Manet: Routing and Quality of Service Metrics
|
|
- Egbert Pearson
- 8 years ago
- Views:
Transcription
1 Manet: Routing and Quality of Service Metrics Manet: Routing and Quality of Service Metrics Juhi Singla B.M.College of Engg. & Tech. (Sonepat) R.K. Gupta, Ritu Goyal, and Anuj Jain T.C.M. College of Engineering (Sonepat) ABSTRACT: A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. The rapidly changing and unpredictable nature of Mobile Ad-hoc Networks (MANET) pose a wide range of challenges like efficient routing, load distribution, congestion avoidance, energy consumption, etc. This paper deals with the optimization of multi hop routing using metaheuristic algorithm of shortest path using ACO and also the QoS of MANET has been discussed. Keywords: MANET, ACO, QoS 1. INTRODUCTION Ad Hoc means improvised or not organized which often has a negative meaning but the sense in this context is not negative but only describing the dynamic network situation. Ad hoc networks is the construction of temporary networks with no wires, no communication infrastructure and no administrative intervention required [4]. A MANET is an autonomous system of mobile nodes connected by wireless links. The ad-hoc networks are classified into two groups: single hop and multi hop networks. In single hop networks the nodes are within their R range and hence communicate with each other directly while in multi hop ad-hoc network nodes are willing to act as a routers and route or forward the traffic of other nodes. Developing support for routing is one of International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
2 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing in ad hoc networks interesting. irst, nodes in an ad hoc network are allowed to move in an uncontrolled manner. Such node mobility results in a highly dynamic network with rapid topological changes causing frequent route failures. A good routing protocol for this network environment has to dynamically adapt to the changing network topology. Second, the wireless channel provides much lower and more variable bandwidth than wired networks. The wireless channel working as a shared medium makes available bandwidth per node even lower. Third, nodes run on batteries which have limited energy supply. In order for nodes to stay and communicate for longer periods, it is desirable that a routing protocol be energy-efficient as well [7]. This also provides another reason why overheads must be kept low. Thus, routing protocols must meet the conflicting goals of dynamic adaptation and low overhead to deliver good overall performance. Optimization of routing is emerging challenge, a metaheuristic is an iterative master process or a set of algorithmic concepts that guides and modifies the operation of subordinate heuristics to efficiently produce high quality solutions. The main representatives of this computational paradigm are Genetic Algorithms (GAs), Evolution Strategies (ESs) and Evolutionary Programming (EP), which was developed independently of each other. The concept of Ant Algorithms was first introduced in [6] and since that time, it has been applied to both theoretical and practical optimization problems with great success. Ant algorithms are an iterative, probabilistic meta-heuristic for finding solutions to combinatorial optimization problems. (A) Mobile Ad hoc Network Ad hoc networks are classified according to their coverage area BAN (Body area Network) is strongly correlated with wearable computers and provides connectivity among the devices like earphones, microphones etc. Communication range is 1-2 m. PAN (Personal 34 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011
3 Manet: Routing and Quality of Service Metrics Area Network) connect mobile devices carried by users to other mobile and stationary devices. LANs (WLAN) hane a communication range typical of a single building or a cluster of buildings that is m. Number of active nodes is the other metric used to classify MANETs that is Ad hoc network as a Small Scale (that is 2-20 nodes), Moderate Scale ( nodes), Large Scale (100+ nodes) and a Very Large Scale (1000+ nodes). (B) Properties of MANETs Dynamic Topology: The link connectivity among the terminals of the network varies dynamically and unpredictably. There could be frequent disconnections among the nodes,this means that the topology is dynamic and routes that existed may not exist some time later due to the movement of the intermediate nodes. To alleviate this problem, the protocol should be resilient to topology changes. Bandwidth: MANETs have significantly lower bandwidth capacity in comparison with fixed networks. Current technologies suitable for the realization of MANETs are IEEE (b,a) with bandwidth upto 54 Mbps and Bluetooth (1 Mbps) the channel over which the terminals communicate is subjected to noise, fading and interference, and has less bandwidth than a wired network. Energy: MANETs have problem of energy conservation as all mobile nodes get their energy from batteries, which is a scarce resource. Security: The nodes and the information in MANETs are exposed to certain threats like denial of service attacks, eavesdropping, spoofing and denial of service attacks etc. Also mobility implies higher security risks than static operation because portable devices may be stolen or their traffic may insecurely cross wireless link Autonomous: No Centralized infrastructure is available. Each mobile node is a n autonomous node which may function both as a host as well as a router. International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
4 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain Distributed Operation: No centralized control is provided for the management of the network. All control is self configured among the nodes where each node acts as a relay. Multi hop Routing: or delivering the data packets from a source to its destination (not in the R range), the packets should be forwarded via one or more intermediate nodes where each node acts as a router. Light Weight Terminal: Mobile devices in MANET have a less CPU processing, low power storage and small memory size and hence they are light in weight. Routing: Routing is the task of directing data flow from source to destination and hence maximizing the network performance. Proactive routing uses periodic messages to distribute information about the current network topology. The aim is to have a valid route to each destination. Therefore the nodes remain always updated about the change in the topology [2]. Reactive routing work by computing the route only when it is needed. So, when a node has a packet to transmit, It first discovers the route to the destination and then sends out the message. Hybrid Routing combines the advantages of both proactive and reactive protocols example. Zone Routing Protocol (ZRP). In this, a network is divided into Zones. Within the Zone, Reactive routing protocols are used and the Inter-Zone messages must be routed via the Zone gateway. The key parameters that should be kept in mind while designing a routing protocol are as Effective routing: or successful discovery and delivery of the packet from source to destination some measures are taken into account. These are packets delivery ratio, percentage of optimal routes taken and average end to end delay. Congestion avoidance: The routing protocol should not congest a particular route /node thereby leading to packet drop or failure of node. 36 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011
5 Manet: Routing and Quality of Service Metrics Energy consumption: It must minimize the energy consumption of the individual nodes as in the case of laptops, PDA etc. Load balancing: Distributing the load to all possible nodes without overloading some specific nodes present in the optimal routes of communication. Mobility: It is the movement of a node out of or into the communication range of other nodes changes not only it's neighbor relationships with other nodes, but also all routes based on the relationships forperformance evaluation we use various mobility model. 2. META HEURISTIC A metaheuristic is an iterative master process or a set of algorithmic concepts that guides and modifies the operation of subordinate heuristics to efficiently produce high quality solutions. It may manipulate a complete (or incomplete) single solution or a collective solution at each iteration. The subordinate heuristic may be high or level procedures, or a simple local search, or just a construction method. (A) Stigmergic Learning and ACO Routing Stigmergy is a form of a distributed control based on indirect communication among agents which locally modify the environment and react to these modifications leading to a phase of global co-ordination of the agents actions. An example of stigmergic process is to find out the shortest path between their nests and food source by the ants. A volatile scent like chemical substance called pheromone is the stigmergic variable. The individual messages are passed between ants leading to a co-ordinated work control of ants without the presence of a centralized control system. Initially the ants spread out in all the directions in search of food. On returning back after finding the food ants mark the trail with the pheromones. These pheromones are dropped at regular interval to act as a trail[1]. Ants moving back and forth preferentially move towards areas of higher pheromone intensity. Shorter paths are covered quickly and hence have higher pheromone concentration as shown in ig 1. These shorter paths attract more and more ants. International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
6 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain igure 1: Routing by Ants (B) Routing Algorithms The challenges in MANETs are providing active network management and simply routing. The steps included in the algorithm are: (a) Node level Congestion Measurement : Every node calculates a Node Congestion Metric which gives an indication on the amount of congestion at the node. This metric varies between 0(Very high congestion) to 1(Least congestion). It is based on the buffer occupancy, channel load measurement and packet drop rate. (b) Route Discovery: irst the source checks for the existing routes. When no routes are known, It broadcasts the orward Request Ants which are propagated through the network till it reaches the destination. Then, the destination node sends the Backward Ants for every orward Request Ants that it receives. The source chooses the shorter path to the destination with the assumption that the same helps in reducing energy and time. 38 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011
7 Manet: Routing and Quality of Service Metrics (c) Calculation of Route Efficiency Metric: Whenever a node sends a packet, the packet has a metric value called the Route Efficiency Metric (REM). The source who originates the packet initially has its value 1 although it may be less than 1. When the packet is being forwarded/broadcasted, all the intermediate nodes multiply the REM with the individual Node Congestion Metrics. Then the REM can be defined as Route Efficiency Metric = (Node Congestion values of intermediate nodes from source to destination) The individual node congestion metric is simply the probability that a node can forward a packet successfully to the next hop. Node Congestion Metric is considered to be linear but it produces incorrect results, as high values of node congestion have the same impact on the overall congestion (like 0.1 or 0.005). Hence, the algorithm converts the linear weights of Node Congestion Metric to a non-linear weight using the equation New Node Congestion = (1 (1 Node Congestion)3) Due to non-linear scale, higher values of Node Congestion have a lesser impact. (d) Probabilistic Route Choosing Algorithm: In this initially the pheromone scents are calculated for every route to a particular destination and then probabilistically a route is chosen based on the Pheromone values. (e) Pheromone Count of Route = (REM)*L Where REM = Route Efficiency Metric L = Length of the Route Probability of Route= Pheromone Count of Route/ (Pheromone count of all routes to destination) Route Maintenance: In MANETs network topology changes frequently due to high and random mobility of nodes. To International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
8 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain 3. QOS find the goodness of the route, it is needed to update the pheromone level for the different routes. To accomplish this, when a destination node receives a packet, it probabilistically send a congestion update message, the REM value is updated and given by New REM value = α * (Old REM Value) + (1 α) *REM When located at a node i an ant k uses the p k ij = τ α ij k l N i 0 40 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011 τ α il if j N if j N pheromone trails to compute the probability of choosing j as the next node where N is the neighborhood of ant k when in node i. When the arc (i, j) is traversed, the pheromone value changes as follows: The United Nations Consultative Committee for τ ij τ ij + τ k International Telephony and Telegraphy (CCITT) Recommendation E.800 has defined QoS as: The collective effect of service performance which determines the degree of satisfaction of a user of the service. This is a widely accepted definition since it doesn't makes any reference to any minimum characteristics, such as Bandwidth or Delay, or mechanisms, such as Admission Control, SLA, Signaling Protocol. (A) IP QoS Network traffic Engineering has two approaches for achieving QoS which are complementary, designed for use in combination for different network contexts. These are ( a) Reservation-based Engineering and (b) Reservation-less Engineering. k i k i
9 Manet: Routing and Quality of Service Metrics In Reservation-based Engineering, network resources are apportioned according to an application s QoS request and subject to bandwidth management policy. This approach was used in ATM (Asynchronous Transfer Mode) and is today the method of achieving QoS in RSVP-IntServ. In Reservation-less Engineering on the other hand no reservation is done within the network. QoS is achieved by the addition of smart mechanism into the network such as Connection Admission Control (CAC), Policy Managers, Traffic Classes, Queuing Mechanisms. CAC controls which nodes can access the network and it will assure to a node that once it is granted access to the network, it will be served with the QoS parameters it is requesting. Policy Managers ensure that no node will violate the type of service it is pre-assigned. Traffic Classes, such as assured, controlled-load or best-effort services, differentiate the processing priority of data packets. Queuing mechanisms are responsible for dropping the packets with the lowest priority in the case of congestion or to provide explicit feedback to nodes in order to avoid congestion. (B) QoS Models for MANets igure 2: IPv4 Packet The QoS Model specifies the architecture which will enable us to offer services that operate better than the current "best effort" model that exists in MANets. This architecture should take into consideration the challenges of Mobile Ad Hoc Networks e.g. dynamic topology and time-varying link capacity. IntServ/RSVP model is not suitable for MANets due to the resource limitations in MANets. There are several factors which prohibit the use of that model over a MANet. 1) Huge storage and processing overhead for each mobile host, since they have to build and maintain such International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
10 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain information. Moreover the amount of state information increases proportionally with the number of flows, which is also a problem with the current QoS Internet, but which will be fortunately solved with the aggregation of state information on the core routers (DiffServ). 2) The RSVP reservation and maintenance process is a network consuming procedure. Thus RSVP signaling packets will grapple with the data packets for resources and more specifically for bandwidth. This happens because RSVP is an out-of-band signaling protocol. 3) In order to have a complete QoS Model mechanism such as Connection Admission Control (CAC), classification and scheduling must be provided. These mechanisms though require again a respectable amount of network resources which are usually not available in MANets. DiffServ on the other hand is a lightweight model for the interior routers since individual state flows are aggregated into set of flow as shown in ig. 3. This igure 3: In DiffServ Interior lows are Aggregated makes routing a lot more easily in the core of the network. Thus this model could be a potential model for MANets. In MANets though there is no clear definition of what is a core, ingress or egress router because of the dynamic topology of the network. This drawback would again take us back to the IntServ model where several separate flow states are maintained, causing a heavy storage cost in every node. Moreover the concept of the Service Level Agreement 42 International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011
11 Manet: Routing and Quality of Service Metrics (SLA), defined in Wire-based QoS models is not more applicable. SLA basically defines the contract between the customer (e.g. ISPs) and the clients. The charging model in MANets has still a long way to go and could be characterized as a gray area. In a completely ad-hoc topology where there is no concept of service provider and client and where there are only clients it would be quite difficult to innovate QoS, since there is no obligation from somebody to somebody else making QoS almost infeasible. lexible QoS Model for MANets (QMM), is the first QoS Model proposed for MANets in The idea of the paper is to combine knowledge from the solutions offered in the wire-based networks and apply them to a new QoS Model which will take into consideration the characteristics of MANets. The basic idea of that model is that it uses both the per-flow state property of IntServ and the service differentiation of DiffServ. In other words, this model proposes that highest priority is assigned per-flow provisioning and other priority classes are given per-class provisioning. This model is based on the assumption that not all packets in our network are actually seeking for highest priority because then this model would result in a similar model with IntServ where we have per-flow provisioning for all packets. The QMM hybrid model defines three types of nodes, exactly as in DiffServ ( a) ingress, (b) core and (c) egress as shown in ig. 4. The difference though is that in QMM the type of a node has nothing to do with its physical location in the network, since this wouldn't make any sense in a dynamic network topology. A node is characterized as ingress if it is transmitting data, core if it is forwarding data and egress if it is receiving data. igure 4: In the irst Scenario Nodes 2,3,6 Act as Interior (Core) Nodes and in the Second Scenario 2 Only Node 3 Act as a Core Node International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June
12 Juhi Singla, R.K. Gupta, Ritu Goyal, and Anuj Jain 4. CONCLUSION In this paper a routing algorithm for MANETs which was inspired by ideas from Swarm Intelligence, and more specifically by the framework of ACO. This proposed algorithm determines the shortest path from source to destination in an efficient way so as to reduce the end to end delay. The QoS models for Manet have also been discussed. In the future the simulations would be performed on the NS2 Simulator and the results would be compared with the AODV, DSR and other protocols. REERENCE [1] A C Jawahar, Ant Colony Optimization for Mobile Adhoc Networks pp-1 to 6, Department of Electrical Engineering, Rutgers. [2] Di Caro Gianni, Ducatdle rederick and Gambardella Luca Maria, Swarm Intelligence for Routing in Mobile Ad hoc Networks, 2005 IEEE. [3] Kwak Byung-Jae, Regular Member, Nah-Oak SONG, and Leonard E. Miller, Non Members, A StandardMeasure of Mobility for Evaluating Mobile Ad-hoc Network Performance, IEICE Trans.Commun., VOL. E86-B, No.11 November [4] Tarek Helmi ABD El-Nabi Ali Ahmed, A Dissertation on Modeling and Simulation of a Routing Protocol for Ad-hoc Networks Combining Queuing Network Analysis and Ant Colony Algorithms April [5] S. Radha and N. Ravindram, A New Solution to Improve the Link ailure Tolerance in Mobile Ad-hoc Networks Paper No. 165-B, IETE Journal of Research, 53, No. 4, July-August 2007, pp [6] M. Dorigo "Ant Colony Optimization" PHI Publications. [7] P. Mohapatra and S. Krishnamurthy, AD HOC NETWORKS Technologies and Protocols 2005 Springer Science + Business Media, Inc. [8] Demetrios Zeinalipour-Yazti, A Glance at Quality of Services in Mobile Ad-Hoc Networks, inal Research Report for CS260- Seminar in Mobile Ad Hoc Networks, all 2001, November 19, International Journal of Logic Based Intelligent Systems, Vol. 1, No. 1, Jan-June 2011
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationResearch Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationA Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationLoad Balancing of Ant Based Algorithm in MANET
ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) IJCST Vo l. 1, Is s u e 2, De ce m b e r 2010 Load Balancing of Ant Based Algorithm in MANET 1 Rajbhupinder Kaur, 2 Ranjit Singh Dhillon, 3 Harwinder Singh
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationAntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks
: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks Gianni Di Caro, Frederick Ducatelle and Luca Maria Gambardella Istituto Dalle Molle sull Intelligenza Artificiale (IDSIA) Galleria 2,
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationA Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationManagement of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationJournal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved.
EFFICIENT LOAD BALANCING USING ANT COLONY OPTIMIZATION MOHAMMAD H. NADIMI-SHAHRAKI, ELNAZ SHAFIGH FARD, FARAMARZ SAFI Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationA Novel Technique to Isolate and Detect Jamming Attack in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationA Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 200 3 A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks Shahab Kamali, Jaroslav Opatrny Department of Computer Science and Software Engineering,
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationA Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
More informationLoad Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationHosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University M.P.Indrasinghe@2004.ljmu.ac.uk,
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationInternet Quality of Service
Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:
More informationAdaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks
Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla
More informationNetwork management and QoS provisioning - QoS in the Internet
QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets
More informationQuality of Service for MANETs connected to the Internet
Quality of Service for MANETs connected to the Internet Andreas J. Kassler 1, ChenShanShan 2 1 Karlstad University, Computer Science Department, Universitetgatan 2, 65188 Karlstad, Sweden, kassler@ieee.org
More informationQUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES
QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES Satinder Assistant professor (Extn.), Govt. College for Women, Hisar, Haryana, (India) ABSTRACT A MANET
More informationDelay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationQuality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
More informationStudy of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationComprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
More informationOptimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC
Optimization of ACO for Congested Networks by Adopting Mechanisms of Flock CC M. S. Sneha 1,J.P.Ashwini, 2, H. A. Sanjay 3 and K. Chandra Sekaran 4 1 Department of ISE, Student, NMIT, Bengaluru, 5560 024,
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationAn Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
More informationA Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV
More informationRouting with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationCS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 QoS Why a New Service Model? Best effort clearly insufficient Some applications need more assurances from the network What is the basic
More informationReal-Time Traffic Support in Heterogeneous Mobile Networks
Real-Time Traffic Support in Heterogeneous Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara {suny, ebelding}@cs.ucsb.edu Xia Gao
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationTechnology Longowal, Punjab, India
An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science
More informationComparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Comparative Study of Delay-Oriented and Hybrid Load Balancing Routing Protocols in Mobile Ad
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationQuality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS. What s the Problem?
Quality of Service (QoS) EECS 122: Introduction to Computer Networks Resource Management and QoS The Internet s most contentious subject - Inside vs. Outside the Network (see P&D, pp. 519-520) Computer
More informationQuality of Service Support in Mobile ad-hoc IP Networks *
Quality of Service Support in Mobile ad-hoc IP Networks * Derya H. Cansever GTE Laboratories 40 Sylvan Road Waltham, MA 02454 Arnold M. Michelson GTE Government Systems 400 John Quincy Adams Road Taunton,
More informationSecurity and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
More informationPerformance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
More informationMOBILE INTELLIGENT SYSTEM (MIS) AND A MULTI-CRITERIA IN MPLS NETWORKS
MOBILE INTELLIGENT SYSTEM (MIS) AND A MULTI-CRITERIA IN MPLS NETWORKS Jawad OUBAHA, Ahmed HABBANI and Mohammed ELKOUTBI SI2M Laboratory, E.N.S.I.A.S, Mohammed V-Souissi University B.P. 713 Rabat, Morocco
More informationSimulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2
Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationINTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK
INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK Kruahnadeo Belerao M.E. student JSPM Imperial College Of Engg. Wagholi,Pune Vinod Wadane M.E. student JSPM Imperial College Of Engg. Wagholi,Pune ABSTRACT
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More informationImplementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2
Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2 1 Research Scholar, Department of Computer Science, Doaba Group of Colleges, Kharar, Punjab,
More informationReal-time apps and Quality of Service
Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting
More informationA Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6196-6201 A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs
More informationQoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)
QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees
More informationA Survey on Load Balancing Techniques Using ACO Algorithm
A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More information