ACO and PSO Algorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks

Size: px
Start display at page:

Download "ACO and PSO Algorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks"

Transcription

1 2012 International Conference on Networks and Information (ICNI 2012) IPCSIT vol. 57 (2012) (2012) IACSIT Press, Sinapore DOI: /IPCSIT.2012.V57.02 ACO and PSO Alorithms Applied to Gateway Placement Optimization in Wireless Mesh Networks Dac-Nhuon Le 1, Nhu Gia Nuyen 2, Nuyen Dan Le 1, Nhia Huu Dinh 3 and Vinh Tron Le 4 1 Faculty of Information Technoloy, Haiphon University, Vietnam 2 Duytan University, Danan, Vietnam 3 School of Graduate Studies, Vietnam National University, Vietnam 4 Hanoi University of Science, Vietnam National University Abstract. In this paper, we study the challenin problem of optimizin ateway placement for throuhput in Wireless Mesh Networks and propose a novel alorithm based on Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) for it. A ateway placement alorithm was proposed based on ACO, we enerate the locations of ateway randomly and independently then calculate the probability and pheromone values of ants will choose to o from current ateway i to next client. After each iteration, the pheromone values are updated by all the number of ants that have reached to the destination successfully and found the optimal solution. Our alorithm was proposed based on PSO, we calculate the fitness value of each scheme and update them step by step with the best method to quickly find the optimal. Numerical results show that the proposed alorithm has achieved much better than previous studies. Keywords: Wireless Mesh Networks, Gateway Placement, Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO). 1. Introduction A wireless mesh network (WMN) is a communication network made up of radio nodes oranized in a mesh topoloy, which often consists of mesh clients, mesh routers and ateways [1]. The mesh clients are often laptops, cell phones and other wireless devices, which are connected to the Internet throuh the mesh routers. The mesh routers forward traffic to and from the ateways which connected to the Internet. The coverae area of the radio nodes workin as a sinle network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes workin in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no loner operate, the rest of the nodes can still communicate with each other, directly or throuh one or more intermediate nodes. Wireless mesh networks can be implemented with various wireless technoloy includin , , cellular technoloies or combinations of more than one type. Fi.1. A typical WMN 8

2 A wireless mesh network has some features which are similar to wireless ad-hoc network. It is often assumed that all nodes in a wireless mesh network are immobile but this is not necessary. The mesh routers may be hihly mobile and are not limited to power, memory, calculatin ability and operate as intellient switchin devices. Fi. 1 presents an example of a WMN. In recent years, the optimizin WMN problem is interested in many researches. However it still remains open [1]. In there, ateway placement is the most interested problem in optimizin WMN. There are some analoous research results in wired or cellular networks. However, all the above investiation has been focused on network connectivity of WMNs by deployin the minimum number of backbone nodes [2]. Throuhput is one of the most important parameters that affect the quality of service of WMN. So in this paper, we will improve a ateway placement alorithm to optimize throuhput for WMNs. A similar problem was studied by Pin Zhou, Xudon Wan, B. S. Mano and Ramesh Rao in [2], however, their scheme was not updated step by step, and the locations of ateways were determined sequentially, so the location of previously-placed ateways affects the location of those placed later. Constructin computation model to calculate the throuhput of WMNs is very necessary, but it is not simple to build. There are many computation models built in [3-8], but all of them, except [8], are not suitable for calculatin throuhput of WMNs. In this paper, we use the computation model in [2], in which TDMA schedulin is assumed to coordinate packet transmissions in mesh clients, mesh routers, and ateways. The rest of this paper is oranized as follows. Section 2 presents the computation model and briefly introduces the main idea of MTW-based ateway placement proposed in [2]. Section 3 presents our new alorithm for ateway placement in optimizin WMN based on ACO and PSO. Section 4 presents our simulation and analysis results, and finally, section 5 concludes this paper. 2. MTW-based Gateway Placement In this section, we first present the computation model and briefly introduce the main idea of MTWbased ateway placement proposed in [2] 2.1. Computation Model Network Topoloy The computation model presented in [2] brins out a typical WMN topoloy for Internet accessin as follows and is illustrated in Fi. 2. Router with ateway function Router without ateway function. Client Fi.2. Network topoloy of an WMN infrastructure with ateways This topoloy has N c mesh clients which are assumed to be distributed on a square R, N r routers, and N ateways with the constraint of 1 N N r N c. Accordin to [9] R is partitioned evenly into N r cells R, and a mesh router is placed in the centre of each cell. In each cell, mesh clients are connected to the mesh router like a star topoloy and are not communicated with each other directly. Data transmission is carried out amon mesh clients, which are equivalent such that they always have the same amount of packets to send or receive durin a certain time, while the mesh routers find the best route and forward data to its destination. All traffic is assumed to o throuh ateways. Each mesh router determines its nearest ateway to relay packets to or from that. If there is more than one nearest ateways, the router will load its traffic to all its nearest ateways by a round robin. A mesh client is said to be associated with a ateway if its connected 9

3 router is associated with the ateway. Thus, traffic load of a mesh client will also be shared by all its potentially associated ateways. There are some definitions of communications which will be frequently used: Local communications: it is referred as the communications between a mesh router and a mesh client; Backbone communications: it is referred as the communications between two mesh routers, which includes the communications between a ateway and a mesh router; Downlink communications: it is referred as the communications from a ateway to a mesh client, in which a data packet is first relayed amon mesh routers in backbone communications and is then sent by a mesh router to one of its connected mesh clients; Uplink communications: it is referred as the communications from a mesh client to a ateway, in which a data packet is sent in the exact reverse direction as described in the downlink communications Transmission Model Each mesh router is often equipped with two virtual radio interfaces over one physical radio interface, in which one transmittin at W 1 bits/s for backbone communications and the other transmittin at W 2 bits/s for local communications. Each mesh client transmits W 2 bits/s in local communications. It is assumed that W 1 and W 2 are orthoonal so that local communications and backbone communications do not influence each other. Moreover, mesh routers or mesh clients can receive packets from only one sender at a time. Transmission and reception can occur in either time-division duplex (TDD) or frequency division duplex (FDD), dependin on how the physical and MAC layers are implemented Throuhput The computation model proposed in [2] introduces two criterions to evaluate the performance of ateway placement alorithms: the total of throuhput and the minimal throuhput of each client. In this paper, we also use these criterions to evaluate the performance of our alorithm. Problem 1: Optimal ateway placement for maximizin areate throuhput of WMNs, i.e., in the above WMN model, iven N c, N r, N, W 1, W 2 and specific clients distribution, routers distribution, transmission, schedulin and routin protocols, N ateways are chosen amon N r mesh routers such that, N c TH(, i N ) (1) is maximized, where TH(i,N ) denotes the per client throuhput of the i th mesh client when i= 1 N ateways are deployed. Problem 2: Optimal ateway placement for maximizin the worst case of per client throuhput in the WMN, i.e., in the above WMN model, iven N c, N r, N, W 1, W 2 and specific clients distribution, routers distribution, transmission, schedulin and routin protocols, N ateways are chosen amon N r mesh routers such that, N c min TH( i, N ) (2) is maximized. i= Sharin Efficiency of Gateways IntD is defined as Interferin Distance of Gateways. If distance of two ateways less than IntD, they interfere with each other. Interferin ateways have to share the same wireless channel in the backbone communications. The alorithm to calculate the sharin efficiency of ateways is presented as follows. 1) Constructin the table of non-overlappin interferin roups arraned in descendin order of the number of elements in the roup. 2) Assinin percentae value for each ateway from the top to the last row in the above table. In the first step, any two elements of each roup that interfere with each other, and a roup appearin later must have at least one ateway which does not belon to the previous roups. The procedure that calculates percentae value for the ateways is described as follows: Assin value of 100% for all the ateways. For the top row to the last row of the table in the first step k=1/the number of ateways in current roup. 10

4 For the first ateway to the last ateway in current roup If percentae value > k then push into subroup1 Else push into subroup2. End for. 1-sum of all the percentae value in subroup2 P= the number of the ateways in subroup1 Assin value of P for all ateways in subroup1. End for. The final computin value is stored in G eff (k), k=1..n Throuhput Computation Throuhput of the i th mesh client when N ateways are deployed, denoted as TH(i,N ), is calculated as follow: { } ( ) 1( ) 2() W W TH i, N = min TH i, N, TH i, (3) i= 1... Nc Here, TH W1 (i, N ) is defined as the throuhput of the i th mesh client in backbone communications and TH W2 (i) is defined as the throuhput of i th mesh client in local communications. Because W 1 and W 2 are orthoonal, so we can compute TH W1 (i, N ) and TH W2 (i) separately. Note that TH W2 (i) is independent of N in WMN model and if a mesh client is connected directly to a ateway, its throuhput is decided only by the per-client throuhput in local communications. TH W1 (i, N ) is computed as follows: TH W1 (, i N ) = k = all theassociated ateways withthemeshrouter R N ( ) TH '( k) Here, N () is the number of ateways associated with the mesh router R. A ateway is associated with a router if the distance between them is less than or equal the radius of that ateway. The computation of the radius of ateway is proposed in sub-section TH (k) is the throuhput per client that the k th ateway can uarantee for all its associated mesh clients in backbone communications. Geff ( k) cw 1 1 (5) TH '( k) = ( N ( l) N '( l) N ( l)) c l = all associated routers th with the k ateway hop Here c 1 W 1 is the throuhput that the k th ateway can uarantee in backbone communications, N c (l) is the number of clients associated with the mesh l th router. N hop (l) is the actual time slot that the R l -connected mesh client uses to transmit data to the ateway. N hop ()=N hop (), if N hop () < SRD; N hop ()=SRD, if N hop () SRD; (6) Here, N hop () is the number of hops from the mesh client to the ateway. SRD is defined as Slot Reuse cw 2 2 Distance. Next, TH W2 (i) is computed simply as follows: THW () i =, i = 1.. N 2 c (7). Here, c 2 W 2 CRF Nc ( ) is the throuhput that R can uarantee for all associated mesh clients. CRF is defined as Cell Reuse Factor The oriinal MTW-based Gateway Placement In this alorithm, a traffic-flow weiht, denoted as MTW(), is calculated iteratively on the mesh router R, =1..N r. Each time, the router with the hihest weiht will be chosen to place a ateway. The weiht computation is adaptive to the followin factors: 1. The number of mesh routers and the number of ateways. 2. Traffic demands from mesh clients. 3. The location of existin ateways in the network. 4. The interference from existin ateways. (4) 11

5 Nr First of all, this alorithm proposes a formula to compute the ateway radius: R = round( ) (8) 2 N Assumin all mesh clients are similar in WMN model, then local traffic demand on each mesh router, denoted as D(), =1..N r, represented by the number of mesh clients connected to R. MTW() is calculated with D() and R as follows: MTW()=( R+1) D() + R (traffic demand on all 1-hop neihbors of R ) + (R-1) (traffic demand on all 2-hop neihbors of R ) +(R-2) (traffic demand on all 3-hop neihbors of R ) + Place the first ateway on the router with hihest MTW(). If more than one ateways are requested, readust D(), =1..N r with R as follows: set the value 0 for all routers within (R -1) hops away from R (includin R ) and reduce to half for ateways which are R hops away from R. Re-calculate MTW() with the new D(), and perform the followin procedure. 1. Choose the router with the hihest weiht as potential location for ateway placement, namely R. 2. Re-construct the table of non-overlappin interfere roups with R and previous ateways. 3. Compute the sharin efficiency for R. 4. MTW () = MTW() G eff ()MTW (). If MTW () is still larer than the second hihest weiht, then place the ateway in the location. Otherwise, repeat the above steps from 1 to 5 until obtainin the location 3. Optimizin Gateway Placement in WMN usin ACO and PSO 3.1. Apply ACO alorithm to Gateway Placement Problem The ACO alorithm is oriinated from ant behavior in the food searchin. When an ant travels throuh paths, from nest food location, it drops pheromone. Accordin to the pheromone concentration the other ants choose appropriate path. The paths with the reatest pheromone concentration are the shortest ways to the food. The optimization alorithm can be developed from such ant behavior. The first ACO alorithm was the Ant System [10], and after then, other implementations of the alorithm have been developed [11-12]. In our case the pheromone matrix is enerated with matrix elements that represent a location for ant movement, and in the same time it is possible receiver location. Assume that the WMN model, presented in Section II-1, is divided into N cells and numbered from left to riht and from top to bottom. In this paper, we use inteer encodin to express an element of matrix A m*n (where m is the number of ateways, n is number of client). a i will then receive a random inteer enerated correlatively. The pseudo code of the procedure for each element (1) Determine the location of ateways. (2) Compute the throuhput achieved. The ant population is randomly enerated (50 ants) and each ant is associated to one matrix location (node). Location of ants is an inteer, randomly enerated, correspondin to the interval of [0, N-1]. The next node (location) is selected accordin to the probability with which ant k will choose to o from current ateway i to next client is calculated by the followin formula: p k i = α β τ i η i α β τi ηi k l Ni (9) k In which, τ i is the pheromone content of the path from ateway i to client, N i is the neihbourhood includes only locations that have not been visited by ant k when it is at ateway i, η i is the desirability of client, and it depends of optimization oal so it can be our cost function. The influence of the pheromone concentration to the probability value is presented by the constant α, while constant β do the same for the desirability. These constants are determined empirically and our values are α=1, β=10. The ants deposit pheromone on the locations they visited accordin to the relation. τ = τ +Δ τ (10) new current k 12

6 where k Δ τ is the amount of pheromone that ant k exudes to the client when it is oin from ateway i to client. This additional amount of pheromone is defined by k 1 Δ τ = (11) f Where f is the cost function of the client is computed by the formula (3). The pheromone evaporates durin time and diminishes if there are no new additions. The pheromone evaporation is applied to all locations as follows: new ( 1 ) ( 0 1) τ = ρ τ < ρ (12) The value of ρ is selected empirically, what is in our case ρ= Apply PSO alorithm to Gateway Placement Problem Particle Swarm Optimization (PSO) was invented by Kennedy and Eberhart [15-16] while attemptin to simulate the choreoraphed, raceful motion of swarms of birds as part of a socio conitive study investiatin the notion of collective intellience in bioloical populations. There are three common types of expressin an element: encodin as a real number, an inteer and a binary. In this paper, we use inteer encodin to express an element. An element is a K-dimensional vector (K is the number of ateways), where each of its component is an inteer correspondin to the position to be located in the WMN. Specifically, ateways are denoted by { 1,, k }, in which if the th element is {a 1,, a k} then a i would correspond to the ateway i, and its value will be a random inteer enerated correlatively. Assume that the WMN model, presented in Section 2.1, is divided into N cells and numbered from left to riht and from top to bottom. a i will then receive the value in the rane of [0..(N-1)]. The initial population is enerated with P elements (P is a desinated parameter). Each element is a K- dimensional vector (K is the number of ateways) that each component is an inteer, randomly enerated, correspondin to the interval of [0,N-1]. Fitness value of th element is calculated by the followin formula: F = 1 N c i= 1 1 TH (, i K) In which, N c is the number of clients, K is the number of ateways, TH(i,K) is computed by the formula (3). Elements in each eneration are updated accordin to formula (14) and (15) described below. In which present[] and v[] are respectively the th element in the current eneration and its speed. In the context of the current problem, present[] and v[] are K-dimensional vectors. v[] = v[] + c1 * rand() * (pbest[] - present[]) + c2 * rand() * (best[] - present[]) (14) present[] = present [] + v[] (15) Since PSO is a stochastic process, we must define the conditions for stoppin the alorithm. The alorithm will stop after G enerations (G is a desin parameter) or when the values of Best and pbest are unmodified. Our results have been published in [13-14]. 4. Numerical Results and Discussion Accordin to numeric results in [2], the MTW-based Gateway Placement Alorithm is better than three ateway placement alorithms: Random Placement (RDP), Busiest Router Placement (BRP), and Reular Placement (RGP). Therefore in this paper we only compare our alorithm with MTW-based ateway placement alorithm. We study two experiments. In the first experiment we assume N c =200, N r =36, l=1000m, i.e. there are 200 mesh clients distributed in a square reion of 1000m x 1000m; the square is split evenly into 36 small square cells and a mesh router is placed in the centre of each cell. Concurrently, we assume CRF = 4, SRD=3, IntD=2, the backbone bandwidth is 20Mbps and the local bandwidth is 10Mbps. The second experiment is (13) 13

7 similar to the first one, but in which N c =400, N r =64. The local traffic demand of each mesh router in all experiments is enerated randomly. In each experiment, we optimize the ateway placement problem by maximum one of two parameters: the total throuhput of all mesh clients, denoted as ACO_Sum, PSO_Sum, and the minimal throuhput of each mesh client, denoted as ACO_Min, PSO Min. Then we compare our results with the results achieved by MTW-based ateway placement alorithm. Firstly, we compare the areate throuhput and the worst case throuhput achieved by each alorithm, as shown in Fi. 3 and Fi. 4. (a) (b) (a) (b) Our alorithm based on ACO Our alorithm based on PSO Fi. 3. The comparison of the areate throuhput (a) and the worst case of per client throuhput (b) in the first experiment (a) (b) (a) (b) Our alorithm based on ACO Our alorithm based on PSO Fi. 4. The comparison of the areate throuhput (a) and the worst case of per client throuhput (b) in the second experiment We find that the results achieved by our alorithm are better than the results achieved by MTWP alorithm in all experiments. Next, we easily realize the fact that when the number of ateways increase, the throuhput miht not be better. So when desinin the WMN, it is necessary to choice the number of ateways suitably to maximum the throuhput of WMN and reduces the cost. Final, we compare throuhput per ateway of two ateway placement alorithm, as shown in Fi. 5. (a) The first experiment (b) the second experiment (a) The first experiment (b) the second experiment Our alorithm based on ACO Our alorithm based on PSO Fi. 5. The comparison of the areate throuhput per ateway The results show us once aain the superiority of the alorithm proposed in this paper. The results show that PSO has better properties compared to ACO alorithm. 5. Conclusion The problem of ateway placement in WMNs for enhancin throuhput was investiated continuously in this paper. A ateway placement alorithm was proposed based on ACO, PSO. A non-asymptotic analytical 14

8 model was also derived to determine the achieved throuhput by a ateway placement alorithm. Based on such a model, the performance of the proposed ateway placement alorithm was evaluated. Numerical results show that the proposed alorithm has achieved much better performance than other schemes. It is also proved to be a cost-effective solution. The best performance we ot with the PSO alorithm with the lowest cost function and consumin time. While the ACO alorithm doesn t converes as fast and its results is litter worse than PSO. Optimizin ateway placement toether with throuhput maximization is our next research oal. 6. References [1] F. Akyildiz, Xudon Wan, Weilin Wan: "Wireless mesh networks: a survey", "Computer Networks and ISDN Systems", vol.47 no.4, pp , 15 March [2] Pin Zhou, Xudon Wan, B. S. Mano and Ramesh Rao (2010), On Optimizin Gateway Placement for Throuhput in Wireless Mesh Networks, Journal on Wireless Communications and Networkin Volume 2010 (2010), Article ID , 12 paes doi: /2010/ [3] P. Gupta and P. R. Kumar, Internets in the sky: The capacity of three dimensional wireless networks, Commun. Inform and Syst., vol.1, no. 1, pp , Jan [4] M. Grosslauser and D. Tse, Mobility increases the capacity of ad-hoc wireless networks, in Proc IEEE INFOCOM 01, [5] B. Liu, Z. Liu and D. Towsley, On the capacity of hybrid wireless networks, in Proc IEEE INFOCOM 03, [6] U. C. Kozat and L. Tassiulas, Throuhput capacity of random ad hoc networks with infrastructure support, in Proc ACM MOBICOM 03, [7] A. Zemlianov and G. de Veciana, Capacity of ad hoc wireless networks with infrastructure support, IEEE J. Sel. Areas Commun., vol.23, no.3, pp , Mar [8] P. Zhou, X.Wan, and.r. Rao, Asymptotic Capacity of Infrastructure Wireless Mesh Networks, IEEE Transaction on Mobile Computin, vol. 7, no.8, pp , Au [9] J. Robinson and E. Knihtly, A Performance Study on Deployment Factors in Wireless Mesh Networks, in Proc. IEEE Infocom 2007, pp , May [10] M. Dorio, V. Maniezzo, and A. Colorni, "Ant system: Optimization by a colony of cooperatin aents", IEEE Trans. on System, MAN, and Cybernetics-Part B, vol. 26, pp , February 1996 [11] E. Rao-Ilesias, O. Quevedo-Teruel, "Linear Array Synthesis usin an Ant Colony Optimization based Alorithm", IEEE Trans. on Antennas and Propaation, [12] M. Dorio, M. Birattari, and T. Stitzle, Ant Colony Optimization: Artificial Ants as a Computational Intellience Technique, IEEE computational intellience maazine, November, [13] Vinh Tron Le, Nhia Huu Dinh, Nhu Gia Nuyen, The minimum numbers of ateway for maximizin throuhput in wireless mesh networks, in Proc. 2 nd International Symposium on Information and Communication Technoloy (SoICT 2011), Ha Noi, Viet Nam, [14] Vinh Tron Le, Nhu Gia Nuyen, Dinh Huu Nhia, A Novel PSO-Based Alorithm for Gateway Placement in Wireless Mesh Networks, in Proc, 3 rd IEEE International Conference on Communication Software and Networks (ICCSN), China, 2011, pp [15] James Kennedy and Russell Eberhart, Particle swarm optimization in Proceedins of IEEE International Conference on Neural Networks, paes , Piscataway, NJ, USA, [16] 15

EA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless Networks

EA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless Networks 2 EA and ACO Algorithms Applied to Optimizing Location of Controllers in Wireless Networks Dac-Nhuong Le, Hanoi University of Science, Vietnam National University, Vietnam Optimizing location of controllers

More information

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol The International Arab Journal of Information Technoloy, Vol. 5, No. 1, January 2008 25 Internet Connectivity for Mobile Ad Hoc Networks Usin Hybrid Adaptive Mobile Aent Protocol Velmuruan Ayyadurai 1

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

A HyFlex Module for the Personnel Scheduling Problem

A HyFlex Module for the Personnel Scheduling Problem A HyFle Module for the Personnel Schedulin Problem Tim Curtois, Gabriela Ochoa, Matthew Hyde, José Antonio Vázquez-Rodríuez Automated Schedulin, Optimisation and Plannin (ASAP) Group, School of Computer

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks

QoS Guaranteed Intelligent Routing Using Hybrid PSO-GA in Wireless Mesh Networks BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 1 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0007 QoS Guaranteed Intelligent Routing

More information

Bespoke Shuffled Frog Leaping Algorithm and its Engineering Applications

Bespoke Shuffled Frog Leaping Algorithm and its Engineering Applications I.J. Intellient Systems and Applications, 5,, - Published Online March 5 in MECS (http://www.mecs-press.or/ DOI:.585/ijisa.5.. Bespoke Shuffled Fro Leapin Alorithm and its Enineerin Applications Anura

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

GIS-BASED REAL-TIME CORRECTION OF DEVIATION ON VEHICLE TRACK *

GIS-BASED REAL-TIME CORRECTION OF DEVIATION ON VEHICLE TRACK * Proceedins of the 004 International Conference TP-038 on Dynamics, Instrumentation and Control, Nanin, China, Auust, 004 GIS-BASED REAL-TIME CORRECTION OF DEVIATION ON VEHICLE TRACK YUANLU BAO, YAN LIU

More information

HPC Scheduling & Job Prioritization WHITEPAPER

HPC Scheduling & Job Prioritization WHITEPAPER HPC Schedulin & Job Prioritization WHITEPAPER HPC Schedulin & Job Prioritization Table of contents 3 Introduction 3 The Schedulin Cycle 5 Monitorin The Schedulin Cycle 6 Conclusion 2 HPC Schedulin & Job

More information

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

A Multiagent Based System for Resource Allocation and Scheduling of Distributed Projects

A Multiagent Based System for Resource Allocation and Scheduling of Distributed Projects International Journal of Modelin and Optimization, Vol. 2, No., Auust 2012 A Multiaent Based System for Resource Allocation and Schedulin of Distributed Projects Sunil Adhau and M. L. Mittal Abstract In

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION

A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION A KERNEL MAXIMUM UNCERTAINTY DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION Carlos Eduardo Thomaz Department of Electrical Enineerin, Centro Universitario da FEI, FEI, Sao Paulo, Brazil

More information

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

CLOUD DATABASE ROUTE SCHEDULING USING COMBANATION OF PARTICLE SWARM OPTIMIZATION AND GENETIC ALGORITHM

CLOUD DATABASE ROUTE SCHEDULING USING COMBANATION OF PARTICLE SWARM OPTIMIZATION AND GENETIC ALGORITHM CLOUD DATABASE ROUTE SCHEDULING USING COMBANATION OF PARTICLE SWARM OPTIMIZATION AND GENETIC ALGORITHM *Shabnam Ghasemi 1 and Mohammad Kalantari 2 1 Deparment of Computer Engineering, Islamic Azad University,

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

A RANDOMIZED LOAD BALANCING ALGORITHM IN GRID USING MAX MIN PSO ALGORITHM

A RANDOMIZED LOAD BALANCING ALGORITHM IN GRID USING MAX MIN PSO ALGORITHM International Journal of Research in Computer Science eissn 2249-8265 Volume 2 Issue 3 (212) pp. 17-23 White Globe Publications A RANDOMIZED LOAD BALANCING ALGORITHM IN GRID USING MAX MIN ALGORITHM C.Kalpana

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks

Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks 246 Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks Whoi Jin Jung, Jae Yong Lee and Byung Chul Kim Dept. of Info. Comm. Engineering, Chungnam National University, Korea

More information

Wireless Mesh Networks: WMN Overview, WMN Architecture

Wireless Mesh Networks: WMN Overview, WMN Architecture 2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

IN the last decade, vehicular ad-hoc networks (VANETs) Prefetching-Based Data Dissemination in Vehicular Cloud Systems

IN the last decade, vehicular ad-hoc networks (VANETs) Prefetching-Based Data Dissemination in Vehicular Cloud Systems 1 Prefetchin-Based Data Dissemination in Vehicular Cloud Systems Ryansoo Kim, Hyuk Lim, and Bhaskar Krishnamachari Abstract In the last decade, vehicular ad-hoc networks VANETs have been widely studied

More information

Flexible mobility management strategy in cellular networks

Flexible mobility management strategy in cellular networks Flexible mobility management strategy in cellular networks JAN GAJDORUS Department of informatics and telecommunications (161114) Czech technical university in Prague, Faculty of transportation sciences

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

On the Influence of the Prediction Horizon in Dynamic Matrix Control

On the Influence of the Prediction Horizon in Dynamic Matrix Control International Journal of Control Science and Enineerin 203, 3(): 22-30 DOI: 0.5923/j.control.203030.03 On the Influence of the Prediction Horizon in Dynamic Matrix Control Jose Manue l Lope z-gue de,*,

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

How To Write A Report In Xbarl

How To Write A Report In Xbarl XBRL Generation, as easy as a database. Christelle BERNHARD - [email protected] Consultant & Deputy Product Manaer of ADDACTIS Pillar3 Copyriht 2015 ADDACTIS Worldwide. All Rihts Reserved

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Listwise Approach to Learning to Rank - Theory and Algorithm

Listwise Approach to Learning to Rank - Theory and Algorithm Fen Xia* [email protected] Institute of Automation, Chinese Academy of Sciences, Beijin, 100190, P. R. China. Tie-Yan Liu [email protected] Microsoft Research Asia, Sima Center, No.49 Zhichun Road, Haidian

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

MULTIHOP cellular networks have been proposed as an

MULTIHOP cellular networks have been proposed as an 1206 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 7, SEPTEMBER 2004 On the Throughput Enhancement of the Downstream Channel in Cellular Radio Networks Through Multihop Relaying Jaeweon

More information

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface

Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information

[email protected] [email protected]

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract

More information

A Survey on Privacy Preserving Decision Tree Classifier

A Survey on Privacy Preserving Decision Tree Classifier A Survey on Classifier Tejaswini Pawar*, Prof. Snehal Kamalapur ** * Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ** Department of Computer Enineerin, K.K.W.I.E.E&R, Nashik, ABSTRACT In recent

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],

More information

Research on the Performance Optimization of Hadoop in Big Data Environment

Research on the Performance Optimization of Hadoop in Big Data Environment Vol.8, No.5 (015), pp.93-304 http://dx.doi.org/10.1457/idta.015.8.5.6 Research on the Performance Optimization of Hadoop in Big Data Environment Jia Min-Zheng Department of Information Engineering, Beiing

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information