Multicast in Wireless Mesh Networks

Size: px
Start display at page:

Download "Multicast in Wireless Mesh Networks"

Transcription

1 Multicast in Wireless Mesh Networks JIN XU A thesis submitted to the Faculty of Graduate Studies in partial fulfilment of the requirements for the degree of Master of Science Graduate Programme in Computer Science and Engineering York University Toronto, Ontario October 2006

2 Abstract Wireless Mesh Networks (WMNs) form a new class of networks that has emerged recently. In a WMN, the wireless mesh routers are stationary and form the wireless mesh backbone, which provides multi-hop connectivity for mobile mesh hosts to communicate with either other mesh hosts or the Internet via access points. In such WMNs, multicast is an efficient way to distribute data to a group of receivers. In this thesis, we first propose a framework that supports multicast routing between the wired Internet and wireless mesh networks in a simple and efficient manner. We then propose a protocol named (Shortest Path Tree algorithm for wireless Mesh networks) for efficient and scalable multicast routing inside the mesh backbone of a WMN. The protocol builds source-based trees based on the network topology. It avoids flooding and employs an effective mechanism to prevent the implosion and exposure problems when a tree is constructed and when nodes join and leave. Our simulation results show iv

3 that the protocol outperforms existing protocols such as ODMRP (On- Demand Multicast Routing Protocol), MOSPF (Multicast Extensions to Open Shortest Path First), MST (Minimum Steiner Tree) and MNT (Minimum Number of Transmissions) in terms of packet delivery ratio, throughput, and end-to-end delay. Based on the protocol, we further propose an effective reliable multicast protocol for WMNs called Mesh Reliable Multicast (MRM). With the assistance of the underlying multicast routing protocol, MRM builds a recovery tree that dynamically coincides with the multicast routing tree. The cost of constructing the recovery tree is kept to a minimum, and packet losses are repaired locally using the recovery tree. Simulation results justify the correctness and effectiveness of the proposed MRM protocol in WMNs. v

4 Acknowledgements This thesis could not have been written without the encouragement, collaboration, and support of a tremendous number of people. To my supervisor, Professor Uyen Trang Nguyen, thank you for your patience in thesis supervision, encouragement, advice and guidance. Step by step, you have shown me how to discover the problems and solve them, which has resulted in this valuable research. To my committee members, Professors Amir Asif, Mariana Kant and Baoxin Hu, thank you for taking the time to read this thesis and giving me valuable comments. I am grateful to the administrative assistants and system administrators of the department for assisting me in many different ways. I would also like to thank my colleagues Qian Bai, Frank Xu, Xong Xing, Lan Nguyen, Van Ngo, David Xia, Pengfei Liu and Haoyuan Wang. vi

5 port. Finally, my special thanks to my family for their unconditional love and sup- vii

6 Table of Contents Abstract iv Acknowledgements vi Table of Contents viii List of Figures xii 1 Introduction Motivations Contributions The Multicast Framework The Mesh Multicast Routing Protocol The Mesh Reliable Multicast Protocol Thesis Outline viii

7 2 Literature Survey Multicast Routing Protocols Multicast Routing on the Internet Multicast Routing in MANETs Multicast Routing in WMNs Reliable Multicast Protocols Group-based Protocols Structure-based Protocols Simulators The Multicast Framework Network Model The Multicast Framework Summary Multicast Routing in WMNs Multicast Routing in WMNs: The Protocol Assigning APs to Mesh Routers Acquiring the Network Topology ix

8 4.1.3 Multicast Routing in the Mesh Backbone: the Protocol Integration with Multicast Routing in the Internet Experimental Results vs. ODMRP vs. MOSPF vs. MST/MNT Summary Reliable Multicast in WMNs Reliable Multicast in WMNs: the MRM protocol Overview Protocol Details Experimental Results Performance Metrics Simulation Setting Simulation Results Summary Conclusion 126 x

9 Bibliography 128 xi

10 List of Figures 1.1 Architecture of a WMN Deployment of a WMN in a city Deployment of a WMN in a rural area Tree-based protocols The sender is an Internet host; receivers are in the WMN (Case 1(b)) The sender and receivers are in the same WMN (Case 2(a)) The sender is a mesh host; receivers (R 3 and R 4 ) are Internet hosts (Case 2(b)) An join operation example between a sender S and its three receivers R 1, R 2 and R Case 1: The sender in Internet and some receivers in WMN xii

11 4.3 Case 2: The sender in WMN and some receivers in Internet vs. ODMRP: functions of traffic load, one sender, 10 receivers, network of 100 nodes vs. ODMRP: functions of traffic load, one sender, 30 receivers, network of 300 nodes vs. ODMRP: functions of number of receivers, one sender, traffic load = 40 pkts/s, network of 100 nodes vs. ODMRP: functions of number of receivers, one sender, traffic load = 40 pkts/s, network of 300 nodes vs. ODMRP: functions of number of senders, 40 receivers, traffic load = 10 pkts/s per sender, network of 100 nodes vs. ODMRP: functions of number of senders, 40 receivers, traffic load = 10 pkts/s per sender, network of 300 nodes The impact of multicast on unicast: vs. ODMRP, 10 common receivers/sender, network of 100 nodes The impact of multicast on unicast: vs. ODMRP, 10 common receivers/sender, network of 300 nodes xiii

12 4.12 vs. MOSPF: functions of traffic load, one sender, 20 permanent receivers plus 20 transient receivers (join/leave interval=5s), network of 100 nodes vs. MOSPF: functions of traffic load, one sender, 20 permanent receivers plus 20 transient receivers (join/leave interval=5s), network of 300 nodes The impact of multicast on unicast: vs. MOSPF, 10 common permanent receivers/sender plus 20 common transient receivers (join/leave interval=5s), network of 100 nodes The impact of multicast on unicast: vs. MOSPF, 10 common permanent receivers/sender plus 20 common transient receivers (join/leave interval=5s), network of 300 nodes vs. MOSPF: functions of traffic load, one sender, 20 permanent receivers plus 20 transient receivers (join/leave interval=10s), network of 100 nodes vs. MST/MNT: functions of traffic load, one sender, 20 receivers, network of 100 nodes vs. MST/MNT: functions of traffic load, one sender, 40 receivers, network of 100 nodes xiv

13 4.19 vs. MST/MNT: functions of traffic load, one sender, 40 receivers, network of 300 nodes vs. MST/MNT: functions of traffic load, one sender, 80 receivers, network of 300 nodes Average path lengths of, MST and MNT, network of 100 nodes Average path lengths of, MST and MNT, network of 300 nodes The impact of multicast on unicast: vs. MST/MNT, 10 common receivers/sender, network of 100 nodes The impact of multicast on unicast: vs. MST/MNT, 10 common receivers/sender, network of 300 nodes vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 20 receivers, network of 100 nodes vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 40 receivers, network of 100 nodes vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 80 receivers, network of 100 nodes xv

14 4.28 vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 20 receivers, network of 300 nodes vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 40 receivers, network of 300 nodes vs. MST/MNT: functions of traffic load (20 unicast flows in background), one sender, 80 receivers, network of 300 nodes Example of DR selection The sender s operation A sender s send window A receiver s receive window and the associated bit vector nodes in a 2000m 2000m terrain nodes in a 3000m 3000m terrain xvi

15 Chapter 1 Introduction Wireless Mesh Networks (WMNs) [1, 2] form a new class of networks that has emerged recently. Major components of a WMN include wireless mesh routers, wireless mesh hosts, and access points (or gateways) that act both as Internet routers and wireless mesh routers (Figure 1.1). The mesh routers in a WMN are stationary; they form the wireless mesh backbone, which provides multi-hop connectivity from mesh hosts to either other mesh hosts or the Internet via access points. The mesh hosts can be stationary or mobile; they can form a wireless local area network (LAN) or a mobile ad-hoc network (MANET), and communicate with the outside world via connections to the mesh routers. A WMN is dynamically self-organized and self-configured with nodes in the network automatically 1

16 establishing and maintaining mesh connectivity among themselves. This feature brings many benefits to WMNs such as low installation cost, large-scale deployment, reliability, and self-management. Figure 1.2 illustrates a typical application of WMNs deployed in a new town. The wireless mesh routers are installed on the roofs of the buildings to cover an area of the town. It is also possible to implement a wired network in the area. However, a WMN incurs a much lower installation cost. Another example is a WMN deployed in a rural area, as shown in Figure 1.3. In this example, it is very hard to build a wired network due to the mountains and the forests. Deploying a WMN, on the other hand, is relatively easy. Figure 1.1: Architecture of a WMN 2

17 Figure 1.2: Deployment of a WMN in a city Figure 1.3: Deployment of a WMN in a rural area 3

18 1.1 Motivations WMNs are promising for providing Internet access to remote areas. They can provide large coverage area, reduce dead-zones in wireless coverage, and lower costs of backhaul connections for base stations. Their promise of rapid deployability and reconfigurability makes them suitable for important applications such as disaster recovery, homeland security, transient networks in convention centers, hard-to-wire buildings such as museums, unfriendly terrains, and rural areas with high costs of network deployment. Most of the existing work on WMNs concentrates on the issues of unicast routing and channel assignment when multiple channels are being used [3, 4, 5, 6], network architectures [7, 8], performance evaluation and analysis [9, 10], and network capacity analysis [11]. In this thesis, we focus on providing multicast services in WMNs. Multicast is a form of communication that delivers information from a source to a set of destinations simultaneously in an efficient manner; the messages are delivered over each link of the network only once (excluding retransmissions) and only duplicated at branch points, where the links to the destinations split. Important applications of multicast include distribution of stock quotes, billing records, software, and newspapers; audio/video conferencing; distance education; 4

19 and Internet games. Not much research on multicast in WMNs has been done. The only existing work is the routing protocol proposed by Ruiz et al. [12]. In this thesis we propose effective solutions to the problem of multicast in WMNs. 1.2 Contributions Specifically, we propose solutions to the following three problems. First, we propose a framework that supports multicast routing between the wired Internet and wireless mesh networks in a simple and efficient manner. Second, we design a protocol named (Shortest Path Tree algorithm for WMNs) for efficient and scalable multicast routing inside the mesh backbone of a wireless mesh network. Third, we propose an effective reliable multicast protocol named Mesh Reliable Multicast (MRM) based on the protocol The Multicast Framework Our proposed multicast framework offers the following advantageous features: 1. Transparency of hosts locations. Communications between an Internet host and a mesh host require assistance from access points. On the other hand, mesh hosts located in the same WMN may send data to each other via mesh 5

20 routers without involving the access points (APs). These two routing scenarios imply that we would need a mechanism to signify the locations of the communicating hosts (i.e., in the Internet, in the same WMN or in another WMN) in order to use the appropriate routing method (i.e., with or without assistance from APs). One such mechanism would be to create different IP address formats for hosts in the Internet and hosts in WMNs respectively. This approach would require efforts to define the address formats and to standardize them. An alternative would be to let a host advertise its location (in the Internet or in a WMN) to other hosts. This mechanism would create traffic overhead in both the Internet and WMNs. Considering the above disadvantages, we designed a multicast framework that does not require any knowledge of host locations. Yet it effectively supports communications between the Internet hosts and mesh hosts via access points, and multi-hop ad hoc communications between mesh hosts residing in the same WMN. 2. No changes to Internet multicast routing. The framework does not require any modifications to the current IP multicast model in the Internet, nor to the existing multicast routing protocols in the Internet. Multicast routing in the wired network can use any of the existing Internet routing protocols such as DVMRP [21], MOSPF [22], PIM [24], or CBT [25]. This enables the framework 6

21 to be deployed quickly and interact seamlessly with the IP multicast and the existing Internet multicast routing protocols The Mesh Multicast Routing Protocol The problem of efficient multicast routing in a wired network has been studied in depth. Several multicast routing protocols have been proposed for wired networks such as DVMRP (Distance Vector Multicast Routing Protocol) [21], MOSPF (Multicast Extensions to Open Shortest Path First) [22], PIM (Protocol Independent Multicast) [24], and CBT (Core-Based Tree) [25]. Although these protocols work well in wired networks, they are not suitable for wireless environments. In wireless networks, bandwidth is a scarce resource and wireless links are more error-prone than their wired counterparts. On the other hand, multicast routing protocols proposed for wireless mobile ad hoc networks such as MAODV (Multicast Ad hoc On-Demand Distance Vector Routing) [32], ODMRP (On-Demand Multicast Routing Protocol) [33], CAMP (Core-Assisted Mesh Protocol) [34], or AMRIS (Ad hoc Multicast Routing protocol utilizing Increasing id-numbers) [35] do not work efficiently in WMNs because they assume nodes are mobile while mesh routers are static. Mechanisms designed to deal with node mobility such as periodic route refreshment by flooding [33] or 7

22 beacon exchange [34] would create a lot of unnecessary overheads in WMNs. Recently, Ruiz et al. [12] argued that, in a wireless environment, the transmission of a multicast data packet from a node to any number of its neighbors can be done with a single data transmission. Thus in a multi-hop wireless mesh network the minimum-cost multicast tree is one which connects the source and receivers by issuing a minimum number of transmissions, rather than having a minimum edge cost. They also showed that the problem of minimizing the number of transmissions is NP-complete and proposed several heuristics to compute the approximation of such optimal trees, which we call Minimum Number of Transmissions Trees (MNT). Although MNT trees have a lower total edge cost and require less transmissions than Shortest Path Trees (SPTs), the mean source-to-destination path length in a MNT tree is longer than that in a shortest path tree. Since wireless links are error-prone, the longer the path, the higher the probability that a data packet gets lost or damaged, due to packet collision and/or congestion, resulting in a throughput reduction [54]. The proposed multicast routing protocol considers the broadcast nature of wireless mesh routers as well as their static placement/positions in a WMN so as to be efficient and scalable. Specifically, the proposed protocol builds a shortest-path multicast routing tree, which is rooted at the sender and spans 8

23 all receivers. It avoids flooding and employs effective mechanisms to prevent the feedback implosion and exposure problems during the tree construction process and when members join and leave. Moreover, the protocol can easily integrate with multicast routing in the Internet without any changes to the existing Internet multicast routing protocols. Our simulation results show that the protocol outperforms the existing protocols such as ODMRP [33], MOSPF [22], MST [14] and MNT [12] in terms of packet delivery ratio, throughput, and delay The Mesh Reliable Multicast Protocol Distribution of data using multicast in an unreliable network does not guarantee reliable delivery, which is the prime requirement for many important applications, such as distribution of software, stock quotes, electronic newspapers, billing records, and medical images. The second part of the thesis focuses on designing and implementing an effective reliable multicast protocol called Mesh Reliable Multicast (MRM) based on the aforementioned multicast routing protocol. Although many reliable multicast protocols have been proposed for wired networks, such as SRM (Scalable Reliable Multicast) [36], RMTP (Reliable Multicast Transport Protocol) [38], TMTP (Tree-based Multicast Transport Protocol) [39], 9

24 LBRRM (Log-Based Receiver-Reliable Multicast) [37], and LSM (Large-Scale Multicast) [40], these protocols can not be applied directly to WMNs due to the inherent broadcast nature of wireless transmissions. For example, SRM is a group-based protocol that multicasts the packet-loss request and the repair packet globally to the whole multicast group. Although SRM uses some mechanisms to reduce the number of messages generated, it is still inefficient to recover local losses using global mechanisms. Because bandwidth is a scarce resource in wireless networks, SRM consumes too much bandwidth and results in poor performance. Unlike SRM, RMTP uses a tree-based approach in which a recovery tree is constructed at the transport layer; the parents and the children keep state about each other; and the recovery messages traverse only between a parent and its children. Although RMTP is efficient to do the loss recovery locally, the recovery tree is different from the underlying routing tree, which is not efficient in WMNs. TMTP employs distributed algorithms based on heuristics to estimate the topology of the routing tree and builds a dynamic recovery tree at the transport layer. However, it is hard to create a recovery tree that faithfully follows the underlying routing tree. Moreover, the recovery tree construction is expensive and not suitable for WMNs. With the assistance of the underlying multicast routing protocol, the pro- 10

25 posed reliable multicast protocol MRM builds a recovery tree that dynamically coincides with the underlying multicast routing tree. The cost of constructing the recovery tree is kept to a minimum and packet losses are repaired locally using the recovery tree. In addition, MRM can easily interact with the reliable multicast protocols used in the Internet, such as RMTP. Experimental results are presented to demonstrate the effectiveness, scalability and performance of the MRM protocol in WMNs. 1.3 Thesis Outline The remainder of the thesis is organized as follows. Chapter 2 provides a literature survey of the existing multicast routing protocols and reliable multicast protocols. The multicast framework is described in detail in Chapter 3. Chapter 4 presents the protocol for multicast routing in a mesh backbone and its integration with multicast routing in the Internet. Experimental results are included to quantify the performance of the protocol in WMNs. The MRM protocol is described in detail in Chapter 5. We also present experimental results to demonstrate the correctness and effectiveness of the MRM protocol in WMNs. Chapter 6 concludes the thesis and outlines some directions for future work. 11

26 Chapter 2 Literature Survey In this chapter, we present a literature survey of the existing multicast routing protocols and reliable multicast protocols. 2.1 Multicast Routing Protocols In this section, we review the existing multicast routing protocols for the Internet, wireless mobile ad hoc networks (MANETs), and wireless mesh networks (WMNs). Multicast routing algorithms for the Internet can be divided broadly into three categories: shortest path tree algorithms, minimum cost tree algorithms, and constrained tree algorithms. A shortest path tree algorithm computes a tree 12

27 rooted at the sender and spanning all the receivers such that the distance from the sender to each receiver is minimum. Unlike shortest path tree algorithms, a minimum cost tree algorithm tries to minimize the overall cost of the tree. A constrained tree algorithm tries to optimize on both constraints (i.e., the shortest paths and the minimum cost). However, the majority of multicast routing protocols used in the Internet today are based on shortest path trees because they are easy to implement and they provide minimum delay from the sender to each receiver, which is a desirable property for most of the real-life multicast applications. Multicast routing protocols proposed for wireless mobile ad hoc networks can be classified into two categories: tree-based and mesh-based. Studies have shown that in a mobile ad hoc network, where the network topology changes frequently, mesh-based protocols outperform tree-based protocols due to the fact that redundant routes in a mesh provide alternative paths for data delivery when one or more links fail. For wireless mesh networks, Ruiz et al. [12] studied the problem of building a multicast tree which requires a minimum number of transmissions. They showed that the problem of minimizing the number of transmissions is NP-complete and proposed heuristics to compute the approximation of such an optimal tree. 13

28 2.1.1 Multicast Routing on the Internet As stated earlier, the multicast routing algorithms for the Internet can be divided broadly into the following three categories: 1. Shortest path tree algorithms 2. Minimum cost tree algorithms 3. Constrained tree algorithms Shortest Path Tree Algorithms The goal of the shortest path tree (SPT) algorithms is to compute a tree rooted at the sender and spanning all the receivers such that the distance between the sender and each receiver along the tree is minimum. The two most well-known algorithms for computing shortest path trees are Bellman-Ford and Dijkstra. SPTs by definition are per sender. Thus for multiple source multicast, separate multicast trees need to be computed, one for each sender. The dynamic versions of these static algorithms as used in a network are distance vector algorithms [16] and link state algorithms [16]. In the distance vector algorithms, the router attached to the sender broadcasts to its neighboring routers that it can reach the sender at a cost of one. That is, its 14

29 distance from the sender is one hop. Based on this information, the neighboring routers compute their distance to the sender and choose the minimum among all possible alternatives. Each of these routers then broadcasts its distance to its neighboring routers and the process is repeated. The link-state approach is based on the Dijkstra s shortest path algorithm in which each router knows the complete topology of the network at any instant of time. In order to maintain an up-to-date network topology, the routers flood a change in the state of a directly connected link as soon as such a change occurs. For example, if a directly connected link goes down or comes up, a router immediately broadcasts the information to all its neighbors and so on until every router gets the information and updates its own view of the network topology. Once a router has the complete topology, it can use the Dijkstra s shortest path algorithm to compute the shortest path form the sender to each receiver. These paths collectively constitute the shortest path multicast tree Minimum Cost Tree Algorithms Unlike shortest path tree algorithms whose goal is to minimize the distance from the sender to each receiver, minimum cost tree algorithms try to minimize the overall cost of the tree. By assigning a cost to each edge of the graph, minimum 15

30 cost tree algorithms compute the tree which minimizes the sum of the cost of its edges. In practice, the cost of an edge (a link) can be the packet transmission delay on that link, or the distance between the two vertices (routers). The problem of finding a minimum cost multicast tree is known as the minimum Steiner tree problem, which is NP-complete and there exist several heuristics that compute the approximate Steiner trees. For instance, the MST algorithms [14, 15] provide a 2-approximation, while Zelikovsky [17] proposed an algorithm which obtains a 11/6-approximation. In practice, the MST heuristic [14] is used because it is simpler to implement. We also implement the MST heuristic to evaluate its performance in WMNs. Following is a brief description of this heuristic. MST Heuristic Given a connected undirected graph G = (V, E, d) and a set of Steiner points (multicast group members) S, where V is the set of vertices in G, E is the set of edges in G, d is a distance function which maps E into the set of nonnegative numbers and S is a subset of vertices in V, consider the complete undirected graph G 1 = (V 1, E 1, d 1 ) constructed from G and S in such a way that V 1 = S and, for every (v i, v j ) in E 1, d(v i, v j ) is set equal to the distance of the shortest path from v i to v j in G. Notice that, for each edge in G 1, there corresponds a 16

31 shortest path in G. Given any spanning tree in G 1, one can construct a subgraph of G by replacing each edge in the tree by its corresponding shortest path in G. The MST heuristic algorithm is as follows. 1. Construct the complete undirected graph G 1 = (V 1, E 1, d 1 ) from G and S. 2. Find the minimal spanning tree T 1 of G Construct the subgraph G s of G by replacing each edge in T 1 by its corresponding shortest path in G. 4. Find the minimal spanning tree T s of G s. 5. Construct a Steiner tree T h from T s by deleting edges in T s, if necessary, so that all the leaves in T h are Steiner points Constrained Tree Algorithms Shortest path tree algorithms try to minimize the distance between the sender and each receiver. Another way of interpreting this is to say that the shortest path tree algorithms try to minimize end-to-end delay. On the other hand, minimum Steiner tree algorithms aim at minimizing the overall cost of the tree. However, in a real-life scenario, it is important to minimize both. For example, 17

32 in a multimedia multicast case, minimizing the end-to-end delay is as important as minimizing the overall cost. References [18], [19], and [20] have studied this problem and suggested heuristics to optimize on both cost and delay Multicast Routing Protocols in Practice The majority of the multicast routing protocols used in the Internet today are based on shortest path trees. The reasons are that they are easy to implement and they provide minimum delay from the sender to each receiver, which is a desirable property for most of the real-life multicast applications. The multicast routing protocols used (or proposed to be used) in the Internet are DVMRP [21], MOSPF [22], PIM [24], and CBT [25]. Distance Vector Multicast Routing Protocol (DVMRP) DVMRP is a distance vector routing protocol. It uses flooding and pruning to build the multicast tree. The routers in the leaf subnets have group membership information. When a router receives a flooded packet, it knows whether that packet will be useful for its subnet or not. In case there is no group member on the subnet, the leaf router sends a prune message to its neighboring routers. In addition, a leaf router can send a prune message through all interfaces except 18

33 for the one on the reverse shortest path to the sender. When an intermediate router receives prune messages from all interfaces except for the reverse shortest path interface, it forwards the prune message upstream. This way, the unwanted branches of the spanning tree get pruned off. When a router sends a prune message, it maintains information about the (Source, Group) pair for which the prune message was sent. This state is used to prevent propagation of the data packets when they arrive at those routers. DVMRP is a soft-state protocol in the sense that the state in the routers times out, and hence the process of flooding and pruning needs to be repeated periodically. However, if a member wants to join a group before the next flooding takes place and there is no host on the subnet currently subscribed to the group, DVMRP allows the corresponding router to send a graft message. The graft message propagates upstream using the reverse path forwarding interface until it reaches a router that is part of the shortest path tree. In fact, a graft message cancels the prune state at the relevant routers. Multicast Extensions to Open Shortest Path First (MOSPF) MOSPF is an enhancement of the unicast routing protocol OSPF [23]. OSPF is a link-state routing protocol in which the routers advertise the state of their directly attached links, and based on these advertisements, each router builds up a link- 19

34 state database. The OSPF link-state database provides a complete picture of the topology of an Autonomous System (AS). In order to support multicast routing, a new type of link-state advertisement, referred to as the group-membership-lsa (Link State Advertisement), has been added to OSPF. These advertisements help to pinpoint the locations of all multicast group members in the database. The path of a multicast data packet can then be calculated by building a shortest-path tree rooted at the source of the data packet. Note that each router in the domain has the complete description of the topology and the membership information, and each one of them uses exactly the same algorithm to computer the shortestpath tree rooted at the same node. Thus every router ends up computing the same tree and creating the corresponding forwarding entries for each group. The shortest path trees are built on demand (that is, when the first packet arrives), and the results of this computation are cached for use by subsequent packets having the same source and destination. Protocol Independent Multicast (PIM) PIM is a multicast routing protocol that does not depend on a specific unicast routing protocol. PIM uses a set of special routers called Rendezvous Points (RPs) such that any receiver who wants to join the multicast group needs to 20

35 send an explicit join request to a unique RP determined based on the multicast group address. The receivers explicitly join the RP resulting in the formation of a unidirectional shared RP-tree. Senders, on the other hand, do not explicitly join the RP but send their data encapsulated in register messages directly to the RP for distribution using the shared RP-tree. A sender who wants to multicast to the group starts by sending encapsulated packets to the corresponding RP, which then forwards the packets to the attached receivers. If the sender s traffic increases beyond some threshold, the shortest path route is set up between the sender and the corresponding RP. In addition, the intermediate routers between the RP and the receivers switch from the RP-based shared tree to a source-based shortest path tree. PIM uses soft state mechanisms to maintain the tree. That is, control messages are sent periodically by the relevant routers to refresh the state information. No explicit teardown mechanism is needed to remove states when a group ceases to exist. Core-Based Tree (CBT) CBT is a multicast routing protocol which sets up a single shared bi-directional tree connecting the senders and the receivers. Every multicast session has a special router called the core, which is instrumental in setting up the multicast 21

36 tree. Every member of the multicast group sends an explicit Join message towards the core, resulting in the creation of a branch ending in either the core or an existing branch of the tree. All senders use the same tree for transmitting data, and the routers simply forward the data on all the interfaces for the CBT except for the incoming interface. The main advantage of using a single shared tree per group is the reduction of state information that needs to be maintained at each router. The main drawback of using a single shared tree in a network with a large degree of connectivity is traffic concentration. If every sender uses the same shared distribution tree, traffic is concentrated along the links of the shared tree. This is not the case if separate trees are used by the sources. Another drawback of a single shared tree is that the sender and the receivers are not necessarily connected by the shortest path. The delivery delay can thus be higher in shared trees than in source-based shortest path trees. The CBT routers in the network maintain hard state. Therefore, there is a need for explicit tear down of the multicast tree. Although the protocols described above work well in wired networks, they are not suitable for the wireless environment. In wireless networks, bandwidth is a scarce resource, and wireless links are more error-prone than their wired coun- 22

37 terparts. DVMRP requires a multicast sender to periodically flood the network in order to prune or graft branches to keep the multicast tree up-to-date. In MOSPF, routers maintain multicast group membership information in addition to the topological information. Based on these two pieces of information, MO- SPF routers compute the shortest paths from the sender to the group members using the Dijkstra s shortest path algorithm. When a member joins or leaves the group, the group membership advertisement is flooded to the entire MOSPF routing domain to inform the routers in the domain. Flooding is expensive in a wireless environment because it consumes bandwidth and causes a high number of packet collisions and thus packet losses. PIM introduces the notion of a rendezvous point (RP), which acts as a meeting place for the receivers and the sender. The receivers explicitly join the RP resulting in the formation of an unidirectional shared RP-tree, and then the sender sends the data to the RP for distribution using the shared RP-tree. CBT sets up a single shared bidirectional tree connecting the senders and the receivers. All senders use the same tree for transmitting the data and the routers simply forward the data on all the interfaces (except for the incoming interface of the data) for the tree. In PIM and CBT, the routing paths are sub-optimal and longer than necessary. The data packets thus need to traverse more hops to reach the 23

38 receivers. Since the wireless links are more error-prone, the longer the path, the more likely it is for a data packet to be lost or damaged. In WMNs, we can take advantage of the knowledge of the network topology to build the tree in a more efficient manner Multicast Routing in MANETs Multicast routing protocols proposed for MANETs can be classified broadly into two categories: tree-based and mesh-based. Typical tree-based protocols are AM- RIS (Ad hoc Multicast Routing protocol utilizing Increasing id-numbers) [35] and MAODV (Multicast Ad hoc On-Demand Distance Vector Routing) [32]. Example mesh-based protocols are ODMRP (On-Demand Multicast Routing Protocol) [33] and CAMP (Core-Assisted Mesh Protocol) [34]. Existing studies [13] show that in a mobile ad hoc network, where the network topology changes frequently, mesh-based protocols outperform tree-based protocols in terms of packet delivery ratio and throughput due to the fact that redundant routes in the mesh provide alternative paths for data delivery when a path breaks. Among the multicast routing protocols proposed for MANETs, ODMRP is the most popular because it is simple and gives high packet delivery ratio. Following is a review of ODMRP. 24

39 On-demand Multicast Routing Protocol (ODMRP) ODMRP creates a mesh of nodes (the forwarding group), which forwards multicast packets via flooding within the mesh, thus providing path redundancy. In ODMRP, group membership and multicast routes are established and updated by the source on demand. When multicast sources have data to send, they flood JOIN QUERY packets over the network. When a node receives a non-duplicate JOIN QUERY, it stores the upstream node ID (i.e., backward learning) and rebroadcasts the packet. (The node will discard duplicate JOIN QUERY packets.) When a JOIN QUERY packet reaches a multicast receiver, the receiver creates a JOIN REPLY and broadcasts the JOIN REPLY to the neighbors. The JOIN REPLY packet includes the next hop ID and the sender IDs. When a node receives a JOIN REPLY, it checks if the next hop ID of one of the entries in the JOIN REPLY matches its own ID. If it does, the node realizes that it is on the path to the source and is thus a forwarding node. To reduce the control overhead, a forwarding node consolidates all the JOIN REPLY packets it receives during a period of ReplyConsolidationInterval, then broadcasts its own JOIN REPLY built upon matched entries. The JOIN REPLY is thus propagated by each forwarding node until it reaches the multicast source via the shortest delay path. This process constructs (or updates) the routes from the sources to the receivers, 25

40 and builds a mesh of nodes, the forwarding group. Multicast senders refresh the routes by sending JOIN QUERY periodically. ODMRP works independently of the unicast routing protocols and can itself be used as one Multicast Routing in WMNs Recently, Ruiz et al. [12] argued that in a wireless environment, the transmission of a multicast data packet from a node to any number of its neighbors can be done with a single data transmission. Therefore, in a multi-hop wireless mesh network, the minimum-cost multicast tree is one that connects the source and receivers by issuing a minimum number of transmissions, rather than having a minimal edge cost. They also showed that the problem of minimizing the number of transmissions is NP-complete and proposed MNT heuristics [12] to compute the approximation of such optimal trees. Although such minimum-cost trees save bandwidth, the paths from the source to the receivers in such a minimum-cost tree are longer than the paths produced by a shortest path algorithm. Since wireless links are more error-prone, the longer the path, the more likely that a data packet will be lost or damaged. Another problem of such minimum-cost trees is that when nodes join or leave the multicast group, the tree is no longer optimal and it must be rebuilt to maintain the optimality. This problem cannot 26

41 be solved without incurring traffic and computation overheads. The worst case occurs when nodes keep joining and leaving the group. Following is the description of one of the MNT heuristics proposed by Ruiz et al. [12], which we implemented to compare with our proposed protocol. MNT heuristic Algorithm MNT MF φ V V {s} aux R Cov(s) + {s} repeat v argmax v V ( Cov(v) )s.t.cov(v) 2 aux aux Cov(v) + {v} V V {v} MF MF + {v} until aux = φ or v = null if aux φ then Build Steiner tree among nodes in aux. end if In the above algorithm, s is the sender; V is the set of all nodes; R is the set of receivers; MF is the set of forwarding nodes; aux is the set of nodes to cover; Cov(v) is the set of nodes that node v covers. This algorithm systematically builds different cost-effective subtrees. Costeffectiveness refers to the fact that a node v is selected to be a forwarding node only if it covers two or more nodes. The algorithm starts by initializing the nodes- 27

42 to-cover set (aux) to all the receivers, except for those which are already covered by the source s. Initially, the set of forwarding nodes (MF) is empty. After the initialization, the algorithm repeats the process of building a cost-effective tree, starting with node v which covers more nodes in aux. Then, v is inserted into the set of forwarding nodes (MF) and it becomes a node to cover. In addition, the receivers covered by v (Cov(v)) are removed from the list of nodes-to-cover (aux). This process is repeated until all the nodes are covered, or it is not possible to find more Steiner nodes, guaranteeing the cost-effectiveness. In the latter case, the different subtrees are connected by a Steiner tree among their roots. 2.2 Reliable Multicast Protocols IP multicast provides only best-effort services. It does not guarantee message delivery, ordering, throughput, or end-to-end delay. Many multicast applications, however, have requirements beyond best-effort services. For example, bulk-data transfers such as file distribution require error-free delivery of data (but they can usually tolerate relatively large delay and delay jitter). Some applications, such as distributed whiteboards [36] and distributed games, require both errorfree and real-time delivery. Therefore, various multicast transport protocols are proposed to provide reliable delivery and/or quality-of-service guarantees on top 28

43 of the multicast routing protocols. An end-to-end reliable multicast service ensures that all packets from a sender are delivered to all receivers of the multicast session within a finite amount of time and free of errors. Lost or damaged packets are recovered by Automatic Repeat Request (ARQ) and/or Forward Error Correction (FEC). ARQ is a retransmission on demand mechanism based on retransmissions of lost packets. ARQ provides total reliability but retransmissions increase packet delivery latency. FEC [41] allows error correction codes (also referred to as parity packets) to be transmitted along with the original data from the sender to the receiver. Depending on how many error correction codes are sent and how many packets are lost at the receiver, it is possible to recover missing packets based on the received packets. The FEC-based approach thus reduces packet delivery latency at the cost of additional bandwidth needed for the parity packets. However, the optimal amount of error correction code in FEC is usually difficult to set due to heterogeneous loss probabilities in a multicast group and the burst of losses. Moreover, FEC alone is not enough to guarantee complete reliability in practice. Thus we chose ARQ as the error recovery mechanism for our reliable multicast protocol. 29

44 A reliable multicast protocol needs to address the following issues: Implosion problem: A problem that occurs when the loss of a packet triggers simultaneous messages, either requests or replies, from a large number of receivers. Exposure problem: A problem that occurs when recovery-related messages reach receivers which have not experienced loss. Recovery latency: The latency experienced by a member from the instant a loss is detected until the repair packet is received. A reliable multicast is scalable if it can support a very large number of receivers with low recovery latency, and minimal implosion and exposure. Several ARQ-based reliable multicast protocols have been proposed in the literature [36, 38, 39, 43]. These protocols can be classified into two broad categories: group-based, and structure-based. RBP (Reliable Broadcast Protocol) [42], RMP (Reliable Multicast Protocol) [43] and SRM (Scalable Reliable Multicast) [36] are typical group-based protocols. Example structure-based protocols are RMTP (Reliable Multicast Transport Protocol) [38] and TMTP (Tree-based Multicast Transport Protocol) [39]. 30

45 2.2.1 Group-based Protocols Group-based protocols require no structure among the members of a multicast group. Levine et al. [44] classify them into sender-initiated and receiver-initiated protocols Sender-initiated Protocols The sender-initiated approach places the responsibility of error recovery on the sender, which maintains the state information of all of its receivers. This is accomplished by having receivers return positive acknowledgments (ACKs) for the packets correctly received, and having the sender detect and retransmit lost packets. As the number of receivers increases, the sender is overwhelmed by a large amount of ACKs from the receivers and the task of retransmission. This scheme is thus not scalable, and the recovery latency may be high Receiver-initiated Protocols In contrast, receiver-initiated protocols place the responsibility of loss recovery on both the receivers and the sender. A receiver multicasts negative acknowledgments (NACKs) to other receivers and the sender when packets are lost. The sender or any receiver having the lost packet can multicast the packet. Pin- 31

46 gali et al. [45] showed that receiver-initiated protocols are far more scalable than sender-initiated protocols because the sender of a receiver-initiated protocol does not need to maintain the state of all the receivers, and the task of retransmission is distributed among all group members. However, receiver-initiated protocols may experience the problems of request implosion and repair implosion. In other words, several receivers may request for the same data, and several members may retransmit the same data. A suppression mechanism must be used to reduce the number of duplicate NACKs or duplicate repair packets. The suppression mechanism can be timer-based (as in SRM (Scalable Reliable Multicast) [36]), or probabilistic (as in TRM (Transport Protocol for Reliable Multicast) [46]). Exposure is also a potential problem with this approach since retransmission is done via multicast Structure-based Protocols This class of protocols imposes a logical structure among group members. The two common structures are rings and trees. 32

47 Ring-based Protocols Ring-based protocols arrange the receivers in the form of a ring. Data are transmitted in one direction around the ring. One of the receivers at any instance of time is designated as a token site. The token site is responsible for sending ACKs back to the sender. The sender retransmits packets if it does not receive an ACK from the token site within a timeout period. Receivers send NACKs to the token site when packets are lost. The token site then retransmits the lost packets. The token is passed to the next receiver in the ring when that receiver has correctly received all packets that the former site has received. One of the first ring-based reliable multicast protocols is the Token Ring Protocol (TRP) [42]. The Reliable Multicast Protocol (RMP) [43] is an updated version of TRP and is designed for wide area networks (WANs) Tree-based Protocols The basic principle of tree-based protocols is to distribute the burden of acknowledgment handling and retransmission among members of a multicast group in order to achieve better scalability of error recovery. These protocols require the receivers of a multicast group to be organized into local regions, each with a representative called a Designated Receiver (DR). The local regions are them- 33

48 S DR DR DR DR R R R R R R R R R R DR R R R Figure 2.1: Tree-based protocols selves organized into a hierarchical tree structure. The receivers in a local region request lost packets from their parent DR. The DR retransmits repair packets to the receivers in its local region. If the DR does not have a requested packet, it forwards the request to the next higher level DR, and so on, until the request reaches a DR that has the packet (see Figure 2.1). This local recovery leads to shorter recovery latency and reduces the number of data units flowing through a global network. The protocols that belong to this category are RMTP (Reliable Multicast Transport Protocol) [38], TMTP (Tree-based Multicast Transport Protocol) [39], LBRRM (Log-Based Receiver-Reliable Multicast) [37], and Lorax [48]. 34

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Introduction to IP Multicast Routing

Introduction to IP Multicast Routing Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted

More information

Multicast Routing in Scalable Networks using MAODV

Multicast Routing in Scalable Networks using MAODV Multicast Routing in Scalable Networks using MAODV Jayalakshmi G Naragund 1, R M Banakar 2 Abstract Wireless mesh network (WMN) is used to develop techniques for guaranteeing end-to-end delay performance

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

CHAPTER 10 IP MULTICAST

CHAPTER 10 IP MULTICAST CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios

Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Multicasting in Mobile Ad-Hoc Networks: Achieving High Packet Delivery Ratios Thomas Kunz Systems and Computer Engineering Carleton University Abstract Multicasting is intended for group-oriented computing.

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

The necessity of multicast for IPTV streaming

The necessity of multicast for IPTV streaming The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania arianit.maraj@ptkonline.com,

More information

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network

Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer

More information

A Survey of Mobile Ad Hoc network Routing Protocols*

A Survey of Mobile Ad Hoc network Routing Protocols* Technical Report (Nr. 2003-08) A Survey of Mobile Ad Hoc network Routing Protocols* Changling Liu, Jörg Kaiser {changling.liu, joerg kaiser}@informatik.uni-ulm.de Department of Computer Structures University

More information

Analysis of Bandwidth Utilization for Wireless Mesh Networks

Analysis of Bandwidth Utilization for Wireless Mesh Networks Analysis of Bandwidth Utilization for Wireless Mesh Networks Nagendra Sah, Neelam Rup Prakash, and Deepak Bagai Abstract Mobile Ad-hoc networks are characterized as networks without any physical connections.

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission

Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission Majid Ashraf Derwesh Department of Electronics and Communication

More information

Study of Network Characteristics Incorporating Different Routing Protocols

Study of Network Characteristics Incorporating Different Routing Protocols Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network

A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network Journal of Computing and Information Technology - CIT 13, 25, 3, 177 193 177 A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network Ziping Liu 1 and Bidyut Gupta 2 1 Computer Science Department,

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks

A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks A Comparison of Reliable Multicast Protocols for Mobile Ad Hoc Networks Beini Ouyang and Xiaoyan Hong Dept. of Computer Science University of Alabama bouyang@cs.ua.edu Yunjung Yi Honeywell Technology Center

More information

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Dynamic Source Routing in Ad Hoc Wireless Networks

Dynamic Source Routing in Ad Hoc Wireless Networks Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Rate-adaptive Multicast in Mobile Ad-hoc Networks

Rate-adaptive Multicast in Mobile Ad-hoc Networks Rate-adaptive Multicast in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University Toronto, Canada M3J P3 Email: {utn, xing}@cs.yorku.ca Abstract

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Graph Theory Algorithms for Mobile Ad Hoc Networks

Graph Theory Algorithms for Mobile Ad Hoc Networks Informatica 36 (2012) 185-200 185 Graph Theory Algorithms for Mobile Ad Hoc Networks Natarajan Meghanathan Department of Computer Science, Jackson State University Jackson, MS 39217, USA E-mail: natarajan.meghanathan@jsums.edu

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A survey on Wireless Mesh Networks

A survey on Wireless Mesh Networks A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im ybim@mmlab.snu.ac.kr 2007.10.15. Contents Introduction to WMNs Network architecture Critical design

More information

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu

More information

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo. gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

A Link-state QoS Routing Protocol for Ad Hoc Networks

A Link-state QoS Routing Protocol for Ad Hoc Networks A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,

More information

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science

More information

Multicast Over Wireless Networks

Multicast Over Wireless Networks Multicast Over Wireless Networks How to ensure the participation of mobile users (no matter how disruptive the circumstances), especially for mobile commerce applications distributed over multiple networks.

More information

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

The Benefits of Layer 3 Routing at the Network Edge. Peter McNeil Product Marketing Manager L-com Global Connectivity

The Benefits of Layer 3 Routing at the Network Edge. Peter McNeil Product Marketing Manager L-com Global Connectivity The Benefits of Layer 3 Routing at the Network Edge Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper covers where and when to employ Layer 3 routing at the edge

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

order ateway Sicherheit im Internet, Patrick Lederer,, 18.05.2004

order ateway Sicherheit im Internet, Patrick Lederer,, 18.05.2004 B G order ateway M ulticast P rotocol 1 Abstract 1. Introduction 1. Introduction 2. Tasks and Rules of Border Routers 3. Implementations 4. Bidirectional Trees 4.1 Third Party Dependency 4.2 Method of

More information

Übungen zu Kommunikationssysteme Multicast

Übungen zu Kommunikationssysteme Multicast Übungen zu Kommunikationssysteme Multicast Peter Bazan, Gerhard Fuchs, David Eckhoff Multicast Classification Example Applications Principles Multicast via Unicast Application-layer Multicast Network Multicast

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Explicit Multicast Routing

Explicit Multicast Routing Explicit Multicast Routing Malik Mubashir HASSAN Stagiaire, ARMOR 2 IRISA Supervisors: Bernad Cousin Miklos Molnar 1 Plan Introduction of Group Communications Various types of Group Communications Multicast

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,

More information

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter

More information

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Disaster-Resilient Backbone and Access Networks

Disaster-Resilient Backbone and Access Networks The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)

More information

Computer Networks. Main Functions

Computer Networks. Main Functions Computer Networks The Network Layer 1 Routing. Forwarding. Main Functions 2 Design Issues Services provided to transport layer. How to design network-layer protocols. 3 Store-and-Forward Packet Switching

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks Ahmed Helmy Electrical Engineering Department University of Southern California (USC) helmy@usc.edu http://ceng.usc.edu/~helmy

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Internet Connectivity for Ad hoc Mobile Networks

Internet Connectivity for Ad hoc Mobile Networks Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins

More information