Experimental evaluation of two open source solutions for wireless mesh routing at layer two

Size: px
Start display at page:

Download "Experimental evaluation of two open source solutions for wireless mesh routing at layer two"

Transcription

1 Experimental evaluation of two open source solutions for wireless mesh routing at layer two Rosario G. Garroppo, Stefano Giordano, Luca Tavanti Dip. Ingegneria dell Informazione Università di Pisa Via G. Caruso, 16 Pisa, I-56122, Italy Abstract The paper reports the outcome of an experimental evaluation of two open source solutions for realising a Wireless Mesh Network (WMN). Both works at layer two of the ISO/OSI stack and are transparent to the IP layer, i.e. they allow keeping the existing TCP/IP stack unchanged and avoid dealing with the complex IP configuration and management tasks. The first solution is the upcoming IEEE s standard, as implemented by the open80211s project, and the other is the B.A.T.M.A.N. routing protocol, in its layer-2 version. We compared them in a small experimental testbed, with main focus on their behaviour in typical mesh situations. We found that both have strengths and shortcomings, but none can be claimed to be completely mature. I. INTRODUCTION The technology backing Wireless Mesh Networks (WMNs) is in most cases common to all kinds of deployments, be they academic, hobbyist, or commercial. The vast majority of them uses the IEEE family of standards [1] to implement the point-to-point links (medium access control (MAC) and physical layer). The proper mesh topology is realised through IP layer solutions, such as the Optimised Link State Routing (OLSR) protocol [2], the Better Approach To Mobile Adhoc Networking (B.A.T.M.A.N. or just Batman) routing protocol [3], and other proprietary protocols (see e.g. [4] and the references therein). Lately, however, much interest has been put on routing solutions working below the IP layer. This approach offers several interesting features. It reduces the complexity of mesh platforms, since there is no need to load and run the (cumbersome) IP stack. It provides a faster and more complete access to MAC and physical layer information, which can be used to improve the routing decisions and shorten the time to react to unexpected events. It allows synergies on mechanisms that are common to both the routing and MAC protocols (such as beacons and other periodic messages). It is not bound to a specific layer three addressing scheme (for example, a change from IPv4 to IPv6 would be completely painless, but even non-ip schemes, such as IPX, would go). On the flip side, routing at layer two cannot take advantage of the information on the network architecture carried by the IP addressing scheme, since MAC addresses are flat. Hence, scalability represents a serious hurdle, and in fact the majority of current layer-2 meshing solutions are addressed to small to medium networks only. Clearly, for a proper implementation to be completely transparent to the IP layer, mechanisms must be devised so that the network layer can work while being completely unaware of the multi-hop nature of the underlying (wireless) network. In other terms, the mesh must be entirely managed at layer two, so that all mesh devices, even the farthest ones, are seen by the upper layer as directly connected through a one-hop link, as it happens for a single Ethernet broadcast domain. Presently, there are very few working mesh solutions that are transparent to the IP layer. A couple of them have been developed by the IEEE: j [5] and s [6]. The former is in fact a trivial multi-hop relay mechanism, in which Relay Stations (RSs) have been introduced with the primary goal of extending the coverage area of the base station (BS). Therefore, they do not build a proper WMN, since RSs lacks self-configuring capabilities and are used just to form a BSrooted tree. Conversely, IEEE s is a proper WMN built within the MAC layer. The standardisation is still in progress [7]. Nonetheless, thanks to the open80211s project, there is already a working (though incomplete) implementation [8]. Among the transparent meshing solutions developed outside standardisation bodies, it is worth mentioning Microsoft Mesh Connectivity Layer (MCL) [9], the Roofnet project [10], and Batman Advanced, a version of Batman for layer two routing [3]. Actually, both MCL and Roofnet are layer-2.5 solutions, in the sense that they are inserted into the protocol stack as a layer on its own, between the network and MAC layers. The advantage is that they are transparent to both neighbouring layers, but, on the other hand, they introduce extra overhead, in the form of additional management frames, additional frame headers and extra processing time. The paper presents an experimental assessment of two of the cited protocols: IEEE s and Batman Advanced. The goal is to verify their performance in terms of route stability and recovery times, two aspects that are essential in the prospect of setting up reliable deployments. Hence we did not focus on gross figures such as the overall network throughput, but on the response of the protocol procedures in specific situations and in a controlled environment. The features of the two protocols are presented in Sections II and III, respectively. Then, Section IV describes the testbed we set-up for the evaluation and reports the outcome of the tests.

2 II. IEEE S In this Section we outline just the main concepts of IEEE s according to one of the latest draft standards. Further details can be found in [11] or directly from [7].We then describe the features of open80211s, the software that provides the current implementation of s. A. The IEEE s Draft Standard IEEE s conceives a new network architecture that is deployed on top of the existing standard layer. The goal is to provide a protocol for the auto-configuration of paths between stations in the Wireless Distribution System (WDS). In other terms, stations are called to create and exploit a multi-hop communication network to transport data across the WDS. The routing functions are thus brought at level two of the ISO/OSI stack and renamed path selection and frame forwarding procedures. Clearly, since path selection works at layer two, frame forwarding is performed on the basis of the MAC addresses. The basic IEEE s network entity is the mesh station (in short, MS). In addition to having all the characteristics of any legacy station (STA), every MS is also called to relay the traffic generated by other MSs. The set of MSs and connections among them forms the wireless backbone of the mesh, or Mesh Basic Service Set (MBSS). To properly execute the new mesh services and algorithms, and specifically to build the set of paths that forms the mesh backbone and to allow frame forwarding, the draft introduces new mechanisms and adds new frame formats and Information Elements (IEs). The most meaningful are the Path Selection, the Peer Link Management, and the Link Metric frames for the establishment and management of the paths across the MBSS. The mandatory path selection algorithm that all MSs must implement is called Hybrid Wireless Mesh Protocol (HWMP). HWMP combines a reactive technique with an optional proactively-built tree topology. The tree connects all MSs to a root MS so that a path is always available between all MSs. In the reactive mode, MSs are allowed to communicate by means of paths created on-demand. This mode is used when there is no configured root, or when it can provide a better path to the destination. Both techniques use common messages and processing rules. The Path Request (PREQ), Path Reply (PREP), Path Error (PERR) and Root Announcement (RANN) information elements are flexibly structured to allow for the needs of both protocols. In the HWMP on-demand path selection algorithm, a source MS s wanting to send data to a destination MS t broadcasts a PREQ frame indicating the MAC address of t. All MSs receiving the PREQ create or update their path to s (but only if the PREQ contains a sequence number, DSN, greater than the current path or the same DSN and a better metric). Every MS, before re-broadcasting the PREQ, must update the metric field to reflect the cumulative metric of the path to s. Once t (or any allowed intermediate MS) receives the PREQ, it sends s a unicast PREP. If t receives further PREQs with a better metric (and same or greater sequence number), it sends a new PREP along the updated path. Intermediate MSs shall then forward the PREP(s) to s along the best path (stored during the PREQ flooding phase), and, when the PREP reaches s, the path is set up and can be used for a bi-directional exchange of data. If more than one PREP is received, the PREPs following the first are processed only if their information is not stale and announces a better metric (same rules of PREQ apply). As for the proactive HWMP tree, it can be set up either by using PREQ/PREP messages, or by means of RANN frames. The former technique aims at creating and maintaining a set of paths towards the root from all MSs, whereas the latter just disseminates information about the metrics for reaching the root, but leaves each MS the possibility to set up the path whenever it needs it. HWMP sets up the mesh paths according to the announced metric. The s draft defines a mandatory metric, called Airtime Link Metric. This metric estimates the channel resource consumption as a function of the loss rate and link bandwidth. The definition is the following: c a = [ O + B t r ] 1 1 e f. (1) In the formula, O is a constant that quantifies the channel access and protocol overhead (in micro-seconds), B t is the test frame length (8192 bits), r is the data rate (in Mbps), and e f is the test frame loss ratio (the probability that, when a frame of size B t is transmitted at the current bit rate r, the frame is corrupted due to transmission errors). The estimation of both r and e f is left to the implementer of the network interface card driver. B. The open80211s implementation The goal of the open80211s project [8] is to develop a reference implementation of the IEEE s draft standard. Accordingly, it tries to follows as closely as possible the dictates of the draft. However, being the project still in progress, the implementation is not complete. For example, in the current implementation, HWMP works in the reactive mode only, there are no Link Metric frames, and so on. However, apart from these shortcomings, open80211s is indeed a valuable (and fairly updated) implementation of the IEEE draft, which has recently been embedded into the Linux kernel. An interesting part is the computation of the airtime metric. The general formula is the same as (1) (with the constants O and B t set, respectively, to 1 and 8192). Yet it is worth seeing how the terms r and e f, whose definition is left as a local implementation choice, are computed. The open80211s implementation uses these formulae: e f [k] = p f [k] + 8 p f [k 1], (2a) 9 p f = n f, (2b) n tx where k indicates a generic time instant, and n f and n tx count the numbers of failed frame transmissions and trans-

3 mitted frames, respectively. Both are recorded between two consecutive computations of e f (i.e. between k 1 and k). As for r, this is the rate of the very last transmission, which depends on the policy employed by the rate control algorithm (RCA). The RCA is also the entity that computes e f. The exact time instants k are handled internally by the RCA; however two successive computations must be separated by at least 13 ms. HWMP samples e f every time a path in the node cache is added or updated, i.e. every time a PREQ or PREP is received. III. B.A.T.M.A.N. ADVANCED The development of B.A.T.M.A.N. (Better Approach To Mobile Ad-hoc Networking [3]) started as an attempt to overcome the shortcomings of OLSR. According to the developers of Batman, the OLSR protocol as specified in RFC 3626 was not completely functional in practical scenarios, and particularly for large deployments and in lossy environments. Part of these problems were ascribed to the link-state nature of OLSR, which involves a large amount of protocol and computational overhead and requires an accurate synchronisation of the information over all nodes, tasks that might be difficult to accomplish in large wireless networks. The approach of Batman is to spread the knowledge about the best end-to-end paths to all participating nodes. Every node perceives and maintains only the information about the best next hop towards all other nodes. Therefore there is no need for the global dissemination of local topology information. The basic working principle is rather simple. Every node periodically broadcasts the so-called originator messages (OGMs) to inform the neighbouring nodes (and the network in general) about itself. OGMs are small packets (52 bytes including IP and UDP headers) that contain the address of the originator, the address of the node transmitting the packet, a Time To Live (TTL) and a sequence number (SQ). OGMs are selectively re-broadcast to flood the whole network. Each node is allowed to re-broadcast the OGM only once, and only if it has been received from a neighbour which is currently held as the best next hop towards the initiator of the OGM. The best next-hop neighbour to a given destination node D is chosen as the neighbour through which the OGMs from D are received with the smallest delay and packet loss. The idea is that if OGMs are propagated through paths having links with poor quality or excessive load (saturated), they will suffer from packet loss and/or delay, whereas OGMs that travel along good paths will propagate faster. It can be noted that path computation is performed on a hopby-hop basis, and the OGMs carries no metric information. The quality of the next hop to the destination is simply a (local) function of the number of received OGMs through that link. The SQ field is used to check the bi-directionality of the links and is also included in ranking the potential next hops. Every node keeps a sliding window holding the SQs received from each originator and from each neighbour. The node stores the SQs from the last one (say n) to the one numbered n (W 1), where W is the size of the window. When a new SQ is received (say m), the window is moved and the SQs older than m (W 1) are dropped. If the window associated to the neighbour from which the last OGM has been received is the one that contains the most SQs, then this neighbour becomes the current best-hop towards the originator. Batman was first realised as a classic layer three routing protocol, using UDP packets to exchange routing information. Later on, an extension called Batman Advanced (in short, batman-adv) was developed to work at layer two. This version, similarly to IEEE s, emulates an Ethernet bridge, so that all nodes appear to be attached to a direct link and all protocols operating on top of it are not aware of the multi-hop nature of the underlying network. The working principles of batman-adv are the same of classic Batman, with the obvious adaptations for handling layer-2 addresses instead of IP addresses. IV. EXPERIMENTAL ASSESSMENT OF THE PROTOCOLS The testbed to assess the behaviour of the two meshing schemes was composed by four mesh nodes, as depicted in Fig 1. The reason for having such a small testbed is that it is somehow possible to control the various environmental parameters. This allows for a much finer investigation than on a large scale testbed, where complex propagation conditions, node anomalies and external factors are often out of control, and thus only gross figures can be collected. Fig. 1. The experimental testbed. The nodes are laptop PCs run by the Linux operative system (specifically, Ubuntu with kernel ) and equipped with Atheros cards supported by the new ath5k drivers. In all tests, the source and destination nodes are the laptops S and D, while the intermediate nodes are A and B. The direct link between S and D was tore down by placing the laptops sufficiently apart and by setting a lower transmission power, so that the quality of link S-D became poor enough to push both batmanadv and open80211s to always prefer the multi-hop path to the direct link. Both open80211s and batman-adv were run with the default parameter values. Traffic has been generated with the D-ITG software [12]. For all tests, unless otherwise specified, we generated UDP traffic with 512-byte packets and 100 packets per second. The tests can be divided into two sets, as a function of the feature under test: path and throughput stability, and recovery after a node failure. As already outlined, we reckon these two aspects are the most critical in a real scenario. The outcome of each test is described in the following subsections.

4 Fig. 2. Throughput of batman-adv along the two paths. A. Path and throughput stability The goal of this test is verifying whether the protocols use a stable path from S to D, and, in case of path changes, check whether they result in reduced transfer rates. Although stability cannot be regarded as an absolute value, in mostly static deployments, such as the WMN backbone, frequent path swapping come with an unavoidable overhead and possible performance reduction. Therefore mesh protocols that privilege stability should be preferable. The test consisted in running a 40-second-long traffic flow over a static network. Fig. 2 and 3 report the throughput of batman-adv and open80211s along the paths S-A-D (black) and S-B-D (red) in three different runs. Throughput is averaged over 1 s intervals, and refers to physical layer throughput, i.e. it also includes MAC retransmissions. Hence the more the line is close to the 100 pkt/s value, the better the channel is (less retransmissions). We can note that batman-adv is generally more stable. Conversely, open80211s presents a considerable path swapping. A deeper analysis of the behaviour of open80211s allowed us to discover the reason of this oscillation among the two paths. open80211s implements a feature that was defined as optional in one of the early IEEE s drafts and that is illustrated in Fig. 4 (which is a graphical representation of an actual traffic trace sniffed from the testbed). When the destination node of the path discovery procedure receives the first PREQ, it shall increase the destination sequence number (DSN) that is going to put in the PREP. However, the node may decide not to increase the DSN it will put in the successive PREPs for a certain time interval (called HWMP_RT_NETDIAMETER_TRAVERSAL_TIME). As a result, when the originator of the path discovery procedure receives more than one PREP, since it must consider only the one(s) with the highest DSN, it will discard all the others, even though they announce a better metric. The example Fig. 3. Throughput of open80211s along the two paths. in Fig. 4 shows two PREPs that are generated within the same HWMP_RT_NETDIAMETER_TRAVERSAL_TIME interval, but only the DSN of the first PREP in incremented. Hence S discards the second PREP (with DSN=169), even though it carries a better metric (152 instead of 8193). This option, intended to improve route stability, in fact produces the opposite effect. The choice of the path depends on the first received PREP, which in turn is produced as a response to the the first received PREQ. However, the receiving order is determined essentially by the medium access policy, which, in IEEE based networks, is based on random number generation (the backoff counter). As a result, path selection becomes in turn a randomised process. This explains the oscillations even in a rather controlled environment such as our testbed. We fixed the problem by removing the check on the HWMP_RT_NETDIAMETER_TRAVERSAL_TIME parameter from the code. Thus we let the destination node use the same (increased) DSN for all PREPs it generates in response to PREQs belonging to the same path discovery procedure. We then positively verified the correspondence between the path selected by S and the airtime metric values it received. The outcome of the tests run with the amended code is reported in Fig. 5. Surprisingly, the graphs show that there is no apparent change in the protocol behaviour, as path alternation is still present. However, there is a fundamental difference. The oscillation is now driven by the metric values registered along the two paths. Unfortunately, however, not always does the metric reflect the present channel quality of the paths. This

5 Fig. 6. Values (in logarithmic scale) of the airtime metric registered over the small testbed network. Fig. 4. values. Time-space graph of PREQ/PREP frames with DSN and metric (M) can be seen from Fig. 6, which reports the values of the Metric field of the PREP messages sent from A to S during one of the tests. Fig. 7. The physical data rate registered over one link of the test network. Fig. 5. Throughput of the modified open80211s along the two paths. From a quick analysis, we found that the values are a function of the current transmission rate r only, and that the computed e f [k] is always zero (apart from very rare exceptions). This latter point can be explained by the fact that the computation of p f is not based on the single frame transmissions, but on the whole frame exchange sequence. Therefore, unless the channel is very unfavourable, it is quite unlikely that a frame is not correctly delivered after the MAX_RETRY_LIMIT attempts allowed for the IEEE MAC layer. In addition, MAC can also take advantage of rate adaptation procedures, which usually select a less efficient but more robust modulation scheme after every failed frame transmission, thus continuously increasing the success probability of the next attempts. As a result, all registered values can be traced back to the formula c a = ( /r), which is the direct simplification of (1) when p f = 0. With reference to Fig. 6, we can distinguish four sets of values: 228, 342, 456, and 683. It is easy to verify their correspondence to 36, 24, 18 and 12 Mbps data rates. The successive graph (see Fig. 7) plots the physical data rate we registered over the link A-D. The variability of the data rate is apparent. Some plateaux can be detected, but there are also several peaks and notches. A fair relationship with the metric values of Fig. 6 can also be seen. Recall that the highest is the date rate, the smallest is the airtime metric, hence the trends of the two graphics should be complementary (and, for the most part, they are). B. Recovery after a node failure This test aims at verifying the ability of the protocol to restore the communication after a node failure. In practice this event may occur in a number of circumstances, e.g. an actual node failure, or a temporary node unavailability due interferences and/or obstructions. For this purpose we abruptly turned off the wireless interface of the intermediate node that, at that moment, was relaying the traffic from S to D. We then measured how long the protocol takes to find the alternative path to D. Finally, we turn on again the failed node and observe whether and when this node is included again in the forwarding process. The results are in Fig. 8 and 9. The vertical bars show the time instants of the node failure (off) and restart (on). During our tests, batman-adv never succeeded in resuming the communication after the node failure. A slight improvement was registered when the intermediate node was turned on again, but the throughput never reached the same level and stability it had before the failure. We investigated more on this behaviour and discovered that batman-adv declares an originator as lost only if a PURGE_TIMEOUT interval elapses from the last received OGM without hearing any more OGMs from that node. The current default value of PURGE_TIMEOUT is 200 s. Therefore batman-adv is not able to promptly react to sudden topology changes, as it demands all path updates to the expiration of the PURGE_TIMEOUT timer. It is therefore easy to understand that it is not possible to achieve recovery times smaller than the OGM creation interval, since setting PURGE_TIMEOUT to less than ORIGINATOR_INTERVAL would produce continuous path breakages and re-establishments. How to correctly tune the

6 Fig. 8. Throughput of batamn-adv for the recovery test. seem to be mature enough. It lacks some notable features (such as the proactive path selection, the portal), and it reveals some instability. Conversely, under static scenarios, batman-adv shows much more reliable performance. In case of node failure, open80211s recovers quite rapidly, sometimes even so fast that the service appears to be seamless. On the other hand, batman-adv has serious problems in resuming the communication after an abrupt interruption. As a result, it is hard to find a winner in this comparison, as the two solutions have both strengths and weaknesses. Rather, we could even say that both implementations are losers, since none of them is mature enough to handle situations that are typical of any realistic scenario. ACKNOWLEDGMENT This work was supported by the Italian Ministry of Instruction, University and Research (MIUR) under the PRIN 2007 research project SESAME (Scalable Efficient Secure Autonomic MEsh networks) and under the FIRB project InSyEme (Integrated System for Emergency, grant number RBIP063BPH). The authors would like to thank Alessia Moschini and Francesco Cappuccio for their help in setting up the testbed and running the trials. REFERENCES Fig. 9. Throughput of open80211s for the recovery test. two parameters in order to achieve a good trade-off among stability, overhead and fast-recovery will be the focus of future work. As for open80211s, the failure was almost unnoticeable from the application perspective, as the traffic was immediately routed along the other path. Similarly, the re-activation of the failed node had no impact on the protocol behaviour nor on network performance. Sometimes, the re-entering node was immediately chosen to forward the frames (second and third case). V. CONCLUSION From the experimental analysis we can draw the following conclusions: The current implementation of the IEEE s draft standard provided by the open80211s project does not [1] IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Dec [2] T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), Oct. 2003, IETF RFC [3] A. Neumann, C. Aichele, M. Lindner, and S. Wunderlich, Better approach to mobile ad-hoc networking (b.a.t.m.a.n.), April 2008, IETF Internet-Draft (expired October 2008). [Online]. Available: [4] I. F. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: a survey, Computer Networks, vol. 47, pp , [5] IEEE Std j-2009 IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 1: Multiple Relay Specification, May [6] IEEE P Task Group s, IEEE Unapproved draft standard P802.11s/D2.06, January [7], Status of Project IEEE s Mesh Networking. [Online]. Available: update.htm [8] The open80211s project. [Online]. Available: [9] Microsoft Research, Self organizing wireless mesh networks. [Online]. Available: [10] J. Bicket, D. Aguayo, S. Biswas, and R. Morris, Architecture and evaluation of an unplanned b mesh network, in ACM Annual International Conference on Mobile Computing and Networking (MobiCom), August [Online]. Available: [11] R. G. Garroppo, S. Giordano, and L. Tavanti, Implementation frameworks for IEEE s systems, Computer Communications, vol. 33, no. 3, pp , February [12] Distributed Internet Traffic Generator (D-ITG). [Online]. Available:

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Routing Protocols for Wireless Mesh Networks

Routing Protocols for Wireless Mesh Networks International Journal of Scientific & Engineering Research Volume 2, Issue 8, August-2011 1 Routing Protocols for Wireless Mesh Networks Venkat Mohan.S, Dr. Kasiviswanath.N Abstract Routing is a fundamental

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

A Quality of Experience based Approach for Wireless Mesh Networks*

A Quality of Experience based Approach for Wireless Mesh Networks* A Quality of Experience based Approach for Wireless Mesh Networks* Anderson Morais, and Ana Cavalli Télécom SudParis, France {anderson.morais, ana.cavalli}@it-sudparis.eu Abstract. Wireless Mesh Network

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks

Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Deployment of VoIP in the IEEE 802.11s Wireless Mesh Networks Master Research Report June 6, 2008 Submitted By: Abbasi Ubaid Supervised By:Adlen Ksentini Team: DIONYSOS (IRISA) Abstract Wireless mesh networks

More information

IEEE 802.11s Mesh Networking NS-3 Model

IEEE 802.11s Mesh Networking NS-3 Model IEEE 802.s Mesh Networking NS-3 Model Kirill Andreev Institute for Information Transmission Problems Bolshoy Karetny per. 9, Moscow, 27994, Russia [email protected] Pavel Boyko Institute for Information

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Performance analysis and simulation in wireless mesh networks

Performance analysis and simulation in wireless mesh networks Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Extended AODV Protocol to Support Mobility in Hybrid Networks An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}

More information

A Non-beaconing ZigBee Network Implementation and Performance Study

A Non-beaconing ZigBee Network Implementation and Performance Study A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Robust protocols for the Industrial Internet of Things

Robust protocols for the Industrial Internet of Things Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic

An Experimental Performance Analysis of MAC Multicast in 802.11b Networks for VoIP Traffic An Experimental Performance Analysis of MAC Multicast in 82.11b Networks for VoIP Traffic Martin Kappes DoCoMo Euro-Labs Landsberger Str. 312, 8687 Munich, Germany [email protected] Keywords: IEEE

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile

More information

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach

Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

Analysis of Open Source Drivers for IEEE 802.11 WLANs

Analysis of Open Source Drivers for IEEE 802.11 WLANs Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]

More information

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

FORTH-ICS / TR-375 March 2006. Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) FORTH-ICS / TR-375 March 26 Experimental Evaluation of QoS Features in WiFi Multimedia (WMM) Vasilios A. Siris 1 and George Stamatakis 1 Abstract We investigate the operation and performance of WMM (WiFi

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

IEEE 802.11s Wireless Mesh Networks for Last-mile Internet Access: An Open-source Real-world Indoor Testbed Implementation

IEEE 802.11s Wireless Mesh Networks for Last-mile Internet Access: An Open-source Real-world Indoor Testbed Implementation IEEE 802.s Wireless Mesh Networks for Last-mile Internet Access: An Open-source Real-world Indoor Testbed Implementation ABSTRACT Due to their easy-to-deploy and self-healing features, WMNs (Wireless Mesh

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information