Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
|
|
|
- Magdalen Evans
- 10 years ago
- Views:
Transcription
1 International Journal of Electronics Engineering, 3 (2), 2011, pp Serials Publications, ISSN : Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra Kumar 1, K. K. Tripathi 2 & Neeraj Tyagi 3 1 Associate Professor, RKGIT, Ghaziabad, (UP) 2 Prof. & Head, Department of Electronics Engineering, RKGIT, Ghaziabad, (UP) 3 Professor, Department of Computer Science, MNNIT, Allahabad, (UP) s: [email protected] Abstract: Ad hoc network is a collection of nodes which move independently and freely to communicate with other node through wireless links. These networks are logically represented as a set of clusters by grouping nodes which are in close proximity with one another. Clusterheads form the backbone and this clusterhead is used to route packets from one node to other nodes in the cluster. Independent nodes are supposed to have non-deterministic mobility pattern. Different heuristics use different policies to select clusterheads.many of these strategies are in favor of some node and these nodes show greater responsibility and try to deplete their energy faster, it lead them to drop out of the network. Index Terms: Adhoc Network, Mobility, Cluster, Clustered. 1. INTRODUCTION Ad hoc network is a collection of nodes that move independently and communicate with other nodes in wireless network. All nodes may be identical in their capabilities; some nodes are elected to form the backbone of wireless network. These nodes are known as clusterheads and gateways. The wireless backbone can be used either to route packets, or to disseminate routing information, or both. Nodes of ad hoc networks are powered by batteries due to their mobility. Communications cause the batteries to be discharged. Clusterhead batteries discharged soon as compared to other nodes in the wireless adhoc networks due to their high involvement in communication within the cluster. So, there is a need to distribute the responsibility of acting as a clusterhead to all nodes that is load-balancing, the basic interest of our paper. 2. SYSTEM MODEL There are no base stations in ad hoc network to coordinate the activities of subsets of nodes. So, all the existing nodes take decisions collectively. All communication occurs with wireless links. A wireless link may be set between a pair of nodes only if they are within wireless range of each other. We are considering bidirectional links with the assumption that the MAC layer mask unidirectional links and pass only bidirectional links. Two nodes with a wireless link said to be 1 wireless hop away from each other. The Multiple Access with Collision Avoidance (MACA) protocol [13] may be used to allow asynchronous communication while avoiding collisions and retransmissions over a single wireless channel Clusterhead Duration The mean time for which once a node is elected as a clusterhead, it stays as a clusterhead. This statistic is a measure of stability; the longer the duration the more stable the system. 3. PREVIOUS WORK 3.1. Network Management Choices The following two approaches are used to manage the ad hoc networks. The first approach is to have all nodes maintain knowledge of the network and manage themselves [5, 9, and 10]. This need to select leaders or develop clusters. It imposes a communication responsibility on every node. Each node must dynamically maintain routes to the rest of the nodes in the network. But in large networks the number of messages needed to maintain routing tables may lead to congestion in the network. This traffic may generate huge delays in message propagation from one node to another. This approach is not considered in the paper. The second approach is to identify a subset of nodes within the network and assign them with the extra responsibility of being a clusterhead of certain nodes in their proximity. The clusterheads are responsible for managing communication between nodes in their own neighborhood as well as routing information to other clusterheads in other neighborhoods. Tipical, backbones are constructed to connect neighborhoods in the network. In the Linked Cluster Algorithm [1], LCA, nodes communicate using TDMA frames. Each frame has a slot
2 284 International Journal of Electronics Engineering for each node in the network to communicate, avoiding collisions. For every node to have knowledge of all nodes in it neighborhood it requires 2n TDMA time slots, where n is the number of nodes in the network. A node p becomes a clusterhead if at least one of the following conditions is satisfied: (i) p has the highest identity among all nodes within 1 wireless hop of it, (ii) p does not have the highest identity in its 1-hop neighborhood, but there exists at least one neighboring node q such that p is the highest identity node in q s 1-hop neighborhood. Thus, LCA has a definite bias towards higher id nodes while selecting clusterheads. LCA heuristic was revised [4] to decrease the number of clusterheads produced in the original LCA and to decrease the number of clusterheads generated. In this revised edition of LCA (LCA2) a node is said to be covered if it is in the 1-hop neighborhood of a node that has declared itself to be a clusterhead. Starting from the lowest id node to the highest id node, a node declares itself to be a clusterhead if among the non-covered nodes in its 1-hop neighborhood, it has the lowest id. So, LCA2 favors lower id node while choosing clusterheads d-hop Clusters A d-hop cluster is one where no node in a cluster is more than d hops away from its clusterhead. The LCA heuristics were developed to generate 1-hop clusters and intended to be used within small networks of less than 100 nodes. In this case the delay between node transmissions is minimal and may be tolerated. However, as the number of nodes in the network grows larger, LCA will impose greater delays between node transmissions in the TDMA communication scheme and may be unacceptable. The Max-Min heuristic [12] was developed to extend the notion of 1-hop clusters and generalizes cluster formation to d-hop clusters. The rules for Max-Min heuristic are similar to those for LCA but converge on a clusterhead solution much faster at the network layer, 2d rounds of messages exchanges. Once again a node p becomes a clusterhead if at least one of the following conditions is satisfied: (i) it has the highest identity among all nodes within d wireless hop of it, (ii) p does not have the highest identity in its d- hop neighborhood, but there exists at least one neighboring node q such that p is the highest identity node in q s d-hop neighborhood. Max-Min and LCA generate different solutions because in case (ii) for Max-Min if a node becomes a clusterhead it will consume all nodes that are closer to it than any other elected clusterhead. This is a major difference between the two heuristics. However, like LCA, Max-Min also favors higher id nodes while electing clusterheads. 4. CONTRIBUTIONS The main objective was to develop an enhancement for existing heuristics to provide a contiguous balance of loading on the elected clusterheads. Once a node is elected a clusterhead it is desirable for it to stay as a clusterhead up to some maximum specified amount of time, or budget. The budget is a user defined constraint placed on the heuristic and can be modified to meet the unique characteristics of the system, i.e., the battery life of individual nodes. Some of the goals of the heuristic are: 1. Minimize the number and size of the data structures required to implement the heuristic, 2. Extend the clusterhead duration budget based on an input parameter, 3. Allow every node equal opportunity to become a clusterhead in time, 4. Maximize the stability in the network. 5. LOAD-BALANCING (NODE ID) 5.1. Data Structures The data structures necessary for the heuristic consist of two local variables: Physical ID (PID), and Virtual ID (VID). The PID is the initial id given and is unique for each individual node. Initially, the VID is set equal to the PID for each node. However, this changes with time to represent the selectability of a node. The VIDs for various nodes may be the same at certain times Basic Idea The node id load-balancing heuristic operates on the principle of a circular queue. That is, the virtual ids of each non-clusterhead node cycles through the circular queue at a rate of 1 unit per run of the load-balancing heuristic1. The circular queue has a minimum value of 1 and a maximum value of MAX COUNT. Upon reaching MAX COUNT a node will rotate to a value of 1 on the next cluster election heuristic run. As the cluster election heuristics run they will use the VIDs to determine the clusterheads of the network. In cases where the VIDs are the same the PID is used as a tie breaker. Once a node is determined to be a clusterhead, its VID is promoted to a value larger than MAX COUNT (MAX COUNT + VID). A clusterhead will maintain this value until it has exhausted its clusterhead duration budget. At this point it will set its VID to 0, i.e., less than any other node, and become a normal node.there are cases where two selected clusterheads A and B may move within close range of each other causing B to give way to A prior to B exhausting its clusterhead budget. In this case clusterhead B lowers its VID to the value it would have achieved had it not become a clusterhead. That is, B s VID just prior to becoming elected a clusterhead + the number of times the cluster election heuristic has run since B became
3 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network 285 a clusterhead. This will place B back into a place of high selectability to insure a quick return as a clusterhead Load-Balancing Pseudo Code (Clusterhead Load-Balancing) (If a node is a clusterhead check to see if the budget is exceeded. If it is then set the VID to 0 and become and ordinary node, otherwise increment the VID value.) Cluster load balance () { if (Clusterhead == My Node Id) if (Budget >= Max Budget) VID = 0; Clusterhead = FALSE; Budget = 0; else Budget += Work; else ++VID;} Load-Balancing (Degree) 6. DATA STRUCTURES The data structures necessary for the heuristic consist of one local variable: Elected Degree. The Elected Degree represents the degree of the node when it was initially elected a clusterhead. This value will be used for comparison purposes described below Basic Idea Because the Degree based heuristic elects clusterheads with a different policy than LCA and Max-Min heuristics, we must use a different load-balancing policy. The degree loadbalancing heuristic monitors the amount of change, or delta, in the degree of an elected clusterhead from the time it is elected a clusterhead. That is, on each run of the heuristic the difference is taking between the current degree of the clusterhead and the Elected Degree. If the absolute value of the difference exceeds an input value MAX_DELTA, then the clusterhead is demoted to an ordinary node. The Degree based heuristic, much like the LCA2 heuristic, does not allow for adjacent clusterheads. Therefore, there may be cases where an elected clusterhead will give way to another clusterhead based on the heuristic and not on exceeding the MAX DELTA parameter Load-Balancing Pseudo Code *Clusterhead Load-Balancing (If a node is a clusterhead check to see if it has exceeded MAX DELTA. If it has then set it to an ordinary node. )* Cluster load balance () if (Clusterhead == My Node Id) if (ABS(My Degree-Elected Degree)>=MAX DELTA) Clusterhead = FALSE; 7. EXPERIMENTS AND RESULTS In section 5.2, the load-balancing heuristic has many approaches. Example, once a clusterhead loses its leadership role before exhausting its clusterhead budget, it may set the node s new virtual id to 0, or its Old Virtual id + Number of runs of the heuristic since it was elected a clusterhead. Additionally, the clusterhead budget may be a function of (i) contiguous times elected as a clusterhead, (ii) maximum amount of work performed or load, (iii) minimum amount of work performed or idle, (iv) or any combination of these. Work is calculated to be the summation of the number of nodes in the cluster times the sample period. That is, n Work = Σ sample period duration () i *() cluster size i i= 1 For the purposes of these simulations we have set the clusterhead budget to be a function of the maximum amount of work it performs (5000 units of Work). That is, once a clusterhead becomes a clusterhead it will remain a clusterhead until it has exhausted it maximum work load, or until it loses out to another clusterhead based on the rules of the cluster election heuristic. Figure 1 show the clusterhead durations for the Max-Min heuristic with and without load-balancing applied. The load-balancing makes a noticeable difference in the clusterhead duration (ranging from 14% to 28%). Furthermore, the variance of the clusterhead duration without load-balancing applied is more than 500% greater than with load-balancing. This shows that while the load-balancing heuristics generates longer clusterhead durations, it also produces much tighter and more deterministic responses (stability).therefore, once a clusterhead budget is exceeded, a different clusterhead is elected and the process repeats. This provides the loadbalancing effect of distributing the responsibility of being a clusterhead among all nodes. Figure 2 shows the clusterhead durations for the LCA heuristic with and without load-balancing applied. The clusterhead duration for LCA is only slightly greater without load-balancing than with it. However, we see that the variance of clusterhead duration for LCA without loadbalancing is 400% larger than with load-balancing. Therefore, while LCA with loadbalancing produces slightly shorter clusterhead durations, load-balancing once again, provides a much tighter and more deterministic response (stability).what we are observing is that clusterheads exist for only a single snapshot of the simulation and then give way to another node. The variance will be small because each clusterhead is only serving as a clusterhead for one snapshot, on the average. While we want each node to serve as a clusterhead, we would like for each node to stay a clusterhead for some period of time. In this case longer than one snapshot. With this knowledge, the variance of the
4 286 International Journal of Electronics Engineering Figure 1: Clusterhead Duration and Variance, Max-Min Figure 2: Clusterhead Duration and Variance, LCA Degree based heuristic with load-balancing is actually quite good and provides a much needed larger clusterhead duration. 8. CONCLUSION Two clusterhead load-balancing heuristics have been proposed for ad hoc networks. The first heuristic is for cluster election heuristics that favor the election of clusterheads based on node id. Here the heuristic places a budget on the contiguous amount of time that a node stays a clusterhead.as seen from the simulation results, this heuristic produces larger clusterhead durations while decreasing the variance, increased stability. The second heuristic is for cluster election heuristics that favor the election of clusterheads based on the degree of connectivity. A clusterhead stays a clusterhead as long as its degree of connectivity is within a specific range. The Degree based heuristic was simulated with this load-balancing heuristic. The results show a much needed increase in clusterhead duration while still maintaining a low variance. REFERENCES [1] D. J. Baker and A. Ephremides. The Arch. Org. of a Mobile Radio Network via a Distributed Algorithm. IEEE Transactions on Commm,COM-29(11): , November [2] D. J. Baker, A. Ephremides, and J. A. Flynn. The Design and Simulation of a Mobile Radio N/W with Distributed Control. IEEE Journal on Selected Areas in Comm., pp , [3] B. Das and V. Bharghavan, Routing in Ad-Hoc Networks Using Minimum Connected Dominating Sets. In Proceedings of ICC, [4] A. Ephremides, J. E. Wieselthier, and D. J. Baker. A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling. Proceedings of IEEE, 75(1), 56-73, [5] E. Gafni and D. Bertsekas, Distributed Algorithms for Generating Loop-free Routes in Networks with Frequently Changing Topology. IEEE Transactions on Communications, pp , January [6] M. Gerla and J. T. C. Tsai, Multicluster, Mobile, Multimedia Radio Network. ACM Baltzer Journal of Wireless Networks, 1(3), , [7] L. Kleinrock and J. Silvester, Spatial Reuse in Multihop Packet Radio Networks. Proceedings of the IEEE, 75(1), , January [8] Abhay K. Parekh. Selecting Routers in Ad-Hoc Wireless Networks. In ITS, [9] V. D. Park and M. S. Corson. A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. In Proceedings of IEEE INFOCOM, April [10] C.E. Perkins and P. Bhagwat. Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of ACM SIGCOMM Conference on Communication Architectures,Protocols and Applications, pp , August [11] Jennifer Lundelius and Nancy Lynch. An Upper and Lower Bound for Clock Synchronization. Information and Control, Vol [12] A. Amis, R. Prakash, T. Vuong, and D.T. Huynh. Max-Min D-Cluster Formation in Wireless Ad Hoc Networks. In Proceedings of IEEE INFOCOM, March [13] A. Tanenbaum. Computer Networks (3rd Edition). Prentice Hall, Upper Saddle River, N.J., [14] Alan D. Amis Ravi Prakash Department of Computer Science,University of Texas at Dallas Richardson, Texas
5
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
ABSTRACT. Keywords Mobile Ad-Hoc Networks, Weighted Clustering Algorithm, Load Balancing. 1. INTRODUCTION
A Load-Balancing and Weighted Clustering Algorithm in Mobile Ad-Hoc Network Abdel Rahman H. Hussein, Sufian Yousef, and Omar Arabiyat Faculty of Science & Tecnology Anglia Ruskin University,UK Ah455@ anglia.ac.uk,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm
Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos, Basilis Mamalis Department of Cultural Technology
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
Cluster Computing 5, 193 204, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks MAINAK CHATTERJEE, SAJAL K. DAS and
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet
International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1
A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
NEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Optical interconnection networks with time slot routing
Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and
Quality of Service Support in Mobile ad-hoc IP Networks *
Quality of Service Support in Mobile ad-hoc IP Networks * Derya H. Cansever GTE Laboratories 40 Sylvan Road Waltham, MA 02454 Arnold M. Michelson GTE Government Systems 400 John Quincy Adams Road Taunton,
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
2. Related protocols. 1. Introduction
Virtual Cellular Infrastructure For Mobile Ad hoc Network Muthu Chidambaranathan.P, Sundaresan S [email protected] Department of electronics and communication engineering National institute of technology,
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks
246 Joint Link Scheduling and Routing for Load Balancing in STDMA Wireless Mesh Networks Whoi Jin Jung, Jae Yong Lee and Byung Chul Kim Dept. of Info. Comm. Engineering, Chungnam National University, Korea
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks
R. Pandi Selvam et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2),,82-828 Stable and Flexible Weight based Clustering Algorithm in Mobile Ad hoc Networks
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface
Load Balancing Routing in Multi-Channel Hybrid Wireless Networks with Single Network Interface Jungmin So Nitin H. Vaidya Coordinated Science Laboratory, University of Illinois at Urbana-Champaign Email:
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
Energy Aware Load Balancing Clustering in Mobile Ad Hoc Networks
Energy Aware Load Balancing Clustering in Mobile Ad Hoc Networks Ratish Agarwal, Roopam Gupta, and Mahesh Motwani Abstract A mobile ad hoc network is a decentralized type of network formed by collection
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Controlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu [email protected] Communications Laboratory 09.03.2004 Content of Presentation
Performance Evaluation of Mobility Speed over MANET Routing Protocols
International Journal of Network Security, Vol., No.3, PP.28 38, Nov. 2 28 Performance Evaluation of Mobility Speed over MANET Routing Protocols Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz 2, and Ahmed
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
