REPORT DOCUMENTATION PAGE
|
|
|
- Gary Bradley
- 10 years ago
- Views:
Transcription
1 #$%&&%_%&& #& ' ( )* +&&&, -* +&&. REPORT DOCUMENTATION PAGE Form Approved OMB NO Public Reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comment regarding this burden estimates or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA , and to the Office of Management and Budget, Paperwork Reduction Project ( ,) Washington, DC AGENCY USE ONLY ( Leave Blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED Final Report 06/01/03 01/31/05 4. TITLE AND SUBTITLE Mathematical Models for Quality of Service Driven Routing in Networks! " 5. FUNDING NUMBERS DAAD AUTHOR(S) Dr Erol Gelenbe 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) University of Central Florida, School of Computer Science Orlando, FL SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) U. S. Army Research Office P.O. Box Research Triangle Park, NC PERFORMING ORGANIZATION REPORT NUMBER 10. SPONSORING / MONITORING AGENCY REPORT NUMBER MA 11. SUPPLEMENTARY NOTES The views, opinions and/or findings contained in this report are those of the author(s) and should not be construed as an official Department of the Army position, policy or decision, unless so designated by other documentation. 12 a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release; distribution unlimited. 13. ABSTRACT (Maximum 200 words) 12 b. DISTRIBUTION CODE. Very large networks with varying topologies, unreliable components, and highly time varying traffic, are not amenable to traditional techniques of analysis based on traffic engineering and simulations. Traffic flows in such networks will traverse a number of hops which cannot be determined in advance and encounter traffic conditions that are also unknown. During the flow of a particular traffic stream, the network topology may change (e.g. when wireless links are numerous) and other critical conditions (such as network security) may vary. We address the control of traffic flows in such networks with the objective of meeting the needs of the military end user. Novel results obtained in this research include distributed sensible network techniques that provide a hierarchy of provably better flow control algorithms that apply to any specific QoS metric of interest, and estimates for search times of destinations in highly unknown random environments. We prove the existence and uniqueness of solutions of the non-linear equations for the computation of QoS in the presence of sensible decision algorithms. In addition we compute the average travel time of a packet that is routed in a random environment, with and without time-outs for packet re-transmission when the packet is lost. 14. SUBJECT TERMS Computer Communication Networks. Network Quality of Service. Mathematical Models. 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION OR REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION ON THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL
2 a. A Memorandum of Transmittal, (see attached) b. A Filled out DD Form 882 (Report of Inventions and Subcontracts: None) c. Final Progress Report, including the following information: (1) Foreword Very large networks with varying topologies, unreliable components, and highly time varying traffic, are not amenable to traditional techniques of analysis based on traffic engineering and simulations. Traffic flows in such networks will traverse a number of hops which cannot be determined in advance and encounter traffic conditions that are also unknown. During the flow of a particular traffic stream, the network topology may change (e.g. when wireless links are numerous) and other critical conditions (such as network security) may vary. We address the control of traffic flows in such networks with the objective of meeting the quality of service needs of the military end user. (2) Table of Contents (if report is more than 10 pages) None (3) List of Appendixes, Illustrations and Tables (None) (4) Statement of the problem studied The project has examined analytical properties of quality of service based routing in networks. Both discrete and continuous mathematical models of packet routing in networks are considered. Novel results obtained in this research include distributed sensible network control techniques that provide a hierarchy of provably better flow control algorithms that apply to any specific QoS metric of interest, and estimates for routing times from source to destinations in highly perturbed or unknown random environments. We also prove the existence and uniqueness of solutions of the non-linear equations for the computation of QoS in the presence of sensible decision algorithms. In addition we compute the average travel time of a packet that is routed in a random environment, with and without time-outs for packet re-transmission when packets are lost. (5) Summary of the most important results The mixed wired and wireless network topologies that are becoming the norm in military communications, including fixed and ad-hoc connections, create the need to rationally exploit dynamically variable routing as a function of network conditions. Furthermore, the applications that use such networks have stringent QoS requirements such as delay, loss or jitter, as well as requirements that reflect the need for reliability and low power utilization. Quality of Service (QoS) has now become a central issue in networks and there is a large body of literature on the problem of estimating certain specific quality of service parameters (e.g. loss or delay) for given traffic characteristics. Typically this work consider s single or multiple buffer models (finite or infinite), or models of cascaded nodes with or without interfering traffic. There has also been much work on practical routing policies designed to achieve desired QoS objectives, as well as numerous papers on the analysis of protocols such as TCP/IP. Some authors have examined control techniques which can offer QoS guarantees to traffic of different kinds, while research on exact solutions to complex network models is still under active investigation. Our research steps away from these specific questions to take a more abstract approach. We addresses some mathematical questions related to the interaction between network routing and QoS.
3 Our initial work has addressed the development of an appropriate mathematical framework for the problem at hand. Thus a QoS metri q, relating to some specific data unit or a stream of data units, is a non-negative random variable that we associate with a data unit and a path v in the network. Let F(i,d) be the set of all distinct, but not necessarily disjoint, paths from node i to node d in the network. A routing policy P(i,d) for source-destination pair (i,d) is a probability distribution on the set F(i,d) that selects path v with probability p(v,f(i,d)). Let n be an intermediate node on path v, so that v=ixnyd. We say that a routing policy is incremental if p(v,f(i,d)) = p(xn,f(i,n)).p(yd,f(n,d)). Note that an incremental policy is simply equivalent to one where all decisions can be taken independently at each node. We can also consider policies which are incremental only at certain selected nodes. A QoS metric for path v is a non-negative random variable q(v), which has the sub-additive property: for v=xy, q(v) < q(x)+q(y) (w.p.1). Note that the sub-additive covers many strictly additive metrics of interest such as packet or cell loss rates, delay, path length (number of hops), and power dissipation. Other metrics such as path reliability and available bandwidth are sub-additive. We state the following result in a loose manner. Result 1. As a consequence of sub-additivity it follows that the QoS metric of each path in a very large graph tends w.p.1 to a deterministic value, if the length of the paths grows when the size of the graph grows and tends to infinity. Let u be a non-decreasing measurable function and q be a QoS metric. The QoS Q(v) for data units sent on the path v using policy P(i,d) from source i to destination d along the set of paths F(i,d) will be defined as the expected value Q(v)= E[u(q(v))]. For instance if q(v) is path delay and u(x)= 1[x>T], then Q(v) is the probability that the path delay is larger than T. metric q, as a metric such that q(v) increases when the probability of directing traffic into path v increases; examples include path delay and path loss ratio. An example of an insensitive QoS metric is the number of hops along a path. A sensible routing policy (SRP) is one that chooses a path v using a probabability distribution such that p(v) is inversely proportional to Q(v). Thus a SRP is a routing policy decides on routing based only on the QoS of each path, such that whenever the value of the QoS for any path increases then the probability of selecting that path decreases. The following result characterizes the possibility to numerically evaluate the effect of such policies. The result is significant because the QoS Q results from a non-linear equation. Result 2 For a sensible routing policy, the expected QoS of the policy given by Q = Σ v Q(v).p(v,F(i,d)) exists and is unique. Within the class of sensible routing policies, we introduce the m-sensible routing policies (m-srp), for m > 1, from node i to destination d based on the QoS metric q, as the probability distribution p(v,f(i,d)) = (Q(v) -1 ) m / Σ w (Q(w) -1 ) m. Note that a 0-SRP is just a random choice among paths, with equal probability. The expected QoS of the policy is then Q m = Σ v Q(v).(Q(v) -1 ) m / Σ w (Q(w) -1 ) m and we prove the following result: Result 3 For any QoS metric q, if q is insensitive then Q m+1 < Q m, in other words a m+1-sensible policy is always better than a m-sensible policy. This result provides us with the means of characterizing a hierarchy of simple and yet increasingly better sensible routing policies.
4 Finally we have considered the time it takes for traffic to move from some node to a destination which is distance D fom the source, in a communication system represented by a random environment. The model used represents a large and unknown network in which packets travel according to a diffusion process. Result 4 Let b be the average incremental reduction in distance of the packet to its destination in a time interval t, and let c be the corresponding variance parameter for the distance reduction. Then the average time needed by the packet to reach the destination is 2D/( b+ [ b λ c] ½ ] ), where λ is the inverse of the average time it takes for a packet to be lost or destroyed in the course of the search, or λ t is the probability that the packet is lost in a small time interval t during the search, and we assume that a lost packet is then replaced by a new one at the source node. In conclusion, in this project we have developed a probabilistic theory of network routing based on QoS. The project has been truncated to a two year period rather than the three year period initially requested, as a result of the PI s move to an institution in the UK, and thus some of the questions we initially proposed to investigate have remained open. We have suggested that QoS metrics of interest are sub-additive along paths. We have introduced sensitive and insensitive QoS metrics, the latter being those, such as the number of hops on a path, which are not impacted by the routing policy. We have introduced incremental routing policies which constructed routing policies by taking the product of routing probabilities at selected decisions points. We have introduced myopic policies which only examine the QoS prefixes of paths to make decisions, and incremental policies which make decisions at successive decision points. We have also introduced sensible routing policies (SRP) which use the QoS of alternate routes to select paths with some probability. For sensible routing policies, which inevitably lead to bilateral mutual dependency between routing choices and QoS, we prove that the routing probabilities exist and are unique. We have introduced a hierarchy of SRPs, which we call m- SRPs, such that 0-SRP corresponds to random routing with equal probability and have shown that increasing m can provide better QoS. Finally we have developed continuos diffusion approximation models in order to compute the time it takes to forward traffic from some source to a destination in the presence of packet loss and time-outs. Many of these concepts and questions also need to be extended to multicast communications, when a set of sources need to communicate with a set of destinations, and to peer-to-peer environments when sets of nodes rely on each other for information and communication. (6) Listing of all publications and technical reports supported under this grant or contract. Provide the list with the following breakout, and in standard format showing authors, title, journal, issue, and date. (a) Manuscripts submitted but not published: 0 (b) Papers published in peer-reviewed journals: (4) 1. "Power-aware ad hoc cognitive packet networks", Erol Gelenbe and Ricardo Lent, Ad Hoc Networks 2 pp (2004) 2. "Self-aware networks and QoS ", Erol Gelenbe, Ricardo Lent and Arturo Nunez, Proceedings of the IEEE 92 (9) pp (2004)
5 3. "Flow equivalence and stochastic equivalence in G-networks", J.-M. Fourneau and E. Gelenbe, Computational Management Science 1 (2) pp (2004) 4. "Sensible decisions based on QoS", E. Gelenbe, Computational Management Science 1 (1) pp.1-14 (2004) (c) Papers published in non-peer-reviewed journals or in conference proceedings: 5 1. "Review of experiments in self-aware networks (Opening Keynote)", E. Gelenbe, Computer and Information Sciences - ISCIS 2003, A. Yazici and C. Sener (Eds.),Lecture Notes in Computer Science LNCS 2869, Springer Verlag, Berlin. pp.1-8 (2003) 2. "Traffic Balancing via Smart Packets", Erol Gelenbe, Ricardo Lent and Arturo Nunez, IEEE 3rd Workshop on IP Operations & Management (IPOM2003), ISBN , IEEE Communications Society pp (2003) 3. "Self-Awareness and Adaptivity for Quality of Service", E. Gelenbe, M. Gellman and Pu Su, IEEE 8th International Symposium on Computers and Communication, ISBN X, IEEE Computer Society pp.3-9 (2003) 4. "An approach to Quality of Service ", E. Gelenbe, ISCIS'04, 19th Int'l. Symposium on Computer and Information Sciences, Springer Lecture Notes in Computer Science Vol. LNCS 3280 pp.1-10 (2004) 5. "Autonomous smart routing for network QoS ", Erol Gelenbe, Michael Gellman, Ricardo Lent, Peixiang Liu and Pu Su, 1st IEEE International Conference on Autonomic Computing (23% acceptance ratio), New York, May pp (2004) (d) Papers presented at meetings, but not published in conference proceedings: 0 (2) Demographic Data for this Reporting Period: (a) Number of Manuscripts submitted during this reporting period: 10 (b) Number of Peer Reviewed Papers submitted during this reporting period: 8 (c) Number of Non-Peer Reviewed Papers submitted during this reporting period: 0 (d) Number of Presented but not Published Papers submitted during this reporting period: 0 (3) Demographic Data for the life of this agreement: (a) Number of Scientists Supported by this agreement (decimals are allowed): 0.75 (b) Number of Inventions resulting from this agreement: 0 (c) Number of PhD(s) awarded as a result of this agreement: 0 (d) Number of Bachelor Degrees awarded as a result of this agreement: 0 (e) Number of Patents Submitted as a result of this agreement: 0 (f) Number of Patents Awarded as a result of this agreement: 1 (g) Number of Grad Students supported by this agreement: 0 (h) Number of FTE Grad Students supported by this agreement: 0 (i) Number of Post Doctorates supported by this agreement: 1 (j) Number of FTE Post Doctorates supported by this agreement: 0.25 (k) Number of Faculty supported by this agreement: 0.5 (l) Number of Other Staff supported by this agreement: 0 (m) Number of Undergrads supported by this agreement: 0 (n) Number of Master Degrees awarded as a result of this agreement : 0 (3) Report of inventions (by title only) NONE (a) Papers published in peer-reviewed journals (b) Papers published in non-peer-reviewed journals or in conference proceedings (c) Papers presented at meetings, but not published in conference proceedings (d) Manuscripts submitted, but not published (e) Technical reports submitted to ARO
6 - 3 - (7) List of all participating scientific personnel showing any advanced degrees earned by them while employed on the project (8) Report of Inventions (by title only) (9) Bibliography (10) Appendixes d. A Standard Form 298 (Enclosure 1), including the following required entries: (1) Block 2, Report Date (2) Block 3, Report Type and Dates Covered (3) Block 4, Proposal Title (4) Block 5, Contract/Grant Number (5) Block 6, Author(s) (6) Block 7, Performing Organization Name(s) and Address(es) (7) Block 13, Abstract (must not exceed the 200 word limitation) (8) Block 14, Subject Terms. (9) Block 15, Number of Pages.3. Submission: Mail Hard Copy Reports to: Over night express to: Electronic Mail to: U.S. Army Research Office U.S. Army Research Office [email protected] ATTN: AMSRD-ARL-RO-OI (TR) ATTN: AMSRD-ARL-RO-OI (TR) P.O. Box South Miami Blvd Research Triangle Park, NC, Durham, NC FORECAST EXPENDITURE REPORT 1. Content: The research agreements awarded by ARO are reviewed before a decision is made to provide additional funding. ARO will send a Forecast Expenditure Report (Enclosure 4) to the awardee 90 days prior to the exercise of incremental or optional funding. 2. Requirements: Upon receipt of this report from ARO, complete all blanks in SECTION 2 and return: 3. Submission: Return the completed report within 30 days of receipt to: U.S. Army Research Office, ATTN: (Monitors name provided by ARO) P.O. Box Research Triangle Park, NC PLEASE NOTE: ACTION WILL NOT BE TAKEN WITH RESPECT TO THE PROVISION OF ADDITIONAL FUNDS UNTIL THE REQUESTED INFORMATION IS RECEIVED. (4) Scientific progress and accomplishments (Description should include significant theoretical or experimental advances) Network Quality of Service (QoS) criteria of interest to the Army include conventional metrics such as throughput, delay, loss, and jitter, as well as novel criterial which are just as important such as power utilization, reliability and security. Much work has been done on the analysis of network QoS based on conventional criteria (such as loss, delay and jitter) for different traffic characteristics, on the design of node and buffer scheduling policies to achieve desired QoS, and there has also been some work on the interaction between QoS and routing.
7 In this project we consider abstract QoS metrics which are non-negative valued random variables related to traffic flows and network paths, while QoS is the expected value of a measurable function of the QoS metric. We develop a probabilistic theory of QoS based network routing. Our purpose is not to compute specific QoS metrics related to specific networks or specific routing algorithms, but rather to obtain properties of QoS for large networks in the presence of routing algorithms, to discover inequalities between the QoS resulting from classes of routing policies, and to obtain conditions under which QoS dependent routing policies exist and are unique. We consider sensitive and insensitive QoS metrics, the latter being those, such as the number of hops on a path, which are not impacted by the routing policy while the former are the most commonly encountered such as path delay and loss. A routing policy is then defined as a probability distribution on the set of paths from a source to a destination, or to a set of destinations in the case of multicast routing, and the QoS of a routing policy is the expected value of the QoS over the set of paths with respect to the routing probability. Routing policies of most interest to us are those which depend on the QoS so that we have determined conditions of existence and uniqueness of a QoS dependent routing policies. We have introduced incremental routing which are constructed by concatenating routing decisions by taking the product of routing probabilities at selected nodes where decisions can be taken. We have considered myopic policies which only examine the QoS of prefixes of paths in order to make a probabilistic choice about the path to be taken, and deiscuss conditions under which myopic policies may be as good as policies which act upon full knowledge. We introduce sensible routing policies (SRP) which use the QoS of alternate routes to select paths and construct a hierarchy of SRPs, which we call m-srps, such that 0-SRP corresponds to random routing with equal probability. We have proved sufficient conditions that guarantee that an (m+1)-srp is better than a m-srp when the QoS metric is sensitive or insensitive. We prove the existence and uniqueness of solutions of the non-linear equations for the computation of QoS in the presence of sensible decision algorithms. In addition we compute the average travel time of a packet that is routed in a random environment, with and without time-outs for packet re-transmission when the packet is lost (5) Technology transfer WE have had interactions both with US Army PEOSTRI and with the US Army London Office. We are now involved in discussions about the US/UK ITA with ARL. (6) Copies of technical reports, which have not been previously submitted to the ARO, NONE
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 Public Reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Integrated Force Method Solution to Indeterminate Structural Mechanics Problems
NASA/TP 2004-207430 Integrated Force Method Solution to Indeterminate Structural Mechanics Problems Surya N. Patnaik Ohio Aerospace Institute, Brook Park, Ohio Dale A. Hopkins and Gary R. Halford Glenn
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
REPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX)
NASA/CR 2005-213422 AIAA 2004 6361 Addressing the Real-World Challenges in the Development of Propulsion IVHM Technology Experiment (PITEX) William A. Maul, Amy Chicatelli, and Christopher E. Fulton Analex
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Simulation of Air Flow Through a Test Chamber
Simulation of Air Flow Through a Test Chamber by Gregory K. Ovrebo ARL-MR- 0680 December 2007 Approved for public release; distribution unlimited. NOTICES Disclaimers The findings in this report are not
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK
MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK 1 V. Vinoba, 2 P.Hema 1 Department of Mathematics, K.N. Government Arts college, (India)
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Analysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
PREPARED FOR: U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702-5012
AD Award Number: W81XWH-10-1-0957 TITLE: PRINCIPAL INVESTIGATOR: Andrea L. Behrman, Ph.D., P.T. CONTRACTING ORGANIZATION: University of Florida Gainesville, FL 32611 REPORT DATE: October 2011 TYPE OF REPORT:
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Analysis of Delayed Reservation Scheme in Server-based QoS Management Network
Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Takeshi Ikenaga Ý, Kenji Kawahara Ý, Tetsuya Takine Þ, and Yuji Oie Ý Ý Dept. of Computer Science and Electronics, Kyushu Institute
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Routing Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing
Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Service Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Algorithmic Research and Software Development for an Industrial Strength Sparse Matrix Library for Parallel Computers
The Boeing Company P.O.Box3707,MC7L-21 Seattle, WA 98124-2207 Final Technical Report February 1999 Document D6-82405 Copyright 1999 The Boeing Company All Rights Reserved Algorithmic Research and Software
