Experimental evaluation of two open source solutions for wireless mesh routing at layer two
|
|
|
- Jade Harrell
- 10 years ago
- Views:
Transcription
1 Experimental evaluation of two open source solutions for wireless mesh routing at layer two Rosario G. Garroppo, Stefano Giordano, Luca Tavanti Dip. Ingegneria dell Informazione Università di Pisa Via G. Caruso, 16 Pisa, I-56122, Italy Abstract The paper reports the outcome of an experimental evaluation of two open source solutions for realising a Wireless Mesh Network (WMN). Both works at layer two of the ISO/OSI stack and are transparent to the IP layer, i.e. they allow keeping the existing TCP/IP stack unchanged and avoid dealing with the complex IP configuration and management tasks. The first solution is the upcoming IEEE s standard, as implemented by the open80211s project, and the other is the B.A.T.M.A.N. routing protocol, in its layer-2 version. We compared them in a small experimental testbed, with main focus on their behaviour in typical mesh situations. We found that both have strengths and shortcomings, but none can be claimed to be completely mature. I. INTRODUCTION The technology backing Wireless Mesh Networks (WMNs) is in most cases common to all kinds of deployments, be they academic, hobbyist, or commercial. The vast majority of them uses the IEEE family of standards [1] to implement the point-to-point links (medium access control (MAC) and physical layer). The proper mesh topology is realised through IP layer solutions, such as the Optimised Link State Routing (OLSR) protocol [2], the Better Approach To Mobile Adhoc Networking (B.A.T.M.A.N. or just Batman) routing protocol [3], and other proprietary protocols (see e.g. [4] and the references therein). Lately, however, much interest has been put on routing solutions working below the IP layer. This approach offers several interesting features. It reduces the complexity of mesh platforms, since there is no need to load and run the (cumbersome) IP stack. It provides a faster and more complete access to MAC and physical layer information, which can be used to improve the routing decisions and shorten the time to react to unexpected events. It allows synergies on mechanisms that are common to both the routing and MAC protocols (such as beacons and other periodic messages). It is not bound to a specific layer three addressing scheme (for example, a change from IPv4 to IPv6 would be completely painless, but even non-ip schemes, such as IPX, would go). On the flip side, routing at layer two cannot take advantage of the information on the network architecture carried by the IP addressing scheme, since MAC addresses are flat. Hence, scalability represents a serious hurdle, and in fact the majority of current layer-2 meshing solutions are addressed to small to medium networks only. Clearly, for a proper implementation to be completely transparent to the IP layer, mechanisms must be devised so that the network layer can work while being completely unaware of the multi-hop nature of the underlying (wireless) network. In other terms, the mesh must be entirely managed at layer two, so that all mesh devices, even the farthest ones, are seen by the upper layer as directly connected through a one-hop link, as it happens for a single Ethernet broadcast domain. Presently, there are very few working mesh solutions that are transparent to the IP layer. A couple of them have been developed by the IEEE: j [5] and s [6]. The former is in fact a trivial multi-hop relay mechanism, in which Relay Stations (RSs) have been introduced with the primary goal of extending the coverage area of the base station (BS). Therefore, they do not build a proper WMN, since RSs lacks self-configuring capabilities and are used just to form a BSrooted tree. Conversely, IEEE s is a proper WMN built within the MAC layer. The standardisation is still in progress [7]. Nonetheless, thanks to the open80211s project, there is already a working (though incomplete) implementation [8]. Among the transparent meshing solutions developed outside standardisation bodies, it is worth mentioning Microsoft Mesh Connectivity Layer (MCL) [9], the Roofnet project [10], and Batman Advanced, a version of Batman for layer two routing [3]. Actually, both MCL and Roofnet are layer-2.5 solutions, in the sense that they are inserted into the protocol stack as a layer on its own, between the network and MAC layers. The advantage is that they are transparent to both neighbouring layers, but, on the other hand, they introduce extra overhead, in the form of additional management frames, additional frame headers and extra processing time. The paper presents an experimental assessment of two of the cited protocols: IEEE s and Batman Advanced. The goal is to verify their performance in terms of route stability and recovery times, two aspects that are essential in the prospect of setting up reliable deployments. Hence we did not focus on gross figures such as the overall network throughput, but on the response of the protocol procedures in specific situations and in a controlled environment. The features of the two protocols are presented in Sections II and III, respectively. Then, Section IV describes the testbed we set-up for the evaluation and reports the outcome of the tests.
2 II. IEEE S In this Section we outline just the main concepts of IEEE s according to one of the latest draft standards. Further details can be found in [11] or directly from [7].We then describe the features of open80211s, the software that provides the current implementation of s. A. The IEEE s Draft Standard IEEE s conceives a new network architecture that is deployed on top of the existing standard layer. The goal is to provide a protocol for the auto-configuration of paths between stations in the Wireless Distribution System (WDS). In other terms, stations are called to create and exploit a multi-hop communication network to transport data across the WDS. The routing functions are thus brought at level two of the ISO/OSI stack and renamed path selection and frame forwarding procedures. Clearly, since path selection works at layer two, frame forwarding is performed on the basis of the MAC addresses. The basic IEEE s network entity is the mesh station (in short, MS). In addition to having all the characteristics of any legacy station (STA), every MS is also called to relay the traffic generated by other MSs. The set of MSs and connections among them forms the wireless backbone of the mesh, or Mesh Basic Service Set (MBSS). To properly execute the new mesh services and algorithms, and specifically to build the set of paths that forms the mesh backbone and to allow frame forwarding, the draft introduces new mechanisms and adds new frame formats and Information Elements (IEs). The most meaningful are the Path Selection, the Peer Link Management, and the Link Metric frames for the establishment and management of the paths across the MBSS. The mandatory path selection algorithm that all MSs must implement is called Hybrid Wireless Mesh Protocol (HWMP). HWMP combines a reactive technique with an optional proactively-built tree topology. The tree connects all MSs to a root MS so that a path is always available between all MSs. In the reactive mode, MSs are allowed to communicate by means of paths created on-demand. This mode is used when there is no configured root, or when it can provide a better path to the destination. Both techniques use common messages and processing rules. The Path Request (PREQ), Path Reply (PREP), Path Error (PERR) and Root Announcement (RANN) information elements are flexibly structured to allow for the needs of both protocols. In the HWMP on-demand path selection algorithm, a source MS s wanting to send data to a destination MS t broadcasts a PREQ frame indicating the MAC address of t. All MSs receiving the PREQ create or update their path to s (but only if the PREQ contains a sequence number, DSN, greater than the current path or the same DSN and a better metric). Every MS, before re-broadcasting the PREQ, must update the metric field to reflect the cumulative metric of the path to s. Once t (or any allowed intermediate MS) receives the PREQ, it sends s a unicast PREP. If t receives further PREQs with a better metric (and same or greater sequence number), it sends a new PREP along the updated path. Intermediate MSs shall then forward the PREP(s) to s along the best path (stored during the PREQ flooding phase), and, when the PREP reaches s, the path is set up and can be used for a bi-directional exchange of data. If more than one PREP is received, the PREPs following the first are processed only if their information is not stale and announces a better metric (same rules of PREQ apply). As for the proactive HWMP tree, it can be set up either by using PREQ/PREP messages, or by means of RANN frames. The former technique aims at creating and maintaining a set of paths towards the root from all MSs, whereas the latter just disseminates information about the metrics for reaching the root, but leaves each MS the possibility to set up the path whenever it needs it. HWMP sets up the mesh paths according to the announced metric. The s draft defines a mandatory metric, called Airtime Link Metric. This metric estimates the channel resource consumption as a function of the loss rate and link bandwidth. The definition is the following: c a = [ O + B t r ] 1 1 e f. (1) In the formula, O is a constant that quantifies the channel access and protocol overhead (in micro-seconds), B t is the test frame length (8192 bits), r is the data rate (in Mbps), and e f is the test frame loss ratio (the probability that, when a frame of size B t is transmitted at the current bit rate r, the frame is corrupted due to transmission errors). The estimation of both r and e f is left to the implementer of the network interface card driver. B. The open80211s implementation The goal of the open80211s project [8] is to develop a reference implementation of the IEEE s draft standard. Accordingly, it tries to follows as closely as possible the dictates of the draft. However, being the project still in progress, the implementation is not complete. For example, in the current implementation, HWMP works in the reactive mode only, there are no Link Metric frames, and so on. However, apart from these shortcomings, open80211s is indeed a valuable (and fairly updated) implementation of the IEEE draft, which has recently been embedded into the Linux kernel. An interesting part is the computation of the airtime metric. The general formula is the same as (1) (with the constants O and B t set, respectively, to 1 and 8192). Yet it is worth seeing how the terms r and e f, whose definition is left as a local implementation choice, are computed. The open80211s implementation uses these formulae: e f [k] = p f [k] + 8 p f [k 1], (2a) 9 p f = n f, (2b) n tx where k indicates a generic time instant, and n f and n tx count the numbers of failed frame transmissions and trans-
3 mitted frames, respectively. Both are recorded between two consecutive computations of e f (i.e. between k 1 and k). As for r, this is the rate of the very last transmission, which depends on the policy employed by the rate control algorithm (RCA). The RCA is also the entity that computes e f. The exact time instants k are handled internally by the RCA; however two successive computations must be separated by at least 13 ms. HWMP samples e f every time a path in the node cache is added or updated, i.e. every time a PREQ or PREP is received. III. B.A.T.M.A.N. ADVANCED The development of B.A.T.M.A.N. (Better Approach To Mobile Ad-hoc Networking [3]) started as an attempt to overcome the shortcomings of OLSR. According to the developers of Batman, the OLSR protocol as specified in RFC 3626 was not completely functional in practical scenarios, and particularly for large deployments and in lossy environments. Part of these problems were ascribed to the link-state nature of OLSR, which involves a large amount of protocol and computational overhead and requires an accurate synchronisation of the information over all nodes, tasks that might be difficult to accomplish in large wireless networks. The approach of Batman is to spread the knowledge about the best end-to-end paths to all participating nodes. Every node perceives and maintains only the information about the best next hop towards all other nodes. Therefore there is no need for the global dissemination of local topology information. The basic working principle is rather simple. Every node periodically broadcasts the so-called originator messages (OGMs) to inform the neighbouring nodes (and the network in general) about itself. OGMs are small packets (52 bytes including IP and UDP headers) that contain the address of the originator, the address of the node transmitting the packet, a Time To Live (TTL) and a sequence number (SQ). OGMs are selectively re-broadcast to flood the whole network. Each node is allowed to re-broadcast the OGM only once, and only if it has been received from a neighbour which is currently held as the best next hop towards the initiator of the OGM. The best next-hop neighbour to a given destination node D is chosen as the neighbour through which the OGMs from D are received with the smallest delay and packet loss. The idea is that if OGMs are propagated through paths having links with poor quality or excessive load (saturated), they will suffer from packet loss and/or delay, whereas OGMs that travel along good paths will propagate faster. It can be noted that path computation is performed on a hopby-hop basis, and the OGMs carries no metric information. The quality of the next hop to the destination is simply a (local) function of the number of received OGMs through that link. The SQ field is used to check the bi-directionality of the links and is also included in ranking the potential next hops. Every node keeps a sliding window holding the SQs received from each originator and from each neighbour. The node stores the SQs from the last one (say n) to the one numbered n (W 1), where W is the size of the window. When a new SQ is received (say m), the window is moved and the SQs older than m (W 1) are dropped. If the window associated to the neighbour from which the last OGM has been received is the one that contains the most SQs, then this neighbour becomes the current best-hop towards the originator. Batman was first realised as a classic layer three routing protocol, using UDP packets to exchange routing information. Later on, an extension called Batman Advanced (in short, batman-adv) was developed to work at layer two. This version, similarly to IEEE s, emulates an Ethernet bridge, so that all nodes appear to be attached to a direct link and all protocols operating on top of it are not aware of the multi-hop nature of the underlying network. The working principles of batman-adv are the same of classic Batman, with the obvious adaptations for handling layer-2 addresses instead of IP addresses. IV. EXPERIMENTAL ASSESSMENT OF THE PROTOCOLS The testbed to assess the behaviour of the two meshing schemes was composed by four mesh nodes, as depicted in Fig 1. The reason for having such a small testbed is that it is somehow possible to control the various environmental parameters. This allows for a much finer investigation than on a large scale testbed, where complex propagation conditions, node anomalies and external factors are often out of control, and thus only gross figures can be collected. Fig. 1. The experimental testbed. The nodes are laptop PCs run by the Linux operative system (specifically, Ubuntu with kernel ) and equipped with Atheros cards supported by the new ath5k drivers. In all tests, the source and destination nodes are the laptops S and D, while the intermediate nodes are A and B. The direct link between S and D was tore down by placing the laptops sufficiently apart and by setting a lower transmission power, so that the quality of link S-D became poor enough to push both batmanadv and open80211s to always prefer the multi-hop path to the direct link. Both open80211s and batman-adv were run with the default parameter values. Traffic has been generated with the D-ITG software [12]. For all tests, unless otherwise specified, we generated UDP traffic with 512-byte packets and 100 packets per second. The tests can be divided into two sets, as a function of the feature under test: path and throughput stability, and recovery after a node failure. As already outlined, we reckon these two aspects are the most critical in a real scenario. The outcome of each test is described in the following subsections.
4 Fig. 2. Throughput of batman-adv along the two paths. A. Path and throughput stability The goal of this test is verifying whether the protocols use a stable path from S to D, and, in case of path changes, check whether they result in reduced transfer rates. Although stability cannot be regarded as an absolute value, in mostly static deployments, such as the WMN backbone, frequent path swapping come with an unavoidable overhead and possible performance reduction. Therefore mesh protocols that privilege stability should be preferable. The test consisted in running a 40-second-long traffic flow over a static network. Fig. 2 and 3 report the throughput of batman-adv and open80211s along the paths S-A-D (black) and S-B-D (red) in three different runs. Throughput is averaged over 1 s intervals, and refers to physical layer throughput, i.e. it also includes MAC retransmissions. Hence the more the line is close to the 100 pkt/s value, the better the channel is (less retransmissions). We can note that batman-adv is generally more stable. Conversely, open80211s presents a considerable path swapping. A deeper analysis of the behaviour of open80211s allowed us to discover the reason of this oscillation among the two paths. open80211s implements a feature that was defined as optional in one of the early IEEE s drafts and that is illustrated in Fig. 4 (which is a graphical representation of an actual traffic trace sniffed from the testbed). When the destination node of the path discovery procedure receives the first PREQ, it shall increase the destination sequence number (DSN) that is going to put in the PREP. However, the node may decide not to increase the DSN it will put in the successive PREPs for a certain time interval (called HWMP_RT_NETDIAMETER_TRAVERSAL_TIME). As a result, when the originator of the path discovery procedure receives more than one PREP, since it must consider only the one(s) with the highest DSN, it will discard all the others, even though they announce a better metric. The example Fig. 3. Throughput of open80211s along the two paths. in Fig. 4 shows two PREPs that are generated within the same HWMP_RT_NETDIAMETER_TRAVERSAL_TIME interval, but only the DSN of the first PREP in incremented. Hence S discards the second PREP (with DSN=169), even though it carries a better metric (152 instead of 8193). This option, intended to improve route stability, in fact produces the opposite effect. The choice of the path depends on the first received PREP, which in turn is produced as a response to the the first received PREQ. However, the receiving order is determined essentially by the medium access policy, which, in IEEE based networks, is based on random number generation (the backoff counter). As a result, path selection becomes in turn a randomised process. This explains the oscillations even in a rather controlled environment such as our testbed. We fixed the problem by removing the check on the HWMP_RT_NETDIAMETER_TRAVERSAL_TIME parameter from the code. Thus we let the destination node use the same (increased) DSN for all PREPs it generates in response to PREQs belonging to the same path discovery procedure. We then positively verified the correspondence between the path selected by S and the airtime metric values it received. The outcome of the tests run with the amended code is reported in Fig. 5. Surprisingly, the graphs show that there is no apparent change in the protocol behaviour, as path alternation is still present. However, there is a fundamental difference. The oscillation is now driven by the metric values registered along the two paths. Unfortunately, however, not always does the metric reflect the present channel quality of the paths. This
5 Fig. 6. Values (in logarithmic scale) of the airtime metric registered over the small testbed network. Fig. 4. values. Time-space graph of PREQ/PREP frames with DSN and metric (M) can be seen from Fig. 6, which reports the values of the Metric field of the PREP messages sent from A to S during one of the tests. Fig. 7. The physical data rate registered over one link of the test network. Fig. 5. Throughput of the modified open80211s along the two paths. From a quick analysis, we found that the values are a function of the current transmission rate r only, and that the computed e f [k] is always zero (apart from very rare exceptions). This latter point can be explained by the fact that the computation of p f is not based on the single frame transmissions, but on the whole frame exchange sequence. Therefore, unless the channel is very unfavourable, it is quite unlikely that a frame is not correctly delivered after the MAX_RETRY_LIMIT attempts allowed for the IEEE MAC layer. In addition, MAC can also take advantage of rate adaptation procedures, which usually select a less efficient but more robust modulation scheme after every failed frame transmission, thus continuously increasing the success probability of the next attempts. As a result, all registered values can be traced back to the formula c a = ( /r), which is the direct simplification of (1) when p f = 0. With reference to Fig. 6, we can distinguish four sets of values: 228, 342, 456, and 683. It is easy to verify their correspondence to 36, 24, 18 and 12 Mbps data rates. The successive graph (see Fig. 7) plots the physical data rate we registered over the link A-D. The variability of the data rate is apparent. Some plateaux can be detected, but there are also several peaks and notches. A fair relationship with the metric values of Fig. 6 can also be seen. Recall that the highest is the date rate, the smallest is the airtime metric, hence the trends of the two graphics should be complementary (and, for the most part, they are). B. Recovery after a node failure This test aims at verifying the ability of the protocol to restore the communication after a node failure. In practice this event may occur in a number of circumstances, e.g. an actual node failure, or a temporary node unavailability due interferences and/or obstructions. For this purpose we abruptly turned off the wireless interface of the intermediate node that, at that moment, was relaying the traffic from S to D. We then measured how long the protocol takes to find the alternative path to D. Finally, we turn on again the failed node and observe whether and when this node is included again in the forwarding process. The results are in Fig. 8 and 9. The vertical bars show the time instants of the node failure (off) and restart (on). During our tests, batman-adv never succeeded in resuming the communication after the node failure. A slight improvement was registered when the intermediate node was turned on again, but the throughput never reached the same level and stability it had before the failure. We investigated more on this behaviour and discovered that batman-adv declares an originator as lost only if a PURGE_TIMEOUT interval elapses from the last received OGM without hearing any more OGMs from that node. The current default value of PURGE_TIMEOUT is 200 s. Therefore batman-adv is not able to promptly react to sudden topology changes, as it demands all path updates to the expiration of the PURGE_TIMEOUT timer. It is therefore easy to understand that it is not possible to achieve recovery times smaller than the OGM creation interval, since setting PURGE_TIMEOUT to less than ORIGINATOR_INTERVAL would produce continuous path breakages and re-establishments. How to correctly tune the
6 Fig. 8. Throughput of batamn-adv for the recovery test. seem to be mature enough. It lacks some notable features (such as the proactive path selection, the portal), and it reveals some instability. Conversely, under static scenarios, batman-adv shows much more reliable performance. In case of node failure, open80211s recovers quite rapidly, sometimes even so fast that the service appears to be seamless. On the other hand, batman-adv has serious problems in resuming the communication after an abrupt interruption. As a result, it is hard to find a winner in this comparison, as the two solutions have both strengths and weaknesses. Rather, we could even say that both implementations are losers, since none of them is mature enough to handle situations that are typical of any realistic scenario. ACKNOWLEDGMENT This work was supported by the Italian Ministry of Instruction, University and Research (MIUR) under the PRIN 2007 research project SESAME (Scalable Efficient Secure Autonomic MEsh networks) and under the FIRB project InSyEme (Integrated System for Emergency, grant number RBIP063BPH). The authors would like to thank Alessia Moschini and Francesco Cappuccio for their help in setting up the testbed and running the trials. REFERENCES Fig. 9. Throughput of open80211s for the recovery test. two parameters in order to achieve a good trade-off among stability, overhead and fast-recovery will be the focus of future work. As for open80211s, the failure was almost unnoticeable from the application perspective, as the traffic was immediately routed along the other path. Similarly, the re-activation of the failed node had no impact on the protocol behaviour nor on network performance. Sometimes, the re-entering node was immediately chosen to forward the frames (second and third case). V. CONCLUSION From the experimental analysis we can draw the following conclusions: The current implementation of the IEEE s draft standard provided by the open80211s project does not [1] IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Dec [2] T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), Oct. 2003, IETF RFC [3] A. Neumann, C. Aichele, M. Lindner, and S. Wunderlich, Better approach to mobile ad-hoc networking (b.a.t.m.a.n.), April 2008, IETF Internet-Draft (expired October 2008). [Online]. Available: [4] I. F. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: a survey, Computer Networks, vol. 47, pp , [5] IEEE Std j-2009 IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 1: Multiple Relay Specification, May [6] IEEE P Task Group s, IEEE Unapproved draft standard P802.11s/D2.06, January [7], Status of Project IEEE s Mesh Networking. [Online]. Available: update.htm [8] The open80211s project. [Online]. Available: [9] Microsoft Research, Self organizing wireless mesh networks. [Online]. Available: [10] J. Bicket, D. Aguayo, S. Biswas, and R. Morris, Architecture and evaluation of an unplanned b mesh network, in ACM Annual International Conference on Mobile Computing and Networking (MobiCom), August [Online]. Available: [11] R. G. Garroppo, S. Giordano, and L. Tavanti, Implementation frameworks for IEEE s systems, Computer Communications, vol. 33, no. 3, pp , February [12] Distributed Internet Traffic Generator (D-ITG). [Online]. Available:
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Wireless Mesh Networks under FreeBSD
Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Routing Protocols for Wireless Mesh Networks
International Journal of Scientific & Engineering Research Volume 2, Issue 8, August-2011 1 Routing Protocols for Wireless Mesh Networks Venkat Mohan.S, Dr. Kasiviswanath.N Abstract Routing is a fundamental
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
A Quality of Experience based Approach for Wireless Mesh Networks*
A Quality of Experience based Approach for Wireless Mesh Networks* Anderson Morais, and Ana Cavalli Télécom SudParis, France {anderson.morais, ana.cavalli}@it-sudparis.eu Abstract. Wireless Mesh Network
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks
Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Master Research Report June 6, 2008 Submitted By: Abbasi Ubaid Supervised By:Adlen Ksentini Team: DIONYSOS (IRISA) Abstract Wireless mesh networks
IEEE 802.11s Mesh Networking NS-3 Model
IEEE 802.s Mesh Networking NS-3 Model Kirill Andreev Institute for Information Transmission Problems Bolshoy Karetny per. 9, Moscow, 27994, Russia [email protected] Pavel Boyko Institute for Information
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Performance analysis and simulation in wireless mesh networks
Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
High-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic
An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany [email protected] Keywords: IEEE
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
An Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
Robust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems
Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)
FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
IEEE 802.11s Wireless Mesh Networks for Last-mile Internet Access: An Open-source Real-world Indoor Testbed Implementation
IEEE 802.s Wireless Mesh Networks for Last-mile Internet Access: An Open-source Real-world Indoor Testbed Implementation ABSTRACT Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
