Manet: Routing and Quality of Service Metrics

Size: px
Start display at page:

Download "Manet: Routing and Quality of Service Metrics"

Transcription

1 Manet: Routing and Quality of Service Metrics Manet: Routing and Quality of Service Metrics Juhi Singla B.M.College of Engg. & Tech. (Sonepat) R.K. Gupta, Ritu Goyal, and Anuj Jain T.C.M. College of Engineering (Sonepat) ABSTRACT: A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. The rapidly changing and unpredictable nature of Mobile Ad-hoc Networks (MANET) pose a wide range of challenges like efficient routing, load distribution, congestion avoidance, energy consumption, etc. This paper deals with the optimization of multi hop routing using metaheuristic algorithm of shortest path using ACO and also the QoS of MANET has been discussed. Keywords: MANET, ACO, QoS 1. INTRODUCTION Ad Hoc means improvised or not organized which often has a negative meaning but the sense in this context is not negative but only describing the dynamic network situation. Ad hoc networks is the construction of temporary networks with no wires, no communication infrastructure and no administrative intervention required [4]. A MANET is an autonomous system of mobile nodes connected by wireless links. The ad-hoc networks are classified into two groups: single hop and multi hop networks. In single hop networks the nodes are within their R range and hence communicate with each other directly while in multi hop ad-hoc network nodes are willing to act as a routers and route or forward the traffic of other nodes. Developing support for routing is one of International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

2 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing in ad hoc networks interesting. irst, nodes in an ad hoc network are allowed to move in an uncontrolled manner. Such node mobility results in a highly dynamic network with rapid topological changes causing frequent route failures. A good routing protocol for this network environment has to dynamically adapt to the changing network topology. Second, the wireless channel provides much lower and more variable bandwidth than wired networks. The wireless channel working as a shared medium makes available bandwidth per node even lower. Third, nodes run on batteries which have limited energy supply. In order for nodes to stay and communicate for longer periods, it is desirable that a routing protocol be energy-efficient as well [7]. This also provides another reason why overheads must be kept low. Thus, routing protocols must meet the conflicting goals of dynamic adaptation and low overhead to deliver good overall performance. Optimization of routing is emerging challenge, a metaheuristic is an iterative master process or a set of algorithmic concepts that guides and modifies the operation of subordinate heuristics to efficiently produce high quality solutions. The main representatives of this computational paradigm are Genetic Algorithms (GAs), Evolution Strategies (ESs) and Evolutionary Programming (EP), which was developed independently of each other. The concept of Ant Algorithms was first introduced in [6] and since that time, it has been applied to both theoretical and practical optimization problems with great success. Ant algorithms are an iterative, probabilistic meta-heuristic for finding solutions to combinatorial optimization problems. (A) Mobile Ad hoc Network Ad hoc networks are classified according to their coverage area BAN (Body area Network) is strongly correlated with wearable computers and provides connectivity among the devices like earphones, microphones etc. Communication range is 1-2 m. PAN (Personal 34 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011

3 Manet: Routing and Quality of Service Metrics Area Network) connect mobile devices carried by users to other mobile and stationary devices. LANs (WLAN) hane a communication range typical of a single building or a cluster of buildings that is m. Number of active nodes is the other metric used to classify MANETs that is Ad hoc network as a Small Scale (that is 2-20 nodes), Moderate Scale ( nodes), Large Scale (100+ nodes) and a Very Large Scale (1000+ nodes). (B) Properties of MANETs Dynamic Topology: The link connectivity among the terminals of the network varies dynamically and unpredictably. There could be frequent disconnections among the nodes,this means that the topology is dynamic and routes that existed may not exist some time later due to the movement of the intermediate nodes. To alleviate this problem, the protocol should be resilient to topology changes. Bandwidth: MANETs have significantly lower bandwidth capacity in comparison with fixed networks. Current technologies suitable for the realization of MANETs are IEEE (b,a) with bandwidth upto 54 Mbps and Bluetooth (1 Mbps) the channel over which the terminals communicate is subjected to noise, fading and interference, and has less bandwidth than a wired network. Energy: MANETs have problem of energy conservation as all mobile nodes get their energy from batteries, which is a scarce resource. Security: The nodes and the information in MANETs are exposed to certain threats like denial of service attacks, eavesdropping, spoofing and denial of service attacks etc. Also mobility implies higher security risks than static operation because portable devices may be stolen or their traffic may insecurely cross wireless link Autonomous: No Centralized infrastructure is available. Each mobile node is a n autonomous node which may function both as a host as well as a router. International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

4 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain Distributed Operation: No centralized control is provided for the management of the network. All control is self configured among the nodes where each node acts as a relay. Multi hop Routing: or delivering the data packets from a source to its destination (not in the R range), the packets should be forwarded via one or more intermediate nodes where each node acts as a router. Light Weight Terminal: Mobile devices in MANET have a less CPU processing, low power storage and small memory size and hence they are light in weight. Routing: Routing is the task of directing data flow from source to destination and hence maximizing the network performance. Proactive routing uses periodic messages to distribute information about the current network topology. The aim is to have a valid route to each destination. Therefore the nodes remain always updated about the change in the topology [2]. Reactive routing work by computing the route only when it is needed. So, when a node has a packet to transmit, It first discovers the route to the destination and then sends out the message. Hybrid Routing combines the advantages of both proactive and reactive protocols example. Zone Routing Protocol (ZRP). In this, a network is divided into Zones. Within the Zone, Reactive routing protocols are used and the Inter-Zone messages must be routed via the Zone gateway. The key parameters that should be kept in mind while designing a routing protocol are as Effective routing: or successful discovery and delivery of the packet from source to destination some measures are taken into account. These are packets delivery ratio, percentage of optimal routes taken and average end to end delay. Congestion avoidance: The routing protocol should not congest a particular route /node thereby leading to packet drop or failure of node. 36 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011

5 Manet: Routing and Quality of Service Metrics Energy consumption: It must minimize the energy consumption of the individual nodes as in the case of laptops, PDA etc. Load balancing: Distributing the load to all possible nodes without overloading some specific nodes present in the optimal routes of communication. Mobility: It is the movement of a node out of or into the communication range of other nodes changes not only it's neighbor relationships with other nodes, but also all routes based on the relationships forperformance evaluation we use various mobility model. 2. META HEURISTIC A metaheuristic is an iterative master process or a set of algorithmic concepts that guides and modifies the operation of subordinate heuristics to efficiently produce high quality solutions. It may manipulate a complete (or incomplete) single solution or a collective solution at each iteration. The subordinate heuristic may be high or level procedures, or a simple local search, or just a construction method. (A) Stigmergic Learning and ACO Routing Stigmergy is a form of a distributed control based on indirect communication among agents which locally modify the environment and react to these modifications leading to a phase of global co-ordination of the agents actions. An example of stigmergic process is to find out the shortest path between their nests and food source by the ants. A volatile scent like chemical substance called pheromone is the stigmergic variable. The individual messages are passed between ants leading to a co-ordinated work control of ants without the presence of a centralized control system. Initially the ants spread out in all the directions in search of food. On returning back after finding the food ants mark the trail with the pheromones. These pheromones are dropped at regular interval to act as a trail[1]. Ants moving back and forth preferentially move towards areas of higher pheromone intensity. Shorter paths are covered quickly and hence have higher pheromone concentration as shown in ig 1. These shorter paths attract more and more ants. International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

6 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain igure 1: Routing by Ants (B) Routing Algorithms The challenges in MANETs are providing active network management and simply routing. The steps included in the algorithm are: (a) Node level Congestion Measurement : Every node calculates a Node Congestion Metric which gives an indication on the amount of congestion at the node. This metric varies between 0(Very high congestion) to 1(Least congestion). It is based on the buffer occupancy, channel load measurement and packet drop rate. (b) Route Discovery: irst the source checks for the existing routes. When no routes are known, It broadcasts the orward Request Ants which are propagated through the network till it reaches the destination. Then, the destination node sends the Backward Ants for every orward Request Ants that it receives. The source chooses the shorter path to the destination with the assumption that the same helps in reducing energy and time. 38 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011

7 Manet: Routing and Quality of Service Metrics (c) Calculation of Route Efficiency Metric: Whenever a node sends a packet, the packet has a metric value called the Route Efficiency Metric (REM). The source who originates the packet initially has its value 1 although it may be less than 1. When the packet is being forwarded/broadcasted, all the intermediate nodes multiply the REM with the individual Node Congestion Metrics. Then the REM can be defined as Route Efficiency Metric = (Node Congestion values of intermediate nodes from source to destination) The individual node congestion metric is simply the probability that a node can forward a packet successfully to the next hop. Node Congestion Metric is considered to be linear but it produces incorrect results, as high values of node congestion have the same impact on the overall congestion (like 0.1 or 0.005). Hence, the algorithm converts the linear weights of Node Congestion Metric to a non-linear weight using the equation New Node Congestion = (1 (1 Node Congestion)3) Due to non-linear scale, higher values of Node Congestion have a lesser impact. (d) Probabilistic Route Choosing Algorithm: In this initially the pheromone scents are calculated for every route to a particular destination and then probabilistically a route is chosen based on the Pheromone values. (e) Pheromone Count of Route = (REM)*L Where REM = Route Efficiency Metric L = Length of the Route Probability of Route= Pheromone Count of Route/ (Pheromone count of all routes to destination) Route Maintenance: In MANETs network topology changes frequently due to high and random mobility of nodes. To International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

8 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain 3. QOS find the goodness of the route, it is needed to update the pheromone level for the different routes. To accomplish this, when a destination node receives a packet, it probabilistically send a congestion update message, the REM value is updated and given by New REM value = α * (Old REM Value) + (1 α) *REM When located at a node i an ant k uses the p k ij = τ α ij k l N i 0 40 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011 τ α il if j N if j N pheromone trails to compute the probability of choosing j as the next node where N is the neighborhood of ant k when in node i. When the arc (i, j) is traversed, the pheromone value changes as follows: The United Nations Consultative Committee for τ ij τ ij + τ k International Telephony and Telegraphy (CCITT) Recommendation E.800 has defined QoS as: The collective effect of service performance which determines the degree of satisfaction of a user of the service. This is a widely accepted definition since it doesn't makes any reference to any minimum characteristics, such as Bandwidth or Delay, or mechanisms, such as Admission Control, SLA, Signaling Protocol. (A) IP QoS Network traffic Engineering has two approaches for achieving QoS which are complementary, designed for use in combination for different network contexts. These are ( a) Reservation-based Engineering and (b) Reservation-less Engineering. k i k i

9 Manet: Routing and Quality of Service Metrics In Reservation-based Engineering, network resources are apportioned according to an application s QoS request and subject to bandwidth management policy. This approach was used in ATM (Asynchronous Transfer Mode) and is today the method of achieving QoS in RSVP-IntServ. In Reservation-less Engineering on the other hand no reservation is done within the network. QoS is achieved by the addition of smart mechanism into the network such as Connection Admission Control (CAC), Policy Managers, Traffic Classes, Queuing Mechanisms. CAC controls which nodes can access the network and it will assure to a node that once it is granted access to the network, it will be served with the QoS parameters it is requesting. Policy Managers ensure that no node will violate the type of service it is pre-assigned. Traffic Classes, such as assured, controlled-load or best-effort services, differentiate the processing priority of data packets. Queuing mechanisms are responsible for dropping the packets with the lowest priority in the case of congestion or to provide explicit feedback to nodes in order to avoid congestion. (B) QoS Models for MANets igure 2: IPv4 Packet The QoS Model specifies the architecture which will enable us to offer services that operate better than the current "best effort" model that exists in MANets. This architecture should take into consideration the challenges of Mobile Ad Hoc Networks e.g. dynamic topology and time-varying link capacity. IntServ/RSVP model is not suitable for MANets due to the resource limitations in MANets. There are several factors which prohibit the use of that model over a MANet. 1) Huge storage and processing overhead for each mobile host, since they have to build and maintain such International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

10 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain information. Moreover the amount of state information increases proportionally with the number of flows, which is also a problem with the current QoS Internet, but which will be fortunately solved with the aggregation of state information on the core routers (DiffServ). 2) The RSVP reservation and maintenance process is a network consuming procedure. Thus RSVP signaling packets will grapple with the data packets for resources and more specifically for bandwidth. This happens because RSVP is an out-of-band signaling protocol. 3) In order to have a complete QoS Model mechanism such as Connection Admission Control (CAC), classification and scheduling must be provided. These mechanisms though require again a respectable amount of network resources which are usually not available in MANets. DiffServ on the other hand is a lightweight model for the interior routers since individual state flows are aggregated into set of flow as shown in ig. 3. This igure 3: In DiffServ Interior lows are Aggregated makes routing a lot more easily in the core of the network. Thus this model could be a potential model for MANets. In MANets though there is no clear definition of what is a core, ingress or egress router because of the dynamic topology of the network. This drawback would again take us back to the IntServ model where several separate flow states are maintained, causing a heavy storage cost in every node. Moreover the concept of the Service Level Agreement 42 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011

11 Manet: Routing and Quality of Service Metrics (SLA), defined in Wire-based QoS models is not more applicable. SLA basically defines the contract between the customer (e.g. ISPs) and the clients. The charging model in MANets has still a long way to go and could be characterized as a gray area. In a completely ad-hoc topology where there is no concept of service provider and client and where there are only clients it would be quite difficult to innovate QoS, since there is no obligation from somebody to somebody else making QoS almost infeasible. lexible QoS Model for MANets (QMM), is the first QoS Model proposed for MANets in The idea of the paper is to combine knowledge from the solutions offered in the wire-based networks and apply them to a new QoS Model which will take into consideration the characteristics of MANets. The basic idea of that model is that it uses both the per-flow state property of IntServ and the service differentiation of DiffServ. In other words, this model proposes that highest priority is assigned per-flow provisioning and other priority classes are given per-class provisioning. This model is based on the assumption that not all packets in our network are actually seeking for highest priority because then this model would result in a similar model with IntServ where we have per-flow provisioning for all packets. The QMM hybrid model defines three types of nodes, exactly as in DiffServ ( a) ingress, (b) core and (c) egress as shown in ig. 4. The difference though is that in QMM the type of a node has nothing to do with its physical location in the network, since this wouldn't make any sense in a dynamic network topology. A node is characterized as ingress if it is transmitting data, core if it is forwarding data and egress if it is receiving data. igure 4: In the irst Scenario Nodes 2,3,6 Act as Interior (Core) Nodes and in the Second Scenario 2 Only Node 3 Act as a Core Node International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June

12 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain 4. CONCLUSION In this paper a routing algorithm for MANETs which was inspired by ideas from Swarm Intelligence, and more specifically by the framework of ACO. This proposed algorithm determines the shortest path from source to destination in an efficient way so as to reduce the end to end delay. The QoS models for Manet have also been discussed. In the future the simulations would be performed on the NS2 Simulator and the results would be compared with the AODV, DSR and other protocols. REERENCE [1] A C Jawahar, Ant Colony Optimization for Mobile Adhoc Networks pp-1 to 6, Department of Electrical Engineering, Rutgers. [2] Di Caro Gianni, Ducatdle rederick and Gambardella Luca Maria, Swarm Intelligence for Routing in Mobile Ad hoc Networks, 2005 IEEE. [3] Kwak Byung-Jae, Regular Member, Nah-Oak SONG, and Leonard E. Miller, Non Members, A StandardMeasure of Mobility for Evaluating Mobile Ad-hoc Network Performance, IEICE Trans.Commun., VOL. E86-B, No.11 November [4] Tarek Helmi ABD El-Nabi Ali Ahmed, A Dissertation on Modeling and Simulation of a Routing Protocol for Ad-hoc Networks Combining Queuing Network Analysis and Ant Colony Algorithms April [5] S. Radha and N. Ravindram, A New Solution to Improve the Link ailure Tolerance in Mobile Ad-hoc Networks Paper No. 165-B, IETE Journal of Research, 53, No. 4, July-August 2007, pp [6] M. Dorigo "Ant Colony Optimization" PHI Publications. [7] P. Mohapatra and S. Krishnamurthy, AD HOC NETWORKS Technologies and Protocols 2005 Springer Science + Business Media, Inc. [8] Demetrios Zeinalipour-Yazti, A Glance at Quality of Services in Mobile Ad-Hoc Networks, inal Research Report for CS260- Seminar in Mobile Ad Hoc Networks, all 2001, November 19, International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Load Balancing of Ant Based Algorithm in MANET

Load Balancing of Ant Based Algorithm in MANET ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) IJCST Vo l. 1, Is s u e 2, De ce m b e r 2010 Load Balancing of Ant Based Algorithm in MANET 1 Rajbhupinder Kaur, 2 Ranjit Singh Dhillon, 3 Harwinder Singh

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks : an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved.

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved. EFFICIENT LOAD BALANCING USING ANT COLONY OPTIMIZATION MOHAMMAD H. NADIMI-SHAHRAKI, ELNAZ SHAFIGH FARD, FARAMARZ SAFI Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

A Novel Technique to Isolate and Detect Jamming Attack in MANET

A Novel Technique to Isolate and Detect Jamming Attack in MANET International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks

A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 200 3 A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks Shahab Kamali, Jaroslav Opatrny Department of Computer Science and Software Engineering,

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Quality of Service for MANETs connected to the Internet

Quality of Service for MANETs connected to the Internet Quality of Service for MANETs connected to the Internet Andreas J. Kassler 1, ChenShanShan 2 1 Karlstad University, Computer Science Department, Universitetgatan 2, 65188 Karlstad, Sweden, kassler@ieee.org

More information

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES Satinder Assistant professor (Extn.), Govt. College for Women, Hisar, Haryana, (India) ABSTRACT A MANET

More information

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols

More information

Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC

Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC M. S. Sneha 1,J.P.Ashwini, 2, H. A. Sanjay 3 and K. Chandra Sekaran 4 1 Department of ISE, Student, NMIT, Bengaluru, 5560 024,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

Routing with Load Balancing in Wireless Ad hoc Networks

Routing with Load Balancing in Wireless Ad hoc Networks Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS CS640: Introduction to Computer Networks Aditya Akella Lecture 20 QoS Why a New Service Model? Best effort clearly insufficient Some applications need more assurances from the network What is the basic

More information

Real-Time Traffic Support in Heterogeneous Mobile Networks

Real-Time Traffic Support in Heterogeneous Mobile Networks Real-Time Traffic Support in Heterogeneous Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara {suny, ebelding}@cs.ucsb.edu Xia Gao

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Technology Longowal, Punjab, India

Technology Longowal, Punjab, India An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science

More information

Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks

Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Quality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS. What s the Problem?

Quality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS. What s the Problem? Quality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS The Internet s most contentious subject - Inside vs. Outside the Network (see P&D, pp. 519-520) Computer

More information

Quality of Service Support in Mobile ad-hoc IP Networks *

Quality of Service Support in Mobile ad-hoc IP Networks * Quality of Service Support in Mobile ad-hoc IP Networks * Derya H. Cansever GTE Laboratories 40 Sylvan Road Waltham, MA 02454 Arnold M. Michelson GTE Government Systems 400 John Quincy Adams Road Taunton,

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

MOBILE INTELLIGENT SYSTEM (MIS) AND A MULTI-CRITERIA IN MPLS NETWORKS

MOBILE INTELLIGENT SYSTEM (MIS) AND A MULTI-CRITERIA IN MPLS NETWORKS MOBILE INTELLIGENT SYSTEM (MIS) AND A MULTI-CRITERIA IN MPLS NETWORKS Jawad OUBAHA, Ahmed HABBANI and Mohammed ELKOUTBI SI2M Laboratory, E.N.S.I.A.S, Mohammed V-Souissi University B.P. 713 Rabat, Morocco

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK Kruahnadeo Belerao M.E. student JSPM Imperial College Of Engg. Wagholi,Pune Vinod Wadane M.E. student JSPM Imperial College Of Engg. Wagholi,Pune ABSTRACT

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,

More information

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6196-6201 A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs

More information

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ) QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees

More information

A Survey on Load Balancing Techniques Using ACO Algorithm

A Survey on Load Balancing Techniques Using ACO Algorithm A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information