{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen
|
|
|
- Eleanore Carr
- 10 years ago
- Views:
Transcription
1 On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, Lili Qiu, Department of Computer Science, The Univ of Texas at Austin, Andrew Whinston, Dept. IROM, The Univ. of Texas at Austin, 1. INTRODUCTION The convenience of wireless networking and lightweight handheld devices has led to a large-scale adoption of wireless technologies. Corporations, universities, hospitals, homes, and public places are deploying these networks at a remarkable rate. Even many cities, such as Buffalo (MN), Ripon (CA), Philadelphia (PA), and Portland (OR), have deployed or are planning to deploy city-wide wireless networks. A single-hop wireless network (e.g., current hot-spots) has limited wireless coverage. To enable a large-scale wireless network, wireless mesh networks (WMNs) (e.g., [1, 8, 11]) arise as a promising cost-effective solution that provides high network coverage and low infrastructure cost. In a wireless mesh network, a few Internet transmit access points (ITAPs), serving as gateways to the Internet, are deployed across the neighborhood. Wireless nodes (e.g., houses) are equipped with low-cost antennas, and serve as routers to send traffic for both itself and its neighbors. In this way, a multihop wireless network is formed among wireless nodes to cooperatively route traffic to the Internet through the ITAPs. Such a multihop structure dramatically reduces the number of ITAPs, which is a major cost in deployment. The promise of wireless mesh networks has attracted lots of research work in the area, ranging from designing MAC protocols (e.g., [7]) to developing routing protocols and routing metrics (e.g., [3, ]), to studying interactions with TCP (e.g., [5, 6]), to controlling topology via power control (e.g., [9]), channel assignment (e.g., [10]), and directional antennas (e.g., [2]). In addition to network technologies, another major factor that determines the success of wireless mesh networks is whether there exist viable business models. There is limited research on this problem. In wireless mesh networks, wireless nodes are required to forward traffic for both itself and its neighbors. If the nodes are controlled by self-interested users, they may not efficiently share their capacity to route traffic for other nodes. Such possibility undermines the performance and feasibility of wireless mesh networks. Therefore effective pricing mechanisms need to be developed before the mesh technologies are commercialized. Motivated by the observations, we develop two pricing mechanisms for non-cooperative wireless mesh networks: a centralized pricing mechanism and a decentralized one. In the centralized pricing mechanism, the service provider needs to monitor and price the traffic originated from every node, while the decentralized scheme leaves the traffic monitoring and pricing to each router. We describe algorithms a service provider uses to efficiently place the ITAPs, and determine the prices. We evaluate the profitability and overall efficiency of the wireless mesh network under the centralized and decentralized pricing mechanisms. As a comparison, we also analyze an alternative structure based on a single-hop wireless network. In such a network, each user can directly communicate with an ITAP, and does not rely on other users for its communication. On the other hand, the singlehop wireless network requires more Internet access points to be deployed, thereby increasing the infrastructure cost. Our analysis has important practical implications to wireless service providers and the future of wireless mesh technologies. The rest of the paper is organized as follow. In Section 2, we present our models, and develop pricing mechanisms for mesh networks. In Section 3, we describe our evaluation methodology, and present results for realistic mesh networks. Finally we conclude in Section. 2. DEMAND MODEL AND PRICING MECHANISMS There is a collection of geographically distributed houses (indexed as i = 1, 2,, N) with potential traffic demands for Internet accesses. Let α it denote the amount of Internet traffic each
2 house i intends to generate (also called intended demands) at time t, and D it be network bandwidth house i obtains (also called the actual demand) at time t. Note that D it α it. V it (D it ) and P it (D it ) be non-decreasing functions of D it that represent house i s value for the bandwidth and the price it is charged at time t, respectively. We assume that the utility of a house i follows u it (D it, P it ) = V it (D it, α it ) P it (D it ). We further assume that the value function V it is increasing and concave with respect to D it. Without loss of generality, we assume that 2 V it D it α it > 0, which indicates that house i values the actual demand increment more at a higher intended demand α it. Usage-based pricing and fixed pricing are two commonly used charging models. In this paper, we focus on usage-based pricing for the following reasons. First, the usage-based charging is a popular charging model. It also discourages wasting network resources. Second, the fixed pricing gives ISPs less control in regulating users (e.g., in the worst case all the demands are routed through a single user, from whom the ISP can charge). As part of our future work, we plan to directly compare the performance under both charging models. In our analysis, we focus on linear pricing schemes (i.e. P it (D it ) = p it D it ), because it is one of the simplest usage-based pricing schemes, and users can easily estimate their bills based on their network usage. Below we introduce both the centralized and decentralized pricing mechanisms, and illustrate the pricing strategy using a simple chain topology with only two houses (see figure 1). House 1 directly connects to ITAP 0, but house 2 can only connect to house 1 and use house 1 as a relay for Internet access. ITAP 0 is placed by a profit maximizing service provider. For ease of demonstration, we use the value function V it = α it D it 1 2 D2 it, where i {1, 2}. We assume that α it s are independently drawn from a distribution function F (α) in the range of [a, b], where a > 1b. E(α) and var(α) are the mean and variance of α 2 its, respectively. To evaluate different pricing schemes, we compare the expected profit (EΠ), and the overall value of the Internet service EV E(V 1 ) + E(V 2 ). ITAP 0 House 1 House 2 Comm Range FIGURE 1. A linear topology with 2 houses. Lemma 1. Given unit price p it, house i s demand D it = α it p it if α it p it, and 0 otherwise Centralized pricing mechanism. Dynamically changing price: Suppose both houses subscribe to the service provider, and house 1 agrees to forward traffic for house 2. The profit-maximizing service provider charges a unit price p cen t for both houses. The price changes according to the realization of α 1t and α 2t to maximize the service provider s expected profit Π t at time t. That is, p cen t = argmax pt Π t = argmax pt {p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen t = α 1t+α 2t. The service provider s expected profit EΠ cen = (Eα)2 + var(α) and the expected overall value of the network 2 EV cen = 3(Eα)2 + 7var(α). 8 This version of the centralized pricing scheme dynamically changes price based on the changing intended traffic demands. To implement such a pricing mechanism, the service provide is required to monitor both the intended demand α it s and the traffic demands D it s from all the users. Such a fine-grained traffic monitoring is expensive and impractical.
3 One fixed price: If the ISP cannot obtain the information about the real time demand characteristics α it s or it has to agree upon a fixed unit price when the customers subscribe, it would choose the one that maximizes its expected profit EΠ fix. That is, p fix = argmax p p {E [D 1t(p)] + E [D 2t(p)]}. Proposition 2. The optimal fixed price p fix = 1 2 Eα, the ISP s expected profit EΠfix = 1 2 (Eα)2, and the expected overall value of the service EV fix = 3(Eα)2 + var(α). To implement a fixed centralized price, the service provider does not need to know the dynamically changing α it. Only the distribution of α it s is required. In addition, customers prefer a fixed price to an unpredictable price. However, the profit is lower than that of the dynamically changing prices for the same demand level α it because the service provider cannot adjust the price based on a particular realization of (uncertain) demand. However, the overall value is generally higher when using a fix price scheme. This indicates that the service provider s pricing power may hurt the overall benefit a WMN generates Decentralized pricing mechanism. In such a pricing mechanism, we allow each relay node to determine its own price for routing traffic. This way, the relay node can increase (decrease) the routing price to reduce (increase) the routing traffic when it itself has a large (small) demand to send. However, such a pricing mechanism allows the relays some positive profit and reduce the service provider s potential profitability. In the example of figure 1, to decide the optimal price for ITAP0, p 0t, the service provider needs to first figure out the pricing strategy house 1 uses to make profit from house 2. Given the price p 0t and house 2 s demand function (α 2t p 2t ) +, House 1 s pricing strategy p 1t(p 0t ) = argmax p1t (p 1t p 0t ) (α 2t p 2t ) +. Lemma 2. House 1 s optimal pricing strategy p 1t = α 2t+p 0t 2 if α 2t p 0t and p 1t > α 2t otherwise. Hence, the profit maximizing problem for ITAP0 is: p dec 0t = argmax p0t Π dec t = argmax p0t p 0t { (α1t p 0t ) + + (α 2t p 1t) +} Proposition 3. The ISP s optimal price p dec 0t = 1α 3 1t + 1α 6 2t, the expected profit EΠ = 3 8 (Eα) var(α) and the expected overall value EV = 2 32 (Eα) var(α). Meanwhile, the house expect to collect Eπ 1 = 9 16 (Eα) var(α) profit by serving as a router. 1 The decentralized pricing scheme requires all nodes in the network (including both the ITAPs and the houses) to constantly monitor the dynamic changing demand of their neighbors. Different from the first version of centralized scheme, in this case an ITAP only needs to monitor the load on its incoming link, and do not need to distinguish and verify how much traffic is originated from its neighbors and how much traffic is relayed by its neighbors for other nodes. Hence, such a coarsegrained traffic monitoring incurs a significantly lower cost, As a tradeoff, part of the profit will be taken away by the routers. Comparisons of Proposition 1-3 shows that the decentralized pricing scheme yields the least value because both ITAP 0 and house 1 can exert pricing power to control the overall network traffic. However, the decentralized pricing scheme has the potential to yield higher profit than the fix price scheme if the variance is large enough Placement of ITAP. If ITAP 0 can be moved from the current location to the place in between the two houses, then both houses can directly communicate with it. This becomes a traditional single hop wireless network. Based on the fact that the service provider aims to maximize profit, we can show that different ITAP placement will not change the profit under the first two pricing schemes. However, both the profit and the customer value increase under the decentralized pricing
4 scheme. This is because the placement of ITAP0 changes how traffic is routed in the network, and hence changes the routers pricing power. This example demonstrates that the placement of ITAPs is especially important to the profit and efficiency of the decentralized pricing scheme. This motivates us to focus on analyzing the decentralized pricing scheme in the following section. 3. EVALUATION METHODOLOGY AND RESULTS In this section, we first describe our evaluation methodology, and then present our evaluation results and explain the intuition behind them Evaluation Methodology. We evaluate the efficiency and profitability of different pricing mechanisms as follow. We randomly place houses in a region of size R R. There is a wireless link between two houses if and only if their distance is within the wireless communication range (CR). Given a neighborhood layout, finding the optimal placement of ITAPs (i.e., the smallest number of ITAPs that serve the houses) is an NP-hard problem, which means that there is no polynomial algorithm that optimizes ITAP locations unless P = NP. To achieve efficiency and low computational cost, we determine the location of ITAPs using the following greedy algorithm. In the first iteration, we compute how many houses can be served if we place an ITAP at each of possible locations, and select the one that results in the largest number of served houses. Then in the next iteration, we pick the one that in conjunction with the already chosen ITAP that results in the largest number of served houses. We iterate until all the houses are served. We consider a house is served by an ITAP if it is within HC hops away from the ITAP, where HC is an input parameter specifying the maximum allowed hop count (i.e., the number of links a house traverses before reaching the ITAP). After placing the ITAPs, each house uses the closest ITAP in terms of the number of hop count to access the Internet. The exact route a house uses towards the ITAP is based on the shortest hop count, which is found using Dijkstra s algorithm. The motivation of limiting the hop count between a house and an ITAP and for routing traffic along the path with the smallest hop-count is that wireless network throughput tends to decrease fast with an increasing hop count. Based on the path, we then decide the real time price p it each router i uses if the traffic is sent through it. A router chooses a price such that it maximizes the aggregate profit of routing the traffic for all its children. That is, p it = argmax pit (p it p parent ) j {children of i} D jt(p it ). Similarly each ITAP chooses a price to maximize its aggregate profit except that the price p parent = 0. ( Proposition. Given p parent, the optimal price for each router i, p it = 1 A it 2 B it + p parent ), where A i and B i are defined as A i α jt j S i and B 2 n j n i i 1 j S. In the expression, n i 2 n j n i i and n j denote the length of node i and j s routing path and S i is the set of node j whose routing path [ include router i and α jt < Bit B it 2 n i n j Bit A + B it 2 n i n jpparent ]. 2 n i n j To measure the profitability of the decentralized pricing scheme, we mainly focus on the following three measures: (1) the expected revenue for the { service provider, which is calculated as } the aggregate revenue all the ITAPs collect (EΠ E k {IT AP s} [p k D k ] ); (2) the expected aggregate customer valuation of the WMN ( i {Houses} EV i); (3) the expected number of ITAPs to be placed, which directly reflects the installation cost of the WMN. In our evaluation, we vary the following parameters: (1) N: the number of houses; (2) HC: the maximum allowed hop count; (3) R R: the size of neighborhood.
5 3.2. Evaluation Results. We first examine the overall profit as we vary the unit cost of installing an ITAP (c) and the maximum allowed hops (HC). The overall profit is defined as the service provider s expected revenue minus the aggregate cost of installing the ITAPs. As shown in Figure (2), as the unit cost of installing ITAPs increases, the expected overall profit decreases. Its reduction rate is smaller when the number of maximal allowed hop count is larger. This is as what we would expect, since increasing the maximal allowed hop count decreases the number of required ITAPs and hence reduce the installation cost. In addition, the figure also shows that the decrease in the installation cost can overcome the revenue loss of increasing the allowed hops, making the single hop structure suboptimal in some circumstance. This result demonstrates that the mesh technology is cost effectiveness EProfit c HC=1 HC=2 HC=3 HC= HC=5 FIGURE 2. Expected profit as the unit cost of installing an ITAP and maximum allowed number of hops change (R = 70, N = 20, and α U[3, ]) Next we study the impact of the region size R, which in turn changes network density (N/R 2 ). In our evaluation, the number of houses is fixed to be 35. Figures 3 (a)-(c) summarize the results. As shown in Figure 3(a), the service providers revenue first decreases and then increases as R increases when HC 2. This trend can be explained as follows. When R is small, every node can easily connect to an ITAP without using many routers. As R initially increases, more nodes need to go through multihop paths in order to reach ITAPs, which makes profit be taken away by the intermediate relay nodes. As R continues to increase, the mesh network becomes disconnected, and at least one ITAP is required in each disconnected component. So more houses are directly connected with an ITAP, which reduces the likelihood of intermediate relay nodes taking away profit. This is also evident from figure 3(b), which shows that the expected number of ITAPs increases as the density decreases. Meanwhile, the total welfare decreases first and then increase when HC 2. Finally we fix the density of houses (defined as N/R 2 ) and increase the number of houses. Figures (a)-(c) show the change of profitability, the expected number of ITAPs, and customer value, respectively. Since the number of houses varies, we use revenue/house, the number of ITAPs/house, and customer value/house to measure the profitability, infrastructure cost, and efficiency. These measures give us a good idea about the ability of the service provider to make profit from its users and the users expected efficiency loss due to the decentralized pricing. As the figures show, all the measures decreases as HC increases. This suggests that there is a tradeoff between the profitability (efficiency as well) and the cost saving under decentralized pricing scheme. In all the three figures, we cannot find significant change of profit/house, welfare/house and expected number of ITAPs as the number of houses changes. This indicates that network density is a more important factor than the number of houses that determines profitability and efficiency in a WMN.
6 Expected revenue R HC=1 HC=2 HC=3 HC= HC=5 Expected number of ITAPs R HC=1 HC=2 HC=3 HC= HC=5 Expected aggregate customer value R HC=1 HC=2 HC=3 HC= HC=5 (a)expected revenue (b)expected number of ITAPs (c) Expected customer value FIGURE 3. Varying the network density, where N = 35, CR = 15, and α U[3, ]. Expected revenue per house 3. N=20 3 N=25 N= N=35 N= HC Expected number of ITAPs per house HC N=20 N=25 N=30 N=35 N=0 Expected customer value per house N=20 N=25 N=30 N=35 N= HC (a)expected revenue/house (b)expected number of ITAPs/house (c) Expected customer value/house FIGURE. Varying the number of houses, where CR = 15,N/R 2 = 1, and α U[3, ] CONCLUSION In this paper, we study the potential pricing schemes for implementing emerging wireless mesh networks in a non-cooperative network. We propose several pricing schemes, and analyze their efficiency and profitability. We also evaluate a dynamic decentralized pricing scheme under varying network configurations. Our results show that the efficiency and profitability is sensitive to network density and the maximum number of allowed hop count. REFERENCES [1] b community network list. [2] R. R. Choudhury and N. H. Vaidya. Impact of directional antennas on ad hoc routing. In Proc. of 8th International Conference on Personal Wireless Communication (PWC), September [3] D. D. Couto, D. Aguayo, J. Bicket, and R. Morris. A high-throughput path metric for multi-hop wireless routing. In Proc. of ACM MOBICOM 2003, Sept [] R. Draves, J. Padhye, and B. Zill. Routing in multi-radio, multi-hop wireless mesh networks. In Proc. of ACM MOBICOM, Sept. - Oct [5] M. Gerla, R. Bagrodia, L. Zhang, K. Tang, and L. Wang. TCP over wireless multi-hop protocols: Simulation and experiments. In Proc. of 1999 IEEE International Conference on Communications (ICC), Jun [6] G. Holland and N. Vaidya. Analysis of TCP performance over mobile ad hoc networks. In Proc. of ACM MOBI- COM, [7] Y. Liu and E. Knightly. Opportunistic fair scheduling over multiple wireless channels. In Proc. of IEEE INFO- COM, [8] Self-organizing neighborhood wireless mesh networks. [9] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar. Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the compow protocol. In Proc. of European Wireless Conference, [10] A. Raniwala, K. Gopalan, and T. Chiueh. Centralized algorithms for multi-channel wireless mesh networks. In Proc. of ACM Mobile Computing and Communications Review (MC2R), April 200. [11] MIT Roofnet.
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Routing Analysis in Wireless Mesh Network with Bandwidth Allocation
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-2, Issue-3, February 213 Routing Analysis in Wireless Mesh Network with Bandwidth Allocation T.S. Starlin, D.
Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network
Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network K.G.S. VENKATESAN 1 Associate Professor, Dept. of CSE, Bharath University, Chennai 1 ABSTRACT: Mesh
A survey on Wireless Mesh Networks
A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im [email protected] 2007.10.15. Contents Introduction to WMNs Network architecture Critical design
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool
1 Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool Rafael De T. Valle 1, Diego Passos 2, Célio Albuquerque 2, Débora C. Muchaluat Saade 1 Abstract This paper
A Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks
Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Estimation of Interference in Wi-Fi Networks
Estimation of Interference in Wi-Fi Networks Prajakta D. Patil 1, M. M. Wankhade 2 Student, E & TC, Sinhgad College of Engineering, Pune, India 1 Professor, E & TC, Sinhgad College of Engineering, Pune,
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: [email protected] Prithwish Basu and Saikat Guha
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENGES
WIRELESS MESH NETWORKS: OPPORTUNITIES AND CHALLENES Mihail L. Sichitiu Dept. of Electrical and Computer Engineering North Carolina State University Raleigh, NC 27695, USA email:[email protected] Abstract
Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways
Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement
Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka,
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks
Analysis of Minimum-Energy Path-Preserving Graphs for Ad-hoc Wireless Networks Mahmuda Ahmed, Mehrab Shariar, Shobnom Zerin and Ashikur Rahman Department of Computer Science and Engineering Bangladesh
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Architecture and Algorithms for an IEEE 802.11-Based Multi-Channel Wireless Mesh Network
Architecture and Algorithms for an IEEE 8.11-Based Multi-Channel Wireless Mesh Network Ashish Raniwala Tzi-cker Chiueh Computer Science Department, Stony Brook University, Stony Brook, NY 11794-44 Email:
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks
Optimal Monitoring in Multi-Channel Multi-Radio Wireless Mesh Networks Dong-Hoon Shin and Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani
Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,
Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks
246 Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks Whoi Jin Jung, Jae Yong Lee and Byung Chul Kim Dept. of Info. Comm. Engineering, Chungnam National University, Korea
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Wireless Mesh Networks: WMN Overview, WMN Architecture
2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,
NEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
Performance analysis and simulation in wireless mesh networks
Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Quality of Service Routing in Ad-Hoc Networks Using OLSR
Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre [email protected] Thomas Kunz Carleton University [email protected] Louise Lamont Communications Research
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
Multihop Wireless Networks
Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: [email protected] Outline
