How To Balance Network Load In A Wireless Sensor Network
|
|
|
- Carmella Paul
- 5 years ago
- Views:
Transcription
1 Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. [email protected], [email protected], [email protected] [email protected] Abstract Balancing the network traffic load is a serious problem in wireless sensor network. The data generated in a wireless sensor network is stored on the sensor node and accessed through geographic hash table(ght). GHT is used to retrieve the data from nodes. The previous approaches allow balancing network load by changing the georouting protocol[1]. In our paper we have designed two new approaches called analytical and heuristic. In analytical approach the destination density function yielding quasiperfect load balancing under uniformity assumption. Heuristic approach is used whenever uniformity assumptions are not fulfilled. This approach attempts to prevent multiple request being sent to a single node. We have used hash algorithm for security purpose. Keywords analytical, georouting protocol, heuristic, Load balancing, Wireless sensor network. I. INTRODUCTION Balancing storage resources is important in wireless sensor networks, because the memory size of sensor nodes is limited. Imbalance in network traffic load has a negative effect on network lifetime since transmit and receive operations are not evenly spread among network nodes. In order to extend the lifetime of a network we use load balancing in GHTs. This Geographic Hash Table (GHT) [10] is used to retrieve and store data from sensor nodes. Each node is assigned a value of certain range. For Example: 2D real interval [0,1] 2. Each data is appended with metadata. This metadata is hashed to a key value. Keys are stored at nodes. Fig. 1 : GHT Data Retrieval As shown in Figure [1], GHT maintains all the information about nodes. GHT is an approach for effectively retrieving data from a wireless sensor network. 2.1 Georouting II. RELATED WORK It is also called as geographic routing [7] or position-based routing.in georouting, instead of a specific destination node, a message is routed toward a specific geographic location and it is delivered to the node whose key is closest to destination. Load imbalance problem is reduced when modifying the underlying georouting protocol. Changing the georouting protocol comes at a price and it might impact on upper layers and existing applications. 2.2 Load Balancing in Networks Load balancing might split incoming transactions evenly to all servers, or it may redirect transactions to next available server as needed. The load balancing service [9] is usually provided by dedicated software or hardware, such as multilayer switch. Title TABLE 1: Literature Survey Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs (2004) Description This paper discussed the tradeoff between two quality measures for routing in growth restricted graphs. The two measures considered stretch factor, which measures the lengths of the routing paths, and the load balancing ratio, which measures how 57
2 Balancing Traffic Load in Wireless Networks with Curveball Routing (2007) Routing in Outerspace: Fair Traffic Load in Multihop Wireless Networks (2008) evenly the traffic is distributed. The problem is addressed to balancing the traffic load in multi-hop wireless networks, which considers a point-to-point communicating network with a uniform distribution of sourcesink pairs. This paper consider security-related and energy-efficiency issues in multi-hop wireless networks - The traffic density t(x, y), denoting the probability density that a random query traverses location (x, y) on its route from node s to node d. Source density s depends on parameters such as node locations and data query patterns and the destination density d depends on factors such as the number of keys managed by a node located at (x, y), and/or their popularity. 4.1 Hash function IV. DESIGN OF HASH FUNCTION It is any algorithm or subroutine that maps large data sets of variable length to smaller data sets of a fixed length. Hash function example as shown in figure[2]. Covering Space for In Network Sensor Data Storage (2010) This paper proposed to map data to a covering space, which is a tiling of the plane with copies of the sensor network, such that the sensors receive uniform storage load and traffic. Distributed algorithms proposed to construct the covering space with Ricci flow and Mobius transforms III. MODEL OF A NETWORK Source Node(s): The node which initiates the query process for a key k. Destination Node (d): The node responsible for key k. In Geographic routing protocol such as GPSR[10] a packet may encounter a dead end (i.e. target separated by a wall or obstruction).the packet is then diverted until a path to the target is available.they do not take path length into account when routing around local obstructions such that the packet moves from source to destination. Probability density functions: - The source density s(x, y), denoting the probability density of having the source node s of a random query located at (x, y). - The destination density d(x, y), denoting the probability density of having the destination node d of a random query located at (x, y). Fig. 2 : Hash Function In particular, we want to specify that the hash function can be computed in a fully distributed and localized way, thus according to typical wireless sensor network design guidelines. 4.2 Hash tables Hash functions are primarily used in hash tables, to quickly locate a data record (e.g., a dictionary definition) given its search key (the headword). 5.1 Analytical Approach V. MODULES First, we have to decide how many number of server going to be used and nodes being connected to it. Here we are considering nodes n1,n2,n3,n4 etc. and servers s1,s2 etc. are constructed. In this Analytical approach, a new node would be added to the server in two conditions. 1. When the number of data exceed the permissible limit in each node. 2. When we want to create a new node. 58
3 We have used simulation coding so that the data moves from highly loaded node to newly created node. Hence load over a particular node could be reduced and it could be balanced easily. Implementation Fig. 6 : Assigning data to newly created node. Fig. 3 : Server and Nodes Network 5.2 Heuristic Approach Heuristic approach attempts to prevent multiple request being sent to a single node. It does this by moving data from highly loaded node to some other nodes having lesser load. The analytical approach is based on uniformity assumptions for what concerns node and source density. When these assumptions are not met, we propose to use a different load balancing approach, based on (an iterative) heuristic that repeatedly changes key ranges assigned to nodes as long as a load balancing metric is improved. When there is a request for data from the source, the data would be parsed through the geographic hash table(ght) which will map the requested data through its associated key value. These key values are actually stored in the geographic hash table(ght). Hence mapping would be made to the node, which requested data could be retrieved. Implementation Fig. 4 : Data assigning to nodes. Fig. 5 : File transfer from one node to another node for load balancing Fig. 7 : Multiple request sending to one node. 59
4 improve storage and load balancing in GHT. In this paper, we are concerned with the load balancing problem in GHT, and we do not consider storage balancing. We left this storage balancing for future work. VII. REFERENCES Fig. 8 : File transfer to newly created node. Fig. 9 : File received from highly loaded node. VI. CONCLUSION The proposed analytical and a heuristic approach, has been shown to provide very good load balancing in ideal conditions, and to provide load balancing improvements comparable or even superior to those provided by existing schemes in practical scenarios, even when uniformity assumptions are not valid. The major advantage of the presented load balancing methodology over existing ones lies in its practicality and versatility. Imbalance in network traffic load instead has a negative effect on network lifetime, since energyconsuming transmit/receive operations are not evenly spread among network nodes. This explains why researchers have recently proposed techniques to [1] M. Elena Renda, Giovanni Resta, and Paolo Santi Load Balancing Hashing in Geographic Hash Tables, VOL. 23, NO. 8, AUGUST 2012 [2] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, Routing with Guaranteed Delivery in Ad Hoc Wireless Networks, Wireless Networks, vol. 7, no. 6, pp , [3] C. Canali, M.E. Renda, and P. Santi, Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks, Proc. IEEE MeshTech, pp , [4] L. Galluccio, G. Morabito, S. Palazzo, M. Pellegrini, M.E. Renda, and P. Santi, Georoy: A Location-Aware Enhancement to Viceroy Peerto-Peer Algorithm, Computer Networks, vol. 51, no. 8, pp , June 2007 [5] P. Gupta and P.R. Kumar, Critical Power for Asymptotic Connectivity in Wireless Networks, Stochastic Analysis, Control, Optimization and Applications, pp , [6] D.B. Johnson and D.A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer Academic Publishers, pp , [7] A. Mei and J. Stefa, Routing in Outer Space: Fair Traffic Load in Multi-hop Wireless Networks, Proc. ACM MobiHoc, pp , [8] L. Popa, A. Rostamizadeh, R.M. Karp, C. Papadimitriou, and Stoica, Balancing Traffic Load in Wireless Networks witcurveball Routing, Proc. ACM MobiHoc, pp , [9] R.Sarkar, W. Zeng, J. Gao, and X.D. Gu, Covering Space for InNetwork Sensor Data Storage, Proc. ACM/IEEE IPSN, pp , [10] S.Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin,and F. Yu, Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table, Mobile Networks and Appl., vol. 8, no. 4, pp ,
5 [11] L. Wang, F. Yao, and C.-W. Yi, Improved Asymptotic Bounds on Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks, Proc. ACM MobiHoc, pp , [12] A.D. Polyanin and A.V. Manzhirov, Handbook of Integral Equations, CRC Press, Boca Raton, [13] P. Lassila, and J. Virtamo, Spatial Node Distribution of the Random Waypoint Mobility Model with Applications, IEEE Trans. Mobile Computing, vol. 5, no. 6, pp , [14] J. Gao and L. Zhang, Tradeoffs between Stretch Factor and Load Balancing Ratio in Routing on Growth Restricted Graphs, Proc. ACM Symp. Principles of Distributed Computing (PODC), pp , [15] M. Albano, S. Chessa, F. Nidito, and S. Pelagatti, Q-NiGHT: Adding QoS to Data Centric Storage in Non-Uniform Sensor Networks, Proc. IEEE Conf. Mobile Data Management, pp , [16] C. Canali, M.E. Renda, P. Santi, and S. Burresi, Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks, IEEE Trans. Mobile Computing, vol. 9, no. 3, pp , Mar
Load Balancing Hashing in Geographic Hash Tables
Load Balancing Hashing in Geographic Hash Tables M. Elena Renda, Giovanni Resta, and Paolo Santi Abstract In this paper, we address the problem of balancing the network traffic load when the data generated
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks
Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks Claudia Canali IIT-CNR Pisa, ITALY M. Elena Renda IIT-CNR Pisa, ITALY Paolo Santi IIT-CNR Pisa, ITALY Abstract
On Game Theory for Load Balancing in Wireless Networks
On Game Theory for Load alancing in Wireless Networks Mehdi Kargar Nima Haghpanah and Mohammad Ghodsi epartment of Computer ngineering Sharif University of Technology, Tehran, Iran bstract We study the
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks
Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks Gowthami.V.R, Divya Sharma M.Tech, Dept. of E&C. NHCE, VTU, Bengaluru India. Assistant
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways
ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Energy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
IEQGOR to Increase the Quality of Service in Wireless Sensor Network
IEQGOR to Increase the Quality of Service in Wireless Sensor Network K.Mythilipriya 1, B.Arunkumar 2 III M.E., Dept of CSE, Karpagam University, Coimbatore, India 1 Assistant Professor, Dept of CSE, Karpagam
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Node Mobility Tracking In Mobile Ad-Hoc Networks in their Geographical Position (Dynamic Networks)
Node Mobility Tracking In Mobile Ad-Hoc Networks in their Geographical Position (Dynamic Networks) A. Subramani, A. Krishnan Abstract In mobile ad-hoc network, nodes of position change due to dynamic nature.
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers
1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics
Influences of Communication Disruptions on Decentralized Routing in Transport Logistics Bernd Scholz-Reiter, Christian Zabel BIBA Bremer Institut für Produktion und Logistik GmbH University of Bremen Hochschulring
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu
A Survey on Rendezvous Data Collection in Wireless Sensor Networks Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu Roadmap Background Introduction of state-of-art solutions Future works References
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 200 3 A Position Based Ant Colony Routing Algorithm for Mobile Ad-hoc Networks Shahab Kamali, Jaroslav Opatrny Department of Computer Science and Software Engineering,
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Modelling Quality of Service in IEEE 802.16 Networks
1 Modelling Quality of Service in IEEE 802.16 Networks Giuseppe Iazeolla1, Pieter Kritzinger2 and Paolo Pileggi2 1 Software Engineering and System Performance Modelling Group University of Roma Tor Vergata,
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
Towards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks.
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks. Ming Zhao Wenye Wang Department of Electrical and Computer Engineering North Carolina State University Raleigh, North Carolina 7695
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
