wireless sensor networks, in ADHOC-NOW, [35] A. L. Toledo and X. Wang, Efficient multipath in sensor networks using diffusion and network coding, in 40 th Annual Conference on Information Sciences and Systems, March [36] Z. Xiong, W. Liu, J. Huang, W. Cheng, and Z. Yang, Network coding approach: Intra-cluster information exchange in wireless sensor networks, in MSN, [37] Z. Guo, P. Xie, J. Cui, and B. Wang, On applying network coding to underwater sensor networks, in WUWNet, September [38] E. Ayday, F. Delgosha, and F. Fekri, Location-aware security services for wireless sensor networks using network coding, in IEEE Infocom, May 2005.
A REVIEW ON NETWORK CODING AND ITS APPLICATIONS IN WIRED AND WIRELESS NETWORKS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 5, May 2014, 179-186 Impact Journals A REVIEW ON NETWORK CODING
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationNetwork Monitoring in Multicast Networks Using Network Coding
Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen
More informationComparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationOptimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
More informationFile Sharing between Peer-to-Peer using Network Coding Algorithm
File Sharing between Peer-to-Peer using Network Coding Algorithm Rathod Vijay U. PG Student, MBES College Of Engineering, Ambajogai V.R. Chirchi PG Dept, MBES College Of Engineering, Ambajogai ABSTRACT
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationLink Loss Inference in Wireless Sensor Networks with Randomized Network Coding
Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Vahid Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,
More informationPerformance Evaluation of Network Coding: Effects of Topology and Network Traffic for Linear and XOR Coding
JOURNAL OF COMMUNICATIONS, VOL., NO. 11, DECEMBER 9 88 Performance Evaluation of Network Coding: Effects of Topology and Network Traffic for Linear and XOR Coding Borislava Gajic, Janne Riihijärvi and
More informationNetwork Coding-Based Broadcast in Mobile Ad hoc Networks
Network Coding-Based Broadcast in Mobile Ad hoc Networks Li (Erran) Li Ramachandran Ramjee Milind Buddhikot Scott Miller Bell Labs Alcatel-Lucent erranlliramjeembuddhikotscm@bell-labs.com Abstract Broadcast
More informationToward Secure Network Coding in Wireless Networks: Threats and Challenges
Toward Secure Network Coding in Wireless Networks: Threats and Challenges Jing Dong Reza Curtmola Ruben Sethi Cristina Nita-Rotaru Department of Computer Science, Purdue University {dongj,crix,rsethi,crisn}@cs.purdue.edu
More informationEfficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationAd hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationReliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points
Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Email:
More informationSecure Network Coding for Wiretap Networks of Type II
1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can
More informationLoad Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
More informationCommunication Overhead of Network Coding Schemes Secure against Pollution Attacks
Communication Overhead of Network Coding Schemes Secure against Pollution Attacks Elke Franz, Stefan Pfennig, and André Fischer TU Dresden, Faculty of Computer Science 01062 Dresden, Germany {elke.franz
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationSecure Network Coding: Dependency of Efficiency on Network Topology,
13 IEEE. Reprinted, with permission, from S. Pfennig and E. Franz, Secure Network Coding: Dependency of Efficiency on Network Topology, in IEEE International Conference on Communications (ICC 13), pp.
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationBandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
More informationNEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationother. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
More informationSecurity for Wiretap Networks via Rank-Metric Codes
Security for Wiretap Networks via Rank-Metric Codes Danilo Silva and Frank R. Kschischang Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario M5S 3G4, Canada, {danilo,
More informationA Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
More informationTOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING. Attilio Fiandrotti, Anooq Muzaffar Sheikh, Enrico Magli
20th European Signal Processing Conference (EUSIPCO 202) Bucharest, Romania, August 27-3, 202 TOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING Attilio Fiandrotti, Anooq Muzaffar
More informationWIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationPerformance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
More informationAdaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
More informationNetwork Monitoring: It Depends on your Points of View
Network Monitoring: It Depends on your Points of View Christina Fragouli EPFL, Lausanne christina.fragouli@epfl.ch Athina Markopoulou University of California, Irvine athina@uci.edu Ramya Srinivasan EPFL,
More informationCHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
More informationFurther Analysis Of A Framework To Analyze Network Performance Based On Information Quality
Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,
More informationVideo Transmission Using Network Coding
Paper Video Transmission Using Network Coding Francisco de Asís López-Fuentes and Cesar Cabrera-Medina Department of Information Technology, Autonomous Metropolitan University, México Abstract Network
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationAchievable Strategies for General Secure Network Coding
Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu
More informationIN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
More informationLecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
More informationNetwork Coding for Distributed Storage
Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and
More informationWeakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
More informationEnergy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network
Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationOn Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University
More informationGraph Theory Applications in Network Security
Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) jonwebb@cqu.edu.au
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationNetwork Coding Aware Queue Management in Multi-Rate Wireless Networks
Network Coding Aware Queue Management in Multi-Rate Wireless Networks Nicola De Coppi, Jianxia Ning, George Papageorgiou, Michele Zorzi, Srikanth V. Krishnamurthy and Thomas La Porta University of Padova
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationRouting and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References
More informationKodo: An Open and Research Oriented Network Coding Library Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul
Aalborg Universitet Kodo: An Open and Research Oriented Network Coding Library Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul Published in: Lecture Notes in Computer Science DOI (link
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationVideo Streaming with Network Coding
Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,
More informationAN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
More informationEnergy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
More informationCross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
More informationAnatomy of a P2P Content Distribution system with Network Coding
Anatomy of a P2P Content Distribution system with Network Coding Christos Gkantsidis, John Miller, Pablo Rodriguez Microsoft Research, Cambridge email:{chrisgk, johnmil,pablo}@microsoft.com ABSTRACT In
More informationThis article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationCluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationContent Distribution over IP: Developments and Challenges
Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,
More informationStudy of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationSignatures for Content Distribution with Network Coding
Signatures for Content Distribution with Network Coding Fang Zhao, Ton Kalker, Muriel Médard, and Keesook J. Han Lab for Information and Decision Systems MIT, Cambridge, MA 02139, USA E-mail: zhaof/medard@mit.edu
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationLinear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB)
462 Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB) Nitin Rakesh 1 and VipinTyagi 2 1, 2 Department of CSE & IT, Jaypee University of Information Technology, Solan,
More informationPerformance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks
Proceedings of the 213 International Conference on Electronics and Communication Systems Performance Evaluation of VoIP Codecs over Network Coding in Wireless Mesh Networks Erik Pertovt, Kemal Alič, Aleš
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationEfficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
Du et al. EURASIP Journal on Wireless Communications and Networking 2014, 2014:5 RESEARCH Open Access Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationDelay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
More information