Distributed Virtual Network Interfaces to support intra-pan and PAN-to-infrastructure Connectivity

Size: px
Start display at page:

Download "Distributed Virtual Network Interfaces to support intra-pan and PAN-to-infrastructure Connectivity"

Transcription

1 Distributed Virtual Network Interfaces to support intra-pan and PAN-to-infrastructure Connectivity Kaouthar Sethom, Mehdi Sabeur, Badii Jouaber, Hossam Afifi, Djamal Zeghlache Institut National des Télécommunications, Evry, France firstname.lastname@int-evry.fr Abstract In emerging Personal Area Networks (PANs), consisting of heterogeneous devices and nodes, dynamic Intra- PAN and PAN-to-infrastructure connectivity should be achieved transparently to end users and applications. This paper proposes a Distributed Virtual Network Interface (D) solution for PAN device discovery, seamless handover and routing. D is an extension of the concept designed for seamless vertical handover in the case of a single device with multiple interfaces. The D concept consists of making all PAN interfaces available via a common distributed virtual interface to mask changes in the PAN dynamics and connectivity. Keywords- Personal Area Network, Distributed Virtual Network Interface, seamless handover, L2 routing, device and gateway discovery. I. INTRODUCTION Even if for many years users have been promised seamless connectivity, any time and anywhere, wireless technologies are yet to offer this seamless environments to end users. Among wireless access technologies that have emerged, no particular access solution is appropriate for all applications, scenarios and contexts. For instance, Bluetooth is appropriate for short range communications and energy limited devices WiFi is well suited for wireless access for low mobility users on campuses and local area networks, while is able to manage large scale terminal mobility and provides higher security levels. This has lead to heterogeneous environments with multiple interfaces lacking embedded enablers for interoperability. For instance, current vertical handover solutions require end users to manually configure their terminal connectivity of their terminals (when switching from one access technology to another). This often causes the restarting of ongoing applications because of interactions between higher and lower protocol layers. The main objective for 4G and B3G networking solutions is to address these challenges to provide an Always Best Connected (ABC) solution [1] in heterogeneous environments. With ABC, users should be able to dynamically switch between different access networks in order to reach required or preferred security and QoS levels. ABC includes both horizontal and vertical handovers that should be performed seamlessly with minimum complexity and maximum transparency to users and applications. Virtual interfaces can be useful to alleviate IP address changes during mobility. Network applications and protocols consider IP addresses as non-volatile and use them as identifiers in data structures. When the IP address of a given terminal changes, applications fail and have to be restarted to take into account the new IP address. These impediments result in limited user friendliness and are in contrast to the open, easy-to-access and easy-to-use Internet paradigm. They are motivating this work Most ABC solutions assume stand alone mobile terminals switching between different access networks according to context and reaching external networks in one hop. In the PAN concept, users can rely on the availability of multiple networking interfaces to connect to external networks via other PAN devices using multiple hops. (c.f. Section II). This requires discovery, addressing and routing mechanisms within the PAN. The Virtual network Interface () is one promising ABC solution for stand-alone devices [2]. This paper extends the framework to the PAN context by introducing a distributed version considering the PAN as a unique logical network entity. The proposed solution called D (Distributed Virtual Network Interfaces) includes addressing (as in ), a discovery mechanism and a layer-2 routing solution. Section 2 of this paper presents PAN requirements and challenges for seamless mobility and routing. Section /05/$20.00 (C) 2005 IEEE

2 describes the virtual network interface concept as background for the proposed D solution, followed by the architecture of the proposed distributed virtual network interface in section 4. Performance studies are presented in section 5. II. PANS SPECIFIC REQUIREMENTS A PAN can be defined as the personal sphere composed of a set of interconnected devices moving with a given user. PAN devices may use heterogeneous technologies. Managing the PAN includes organizing and selecting intra-pan connectivity as well as PAN-to-Infrastructure connectivity. Depending on the context, some of the PAN devices may play the role of gateways to external networks (e.g. WLANs, GPRS, or wired networks), while others can only ensure Intra-PAN connectivity. PAN connectivity should be based on available networks, battery status, link layer conditions, mobility, security, requested QoS as well as user and application preferences. Since the PAN context may change dynamically, PAN connectivity need to be updated frequently. Appropriate addressing and routing mechanisms are also required. Such dynamic PAN configuration should be automated, transparent and induce minimum complexity to end users and applications. The aim is also to reduce computing and memory requirements. III. THE VIRTUAL NETWORK INTERFACE CONCEPT of access technologies is made transparent to higher-layer protocols even during vertical handovers. adds a new virtual MAC layer (Figure 1) so that a unique unicast IP address can be assigned over the virtual MAC entity. Applications receive/send flows from/to this single virtual MAC interface. The virtual MAC interface is responsible of spreading and redirecting received and sent flows to the in-use network interface. It stores information about network devices in a specific table that is dynamically updated. It periodically evaluates the status of these network interfaces and is able to selects the suitable one to use. For instance, the can use the carrier signal to check if a given interface is alive (information about the physical layers are available through its Netlink interface [3]). The virtual MAC is generally taken from the first active network device. It is then assigned to all following interfaces and remains Upper layers TCP IP, ICMP, ARP Virtual MAC address B Bluetooth G Virtual Interface The Virtual Network Interface () solution [2] is proposed as an ABC solution in the case of a unique device with multiple network interfaces. Its main concept is to add a specific adaptation interface within the protocol stack. This adaptation interface takes in charge interactions between the IP and the data link layers and allows the use of a unique IP address over different wireless technologies. IV. Adaptation plan FIG.1: VIRTUAL INTERFACE ARCHITECTURE THE DISTRIBUTED VIRTUAL NETWORK INTERFACE SOLUTION The concept achieves the following desirable goals: - Preserving communication: Once a session has been established between end points, from the application point of view, the connection is persistent even though the network interface changes. - Use of different network interfaces: from the host to the MAC layer (within the operating system) it should be possible to use different network interfaces for the physical connection to the network. - Transparency: applications are not disturbed by changes in network devices. - Minimal changes: to current network structure. - Efficient handoff: the delay during handoff should be minimized and avoided, if possible. assigns a unique virtual MAC address to all the link layers available on one terminal. Therefore, the heterogeneity The Distributed Virtual Network Interface solution consists of extending the concept to the entire PAN. The idea here is to pool together all available connectivity resources behind this distributed virtual interface (Figure 2). The interface used for ingress and egress traffic is selected according to device capabilities, application requirements and available access networks characteristics (c.f. section 2). As applications could run over any of the PAN devices, a path toward external networks should be established. With D, the PAN is considered as a unique logical network entity, where all network interfaces, available on any of the PAN devices, are shared in a common distributed pool of networking resources (Figure 2). This pool is made available for all applications running on any of the PAN devices.

3 The path toward external networks is split into two segments. A first segment towards the selected gateway and a second segment from that gateway towards the destination. This results in specific issues related to Intra-PAN and PAN-toinfrastructure connectivity. In the following, we will describe how D solves these connectivity requirements by introducing new discovery, and layer-2 routing solutions in the PAN. A PAN has generally multiple gateways to connect to the global Internet and hence, multiple egress interfaces. Therefore, each device within the PAN can be considered as a multi-interface terminal when seen from the outside (see Figure 3). As said above, the selection of the PAN-to-Infrastructure interface to be used with a given context is subject to multicriteria optimization. We suppose here that user context and ambient networks related information is available to the application layers. The storage and the management of the context as well as the optimization algorithm and the selection criteria are out of the scope of this paper. Based on these assumptions, we propose a specific PAN s egress interfaces discovery mechanism (section IV.1) to update and maintain the needed context information. A. PAN s egress interfaces discovery mechanism Before packets from a PAN node hereafter referred to as source node - are routed to a destination node outside the PAN, one has to determine that the destination node is not present in the PAN. This information can be obtained by queering the Master node responsible for PAN formation and node discovery. If the destination IP address is not found inside the PAN, one of the available gateways must be selected. The proposed PAN's egress interface discovery mechanism works as follows: Gateways periodically announce their presence in the PAN by broadcasting hello messages. Each Hello message contains the list of gateways active egress interfaces, their MAC addresses and correspondent technologies, as well as the advertisement lifetime. When a PAN node receives a hello message, it records this information in a gateways local table (Figure 4). To prevent path loops, a unique broadcast ID and a hop counter are used with hello messages. These messages are also used to set up reverse routes to the gateways. My PAN BT My PDA Device 1 My PAN My Smart Phone Device 2 My PDA seen from the outside BT BT BT My PDA b Bluetooth D Bluetooth WLAN BT FIG.3: AN EXAMPLE OF PAN TO INFRASTRUCTURE CONNECTIVITY FIG.2: DISTRIBUTED VIRTUAL INTERFACE CONCEPT From inside the PAN and to reach an external peer, more than one gateway may be available. A node A may have multiple paths over which it can send packets to its peers. A first decision has to be made about path(s) selection. Let's denote this process as "remote interface selection process". Based on the information provided by the PAN s egress interfaces discovery protocol, the remote interface selection is done locally by the of node A. During this process, the remote interfaces are considered as available locally and make part of the (figure 1). Once the decision is made, packets are forwarded to the selected gateway through a Layer-2 routing mechanism (section IV.2). Reverse routes allow PAN nodes to update and refresh their routing tables. The broadcasting of hello packets is randomly delayed to prevent collisions. Note that each time a gateway detects a change in one of its egress interfaces, it notifies nodes of the PAN by sending a new "hello" message. PAN s egress interfaces Mac address Out local_interface route metric TTL 00: :A1 BT 5 1 WLAN 09:.:35 BT 9 1 BT B5: :C1 BT 1 2 FIG.4: PAN S EGRESS INTERFACES TABLE AT THE If a node on an established path fails, the links connected to the nodes become unavailable. When detecting a link failure, a node generates and broadcasts an "error packet" message. Nodes that receive "error packet" messages, have to disable

4 all paths beyond the failed link in their route cache tables. If available, an alternative route (for the global Internet) is selected in the route cache. Otherwise, when needed, the source node sends a route request message to find a new gateway. B. Layer-2 routing mechanism Routing protocols for mobile ad hoc networks have been studied for many years (MANETs [4]). However, these studies were mainly focusing on efficiency of routing algorithms in disconnected ad hoc networks. Interoperability with other networks (e.g., the Internet) has seen less attention. A novel robust forwarding strategy is then necessary to build Internet connectivity solutions for PANs. Because of possible restrictions on some PAN devices, it seems that operating at the link layer is more suitable than using ad hoc routing at the IP level. The underlay approach leads to immediate implementation benefit, as we do not have to interact with the IP layer. Moreover, the underlay discovery mechanisms inside D permit to add selfconfiguration elements and route updates in a very straightforward way. Routing to the gateway is done on a hop-by-hop basis. As explained in section IV.2.2 routing table are constructed and maintained using the PAN s egress interfaces discovery mechanism (i.e. Hello messages). As example, let s take the scenario shown on figure 5, where a source node A (with and Bluetooth interfaces) wants to send a packet to an Internet node. Using the layer, node A is able to send packets through both and Bluetooth interfaces without flow disruption. When packets arrive at node A, the consults the list of active gateways, constructed using the discovery mechanism, among the and Bluetooth interfaces. The available PAN egress interfaces are GSM, and WiFi. Let's consider that node A decides to access to the global Internet using the connection because of some applications requirements. It first filters the list of gateways with egress interfaces. Then, it selects one of them (G1 in figure 5) according to some routing metrics (shortest path, power consumption...). The "local_interface" colon (figure 5) indicates that, to reach gateway G1, node A need to use its local Bluetooth connection. Packets are then sent to the selected gateway, with the destination MAC address field set to that of G1. The destination IP address field set to the destination CN IP address. The source MAC address is set to the virtual MAC address and the source IP address to node A IP address. Each intermediary node inside the PAN will act as a wireless bridge by forwarding packets toward that gateway. Finally, when packets reach G1, it sends them to the CN using normal IP routing protocol. which de-encapsulates then forwards them to the PAN node using the described Layer-2 routing protocol. V. PERFORMANCE RESULTS In this section, performance results of the proposed D solution are presented and commented. Simulations were conducted using NS-2 simulator [6]. We mainly focused our first studies on the delay and jitter performances of the gateway switching and L2 routing process. Real time applications (e.g., voice over IP) are sensitive to packet delay and cannot typically tolerate important interruption time [ITU-T Recommendation Y.1541]. Simulation topology is shown on figure 6. The simulated PAN is composed of five nodes. Two of them are gateways. We first used a Constant Bit Rate (CBR) traffic source, which is the worst case traffic since it requires regular delivery of packets. In this scenario, node N2 sends packets of 512 bits every 15 ms to node CN. Initially, node N2 is connected to gateway GW0 via node N0. At time t 1 =19.4s, the route to GW0 is forced to fail. Node N2 has to find out a new gateway -GW1 in this scenario- to continue routing its packets. PAN Device A a BT Egress interface Device B BT b WiFi a G3 Egress technology G1 G a Local interface CN GSM WiFi a FIG.5: ROUTING IN THE D GSM D performances are compared to the AODV+ [7] scheme used for Ad hoc networks. AODV+ protocol is an extension of AODV protocol proposed to support gateway discovery and default route notion for ad hoc networks Packets destined for a node inside the PAN and arriving from nodes on the Internet are tunneled (using NEMO protocol [5] for example) from the home network to the current gateway,

5 CN cases (D and AODV+), TCP go into Slow Start mode [8] due to timeout, which increases the disruption time. Router GW0 GW1 PAN N0 N2 N1 FIG.6: SIMULATION TOPOLOGY With the proposed D approach: As soon as the route failure is detected, node N2 focuses on its local gateway table and selects a new route to the CN (GW1). With AODV+, a request is sent to all the gateways in the PAN in order to find a route to CN. Until the reception of a reply, traffic from node N2 can not be resumed. Figure 7 shows the packet sequence number received by node CN for UDP traffic. As it can be seen, the switching process between gateways is faster when using D compared to the case where AODV+ is used. In the simulated scenario, a first gain of about 30ms is observed. In fact, in AODV+ the route establishment process needs more time because of the requests send by the protocol to find new gateways. FIG.8: TCP PACKET SEQUENCE NUMBER Concerning the overhead, and in contrast to AODV+ and other existing solutions where new signaling packets are needed to rediscover gateways, the proposed D solution behaves better. In fact, the D does not introduce new signaling packets, and hence reduces signaling overhead. IV. CONCLUSION The proposed D solution provides PAN connectivity over heterogeneous devices and interfaces. D combines virtual network interface, L2 routing and a gateway discovery mechanism to achieve an ABC solution for the PAN context. Performance results indicate that D reduces packet losses induced by gateway changes within the PAN. D outperforms AODV+ used in Ad hoc networks in terms of packet losses, handoff latency and signaling overhead. REFERENCES FIG.7: UDP PACKET SEQUENCE NUMBER Moreover, packets arriving during this period are queued and retransmitted later (between t 2 and t 3 ) which increase the jitter and disturbs the transmission of the remaining data. It s only after 240 ms from the failure of the used route, that the AODV+ traffic can find its regularity and join the D traffic behavior. The same remarks can be drawn from figure 8 for TCP traffic. In this case, the gain in terms of delay is more important and is about 264ms. The D solution prevents better packet losses during the re-rerouting process. In both [1] Gosta Leijonhufvud, Multi access networks and Always Best Connected ABC MMC, Berlin 2001 [2] K. Sethom, H. Afifi, Requirements and Adaptation Solutions for transparent Handover, IEEE ICC, June 2004 [3] R. Stevens, TCP/IP illustrated, 1994, Addison-Wesley. [4] RFC 2501, [5] T. J. Kniveton, J. Malinen, V. Devarapalli, C. Perkins, Mobile Tunneling Protocol,<draft-kniveton-mobrtr-03.txt>, work in progress, November [6] Network Simulator-NS-2 notes, documentation and source codes: ww.isi.edu/nsnam/ns [7] AODV+, RFC TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms.

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen Vorlesung Kommunikationsnetze Research Topics:

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP

This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11

More information

CME: A Middleware Architecture for Network-Aware Adaptive Applications

CME: A Middleware Architecture for Network-Aware Adaptive Applications CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,

More information

A New Approach to Developing High-Availability Server

A New Approach to Developing High-Availability Server A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Introduction to Mobile IPv6

Introduction to Mobile IPv6 1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

On the Design of Mobility Management Scheme for 802.16-based Network Environment

On the Design of Mobility Management Scheme for 802.16-based Network Environment On the Design of obility anagement Scheme for 802.16-based Network Environment Junn-Yen Hu and Chun-Chuan Yang ultimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information

Cisco Networking Academy CCNP Multilayer Switching

Cisco Networking Academy CCNP Multilayer Switching CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established

More information

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 Revision C 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Passive Link State Auto Configuration (A/P)...

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

II RELATED PROTOCOLS. Dynamic Source Routing (DSR) ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Always Best Packet Switching: the mobile VoIP case study

Always Best Packet Switching: the mobile VoIP case study Always Best Packet Switching: the mobile VoIP case study Vittorio Ghini, Giorgia Lodi and Fabio Panzieri Dept. of Computer Science, University of Bologna, Italy Email: {ghini, lodig, panzieri}@cs.unibo.it

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Mobile Computing/ Mobile Networks

Mobile Computing/ Mobile Networks Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information