Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement
|
|
|
- Damian Pitts
- 10 years ago
- Views:
Transcription
1 Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement Vijaykumar Naik Pawar M.Tech., Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka, India Prof. Vidya R. Kulkarni Associate Professor, Dept of CSE KLS Gogte Institute of Technology Udyambag, Belagavi, Karnataka, India ABSTRACT Wireless Mesh Networks (WMN) is a new exciting technology that is expected to overcome the limitations and to improve the performance of various wireless networks such as adhoc networks, WLANS, WPANS, and WMANs. Heterogeneous Mesh networks running on different technologies with different channels, which is commonly known as multi radio network will be dominant in the nextgeneration wireless networks with the integration of various wireless access networks. In such a network, obtaining routes that elongates the QoS and extends the route lifetime without compromising on performance issues plays a significant role. There is a need to enhance the performance in WMN during dynamic link failures. This paper presents a self reconfiguration wireless mesh network that dynamically searches for the best available path among the available multiple paths to the internet. The best path will be selected based on the fuzzy rule set. The ARS with fuzzy logic results in improved throughput and latency. Keywords Wireless mesh networks, Self Reconfiguration, Multiradio wireless, IEEE , Fuzzy logic. 1. INTRODUCTION Wireless Mesh Networks (WMNs) is a heterogeneous network of mesh routers and mesh clients, where mesh routers form the backbone of network and with minimum movement whereas client can either stationary or might have mobility. They provide network access for both mesh and conventional clients. Mesh routers have bridging and gateway functionality that in turn helps in the integration of WMNs with other existing networks such as internet, cellular, IEEE , IEEE , sensor networks, etc. In WMN each node operates not only as a host, but also as a router, forwarding packets on behalf of other nodes that may not be within the scope of direct wireless transmission of the destinations.[1] WMN supports larger applications and also provides several benefits to users such as no wiring cost, automatically getting connected to all nodes, network flexibility and ease of installation and also discovers new routes automatically. This makes WMN preferable in fast and easy deployment of technology. A WMN is dynamic self-organized and self-configured, where the nodes of the network automatically set and maintain mesh connectivity among them (creating, in effect, an ad hoc network). This feature provides many advantages to WMN as low initial cost, easy network maintenance, robustness, and reliable service coverage. Obtaining an optimal path in a mesh network and then maintaining QoS is always a challenge mainly because of two factors. First, the demand for bandwidth is uneven i.e. a node watching a YouTube video will require more bandwidth then a node just surfing a HTML file. On the other hand, if a node is transmitting a song or video to another device without being connected to the Internet, then the demand will be different. More bandwidth demand leads to collision and thus reduces the signal to noise ratio. So, instead of transmitting long way in one session, nodes are better off to flexible connectivity where they can choose the peer who wants to connect to on the fly. Link failures in WMN occur frequently and results in server performance degradation. Several techniques have been proposed for link failure recover in wireless mesh network. First technique is the, resource-allocation algorithms, in this method the initial planning for resources of network are done. These can provide the best configuration plan but this requires global configuration changes which are unattractive in case of frequent link failure [2]. Second is the, a greedy channelassignment algorithm can reduce the need for changes to the network reconfiguration by changing only the faulty links that is in greedy channel assignment the reconfiguration is not done on the entire network instead only faulty links are changed[4]. Next is the, fault-tolerant routing protocol, such as local rerouting or multipath routing can be adopted for avoiding the faulty links. However, these methods depend on detour paths or redundant transmissions, which may require more network resources than link-level network reconfiguration. Whenever a link failure occurs the routing protocol can route the packet via a different link. A research by kyu-han kim and Kang G.shin suggested a Self Reconfiguration system where the node without dropping the call decides to which node it wants to get connected to. Self Reconfiguration is studied extensively for Mesh network. In a Self Reconfiguration a node decides the peer it wants to get connected to. Even if the radio link quality observed at a node with an access point is good, the access point may itself suffer from packet congestion due to too many connections. [3] Our contribution in the work is twofold: Firstly we propose a unique admission control based routing which is a variant of DSDV protocol where a router participates in routing only if it has sufficient bandwidth to meet the demand. Secondly we offer a unique fuzzy based solution by incorporating bandwidth and delay metrics to resolve the best available connection for a node and update the route on the fly by changing the connected access point/ base station through appropriate handoff which results in auto reconfiguration. This mechanism is called automated reconfiguration. 37
2 The rest of the paper is organised as follows. Section II describes the related work, section III describes ARS architecture, section IV describes system implementation and experimentation an d section V concludes the paper. 2. RELATED WORK 2.1 Network Model and Assumptions Multiradio WMN: A multiradio wireless network is where there are more than one access point. There are multiple nodes, multiple access point can communicate with each other and then get connected to the gateway. Here mostly channel related link failures are due to the lack of bandwidth, lack of energy drainage of nodes or due to lack of very high power.[6] Satisfying dynamic QoS demands: Links in some areas, such as conference rooms may not be able to accommodate increased demands for quality of service to end users. I.e. links around a conference room can have too much traffic to relay data / video during the session. In order to provide large amounts of data in real time the concept of radio switched can be used. This is accomplished by reallocating highly loaded radio to less loaded radius radios. Coping with heterogeneous channel availability: Links in some areas may not be able to access the wireless channel for a certain period of time, because of spectrum regulation. For example, some links in a WMN need vacate current channels if channels are being used for emergency response near wireless links. These links may seek alternative channels available in the same area. 3. ARS ARCHITECTURE Automated reconfiguration enabled wireless mesh network is a distributed system that is easily deployable in IEEE based mr-wmns. Running in each mesh node; ARS supports self-reconfigurability via the following features. [5] Fig 1: Multiradio WMN QoS Support: In operation, each mesh node periodically sends its local channel usage and quality information for all outgoing connections via management messages to the gateway control. The gateway uses this information for admission control. QoS-Awareness: Automated Reconfiguration must meet required QoS constraints on each link as much as possible. First, given the limited bandwidth of each link s existing channel assignment and scheduling algorithms can provide about optimal network configurations. However, as noted above, these algorithms may require global network configuration changes with the changing demands of local service quality, thus causing disruptions. We need a reconfiguration algorithm that incurs only local changes and increase the most of the opportunity to respond to the demands of service quality. Cross-Layer Interaction: Network reconfiguration must jointly consider the network settings across multiple layers. In the network layer, routing protocols with fault tolerance, such as changing local path or multipath routing allow reconfiguration flow to meet the quality of service restrictions by exploiting path diversity. However, consume more network resources than link reconfiguration due to its dependence on roundabout route or redundant transmissions. In the other manual tasks, channel and link through the network and link layers can avoid the overhead of diversion, but they must be taken to avoid interference faults as additional service of neighbouring nodes.[4] 2.2 Need for Self Reconfiguration Recovering from link-quality degradation: Several wireless networks such as Wifi, Bletooth might be operating on the same channels or adjacent channels, due to this severe interference it leads to link quality degradation between the nodes in WMN's. This problem can be solved using the concept of channel switch. By changing the tuned channel link to other channels which is interference-free, local link recovery can be achieved. Fig 2: ARS Architecture Localized reconfiguration: Since multiple radio's and channels are available, during a link failure system generates a reconfiguration plans locally. The reconfiguration plan changes the network configurations only near the faulty area whereas keeping the network configuration at the remote locations unchanged. Cross-layer interaction: For generating the reconfiguration plan s the ARS actively interact through the network and link layers. This interaction allows ARS to include a change of route in reconfiguration along with link layer reconfiguration. ARS can also maintain connectivity during the recovery period using the routing protocols.[4] QoS-aware planning: ARS initially will keep on monitoring the state of the network. Whenever there is a link failure the system immediately looks for a reconfiguration plan which satisfies the required QoS. And pointed out earlier most of the algorithms require network configuration to be changed globally; this system only incurs local reconfiguration plans. 3.1 Algorithm 1. calculate Etx at each node with the of probing hello packets. 2. Generate RREQ packet. Append needed bandwidth 3. Nodes receiving RREQ forwards the request only if it s available BW> demand bandwidth. 38
3 4. Before forwarding node appends it s bandwidth in RREQ packet. 5. At destination average BW is calculated. Packet delay is calculated from Receive time-sending Time. The best route is selected based on RouteQuality. Quality=FuzzyOut(BW,Delay). 6. Destination node replies by transmittig RREP packet. While transmission some nodes may overhear this packet that is not intended for it. This accounts to interference and the overheared packet is dropped. 7. Multiple paths are obatined and the path with high cost (Quality)is selected. 8. Data is transmitted over the selected path 9. When the nodes move, mobility model sends message to physic layer. 10. Physic layer initiates channel quality assessment by looping through the signal from all the access point. 11. Physic layer finds the access point with base station and request for a handoff which results in auto reconfiguration. 12. Once the access point is switched, path is changed locally through new access point. 13. For routing, flood control technique is adopted by restricting the route hops bellow This mechanism is compared with present DSDV based system where only admission control is employed for QoS. ARS at each mesh node monitors the quality of outgoing wireless links and reports the results to a gateway via a management message. Second, once a fault in a link is detected, ARS at the detector node (s) triggers the formation of a group between local network routers that use a faulty channel, and one of the members group has been chosen as a leader with well -known bully algorithm. Third, the leader node sends a message to request planning at the gateway. Then, the gateway requests are synchronized if there are multiple planning requests and generates a reconfiguration plan.fourth, the gateway sends a reconfiguration plan to the leader node and group members. Finally, all nodes in the cluster run the appropriate configuration changes, if any, and resolve the group. 4. SYSTEM IMPLEMENTATION AND EXPERIMENTATION We have implemented ARS using Omnetpp3.3p2 network stimulator. OMNeT++ is an object oriented, modular discrete network simulator. Developed in 1998, it is still new product. It is an open source package. This simulation package built based on C++ language foundation, it offers class library, GUI support (animation of network environment and graphical network editing). This kind of simulator can be used for modelling queuing networks, validating hardware architectures, traffic modelling and to measure evaluation performance of complex systems. OMNeT++ package specifically designed for telecommunication networks, it also gives good simulation performance and analytical results for sensor networks, mesh networks and several wireless network types. OMNeT++ is still young software package. It provides pre-built modules but less in number compared other simulators. OMNeT++ is carefully designed in such a way that it is easy, flexible, well organized and user-friendly than other simulators. OMNeT++ s internal architecture is model based which comprises of several hierarchical overlapping modules. The depth of overlapping of modules is limited to some degree and permits users to reflect logical components of actual system in module form. Modules in the simulator communicate among themselves via message passing, a module can send message directly to the destination or follow pre-defined path through gates and connections which possess properties like delay, bandwidth, and error rate. At the time of simulation run, simple modules are capable to run in parallel mode, since they are implemented in co-ordination with C++ programming code. To create a simple module user can create objects with help of OMNeT GUI and also need to write subsequent C++ programming code to represent objects that are created in OMNeT GUI. 4.1 Implementation Details Fig.2 shows the software architecture of ARS. Initially the ARS will keep on monitoring the state of the network using the network monitor. All the routes satisfying the required QoS will be stored in the routing table; these entries are used during the network reconfiguration. The failure detection module detects any of the link failure in the network and maintains the link state table. And the group organizer forms a local group among the mesh networks. The module in this driver includes:1) Network monitor, monitors link-quality and is extensible to support as many multiple radios as possible and 2) NIC manager, which effectively reconfigures NIC s settings based on a reconfiguration plan from the group organizer. 4.2 Fuzzy Based System When the system generates the route reply packets, the paths on which these packets would be send will depend on the fuzzy rule set. The block diagram of the fuzzy system is as shown in the figure 3. The first step is the fuzzification where the numeric values (ie of bandwidth and delay) are converted into fuzzy values and then each nodes checks for bandwidth and delay values with the reference values. Then bandwidth and delay will be classified as low, medium or high. The fuzzy rule set table is created based on the fuzzy values and it generates a output which is used in the decision system.[5] 39
4 Throughput International Journal of Computer Applications ( ) 4.3 Experimental Setup To evaluate our implementation, we have first constructed a heterogeneous multi hop wireless mesh network. There are a total of 35 nodes over an area of 950*950. One of the node is assumed to be a internet node. Objective of all the other nodes is to get connected with the internet. The source node will be transmitting data from the application layer, which will go routing layer(all routing table activities such as RREQ, RREP, RERR, hello packets) are done over here. And that would go to MAC layer and then move to physical layer. The Mobility to any node will be done by the mobility layer, which changes the X and Y location of the nodes. 4.4 Experimental Results We evaluated the improvements achieved by ARS using fuzzy logic, including throughput and packet delivery ratio, latency and control overhead. 1) Throughput: Throughput is the ratio of message length and latency. We also set the bandwidth requirement of every link to 20 Mb/s and delay of 12 ms. The graph shown in the figure 4, number of nodes in the WMN is compared with throughput. Generally throughput is measured in terms of Mbps. Throughput of proposed work is higher than present system. The graph shown in the figure 5, Packet Rate in the WMN is compared with throughput. Generally throughput is measured in terms of Mbps. Even when the packet rate is varied the throughput is higher in ARS with fuzzy logic. TP_pres represents throughput gains without fuzzy logic whereas TP_pros represents Throughput gain with fuzzy logic. The maximum throughput for proposed system as number of active nodes increase throughput increases gradually but in case existing system throughput decreases as number of nodes increases. 2) Latency: Latency is defined as the end to end delay between transmitter and receiver. Latency is typically measured in milliseconds. the average latency of ARS without fuzzy logic was ms whereas with fuzzy bandwidth and delay it is ms. As shown in the graph figure 6, number of nodes versus latency (delay) is compared. Present system involves large latency but in case of proposed system latency is less, due to minimized latency accuracy of the transmission increases. Also as shown in the graph figure 7, Packet Rate versus latency (delay) are compared. Present system involves large latency but in case of proposed system latency is less, due to minimized latency accuracy of the transmission increases. es represents Latency without fuzzy logic whereas os represents Latency with fuzzy logic. Present system involves large latency but in case of Fig 3 : Fuzzy System proposed system latency is less, due to minimized latency accuracy of the transmission increases. Table 1: Throughput values with varying number of nodes Node ARS Throughput in Bps ARS with fuzzy logic Throughput in Bps E E E E E E E E E E E E E E E E+06 Fig 4: Number of Nodes Vs Throughput Table 2: Throughput values with varying packet rate Packet rate No of Node V/S Throughput 0 ARS Throughput in Bps TP_pres 6E 8E 9E 1E TP_pros ARS with fuzzy logic Throughput in Bps E E E E+06 40
5 Latency Throughput Latency International Journal of Computer Applications ( ) E E E E E E E E E E E E E E E E+00 Packet Rate V/S Throughput TP_pres 1.46E 1.48E 1.22E 1.19E 1.25E TP_pros 1.43E 1.54E 1.50E 1.51E 1.46E Fig 5: Packet Rate Vs Throughput Table 3: Latency values with varying number of nodes Node ARS Latency in ARS with fuzzy logic sec Latency in sec E E E E E Packet rate No of Node V/S Latency es op Fig 5: Number of Nodes Vs Latency Table 4: Latency values with varying packet rate ARS Latency in sec ARS with Fuzzy Logic Latency in sec E Packet Rate V/S Latency 2.00E E E E E+00 es op E Fig 6: Packet Rate Vs Latency 5. CONCLUSION Wireless mesh networks are generally used to provide seamless internet connection within low to medium topology changes. Generally such a network is conceived as more reliable due to fixed access points. However if the nodes are mobile, then their QoS and link quality of Access points keeps varying. Thus routing must be suitable enough to guarantee that there is no failure or minimum failure. In this system as cost based multipath routing is used, the QOS parameters lifetime, latency can be improved. We also offered automatic changing of paths, topology by handoff and by selecting 41
6 alternative routes. This is called reconfiguration. Therefore QoS driven routing, automated reconfiguration and best path transmission ensures better network performance. By combining intelligent fuzzy based system we achieve better PDR in comparison to pure admission control system. 6. FUTURE SCOPE Internet traffic is steadily growing due to increaing service demands and number of users. therefore power consumption might play a vital role for its futher growth. The system can be further improved by incorporating parameters like Energy of the nodes and link strength in the fuzzy decision system. 7. REFERENCES [1] I. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: A survey, Comput. Netw., vol. 47, no. 4, pp , Mar Ding, W. and Marchionini, G [2] M. Alicherry, R. Bhatia, and L. Li, Joint channel assignment and routing for throughput optimization in multi-radio wireless mesh networks, in Proc. ACM MobiCom, Cologne, Germany, Aug. 2005, pp [3] yu-han Kim and Kang G. Shin, IEEE/ACM TRANSACTIONS ON NETWORKING, Self- Reconfigurable Wireless Mesh Networks, APRIL 2011 [4] Mehajabeen Fatima, Roopam Gupta,R.Venkatesh, T.K. Bandhopadhyay. Route Discovery by Cross Layer Approach for MANET International Journal of Computer Applications, January [5] Len Malinin " On Application of Fuzzy Logic to Decisions Making in Solving Inventive Problems" International Journal of Computer and Information technology [6] R. Draves, J. Padhye, and B. Zill, Routing in multiradio, multi-hop wireless mesh networks, in Proc. ACM MobiCom IJCA TM : 42
Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network
Planning in FARS by dynamic multipath Reconfiguration system failure recovery in Wireless Mesh Network K.G.S. VENKATESAN 1 Associate Professor, Dept. of CSE, Bharath University, Chennai 1 ABSTRACT: Mesh
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
A survey on Wireless Mesh Networks
A survey on Wireless Mesh Networks IF Akyildiz, X Wang - Communications Magazine, IEEE, 2005 Youngbin Im [email protected] 2007.10.15. Contents Introduction to WMNs Network architecture Critical design
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
An Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Technology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I [email protected] I www.edx.com Mark Chapman and Greg Leon EDX Wireless
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network
Performance Analysis of Optimal Path Finding Algorithm In Wireless Mesh Network A thesis report submitted for partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
Security in Wireless Mesh Networks
Thesis report, IDE 0949, June 2009 Security in Wireless Mesh Networks Master s Thesis in Computer Network Engineering Presented By: Shakeel Ahmad Ghumman Supervisor: Per-Arne-Wiberg School of Information
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways
Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Intelligent Agent Based Delay Aware QoS Unicast Routing in Mobile Ad hoc Networks
Intelligent Agent Based Delay Aware QoS Unicast Routing in Mobile Ad hoc Networks V. R. Budyal 1 and S. S. Manvi 2 1 Department of Electronics and Communication Engineering Basaveshwar Engineering College,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach
Experimental Comparison of Routing and Middleware Solutions for Mobile Ad Hoc Networks: Legacy vs Cross-Layer Approach E. Borgia, M. Conti, F.Delmastro, and E. Gregori Pervasive Computing & Networking
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
24 0890-8044/15/$25.00 2015 IEEE
Software-Defined Wireless Mesh Networks: Architecture and Traffic Orchestration Huawei Huang, Peng Li, Song Guo, and Weihua Zhuang Abstract SDN has been envisioned as the next generation network paradigm
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Wireless mesh networks: a survey
Computer Networks 47 (2005) 445 487 www.elsevier.com/locate/comnet Wireless mesh networks: a survey Ian F. Akyildiz a, Xudong Wang b, *, Weilin Wang b a Broadband and Wireless Networking (BWN) Lab, School
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol
Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks
www.ijcsi.org 118 -Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks Vijayalakshmi P 1, Dr.V.Saravanan 2, Dr. P. Ranjit Jeba Thangiah 3, Abraham Dinakaran.J 4 1 Karunya
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Wireless Mesh Networks: WMN Overview, WMN Architecture
2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,
