Reliable Adaptive Lightweight Multicast Protocol
|
|
|
- Brittany Stokes
- 10 years ago
- Views:
Transcription
1 Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies Katia Obraczka UC Santa Cruz Sung-Ju Lee HP Labs Mario Gerla UCLA Abstract Typical applications of mobile ad hoc networks (MANET) require group-oriented services. Digital battlefields and disaster relief operations make data dissemination and teleconferences a key application domain. Network-supported multicast is hence critical for efficient any-to-many communications. However, very little work has been done on reliable transport multicast. We propose and evaluate Reliable Adaptive Lightweight Multicast (). The design choices of are motivated by lessons we learned from evaluating the performance of traditional wired reliable multicast transport protocols (in particular, ) in ad hoc networks. We argue that two components, reliability and congestion control, are essential in designing a reliable multicast transport protocol for MANETs. addresses both reliability and congestion control. It achieves reliability by guaranteeing data delivery to troubled receivers in a round-robin fashion. s send-and-wait congestion control uses NACK feedback to adjust to congestion experienced by receivers. We show through simulations that achieves perfect reliability while exhibiting low end-to-end delay and minimal control overhead compared against other protocols. I. INTRODUCTION An ad hoc network enables wireless communications without any fixed infrastructure or central administration. Each node communicates with each other through packet radios. Hence, every host acts as a packet forwarder as well as a source or a destination. Because of its ease of deployment, an ad hoc network is an attractive choice for scenarios where the fixed network infrastructure is non-existent (e.g., remote locations), unusable because it is insecure (e.g., covert military operations) or unavailable due to some catastrophic events (e.g., major earthquake). The types of scenarios targeted by MANETs make group-oriented services such as data dissemination and teleconferences a key application domain. Multicast communication is an efficient means of supporting group-oriented applications. This is especially true in mobile wireless environments where nodes are energy and bandwidth constrained. Because MANETs are particularly well suited for mission-critical applications, ad hoc network protocols must provide reliable and timely data delivery even in the presence of mobility and frequent outages. MANETs have been the subject of extensive research. Despite the fact that reliable multicasting is vital to the success of mission critical applications, surprisingly little work has been done in this area. One of the few exceptions is the Anonymous Gossip (AG) protocol [] that recovers from losses by having pairs of multicast members exchange information on messages they have received or lost. One potential problem with this protocol is the delay it takes for nodes to recover from losses. Reliable multicast for wired networks on the other hand, has been a very active area of research [2]. MAC and transport level protocols for wireless cellular networks have also been proposed [3], [4], [5]. One may consider applying these schemes to MANETs. We argue that the design choices underlying wired reliable multicast transport protocols are not adequate for MANETs. Ad hoc networking protocols must handle node mobility. In addition, MANETs are extremely sensitive to network load and congestion, even more so than in wired shared-medium networks because of the hidden terminal problem. Generating additional control message overhead without performing adequate congestion control will considerably degrade the performance. We propose the Reliable Adaptive Lightweight Multicast () transport protocol that favors reliability and congestion control over throughput. Applications that are willing to trade throughput for reliability include military convert operations and search and rescue missions. For example, an operation commander disseminating mission critical data to his troops in a covert operation is more interested in reliably delivering the commands rather than obtaining high throughput (assuming adequate throughput is obtained). In such a scenario, any data loss can be fatal to the success of the entire operation. is a reliable, rate-based, congestion controlled protocol that targets small group operation scenarios ranging from special military operations to civilian emergency rescue applications. When there is no packet loss, sends packets at the specified application sending rate. Once a loss is detected, recovers by initiating a modified sendand-wait procedure. Send-and-wait is performed with each multicast receiver that experiences losses, one at a time in a round-robin fashion. Once all receivers have up-to-date packets, reverts to the application sending rate. In our previous work [6], we assumed that the multicast sources know the receiver information ahead of time and was able to use a window-based congestion control approach. In this paper, we do not make such an assumption and hence use a send-andwait procedure. We start this study by evaluating how a wired reliable multicast protocol performs in MANETs. While we acknowledge that wired protocols were not designed for MANETs, studying the behavior of these protocols in various scenarios will give us insights into designing new protocols for MANETs. To this end, we evaluate the performance of the Scalable Reliable Multicast () protocol [7]. is one
2 of the early, wired reliable multicast protocols and can be considered representative of reliable multicast protocol behavior, as later developed protocols use common error control mechanisms similar to (e.g., negative acknowledgments, multicasting of NACKs and retransmitted data, NACK suppression and local recovery). was selected as we are particularly interested in protocols that rely exclusively on error recovery to achieve reliability. Our hypothesis is that, since MANETs are extremely sensitive to offered load, protocols that fall in this category will not perform well in MANETs. The remainder of this paper is organized as follows. The performance of in MANETs and the lessons learned from that study are presented in Section II. Section III introduces the protocol and evaluates its performance. Section IV concludes the paper Fig.. Packet delivery ratio as a function of traffic rate. II. IN MANETS We evaluate the performance of in ad hoc networks using simulation. For protocol details of, readers are referred to [7]. We compare against. is chosen because it provides basic multicast support without guaranteeing reliability. Therefore, any reliable multicast algorithm should demonstrate improvements over. We use QualNet [8] for our simulation. In our experiments, 5 nodes are placed randomly in a 5m 5m area. Constant bit rate traffic is generated by the application, with each data payload being 52 bytes. For specific parameters, we use the values specified in [7]. Packets are multicast by ODMRP (On-Demand Multicast Routing Protocol) [9] and unicast by AODV (Ad hoc On-Demand Distance Vector) [] with IEEE 82. DCF as the MAC protocol. The number of multicast sources is fixed at five while the number of receivers varies from to 4, depending on the scenarios. The buffer size at each node is 3 packets. The channel capacity is 2Mb/s. Propagation is modeled using a two-ray ground reflection model where free-space path loss is used for near sight and plane earth path loss is used for far sight. The maximum radio propagation range is 375 meters. When mobility is considered, the random waypoint model is used with zero pause time; thus, nodes are constantly moving. It is important to note that requires multicast sources to also be the multicast receiver. This is because REPAIR REQUEST packets are multicast to the group and thus sources are required to be group members to receive and respond to REPAIR REQUEST packets. Therefore, in all experiments, multicast sources are always a subset of the receiver set. We subject to a range of network characteristics, such as load, number of receivers and mobility. Due to space limitations, we only present a subset of results. For the experiment shown here, we have five multicast sources and ten multicast receivers. We vary the application driven data packet inter-departure time at each source from 5 ms to ms. The purpose of this study is to evaluate the impact of traffic rates on protocol reliability. A. Results and Observations We observe from Fig. that experiences sharp degradation as we decrease the inter-departure time below 5 ms and drops to approximately 3% packet delivery ratio under the highest load. The poor performance of stems from its attempts to recover dropped packets by injecting additional REPAIR REQUEST and REPAIR packets into the network without performing any congestion control. uncouples loss recovery from normal multicast operations. When loss recovery is performed, both retransmitted and new packets are sent at the same time, thus increasing network congestion. Surprisingly, obtains better data delivery than even though it does not provide reliability. achieves reasonable performance (above 9%) until the interdeparture time decreases to less than ms. This result suggests that in MANETs, reliability cannot be accomplished by simply retransmitting lost packets and at the same time still maintaining the same sending rate. Congestion control must accompany loss recovery. Loss recovery is needed to guarantee data delivery while congestion control prevents the network from being overloaded and thus resulting in poor throughput performance. We also learned from this study that error recovery must not incur too much overhead. Multicasting retransmission requests and lost data may not be the best approach; it introduces significant overhead, and multicast loss correlation in MANETs is not high enough to warrant the extra overhead, especially when nodes are mobile. Another drawback of multicasting retransmission requests is the additional overhead needed by the underlying multicast routing protocol. This is because each transport layer receiver must become a routing layer source and therefore establish its own multicast source tree or mesh. What is worse is the fact that if the retransmission requests do not occur frequently, most multicast routing protocol will time out the multicast structure and thus the source tree or mesh will have to be rediscovered, which is an expensive operation.
3 III. RELIABLE ADAPTIVE LIGHTWEIGHT MULTICAST A. Protocol Operation Each multicast source maintains a Receiver List. When a source receives a NACK from a node that is not in the Receiver List, the node is added to the list. Nodes are removed from the list when the source receives an ACK from them. In addition, the source keeps track of the end-to-end latency between itself and each receiver that sent NACKs through a timestamp. The source initially multicasts data packets at the rate specified by the application and continues to do so until a NACK is received. Upon reception of a NACK, the source adds the NACK sender to the Receiver List and enters the loss recovery phase. The source initiates the loss recovery by selecting a receiver from the Receiver List to reliably transmit to. We call this node a feedback receiver. The source multicasts a new packet or retransmits the lost packet requested by the feedback receiver. The packet header includes information instructing the feedback receiver to reply via unicast with an ACK indicating that all packets are successfully received or a NACK with the packet sequence number informing that the source needs to retransmit the specified packet. All other receivers process the packet without replying to the source. The goal of unicasting ACKs/NACKs instead of multicasting is to reduce control overhead and thus congestion and contention. Multicasting ACKs/NACKs would incur the overhead of the underlying routing protocol to flood the entire network with query packets to discover the members. There are a few protocols that do not flood to achieve multicast. Such protocols however, rely on unicast routing protocols that require proactive maintenance and therefore would incur additional overhead. Although unicasting NACKs also results in a flood search to locate the node, the overhead is less since only the destination replies. Unicasting NACKs also speeds up the loss recovery phase compared with multicasting since multicasting often relies on suppression techniques, which delays loss recovery. When there are lost packets, the feedback receiver sends a NACK to the source to request the lost packets one at a time until it has all up-do-date packets (i.e., send-and-wait). The design philosophy behind retransmitting one packet at a time is to slow down the transmission of the source when congestion is detected. Note that because the source multicasts retransmitted packets, all group members will receive them. Since only the feedback receiver replies to the source, the ACK/NACK implosion problem is avoided. Moreover, to reduce the response overhead, NACK transmissions are rate limited to no more than once every κ seconds (κ value is five in our simulations). By allowing only the feedback receiver to respond to the source, we avoid the inaccuracy of feedback suppression timers. This is particularly advantageous in a mobile environment where the majority of suppression techniques will fail since they often rely on distances and end-to-end delay measurements. Such measurements are often in flux when mobility exists and are ineffective in suppressing feedback. Has packets to send TX No packet to send Fig. 2. Receive NACK (add receiver to the list) Receive ACK (remove feedback receiver from the list, list empty, has packets to send) Has packet to send IDLE Receive NACK (add receiver to the list) Receive ACK (remove feedback receiver from the list, list not empty, choose next feedback receiver) RETX Receive ACK (remove feedback receiver from the list, list empty, no packet to send) state transition diagram at the source. Timeout Receive NACK from the feedback receiver Duplicate packets are discarded by the receivers. Note that retransmitted packets are multicast to the group since other receivers may also be missing these packets. The expectation is that as the source visits other receivers, those receivers would already have recovered the lost packets previously retransmitted by the source and thus no further retransmissions are required. Once the feedback receiver obtains all the packets, it unicasts an ACK to the source. Upon reception of the ACK, the source removes the node from the Receiver List, chooses a new feedback receiver in a round robin fashion, and repeats this process until the Receiver List is empty. Feedback receiver selection is not restricted to the round robin approach, although we do so here for simplicity. Other alternatives include selecting the feedback receiver based on common loss packets to reduce the number of retransmissions and oldest packet lost to limit latency. When the Receiver List is empty, the source reverts to the application sending rate. If, however, the source does not receive a NACK or ACK from the feedback receiver after the timeout (determined by the measured end-to-end delay from the source to the feedback receiver via NACKs), the source backs off and tries again up to a maximum number of times. If the source still does not hear from the feedback receiver after the maximum number of retransmissions, it removes the node from the Receiver List and moves on to the next node in the list. The removed receiver may later re-synchronize with the source with the normal NACK mechanism. The round-robin send-and-wait does not require retransmissions of the same lost packets multiple times to each receiver. In the best-case scenario, lost packets are retransmitted only once by the source since retransmissions are multicasted. For instance, if a set of receivers lost the same packet, it is retransmitted only once assuming the retransmitted packet is received by all the receivers. In the worst-case scenario, each receiver experiences different packet losses. In this case, all lost packets must be retransmitted to each receiver. Remember also that when loss recovery mode is entered, the source first sends a new packet instead of retransmitting the lost packet if there are any new packets in its buffer. Fig. 2 depicts state transition graph. Note that a node can unicast a NACK to the source also when no feedback receiver is specified in the packet (i.e., indicating that the
4 2 TABLE I PERCENTAGE OF TIME SPENT IN LOSS RECOVERY MODE BY Interval (ms) 5 Percentage Fig. 3. in operation. source is not in loss recovery mode). Fig. 3 shows the example of operation. Node is the source and nodes 2, 5, 6 and 7 are the multicast receivers. Node begins by multicasting packets at the application sending rate. Assume that after some duration, nodes 6 and 7 detect packet losses and each transmits a NACK to node. Upon receiving NACKs, node adds nodes 6 and 7 to its Receiver List. Node then selects a node from the list, say node 6 as the feedback receiver, and multicasts a new packet (if any) or retransmits the requested lost packet. This data packet will instruct node 6 to respond to the source. All other receivers, including node 7, are prohibited from sending any feedback, thus avoiding the feedback implosion. Node waits for either node 6 to reply or a timeout to occur. If a NACK is received from node 6, node continues to multicast the lost packet indicated in the NACK. If a timeout occurs, the packet is retransmitted after a backoff. When an ACK is received, node removes node 6 from the Receiver List and chooses node 7 as the next feedback receiver to perform loss recovery. It is important to note that retransmitted packets are multicast. If node 7 missed the same packets as node 6 and node 7 received them when they were retransmitted, node 7 does not need to request retransmission of those packets. Upon receipt of an ACK from node 7, node removes node 7 from the list. Since the Receiver List is now empty, node reverts to the original application sending rate. B. Results and Analysis We compare the performance of with that of and. Simulation configurations and parameters are the same as described in Section II. The performance metrics we use are packet delivery ratio, control overhead, and end-toend delay. Packet delivery ratio measures the effectiveness and reliability of a protocol. Control overhead is defined as the ratio between the total number of data and control packets transmitted by the routing and transport layer protocols and the number of data packets received by the multicast receivers. It is used to assess protocol efficiency. End-to-end delay measures data packet latency from the source to the destination and evaluates the protocol s timeliness. Due to space limitations, we show only the subset of results that are of interest. ) Traffic Rate: We start by examining the performance of under varying traffic rate. We point out that the application sending rate under is the rate uses when it is not in loss recovery mode. Under loss recovery/congestion control mode, abandons the application sending rate in favor of a send-and-wait approach. We see from Fig. 4(a) that achieves % packet delivery ratio for all traffic rates. As the application rate increases and thus more packet losses occur due to congestion, slows down the transmission rate by entering loss recovery/congestion control mode with the send-and-wait approach. Table I shows the percentage of simulation time that is used for loss recovery by. At a rate of 2 packets per second, spends.2% of the simulation time in loss recovery. At such a low traffic rate, packet losses are infrequent. As the traffic rate increases, we see that the percentage of time spends in loss recovery increases and up to 2% for the rate of packets per second. Fig. 4(b) shows that is comparable to and is superior to in control overhead. The latency of matches with for the low and medium data rates and improves upon under high rates, as shown in Fig. 4(c). Fig. 4(d) reveals that approaches only 2, packets sent while for and, the number of packets sent directly relates to the application sending rate. Here, we witness s congestion control mechanism at work; the higher the application sending rate, the more adjusts. 2) Mobility: We turn our attention to the mobility experiment. Fig. 5(a) shows that still obtains a packet delivery ratio of % in all of the mobility speed we examined. outperforms both and. In all other metrics of interests, is comparable to that of (not shown due to space constraints). 3) Sensitivity to Random Errors: In a wireless network, random errors are common (e.g., external radio interference, jamming, etc). These errors cause packet losses that are not related to congestion. still recovers from such losses. Nevertheless, as is based on a TCP-like scheme that interprets losses as an indication of congestion, it is important to investigate the impact of random errors on performance. Experiments on mixed wired/wireless networks [3] have shown performance degradation with packet loss rates as low as %, because of large operating TCP window. Packet losses cause drastic window reduction and performance degradation. On the other hand, the operational window in is W =(send-and-wait). Random losses have little effect on its performance as confirmed in Fig. 5(b). We note that a 4% random loss rate (at.e-5 since data size is 52 bytes) has negligible impact on delay. Even at 4% packet loss rate, the delay remains within a reasonable range, showing the protocol robustness to random errors and losses. 4) vs. Multiple Unicast TCP Sessions: Our simulation results indicate that attains reliability while maintaining control overhead that is comparable to. In
5 Control Overhead End-to-End Delay (sec) Number of Data Packets Sent (a) PDR. (b) Overhead. (c) Delay. (d) Data sent. Fig. 4. Traffic rate experiments End-to-End Delay (sec) ms ms ms ms 5ms Number of Data Packets Received 5 5 TCP e+.e-8.e-6.e-4 5 Mobility Speed (m/s) Bit Error Rate (a) PDR. (b) Delay. (c) Data Received. Fig. 5. More simulation results. order to consider as a viable reliable multicast transport protocol, it must also show superiority when compared with multiple TCP unicast streams. We revisit the traffic rate experiments and configure individual TCP unicast sessions to duplicate the behavior of multicast. Since there are five sources and ten receivers, each source will run a TCP unicast session with each of the nine other receivers. and multiple TCP unicast sessions are run separately. We see from Fig. 5(c) that achieves better throughout than TCP. receives approximately 24% more data packets than multiple unicast TCP. TCP guarantees reliable delivery, so the packet delivery ratio is not shown. Note that the number of multicast receivers in this experiment is ten. We expect to further outperform TCP as the number of receivers increases. IV. CONCLUDING REMARKS We proposed Reliable Adaptive Lightweight Multicast () protocol for ad hoc networks. The design principles behind were motivated by our experience evaluating the performance of in MANET environments. We learned that in MANETs, reliable delivery cannot be achieved by error control alone; congestion control is fundamental for reliability. is a transport protocol that provides both error recovery and congestion control. It achieves reliability by guaranteeing data delivery to one multicast member at a time in a round-robin fashion. uses send-and-wait approach for congestion control. This not only ensures that nodes receive the lost packets, but also that the sources are self-clocked (a latcp) not to send packets faster than they receive ACKs when congestion is experienced. Simulation results showed that performs well in diverse ad hoc network scenarios. It achieved perfect reliability while yielding low control overhead and latency compared with and. REFERENCES [] R. Chandra, V. Ramasubramanian, and K. Birman, Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks, in Proceedings of the IEEE ICDCS, Apr., pp [2] K. Obraczka, Multicast transport mechanisms: A survey and taxonomy, IEEE Commun. Mag., vol. 36, no., pp. 94 2, Jan [3] H. Balakrishnan, S. Seshan, and R. Katz, Improving reliable transport and handoff performance in cellular wireless networks, ACM/Baltzer Wireless Networks, vol., no. 4, pp , Dec [4] K. Brown and S. Singh, Relm: Reliable multicast for mobile networks, Computer Communications, vol. 2, no. 6, pp. 379, Oct [5] L. Rizzo and L. Vicisano, RMDP: an FEC-based reliable multicast protocol for wireless environments, ACM Mobile Computing and Communications Review, vol. 2, no. 2, pp. 23 3, Apr [6] K. Tang, K. Obraczka, S.-J. Lee, and M. Gerla, A reliable, congestioncontrolled multicast transport protocol in multimedia multi-hop networks, in Proceedings of the IEEE WPMC, Oct. 2. [7] S. Floyd, V. Jacobson, S. McCanne, C. Liu, and L. Zhang, A reliable multicast framework for lightweight sessions and application-level framing, IEEE/ACM Trans. Networking, vol. 5, no. 6, pp , Dec [8] QualNet. [Online]. Available: [9] S.-J. Lee, W. Su, and M. Gerla, On-demand multicast routing protocol in multihop wireless mobile networks, ACM/Kluwer Mobile Networks and Applications, vol. 7, no. 6, pp , Dec. 2. [] C. Perkins and E. Royer, Ad-hoc on demand distance vector routing, in Proceedings of the IEEE WMCSA, Feb. 999, pp. 9.
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios
Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Thomas Kunz Systems and Computer Engineering Carleton University Abstract Multicasting is intended for group-oriented computing.
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic
An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany [email protected] Keywords: IEEE
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks
A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks Thomas D. Dyer Computer Science Division The Univ. of Texas at San Antonio San Antonio, TX 8249 [email protected]
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols
Vol. 7, No., 200 Performance Evaluation of Unicast and Broadcast Mobile Ad-hoc Networks Routing Protocols Sumon Kumar Debnath, Foez Ahmed 2, and Nayeema Islam 3 Dept. of Computer Science and Telecommunication
CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks
: Routing in Mobile Ad-hoc Cognitive Radio Networks Angela Sara Cacciapuoti, Cosimo Calcagno, Marcello Caleffi Department of Biomedical, Electronics and Telecommunications Engineering University of Naples
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management
Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student
