Peer-to-Peer over Ad-hoc Networks: (Re)Configuration Algorithms

Size: px
Start display at page:

Download "Peer-to-Peer over Ad-hoc Networks: (Re)Configuration Algorithms"

Transcription

1 Peer-to-Peer over Ad-hoc Networks: (Re)Configuration Algorithms Fernanda P. Franciscani Marisa A. Vasconcelos Rainer P. Couto Antonio A.F. Loureiro Computer Science Department, Federal University of Minas Gerais Av Antonio Carlos 6627, Belo Horizonte MG, Brazil fepaixao, isa, rainerpc, Abstract A Peer-to-Peer network over an ad-hoc infrastructure is a powerful combination that provides users with means to access different kinds of information anytime and anywhere. In this paper we study the (re)configuration issue in this highly dynamic scenario. We propose three (re)configuration algorithms especially concerned with the constraints of the environment presented. The algorithms aim to use the scarce resources of the network in an efficient way, improving the performance and the network lifetime. The algorithms were simulated and used a simple Gnutella-like algorithm as comparison. The results show that the algorithms achieved their goals, presenting a good cost-benefit relation. 1. Introduction Mobile computing has the goal to allow people access the distinct types of information anytime and anywhere. In general, the client-server architecture is not adequate to satisfy this demand due to many reasons: the server can be down (little fault-tolerance) or overloaded (scalability problems), or there is no infrastructure to access the server and other entities. Some of the problems above, like scalability and faulttolerance, can be addressed by Peer-to-Peer (p2p) applications, which build a virtual network over the physical one. The peers can act as servers or as clients, and are called servents. The servents can exchange data among themselves in a completely decentralized manner or with the support of some central entity, which usually helps servents to get in touch with one another. Thus, the success and popularity of the p2p networks reveal how important it is to satisfy the anytime demand. Regarding the anywhere issue, however, we can say that its mainly related to the network itself, that is, it depends This work is partially supported by CNPq-Brazil on the infrastructure provided. Once the lack of infrastructure is a problem, networks that do not need it turn out to be a solution. This is the case of ad-hoc networks, which, once endowed with mobility, are called MANETs (Mobile ad-hoc networks). In these networks, the communication between nodes is based on radio coverage and can be made directly or using other nodes as routers. Thus, the MANETs can be easily formed by a group of people who make use of current devices as cellular phones, PDAs and notebooks. From the arguments above, it is reasonable to think that p2p networks over ad-hoc networks would be a very good solution to both the anytime and the anywhere problems. However, this combination leads to a highly dynamic scenario in which references between nodes are constantly changing. The frequent reconfiguration may cause a great impact in the scarce resources of the network, such as energy and bandwidth. Aiming to control and diminish this impact, we designed algorithms to (re)configure a p2p network over an ad-hoc network and analyzed their behavior. Although there are some studies on p2p applications over ad-hoc networks, they usually are not concerned about (re)configuration issues. Many times the references between nodes simply show up or are created through the indiscriminate use of broadcasts. The relevance of the current work is therefore to study adequate ways of (re)configuring a p2p network over and ad-hoc network taking into account the serious constraints this scenario presents. The rest of this paper is organized as follows. Section 2 briefly describes p2p networks, whereas Section 3 discusses the p2p over mobile ad-hoc networks. Section 4 describes the main characteristics of a mobile ad-hoc network and the routing protocol used. Section 5 presents the related work. The four (re)configuration algorithms are described in Section 6 and analyzed through simulations in Section 7. Finally, Section 8 presents our conclusions and future work. 2. Peer-to-Peer Networks The p2p networks are application-level virtual networks. They have their own routing protocols that permit com-

2 puting devices to share information and resources directly, without dedicated servers. P2p members act as a clients and as a servers, thus being called servents [17]. File sharing applications such as Napster, Gnutella, Morpheus have become the p2p networks very popular. The great contribution of this kind of system is the scalability that allows millions of users to be online concurrently even at peak periods [7]. This is obtained thanks the user hybrid behavior (client + server), which yield a greater computing decentralization. The p2p systems are classified in three main categories: centralized, decentralized and hybrid [4, 9]. In a centralized p2p system, coordination between peers is managed by a central server. However, after receiving the information from the central server, the communication between peers happens directly. Some advantages of this kind of system are: the easiness of management and security. The disadvantages are the low fault-tolerance, since some data are held only by the central server and the scalability limitation by the capacity of the server. However, the scalability can still be achieved through the increasing processing power of the computers, which make possible one machine be able to serve a great number of users. Some examples are the search architecture of Napster [11] and the system SETI@Home [20], which has a central job dispatcher. In decentralized topologies, e.g. Freenet [2] and Gnutella [3], all the peers have equal roles. The communication is made through multiples multicasts, where peers forward messages on behalf of others peer. Some important advantages are extensibility and fault-tolerance. Scalability in these systems is difficult to measure: on the one hand, if you add more hosts, the system becomes more capable. On the other hand, however, the overhead of keeping the consistency of the data increases with the size of the system. In hybrid (centralized + decentralized) topologies, peers forward their queries to super-peers which communicate with each other in a decentralized manner. The advantages of this topology resemble the ones of decentralized systems except for data consistency, which was improved. This happens since part of the data is kept only by the superpeers. Examples of this topology are KazaA [5] and Morpheus [10]. Table 1 was derived from [9], in which the advantages and disadvantages of distributed topologies were listed. Centralized Decentralized Manageable yes no no Extensible no yes yes Fault-Tolerant no yes yes Secure yes no no Lawsuit-proof no yes yes Scalable depend maybe apparently Table 1. Topologies and their characteristics. In this work, only hybrid and decentralized configurations were adopted for two reasons. First, we consider these topologies closer to reality. Second, as it will be shown, the environment considered is highly dynamic, making extensibility an important issue. The developed algorithms, including the, also were inspired in the decentralized protocol Gnutella, especially in query mechanism part. Gnutella is a public domain p2p protocol used mainly for sharing, searches and retrieval of files and content. To be part of this network, the servents must connect to the neighbors who already belong to the network. After that, the servent will send messages through broadcasts for its neighbors and will act as router to the other messages that had been transmitted. The types of messages exchanged in this network are: ping to discover other member nodes, the query messages with information about the searched content and file properly said, which is transferred directly between the peers. Whenaservent wishes to search for some file, it sends a query message to its neighbors, which if possible, return the desired files besides forwarding the message for its own neighbors. In order to prevent the indefinite propagation, all the messages are flagged with the TTL (time-to-live) field and with the number of hops passed [17]. 3. P2p over Mobile Ad-Hoc Networks The wireless devices have, in general, a restricted transmission range due to its limited power supply. Thus, the search for data should be made in a small distance range. This search can be made of two distinct ways. The first one uses a fixed infrastructure, generally it involves a high cost and provides continuous access to a information network like the Internet or a private intranet. The second way of access does not need fixed infrastructure: the own set of the mobile devices, acting as routers and information servers, forms the network. This kind of network is called ad-hoc network. In this last case, the nearest devices become important sources of data for each other, what resembled the p2p paradigm, in which the network elements act, at the same time, as clients, servers and routers. One of the main advantages of a p2p over ad-hoc network would be easiness of forming the network, since it is not necessary to have infrastructure nor it depends on a central server. Examples of possible uses of p2p over ad-hoc networks include applications that alert us to the presence of friends at a crowded public space or identify people we want to meet taking into account our preferences and interests; systems that spread rumors, facilitate the exchange of personal information, or support us in more complex tasks [6]. On the other hand, p2p over ad-hoc networks is a very dynamic combination that demands, among other things, special attention regarding (re)configuration issues.

3 4. Mobile Ad-Hoc Networks The ad-hoc mobile networks are composed by wireless mobile devices, which its communication is based on radio coverage and can be made directly (point-to-point) or using other nodes as routers. The utilization of this kind of network is mainly in scenarios without a fixed network infrastructure. Some examples are conventions or meetings, where people, for comfortableness, wish quickly exchanging of information [18], and emergency operations. Ad-hoc mobile networks show, beyond the common restrictions to the wireless network, the additional challenge to deal with a very dynamic topology. The limited energy of the devices demands smart routing protocols. In our simulations, the chosen routing protocol was AODV. Comparing the performance of some routing protocols, it can be seen that each of them performed well in some scenarios for some metrics yet had drawbacks in others [13]. We, therefore, adopted AODV, which exhibited the best performance on high mobility scenarios. The AODV protocol is a demand routing algorithm for ad-hoc mobile networks, in which each node has the information about the next hop of a route. It is an on demand algorithm since the routes are only maintained if they are being used. When a link is broken, AODV updates the nodes that have this route saved. Advantages of this protocol are: quick adaptation to dynamic link conditions, self-starting, multi-hop and loop-free [16, 19]. 5. Related Work A comparison is made in [19] between ad-hoc networks and p2p networks routing. Besides presenting taxonomy of both, this work proposed the joint use of these networks, aiming at a synergetic effect. This theory passes to the practical one in [14, 15], where the 7DS (Seven Degrees of Separation) application is presented, a network for data dissemination among hosts in an ad-hoc network. Besides the implementation, these works present the effect (through simulation) of power conservation, radio control coverage and strategies to cooperation among host to data dissemination. In [6] it is presented a platform for development of peerto-peer applications in small range ad-hoc networks, more precisely, for PAN s - Personal Area Network. A study on sensor networks regarding cooperation and network formation is made in [21]. In [13] it is evaluated the performance of several routing protocols in a p2p over ad-hoc network. The works above are related to the world of p2p over ad-hoc networks and they all lack the concern about p2p (re)configuration issues. Our work focuses exactly on this problem, analyzing its impact on the performance of both p2p and ad-hoc networks. In [4] it is described some metrics for performance evaluation in a p2p network, using Gnutella and Freenet as case studies, based on four criteria: efficiency, speed, worse case performance and scalability. Gnutella was not considered scalable, since the required bandwidth increases linearly as the network grows. Conversely, Freenet scales logarithmically, using pathlength as metric. 6. (Re)Configuration Algorithms For (re)configuration of the network we proposed two types of algorithms: decentralized and hybrid. There are three different decentralized algorithms, which are called, and. The hybrid type has only one representative: the so called algorithm. In the description of all these algorithms, it will be said that the nodes are connected,tryingtoconnect, maintaining a connection etc. It is important to notice, however, that we are dealing with wireless networks and thus there are no real connections, e.g. a TCP connection, between nodes. Then it must be kept in mind that the so called connections actually are references, that is, they represent the knowledge of the addresses of some reachable nodes. Thus, a symmetrical connection is the one in which a node A keeps a reference to node B while B also references A. Asymmetrical connections also exist and are used in the Algorithm Decentralized Algorithms Our system s model is based on the use of messages that are forwarded over many hops from one peer to the next in order to establish connections and to search for data. Despite having this same basis, the three decentralized algorithms have distinct behaviors, as it will be seen below. The algorithm will be presented in the next section. After that, a very important concept will be briefly described: the small-world effect [8], which was the basis for the changes that turned the algorithm into the algorithm. Finally, there is the description of these last two algorithms The Algorithm The algorithm was meant to represent a simple (re)configuration algorithm and therefore to serve as a basis for comparison. Its main characteristic simplicity implies easy implementation but partially ignores the dynamic nature of the network. This algorithm, shown in figure 1, makes use of three constants named Å Æ ÇÆÆ, ÆÀÇÈË and ÌÁÅ Ê. The first represents the maximum number of connections per node. The second is the number of hops a message travels and the third stands for the time interval between two

4 Establishing connections while the node belongs to p2p network if number of connections Å Æ ÇÆÆ try toestablish new connections to nodes within ÆÀÇÈË away up to the limit of Å Æ ÇÆÆ connections; wait ÌÁÅ Ê before next try; Maintaining connections while this connection exists send a Ô Ò to the connected node; wait some time for the ÔÓÒ ; if the ÔÓÒ was received then wait some time before sending next Ô Ò ; else close this connection; Figure 1. Algorithm. attempts to establish connections. The algorithm works as described below. A node, when starting its participation in the p2p network, broadcasts a message to discover other nodes within ÆÀÇÈË away in the neighborhood. Every node that listens to this message answers it. As soon as a response arrives, the node establishes a connection to the neighbor who sent it, till the limit of Å Æ ÇÆÆ connections. In case the number of responses is lesser than Å Æ ÇÆÆ, and whenever else it has less than MAXNCONN connections, the node keeps trying to create the rest of the connections. Between the trials, the node waits for a time interval ÌÁÅ Ê in order to avoid traffic overload in the network. Once a reference 1 is created its validity is frequently checked by sending pings. Whenever a node receives a ping it answers with a pong. The receiving of a pong thus signals the connection still exists while its lack means the neighbor is not reachable anymore and then the connection is over The Small-World Model In a regular graph its n vertices are connected to their nearest k neighbors. Differently, in a random graph, the connections are randomly established and k stands for the average number of edges per vertex. Thus, two neighbors of a node have a greater chance of being connected to each other in regular graphs, that is, the average clustering coefficient is much greater in regular graphs. This coefficient is obtained as explained: let Ö Ð ÓÒÒ be the number of existent connections between all the neighbors of a node (these neighbors are connected to this given node); and let 1 Remember that the so called connections actually are references. ÔÓ Ð ÓÒÒ be the number of all connections that could exist between these neighbors. The clustering coefficient is given by Ö Ð ÓÒÒ ÔÓ Ð ÓÒÒ. Besides the clustering coefficient, the regular and random graphs also have very distinct characteristic pathlengths. In large regular graphs with n much larger than k for a k much larger than 1 the pathlength is approximately Ò ¾. In large random graphs this value decreases substantially and is given by ÐÓ Ò ÐÓ [4]. Interestingly, little changes in regular graphs connections are sufficient to achieve short global pathlengths as in random graphs. The rewiring of some connections from neighbors to randomly chosen vertices represented the creation of bridges between clusters a great distance away. These bridges diminish the pathlength without any considerable change in the clustering coefficient. The graphs that have high clustering coefficients and, at the same time, short global pathlengths are called small-world graphs. Our (re)configuration algorithm presented next aimed to construct the peer-to-peer networks as small-world graphs. Before presenting the and algorithms, we will list their variables and constants, most of which are present in both algorithms. There are three variables: Ò ÓÔ, Ö Ò ÓÔ and Ø Ñ Ö. The first one represents the number of hops a message looking for a Ö ÙÐ Ö connection can travel. It is initialized with the value ÆÀÇÈË ÁÆÁÌÁ Ä, which is greater than 1, and has Å ÆÀÇÈË as an upper limit. The second one has a similar meaning but it is only applied to Ö Ò ÓÑ connections; it does not need to be initialized. The third variable stands for the time interval a node waits between two attempts to establish connections. It is initialized with ÌÁÅ Ê ÁÆÁÌÁ Ä and can increase up to Å ÌÁÅ Ê. Finally, there are two remaining constants not explained yet: Å Æ ÇÆÆ, which is the maximum number of connections per node, and Å ÁËÌ, which is the maximum distance allowed between two connected neighbors (measured in number of hops) The Algorithm Initially there is the ad-hoc network over which some (or all) of its nodes want to build the p2p network, following the algorithm presented in figure 2. As it can be seen, each of the nodes broadcasts a message communicating it is looking for establishing connections. The messages have specific number of hops (Ò ÓÔ ) they are expected to travel. When receiving this message, a node willing to connect starts a three-way handshake with the sender, aiming to establish a symmetrical connection. If, within that radius, less than MAXNCONN neighbors could be symmetrically connected to, the node will make another broadcast

5 with a higher number of hops Ò ÓÔ ¾. Before the new broadcast, however, it waits for a Ø Ñ Ö time interval. As in the algorithm, this interval is an attempt to avoid traffic overload. This mechanism is repeated till the maximum of MAXNCONN connections or the maximum of MAXNHOPS hops is achieved, whichever occurs first. When Ò ÓÔ is set to ¼ it means that node tried all the possible values for Ò ÓÔ without connecting to MAXNCONN neighbors. In this case, the time interval Ø Ñ Ö is doubled before the next cycle of trials, in which Ò ÓÔ will restart with the ÆÀÇÈË ÁÆÁÌÁ Ä value. The variable Ø Ñ Ö has its upper limit given by Å ÌÁÅ Ê, and its lower limit by ÌÁÅ Ê ÁÆÁÌÁ Ä. A : Establishing connections while the node belongs to p2p network if number of connections Å Æ ÇÆÆ then if Ò ÓÔ ¼then try to establish new and symmetrical connections to nodes within Ò ÓÔ away up to the limit of Å Æ ÇÆÆ connections; wait Ø Ñ Ö before next trial; else Ø Ñ Ö =min(ø Ñ Ö ¾, Å ÌÁÅ Ê); Ò ÓÔ Ò ÓÔ ¾µÑÓ Å ÆÀÇÈË ¾µ; A and A : Maintaining connections while this connection exists if it is the node that asked for the connection send a Ô Ò to the connected node; wait some time for the ÔÓÒ ; if the ÔÓÒ was received then if this is a Ö Ò ÓÑ connection then if the node is nearear than ¾ Å ÁËÌ then wait some time before sending next ping; else close this connection; else if the node is nearear than Å ÁËÌ then wait some time before sending next ping; else close this connection; else close this connection; else wait some time for the Ô Ò ; if the Ô Ò was received then send a ÔÓÒ ; else close this connection; Figure 2. and Algorithms. Once a connection is successfully built, the node starts its maintenance as presented in the algorithm of figure 2. The connection is frequently checked using pings. As we are dealing with symmetrical connections, only the vertex that started the process of establishing the connection will send pings. The reception of pings is controlled by the other node with the use of a timer; whenever it receives a ping,it answers with a pong and reschedules the timer. In case a timeout occurs, it closes the connection. When receiving a pong, the other node knows its neighbor is still reachable, but this is not enough to maintain the connection. To remain connected, the distance between the nodes must be less than MAXNHOPS hops. In case the distance is bigger than that, the connection is closed. The same occurs in the absence of a pong. This algorithm has four improvements compared to the algorithm. First, the number of hops a message looking for connections may travel is increased gradually. Once this kind of message is sent by broadcast, controlling the number of hops means less traffic in the network. The traffic is also potentially diminished by the control of the distance between connected nodes as the pings and pongs they exchange will span a narrower area. This was the second improvement, which is complemented by the third one: the number of pings and pongs was cut half because only one vertex checks the connection actively, that is, sending pings. As we are dealing with wireless networks, which have bandwidth constraints, these three actions added together may have a reasonable positive impact. Last, but not least, there is the fourth improvement, related to Ø Ñ Ö and which was inspired by the dynamic nature of our network, together with the traffic concern. As it can be seen, the time interval between two broadcasts has not a fixed value. Instead, it doubles every time a cycle of attempts to establish connections is over, diminishing the overall traffic. Besides, if it has been difficult to connect to other nodes, while waiting for a longer interval the network can change to a more favorable configuration. Then, it may be easier to finally establish the desired connections. One detail not presented in the pseudo-code is that, whenever a connection is done, the Ø Ñ Ö is reset to its initial value. This is done because this new connection may be a signal of a better network configuration The Algorithm Adopting the algorithm, each node would preferentially connect to its nearest neighbors. In a dense peerto-peer network, the connections thus would be established within a low number of hops. This would probably lead to a network whose characteristics would resemble the ones of regular graphs, mainly in the sense of long global pathlengths. Aiming to avoid this and to gain small-world characteristics, our algorithm suffered a little change,

6 leading to the algorithm. The establishment of the first Å Æ ÇÆÆ ½ connections follows exactly the same steps mentioned in the algorithm. For this reason, they will be called regular connections. The difference of the two algorithms lies in the last connection, as it can be seen in the algorithm in figure 3. As we have already seen, few rewiring can turn a Establishing connections while the node belongs to p2p network if number of connections Å Æ ÇÆÆ then if Ò ÓÔ ¼then try to establish new and symmetrical connections to nodes within Ò ÓÔ away up to the limit of Å Æ ÇÆÆ ½ Ö ÙÐ Ö connections; wait Ø Ñ Ö before next trial; else Ø Ñ Ö =min(ø Ñ Ö ¾,MAXTIMER); if a Ö Ò ÓÑ connection is needed then set Ö Ò ÓÔ to a randomly chosen value between Ò ÓÔ and ¾ Å ÆÀÇÈË; try to establish one new and symmetrical Ö Ò ÓÑ connection to the farest node possible within Ö Ò ÓÔ away; Ò ÓÔ Ò ÓÔ ¾µÑÓ Å ÆÀÇÈË ¾µ; Figure 3. Algorithm. regular graph into a small-world graph. To promote this rewiring, the node does not try to establish its last connection within Ò ÓÔ away. Instead, it chooses a random number Ö Ò ÓÔ between Ò ÓÔ and ¾ Å ÆÀÇÈË. Then it broadcasts a message looking for connections to all nodes within Ö Ò ÓÔ hops away. It waits some time for responses to arrive, analyzes them, and only continues the three-way handshake with the most distant neighbor. Once a connection is established this way, it is called a random connection and, whenever it goes down, it must be replaced by another random connection. The maintenance of the existing connections follow the scheme shown in figure 2. The final effect expected is that some of the overall connections will link distant peers and therefore would act as bridges, turning the pathlength shorter while maintaining the clustering coefficient high. Then we would have achieved the small-world effect Algorithm Decentralized algorithms were designed to work on a homogeneous network, that is, network that makes no distinction of their nodes. In this case, all effort should be distributed evenly among the nodes in order to increase lifetime. However, ad-hoc networks often will be formed by different types of devices and, in this case, the most part of all effort should be made by the most powerful devices. algorithm was developed for heterogeneous networks, that is, networks in which all nodes are differentiated by a qualifier. Thisqualifier can be related to any characteristic of the node, e.g. energy level or processor power. The principle is to form subnets with one master and a limited number of slaves. The slaves can only communicate to their master, but masters can communicate with each other, resulting in the hybrid network. To achieve this configuration, A defines several states that peers can present at any given time: master, slave, reserved and initial. Each peer starts at initial state and later, becomes a master or a slave. Reserved state is only used on transitions. The algorithm is described on figure 4. Initially, each peer tries to contact other peers that are within NHOPS INITIAL (ad-hoc) hops away. If there is no response, then the peer doubles the limit and tries new contacts. Eventually, if this limit exceeds MAXNHOPS, then the peer entitles itself a master and uses the regular algorithm to contact other masters. The type of message used in this first step is the capture one, with only one argument - the qualifier of the sender. If one peer in initial state and with a smaller qualifier receives this message, it will try (through a three-way handshake) to become a slave of the sender. If the qualifier of the receiver is bigger and its state is either initial or master, then it responds with a capture message. This step guarantees that new peers will always get some feedback from their neighborhood, either by discovering the masters already there or other peers in initial state. The peers in slave or reserved state don t communicate with any one else, except their masters or master candidates, respectively. The reconfiguration is done in two kinds of situation. The first one is when a master owns no slave after a period. This master could, potentially, be another peer slave. The second one is when a slave is too far away from its master. This peer should look for another master on its neighborhood. This self-reorganization ensures that the hierarchy remains balanced and that the elements of the clusters are not being scattered over a wide area. The maintenance phase is similar to decentralized algorithm s one. A ping message is sent to all neighbors and, if a response message is not received after a while or the neighbor is too far, then the peer closes that connection and, if it is a slave, the peer resets its state to initial. It, then, tries to contact other peers.

7 Establishing connections while this node belongs to p2p network switch state case INITIAL: if Ò ÓÔ ¼then try to find a master and become its slave or try to find slaves and become their master; else change its state to MASTER; Ò ÓÔ Ò ÓÔ ¾µÑÓ Å ÆÀÇÈË ¾µ; break; case MASTER: use the regular algorithm to contact other masters; if Ò Ð Ú Å ÆËÄ Î Ë then accept any incomming slave connection; if the node hasn t got any slaves during MAXTIMERMASTER then change its state to INITIAL; break; case SLAVE: just maintain the connection to the master; break; endswitch 7. Simulation Figure 4. Algorithm. We used the ns-2 simulator [12], a well known simulator for networking, which supports ad-hoc network models. We chose AODV as our routing protocol, which is already available in ns-2 v.9 distribution. Its implementation, however, lacks the support to broadcast messages. We added this feature to the existing code by including a controlled broadcast function such that each node has a cache to keep track of the broadcast messages received. This mechanism avoids forwarding the same message several times. Such an improvement is relevant since each message transmitted or received consumes energy, which is a restrict resource in a mobile ad-hoc network. The simulations were repeated 33 times Model In this section, the p2p network model used in the simulations is discussed. First of all, it must be highlighted that our model was not developed based in any specific application and it intends to work with generic algorithms for data search and exchange. In the decentralized algorithms, all nodes are considered identical since they play the same role: they are servents. The hybrid algorithm, however, is slightly different since a node can be either a master or a slave. It is important to restate that what we are calling connections are actually references. In other words, a node keeps a list of references to other nodes it believes to be its neighbors. Connections can be either symmetrical or asymmetrical. The connections are created and maintained in order to provide the p2p application with means to perform data search and exchange Scenarios We have simulated an ad-hoc network with 50 and 150 nodes, distributed over an area of 100 m 100 m and with a wireless range of 10 m. The p2p is formed by 75% of all nodes, thus some nodes belongs to the ad-hoc network only. For mobility, based on human walking, we used Way model [1] with maximum speed value of 1,0 m/s and maximum pause time of 100s. The node interleaves moving and pause periods. Initially, all nodes were randomly positioned over the area, following a uniform distribution. Unless mentioned, the default values for the parameters are taken from Table 2. All scenarios were simulated for 3,600 seconds. Parameter for simulation Value transmission range 10 m number of distinct searchable files 20 frequency of the most popular file 40% NHOPS INITIAL 2 ad-hoc hops MAXNHOPS 6 ad-hoc hops NHOPS ( Algorithm) 6 ad-hoc hops MAXDIST 6 ad-hoc hops MAXNCONN 3 MAXNSLAVES 3 TTL for queries 6 p2p hops Table 2. Parameters used and their typical values. The query system used in the simulation is based on Gnutella. A node sends a query to all nodes in its list of neighbors. The query contains the identification of the requested file and of the requirer the original source of the query. When a node receives a query, it processes and forwards the message even if it has the file. In order to control the message traffic, we stated the following three rules. First, each node only forwards a query or responds to a query once. Second, a node does not forward a query to the neighbor from which it was received. Third, a query is not forwarded to its original source. In case a node has the requested file, it sends a response directly to the requirer. After sending a query, the node waits for a response for 30

8 seconds. Then, the node waits for a random period between 15 to 45 seconds to send the next query. Different files are distributed in the network following a Zipf law [22] with maximum frequency MAXFREQ of ¼±. This means that the most popular file will be present in 40% of all nodes, the second most popular one in ¼± ¾ ¾¼±, the third in ¼±, and so on Metrics Average minimum distance Average number of answers We have chosen a few metrics considered relevant to the performance of p2p networks [4] and ad-hoc networks. Number of hops: the minimum number of hops (p2p and ad-hoc) from the source to the peer holding the requested information. We evaluated the medium value for all simulated requests. Number of exchanged messages: the number of messages of each type, queries and pings, received by the nodes. We evaluated the medium number of messages received by each node. 7.4 Results This section contains the results considering the metrics described above. These results show the expected behavior of the four proposed algorithms. The graphics in Figures 5 and 6 show the average minimum distance to reach a node that has requested file and the average number of answers per file request. Those graphics were, respectively, for the scenario with 50 and 150 nodes, 75% of them belonging to the p2p network. Clearly, the number of answers decreases as the requested file becomes unpopular, reflecting the Zipf distribution of files. Despite some oscillations, the distance tends to increase. Average minimum distance Files Figure 5. Distance to find the file and # of answers per file request (50 nodes, 75% p2p). Average number of answers Files Figure 6. Distance to find the file and # of answers per file request (150 nodes, 75% p2p). Figures 7 and 8 show the medium number of connect messages received by each node. The nodes were ordered by the amount of messages received. The graphics show that the algorithm, which uses broadcasts indiscriminately, presents greater values for all nodes. The progressive connection method, used by the other three algorithms proposed, makes a controlled use of broadcasts and this resulted in less connect messagespernode. Itis also depicted that the curve of the algorithm is above the ones of the and the algorithms due to the random connection establishment phase, in which broadcast messages are sent with higher TTL values. Number of connect messages Nodes decreasingly ordered by # of received connects Figure 7. Connect messages (50 nodes, 75% p2p). Figures 9 and 10 show how the p2p configuration impacts the traffic volume each node receives. It is known that the traffic of ping messages in p2p networks is the

9 Number of connect messages Nodes decreasingly ordered by # of received connects Figure 8. Connect messages (150 nodes, 75% p2p). Number of ping messages Nodes decreasingly ordered by # of received pings Figure 9. Pings (50 nodes, 75% p2p). higher one [17]. The best way to cope with lack of resources in ad-hoc networks is to distribute the work among all nodes. If the network in question is supposed to be homogeneous, the more uniform the distribution is, the best performance we will achieve and the longer the network will last. This is exactly what random and regular algorithms do compared to the basic algorithm. On the other hand, if the network is heterogeneous, we should assign a higher load to nodes with higher capacity. The hybrid algorithm accomplishes this task by putting a bigger burden on nodes with a high qualifier, which means that masters get more ping and query messages (Figures 11 and 12). The three improved algorithms (, and ) profited from the symmetrical connections: only one node sends pings to check the connection; the other vertex answers with pongs and uses a timer to control the receiving of pings. This feature diminishes the overall number of messages in the network. From these results we can in- Number of query messages Nodes decreasingly ordered by # of received queries Figure 11. Queries (50 nodes, 75% p2p) Number of ping messages Nodes decreasingly ordered by # of received pings Figure 10. Pings (150 nodes, 75% p2p) Number of query messages Nodes decreasingly ordered by # of received queries Figure 12. Queries (150 nodes, 75% p2p). fer that nodes communicating through the algorithm

10 will have to spend more battery to sustain the network. This is an undesirable situation, since energy is a scarce resource in mobile ad-hoc devices. The excessive consume of battery may cause many nodes to go down, making it necessary to reorganize the network, which in turn causes the remaining nodes to spend even more energy. The algorithm was designed based on the smallworld concept. However, in the results presented it was not possible to detect any manifestation of the small-world characteristic. One possible reason for this is that the number of nodes should be much larger than the number of connections, as mentioned in Section 6.1.2, which was not the case. We intend to explore such a scenario in the future. Another explanation would be that, due to the dynamics of the network, the random connections go down before the nodes could benefit from them. 8. Conclusions and Future Work In this paper we studied the (re)configuration of p2p networks over ad-hoc networks. This combination is a natural solution in making data available to users anytime and anywhere. In the p2p paradigm, peers can act both as client and server, which increases fault-tolerance and data availability. In ad-hoc wireless networks, each node is able to establish a point-to-point communication to other nodes within its radio signal range, without the need of a fixed infrastructure. To promote an efficient sharing of information, we designed four algorithms that provide configuration, maintenance and reorganization of the p2p network over ad-hoc network. To analyze the performance of the algorithms we performed some simulations using the ns-2. The results obtained show that the and the algorithms had almost identical behavior despite the introduction of new features in the latter. They proved to be adequate to homogeneous networks. Focusing the heterogeneous scenarios, the algorithm had a performance similar to the and the algorithms in this different type of network. Finally, we showed that the algorithm, based on a traditional fixed-network solution, presented the worse overall performance regarding the effort made by each node to sustain its participation in the network. We will further investigate the performance and behavior of these algorithms under different scenarios. We are most interested in analyzing the effects of wireless coverage, density of nodes, energy, mobility and death/birth rate of nodes in ad-hoc and p2p layers. We are also developing a theoretical study on how the connectivity of nodes influences our metrics and how small-world properties could be better used in these systems. References [1] T. Camp, J. Boleng, and V. Davies. A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communications and Mobile Computing, 2(5): , [2] Freenet. [3] Gnutella. [4] T. Hong. Peer-to-Peer: Harnessing the Power of Disruptive Technologies, chapter 14 - Performance. O Reilly and Associates, [5] KazaA. [6] G. Kortuem, J. Schneider, and D. Preuitt. When Peer-to-Peer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks. In Proceedings 2001 International Conference on Peer-to-Peer Computing, August [7] R. Lienhart, M. Holliman, Y. Chen, I. Kozintsev, and M. Yeung. Improving Media Services on P2P Networks. IEEE Internet Computing, pages 73 77, Jan./Feb [8] S. Milgram. The Small-World Problem. Psychology Today, 1(1):60 67, [9] N. Minar. Distributed Systems Topologies. In The O Reilly P2P and Web Services Conf, [10] Morpheus. [11] Napster. [12] NS-2. [13] L. B. Oliveira, I. G. Siqueira, and A. A. Loureiro. Evaluation of Ad-hoc Routing Protocols under a Peer-to-Peer Application. In IEEE Wireless Communication and Networking Conference (to appear), [14] M. Papadopouli and S. H. A Performance Analysis of 7DS: A Peer-to-Peer Data Dissemination and Prefetching Tool for Mobile Users. In Advances in Wired and Wireless Communications. March [15] M. Papadopouli and H. Schulzrinne. Effects of Power Conservation, Wireless Coverage and Cooperation on Data Dissemination among Mobile Devices. In ACM SIGMOBILE Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc) 2001, October [16] C. Perkins, E. Royer, and S. Das. Ad-Hoc On-Demand Distance Vector (AODV) Routing. IETF Internet draft, draftietf-manet-aodv-11.txt, June [17] M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the Gnutella Network. IEEE Internet Computing Journal, 6(1), [18] E. M. Royer and C. K. Toh. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 2:46 55, April [19] R. Schollmeier and I. Gruber. Routing in Peer-to-peer and Mobile Ad Hoc Networks. A Comparison. In International Workshop on Peer-to-Peer Computing, May [20] SETI@Home. [21] R. Subramanian, L. e Katz. An Architecture for Building Self-Configurable Systems. In IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, August [22] G. K. Zipf. Human Behavior and the Principle of Least- Effort. Addison-Wesley, 1949.

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing

More information

Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines

Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Michael J Jipping Department of Computer Science Hope College Holland, MI 49423 jipping@cs.hope.edu Gary Lewandowski Department of Mathematics

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

Routing with Load Balancing in Wireless Ad hoc Networks

Routing with Load Balancing in Wireless Ad hoc Networks Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Gossiping using the Energy Map in Wireless Sensor Networks

Gossiping using the Energy Map in Wireless Sensor Networks Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison

Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison Routing in Mobile Ad Hoc and Peer-to-Peer Networks. A Comparison Rüdiger Schollmeier 1), Ingo Gruber 1) and Michael Finkenzeller 2) 1) Lehrstuhl für Kommunikationsnetze, Technische Universität München,

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

A Peer-to-peer Extension of Network-Enabled Server Systems

A Peer-to-peer Extension of Network-Enabled Server Systems A Peer-to-peer Extension of Network-Enabled Server Systems Eddy Caron 1, Frédéric Desprez 1, Cédric Tedeschi 1 Franck Petit 2 1 - GRAAL Project / LIP laboratory 2 - LaRIA laboratory E-Science 2005 - December

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications

A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications A Distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 2

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University

More information

Location-Aided Routing (LAR) in mobile ad hoc networks

Location-Aided Routing (LAR) in mobile ad hoc networks Wireless Networks 6 (2000) 307 321 307 Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

How To Create A P2P Network

How To Create A P2P Network Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models

Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Context-Aware Routing Method for P2P File Sharing Systems over MANET

Context-Aware Routing Method for P2P File Sharing Systems over MANET Context-Aware Routing Method for P2P File Sharing Systems over MANET Taoufik Yeferny Dept. of Computer Science Faculty of Sciences of Tunis MOSIC Research Group Tunis, Tunisia Taoufik.Yeferny@itsudparis.eu

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information