Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010
|
|
- Curtis Barrett
- 8 years ago
- Views:
Transcription
1 Literature Synthesis on Wireless Networks Management Veenesh Jeena (JNXVEE001) CSC4000W 2010 Abstract In this paper, we look a Wireless Mesh Networks (WMN). We discuss the importance of WMN s and some of the applications that they have, that traditional wired networks cannot achieve as easily and effortlessly. Managing WMN s however, are not as easily done as wired networks, due to the dynamic nature of the nodes. As a result, traditional network management methods, like Simple Network Management Protocol (SNMP) cannot be implemented and still be expected to work as efficiently as they do for wired networks. Because of this, new management tools have to be developed, to cope with the differences in wired and wireless environments. This paper has a look at two such tools, MeshMan and ReMesh, as solutions to management problems, and we see that they do address the problems of SNMP. 1. Introduction Wireless mesh networks (WMN) consist of routers and clients. The routers are devices that have minimal mobility, and provide the routing of data within the network. Clients are devices that connect to the network like cell phones, laptops or other wireless devices. A particular wireless mesh network may or may not be connected to the internet. [6] A characteristic of WMN are that they are multi-hop networks. That is, packets are routed from one router to another until the destination is reached. This allows WMN to operate over great distances by forming a path in a chain-like manner. WMN s are also redundant, so when one node fails, then rest of the nodes can still operate. Another characteristic of WMN is that they can add devices to the network without changing the physical layout of the network (since no cables need to be laid etc.). Adding nodes to the network also increases the reach of the network. Wireless networks are also decentralized, meaning that there is no single server used to manage the transmission of data. Each node is responsible for its own routing. This makes the network more flexible, and can allow routing to continue even when a router is removed from the network. WMN s are also self-forming, meaning that the mesh network forms itself, once the nodes have been configured and activated.
2 Below is an example of a WMN, displaying the above properties of a WMN. Figure 1: A wireless mesh network [15] A reason why WMN are such an attractive technology, especially in developing countries like countries in Africa, is that they are relatively cheap and can thus drive down the price of communication access. Also, WMN s can quickly form ad-hoc networks that are particularly useful in disaster relief situations when normal communication is not possible. [4] WMN do have their drawbacks. Managing WMN s can be a difficult task due the flexibility of the network. The network has the potential to change and grow all the time, thus, needing complex routing algorithms and methods for discovering new or failed nodes. Roaming also becomes an issue. When a user moves too far from a router, they may experience performance degradation, or they may even degrade the performance of users when they connect to another router, increasing its load. The service levels of a router can also be affect by the environment or distance from other routers. These drawbacks of WMN s are not easy to monitor since routers can be placed far apart from each other. Hence, as wireless networks become more ubiquitous, it is important to provide a solution to manage WMN s, which can be utilized to easily operate and troubleshoot networks. [1]
3 2. Wireless Network Management Wireless ad hoc networks are characterized by strong dynamicity, heterogeneity of devices, bandwidth and energy constraints. This makes fixed network management architectures unsuitable. WMN s require new management mechanisms adapted to their functioning. The management tool of such networks must support the following characteristics: [2] Self-organized Ad-Hoc networks require a management scheme capable of adapting to nodes heterogeneity and movement. Robust Management should be maintained in a dynamic environment. Low Cost Ad-Hoc networks are limited in resources, so the impact of management traffic should be limited. Users expect the quality of service (QoS) from mobile ad hoc networks to be the close to that of wired networks. [2] However, it can be a difficult task providing and managing QoS in an ad-hoc network environment [8] due to the dynamics and mobility of the nodes. There are different Network Management Models (NMM) that one can use, each with their respective strengths and weaknesses, each model created to cover a different aspect of an ad-hoc network. In general, a NMM should monitor the health and status of the nodes and provide warnings for any abnormalities in the network. [11] The most widely used NMM over the internet, is the Simple Management Network Protocol (SNMP). [17] The SNMP emerged out of the International Standards Organization s (ISO) Network Model, which addresses the following 5 aspects as the major functional areas of a NMM: [7] Fault Management Accounting Management Configuration Management Performance Management Security Management Despite SNMP being widely adopted in the internet and wired networks, it is not a viable solution for network management in wireless ad hoc networks. Problems with SNMP over wireless networks are that, firstly, SNMP is designed to work over a heterogeneous link layer where network bandwidth and storage space are abundant. [17, 1]. However, according to [1], since routers in a WMN have limited memory storage, SNMP is heavy on bandwidth consumption and as a result, SNMP cannot address nodes more than one hop away. Also, SNMP cannot retrieve certain statistics in a WMN; [5] reports that
4 SNMP cannot retrieve information like hop count or current gateway used because of the characteristic of a WMN. Bandwidth monitoring is also limited to only being able to monitor the currently used bandwidth. This is not enough to determine, if in a WMN, the reason for low bandwidth between two nodes is poor communication or low traffic. [5] In the next section we look at tools that have been developed to overcome the shortages of SNMP. 3. Alternative Wireless Network Management Tools There are various tools that were developed to overcome the shortcomings of SNMP. Here we will look at two of these tools, MeshMan [1] and the ReMesh project [5], each of whom works very differently from the other MeshMan MeshMan operates at the network layer, providing a low-overhead solution to network management and cope with the dynamics of a wireless network at the network level. [1] MeshMan uses OpenWRT Linux Distribution on the nodes, designed to be deployed on wireless embedded devices. MeshMan is specifically designed to overcome the following constraints of SNMP: [1] Robustness of network failure To diagnose and correct network layer faults, the solution should be independent of the network layer Self-reconfiguration Failure and addition of nodes should easily be handled. MeshMan makes use of 3 components, common to NMM s, to achieve its goals: [1] Managing Entity An application that runs at a management station that controls the collection, analysis and processing of network management information. Managed Device and Agent The component being managed by the managing entity. It is implemented as a daemon running in the background, collecting information and transferring it back to the managing entity. Network Management Protocol This defines the communication protocol used between the managing entity and managed device.
5 3.2. The ReMesh Project ReMesh is a set of tools, instead of a single tool, that when used together provides a NMM. ReMesh hardware runs on the OpenWRT operating system as well, configured for the ReMesh project. According to the ReMesh Project, in order to monitor the network, the network monitoring tool must address the following issues: [5] Resource Constrained Devices Exclusive use of wireless communication Fluctuating link qualities Unfriendly node placement To address these above problems, the ReMesh project has developed tools aimed at satisfying the following: [5] Low user interaction Tools should reduce and simplify user interaction. Reliability Changing parameters should not hamper node communications Low disk footprint Software on each device should be kept to a minimum Low runtime footprint The node s priority is to route data in the network, management tools should not be depleting a nodes memory with management queries. Failure resilience Tools should be able to deal with nodes that suffer from communication failures The MeshMan and ReMesh Solutions Resource Constraints MeshMan uses a hierarchical addressing scheme to overcome memory constraints in the network. The addressing scheme is aimed at reducing management memory overhead. It works as follows: Each node is automatically assigned a variable length mesh ID, in a hierarchical fashion using dot decimal representation. (e.g. a mesh ID of means 3 is a child of 2, and 2 is a child of 1). These ID s are stored in the mesh manager, MeshMan s managing entity, at a central location. These ID s then serve as routing directives for the queries generated by the mesh manager for the routers. The mesh ID representation is more compact and incurs less memory overhead, as compared to a routing scheme that concatenates 48-bit MAC addresses to nodes along a path. [1] ReMesh uses the Optimal Link State Routing (OLSR) protocol to reduce memory usage on the nodes. The OpenWRT implementation of SNMP uses about 10% of node memory,
6 whereas OLSR uses only about 4.9%. Other ways in which memory is conserved, is that only the most fundamental libraries needed in the OpenWRT system is installed, achieving a low disk footprint. [5] This is however, the only way ReMesh saves on memory usage on the nodes Network Performance and Bandwidth Monitoring MeshMan uses tcpdump at the mesh manager to collect information on network activity and the tcptrace tool to estimate the bandwidth consumption by management tools. [1] MeshMan does not seem to have a mechanism for monitoring the network performance or total network traffic or even traffic at a particular node; it only monitors management traffic. ReMesh uses two tools for network performance monitoring: the Multi Router Traffic Grapher (MRTG) and Ntop. MRTG is a tool to monitor the traffic on network links. It generates HTML pages, containing images which represent traffic on a link. Ntop is a Web-based traffic measurement and monitoring application. Ntop focuses on traffic measurement and monitoring as well as information for network optimization and planning. [5] ReMesh also implements a system made up of three protocols: A shell script to obtain statistics, a database to store collected data and a web page to display information. The script is executed in the routers, and the data is sent at certain intervals to be stored in the database. The web page can then display this information in the form of graphs. [5]
7 Figure 2: Example of graphs generated by the ReMesh tools [5] Self-Reconfiguration and Fault Management MeshMan uses an adoption daemon to help with network fault management and find optimal routing paths. The adoption process works as follows: A child node periodically broadcasts a Discovery packet, with its path cost to the mesh manager. The node receives packets from neighbouring parents advertising their path costs. The child evaluates the lowest cost path, and then is adopted by the new parent. The parent then sends a DeleteRoute notification to the manager, to inform it of route changes. To cope with node failures, the DeleteRoute message is again used to inform the manager of the lost link. [1] ReMesh has not yet implemented a fully working autonomous network configuration scheme. Each node has to be individually configured before they are deployed in the network. The only tool that ReMesh does use to help with network management is Broadcast shell (BShell). BShell is a tool that can automate the process of addressing all nodes, and running desired commands on each node. This helps with failure resistance by keeping a log of errors that could occur in executing commands on a node, and keep the remaining nodes functioning. [5]
8 4. Conclusion We have seen reasons why SNMP cannot be an effective NMM, particularly because SNMP: Needs a lot of resources (esp. for node memory) Cannot reach nodes more than 1 hop away Cannot retrieve all network statistics (hop count, current gateway used) Cannot do detailed bandwidth monitoring As a response to these problems, we have seen two solutions, MeshMan and ReMesh, which provide a comparatively better solution to SNMP on aspects of network management. However these two are not the only solutions for network management, other tools have been researched as well like: Ad hoc network management protocol (ANMP) [17] Common Management Information Protocol (CMIP) [17] Researched management tools aren t the only tools that that exist; commercial products already exist such as CISCO [3], MERAKI [10] and Open-Mesh [12]. These can be expensive to purchase, or even maintain. They do provide network management through the web browser, using a tool called a dashboard, which provides a geographical layout and visual information on the network. Further research on these management tools could also extend to involve mobile phones as a manager. With the processing power of mobile phones ever-increasing, management software could be ported to mobile phones. This would allow management on-the-move and even go on-site to the nodes to monitor them in real time.
9 References [1] Aseeja, V. and Zheng, R MeshMan: A management framework for wireless mesh networks. In Proceedings of the 11 th IFIP/IEEE international Conference on Symposium on Integrated Network Management (New York, NY, USA, June 01 05, 2009), IEEE Press, Piscataway, NJ, , DOI: /INM ( [2] Badonnel, R., State, R., and Festor, O Management of mobile ad hoc networks: information model and probe-based architecture. Int. J. Netw. Manag. 15, 5 (Sep. 2005), DOI= [3] CISCO available at: Accessed 26 April 2010 [4] Dhorat I. Afrimesh, Simple & Easy setup of wireless mesh networks for rural Africa Available from: (2009) Accessed 15 April 2010 [5] Duarte, J.L. and Passos, D. and Valle, R.L. and Oliveira, E. and Muchaluat-Saade, D. and Albuquerque, C.V., Management Issues on Wireless Mesh Networks, Latin American Network Operations and Management Symposium, September 2007, Pages 8-19, DOI: /LANOMS ( [6] Ian F. Akyildiz, Xudong Wang, Weilin Wang, Wireless mesh networks: a survey, Computer Networks, Volume 47, Issue 4, 15 March 2005, Pages , ISSN , DOI: /j.comnet ( 2/2/9fa1587e47665f1fb3f7fb461461dd6b) [7] International Standard, Information processing systems Open Systems Interconnection Basic Reference Model, Part 4: Management framework. Reference Number: ISO/IEC : 1989 (E) Available at: [8] Kaustubh S. Phanse, Luiz A. DaSilva, Addressing the requirements of QoS management for wireless ad hoc networks*, Computer Communications, Volume 26, Issue 12, 21 July 2003, Pages , ISSN , DOI: /S (02)00261-X. (
10 [9] Lei Zhang, Jogesh K. Muppala, Samuel T. Chanson, Integrated location management and location-aided routing system for mobile ad hoc networks, Journal of Parallel and Distributed Computing, Volume 66, Issue 3, March 2006, Pages , ISSN , DOI: /j.jpdc ( [10] Meraki available at: Accessed 27 April 2010 [11] Network Management Systems Available at: Accessed 29 April 2010 [12] Open-Mesh available at: Accessed 27 April 2010 [13] Rowe, D The mesh potato. Linux J. 2009, 188 (Dec. 2009), 5. Available at: y2= &coll=acm&dl=acm&cfid= &cftoken= Accessed 15 April 2010 [14] Simple Network Management Protocol Available at: Accessed 29 April 2010 [15] Senior Projects 2009 Available at: Accessed 27 April 2010 [16] Valle R. De T., Passos D., Albuquerque, C., Saade, D.C.M. Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool. In IEEE Symposium on Computers and Communications (July, 2008), , DOI: /ISCC ( [17] Wenli Chen, Nitin Jain, Singh,S., ANMP: Ad hoc network management protocol. IEEE Journal on Selected Areas in Communications, Volume 17, Issue 8, August 1999, Pages , ISSN , DOI: /
Mesh Potato: Mobile Network Visualization, Management and Provisioning. Zaheer Abrahams Tatenda M. Chipeperekwa Veenesh Jeena 08 May 2010
Mesh Potato: Mobile Network Visualization, Management and Provisioning Zaheer Abrahams Tatenda M. Chipeperekwa Veenesh Jeena 08 May 2010 1 1 Project Description Wireless mesh networks (WMNs) consists of
More informationMPMobVis: Mesh Potato Mobile Visualization, Monitoring and Provisioning
Honours Project Report MPMobVis: Mesh Potato Mobile Visualization, Monitoring and Provisioning Veenesh Jeena Supervised by: Professor Edwin Blake Co supervisor: Professor Gary Marsden Category Min Max
More informationMesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool
1 Mesh Topology Viewer (MTV): an SVG-Based Interactive Mesh Network Topology Visualization Tool Rafael De T. Valle 1, Diego Passos 2, Célio Albuquerque 2, Débora C. Muchaluat Saade 1 Abstract This paper
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationMaster Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks
Vishalakshi Prabhu H / International Journal of Engineering Research and Applications (IJERA) Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationThis document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationMERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations
More informationThe new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,
More informationInstructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations
Contract Number: IST-2000-26417 Project Title: Deliverable D8 : Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contractual Date: 31 May 2002 Actual Date: 14 August
More informationENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere
Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationWLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL *
WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL * Bhargavi Hiremagalur and Dulal C. Kar Department of Computing and Mathematical Sciences, Texas A&M University-Corpus Christi,
More informationEnterprise VoIP Services over Mobile Ad-Hoc Technologies
Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the
More informationBandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
More informationAutomated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement
Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka,
More informationThe Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationWireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007
Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationNetwork Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationMulticast monitoring and visualization tools. A. Binczewski R. Krzywania R. apacz
Multicast monitoring and visualization tools A. Binczewski R. Krzywania R. apacz Multicast technology now - briefly Bright aspects: Well-known technology Reduces network traffic and conserves the bandwidth
More informationWireless Mesh Networks: WMN Overview, WMN Architecture
2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationINTERNET OF THINGS 1
INTERNET OF THINGS 1 OUTLINE Introduction to IoT Technologies Ubiquitous Network Network Management Technologies RFID WSN Embedded Nanotechnology IPv6 UPnP SNMP Challenging Problems Conclusions and Future
More informationNetwork Topology. White Paper
White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationRUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
More informationManagement Issues on Wireless Mesh Networks
Management Issues on Wireless Mesh Networks Jairo L. Duarte, Diego Passos, Rafael L. Valle, Etienne Oliveira, Débora Muchaluat-Saade and Célio V. Albuquerque Instituto de Computação Universidade Federal
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationResource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
More informationWHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationCommunications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationDetails. Some details on the core concepts:
Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation
More informationA Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
More informationRelease: 1. ICTTEN5217A Plan a wireless mesh network
Release: 1 ICTTEN5217A Plan a wireless mesh ICTTEN5217A Plan a wireless mesh Modification History Not Applicable Approved Page 2 of 10 Unit Descriptor Unit descriptor This unit describes the performance
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationSolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
More informationNetwork Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationSOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
More informationDesign and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
More informationAn Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationNetwork Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationSolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
More informationInternational Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 2, No. 9, September 2013
29 Wireless Mesh Networks: WMN Architecture, Issues and Challenges Er.Pushpender Sarao, Asstt. Professor in SITM, Rewari, India Dr. Sohan Garg, Professor, C.C.S. University, Meerut, India Prof. (Dr.) YashPal
More informationWireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
More informationApplication Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationA survey on Wireless Mesh Networks
A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design
More informationSapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationAn IEEE 802.11 static mesh network design for isolated rural areas in developing regions
An IEEE 802.11 static mesh network design for isolated rural areas in developing regions Javier Simó Pablo Osuna < posuna@ehas.org> Joaquín Seoane Andrés Martínez
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationEnergy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
More informationUsing The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
More informationA Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
More informationTraffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
More informationNEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
More informationAbaré: A Deployment and Management Framework for Wireless Mesh Network
Abaré: A Deployment and Management Framework for Wireless Mesh Network Billy Pinheiro Federal University of Pará Email: billy@ufpa.br Vagner Nascimento Federal University of Pará Email: vagner@ufpa.br
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationA Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
More informationA SURVEY ON AUTOMATED SERVER MONITORING
A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. priscillapersis@gmail.com Abstract This paper covers the automatic way of server
More informationSolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
More information