Backpressure with Adaptive Redundancy Mechanism for Networks in Overload



Similar documents
A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Comparative Analysis of Congestion Control Algorithms Using ns-2

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Smart Queue Scheduling for QoS Spring 2001 Final Report

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

A Catechistic Method for Traffic Pattern Discovery in MANET

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

ROUTER CONTROL MECHANISM FOR CONGESTION AVOIDANCE IN CDMA BASED IP NETWORK

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Profit Maximization and Power Management of Green Data Centers Supporting Multiple SLAs

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

IN THIS PAPER, we study the delay and capacity trade-offs

International Journal of Advanced Research in Computer Science and Software Engineering

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Transport Layer Protocols

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

PART III. OPS-based wide area networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks

REM: Active Queue Management

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Performance of networks containing both MaxNet and SumNet links

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Network congestion, its control and avoidance

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

Algorithms for Interference Sensing in Optical CDMA Networks

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

How To Balance Network Load In A Wireless Sensor Network

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

[Sathish Kumar, 4(3): March, 2015] ISSN: Scientific Journal Impact Factor: (ISRA), Impact Factor: 2.114

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Low-rate TCP-targeted Denial of Service Attack Defense

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems

Optical Packet Buffers with Active Queue Management

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Rate-Based Active Queue Management: A Green Algorithm in Congestion Control

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Securing MANET Using Diffie Hellman Digital Signature Scheme

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Active Queue Management and Wireless Networks

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Models of Load Balancing Algorithm in Cloud Computing

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures

Performance advantages of resource sharing in polymorphic optical networks

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Introduction to LAN/WAN. Network Layer

Multiobjective Multicast Routing Algorithm

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Routing in packet-switching networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Accessing Private Network via Firewall Based On Preset Threshold Value

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Implementation of Energy Efficient Adaptive Load Balancing Algorithm by Rainbow Mechanism in Wireless Sensor Networks

Controlled Random Access Methods

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.

A Policy-Based Admission Control Scheme for Voice over IP Networks

Transcription:

Backpressure with Adaptive Redundancy Mechanism for Networks in Overload G. Arul Selvam 1, M. Sivapriya 2. Assistant Professor, Department of CSE, EGS Pillay Engineering College, India 1 P.G. Scholar, Department of CSE, EGS Pillay Engineering College, India 2 Abstract To utility maximization in networks where the sources do not employ flow control and may consequently overload the network. In the absence of flow control at the sources, some packets will inevitably have to be dropped when the network is in overload. To overcome the problem by proposing the new method called receiver based flow control method. At first develop a distributed, threshold based packet-dropping policy that maximizes the weighted sum throughput. Next, we consider utility maximization and develop a receiver-based flow control scheme that, when combined with threshold-based packet dropping, achieves the optimal utility. In the flow control scheme creates virtual queues at the receivers as a push-back mechanism to optimize the amount of data delivered to the destinations via backpressure with adaptive redundancy (BWAR), mechanism. It is the novel hybrid approach that remove redundant packets via a timeout mechanism, and that improve energy use. The simulations confirm that BWAR outperforms traditional backpressure at low load, while outperforming back pressure routing schemes at high load. Index Terms BWAR, Threshold based packet dropping policy, DTN. I. INTRODUCTION Flow control in data networks aims to provide fair allocation of resources and regulate the source rates of traffic flows in order to prevent network overload. In recent years, network utility maximization problems have been studied to optimize network performance through a combination of flow control, routing, and scheduling, whose optimal operations are revealed as the solution to the utility maximization problems. Most studies in network flow control focus on source-based algorithms that require all sources to react properly to congestion signals such as packet loss or delay. However, in the presence of a greedy or malicious source that injects excessive traffic into the network, the throughput of other data flows may be adversely affected or even starved. In such scenarios, source-based flow control may be ineffective. The problem of maximizing throughput utilities in a network is considered, assuming that all traffic flows do not employ flow control and may overload the network. Flows are categorized into classes so that flows in a class have a shared destination. A class may simply be a flow specified by a source destination pair, or corresponds to a subset of flows that communicate with a common Web site. A utility function is assigned to each traffic class, and the sum of the class-based utilities is maximized as a means to control the aggregate throughput of flows in each class. The use of class-based utility functions is partly motivated by the need of mitigating network congestion caused by a collection of data flows whose aggregate throughput needs to be controlled. Without flow control at the sources, some packets will be dropped when the network is overloaded. To provide differentiated services to multiple traffic classes, we consider the scenario where the destinations can perform flow control to regulate the received throughput of each traffic class. The question we seek to answer is how to design in-network packet dropping and receiver-based flow control strategies to maximize the sum of class-based utilities and stabilize the network. In order to resolve the delay inefficiency of backpressure, we propose a novel hybrid approach, an adaptive redundancy technique for backpressure routing, that yields the benefits of replication to reduce delay under low load conditions, while at the same time preserving the performance and benefits of traditional backpressure routing under high traffic conditions. This technique, which we refer to as backpressure with adaptive redundancy (BWAR),essentially creates copies of packets in a new duplicate buffer upon an encounter, when the transmitter's queue occupancy is low. These duplicate packets are transmitted only when the original queue is empty. This mechanism can dramatically improve the delay of backpressure during low load conditions for two reasons: (1) with multiple copies of the same packet at different nodes, the destination is more likely to encounter a message intended for it; (2) the algorithm builds up gradients towards the destinations faster and reduces packet looping. The additional transmissions incurred by BWAR, due to duplication, utilize the available slots which would otherwise go idle, in an effort to reduce delay. This offers a more efficient way to utilize the available bandwidth during low load conditions. In order to minimize the storage resource utilization of duplicate packets, ideally, these duplicate packets should be removed from the network whenever a All Rights Reserved 2016 IJARMATE 5

copy is delivered to the destination. Since this may be difficult to implement (except in some kinds of networks with a separate control plane), a practical timeout mechanism is proposed and evaluated for automatic duplicate removal. We also introduce an energy-efficient variant of BWAR in which the number of copies of each packet is bounded. In [1] an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN) is considered, in which routing and forwarding decisions are made on a per-packet basis. Using information about queue backlogs, random walk and data packet scheduling nodes can make packet routing and forwarding decisions without the notion of end-to-end routes. To the best of our knowledge, this is the first ever implementation of dynamic backpressure routing in DTNs. In [2], the problem of optimal scheduling and routingis considered in an ad-hoc wireless network with multiple traffic streams and time varying channel reliability. Each packet transmission can be overheard by a subset of receiver nodes, with a transmission success probability that may vary from receiver to receiver and may also vary with time. We develop a simple backpressure routing algorithm that maximizes network throughput and expends an average power that can be pushed arbitrarily close to the minimum average power required for network stability, with a corresponding tradeoff in network delay. We then show that the optimal packet commodity to transmit at each network node can be determined by a backpressure index that compares the current queue backlog of each commodity to the backlog in the potential receivers. Once a packet from this optimal commodity is transmitted, the responsibility of forwarding the packet to its destination is shifted to the receiver node that maximizes the differential backlog. Responsibility is retained by the original transmitter if no suitable receivers are found on a given transmission attempt. II. PROPOSED SYSTEM Parameter Selection Threshold based BWAR Receiver based flow Backpressur control and e with queue adaptive update redundancy Fig.1. Control Policy Receiver All Rights Reserved 2016 IJARMATE 6

Transmit the packet If packet is transmitted creation A. Control policy: The control policy that solves the general utility maximization problem. It has two main features. First, we have a packet-dropping mechanism discarding data from the network when queues build up. An observation is that, in order to optimize throughput and keep the network stable, we should drive the packet-dropping rate to be equal to the optimal queue overflow rate. Second, we need a flow controller driving the throughput vector toward the utility-optimal point. Parameter Selection: We choose the positive parameter Vmax, w, V,Q and {өc,cε C}. Let ε> 0 be a small constant that affects the performance of the UORA policy. We need the parameter of Vmax to Create duplicate buffer both receiver and transmitter * satisfy where the r c is the solution to the utility maximization for a given exogenous arrival rate vector. This choice of Vmax ensures that the virtual queue can be stabilized when its arrival rate is the optimal throughput. choose the parameter of w value which is If buffer is full duplicate is created calculated by.finally we choose the өc value, this vlue must be satifid the for x>0. Threshold based packet dropping: The threshold based packet dropping policy allocate the Create duplicate copy of original in receive side duplicate buffer packet dropping rate at the queue The packet dropping rate is calculated by the following formula Where dmax>0 is a constant chosen to satisfy the condition If flagged Time out packet are removed t removed. is the largest amount of data that can arrive at a node in a slot and is an upper bound on the maximum queue overflow rate at any node. In this method ensures that the maximum packet dropping rate d max is no less than the maximum queue overflow rate, so that we can always choose packet-dropping rates to stabilize the network. The Activity diagram is shown in Fig.3. Packets are received Fig.2. at the Flow Receiver Diagram side All Rights Reserved 2016 IJARMATE 7

If packet is transmitted Create the duplicate buffer on both sender and receiver side If buffer is full Create duplicate copy of original in receive side duplicate buffer cannot be create any duplicate copy creted any duplicate copy D. SOCIAL FEASIBILITY The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system. If flagged and then packet is timeout Remove the packet Packet are received at the receiver side A. FEASIBILITY STUDY Processing the packet Fig.3. Activity Diagram III. SYSTEM STUDY The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are ECOMICAL FEASIBILITY TECHNICAL FEASIBILITY SOCIAL FEASIBILITY B. ECOMICAL FEASIBILITY This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. C. TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. IV. CONCLUSION To utility maximization in networks where the sources do not employ flow control and may consequently overload the network. In the absence of flow control at the sources, some packets will inevitably have to be dropped when the network is in overload. To overcome the problem by proposing the new method called receiver based flow control method. At first develop a distributed, threshold based packet-dropping policy that maximizes the weighted sum throughput. Next, we consider utility maximization and develop a receiver-based flow control scheme that, when combined with threshold-based packet dropping, achieves the optimal utility. In the flow control scheme creates virtual queues at the receivers as a push-back mechanism to optimize the amount of data delivered to the destinations via backpressure with adaptive redundancy (BWAR), mechanism. It is the novel hybrid approach that remove redundant packets via a timeout mechanism, and that improve energy use. The simulations confirm that BWAR outperforms traditional backpressure at low load, while outperforming back pressure routing schemes at high load. REFERENCES [1] M. Alresaini, M. Sathiamoorthy, B. Krishnamachari, and M. J. Neely, Backpressure with adaptive redundancy (BWAR), in Proc. IEEE IN-FOCOM, 2014, pp. 2300 2308. [2] F. Bai and A. Helmy, Impact of mobility on last encounter routing protocols, Proc. IEEE SECON, 2012. [3] L. Bui, R. Srikant, and A. Stolyar, vel architectures and algorithms for delay reduction in back-pressure scheduling and routing, in Proc.IEEE INFOCOM, 2013, pp. 2936 2940. [4] Y. Ding, T. Miyaki, T. Riedel, M. Beigl, W. Zhang, and L. Zhang, Smart Beijing: Correlation of urban electrical energy consumption with urban environmental sensing for optimizing distribution planning, Conf. Smart Grids, Green Communications and IT Energy-Aware Technologies, 2012. [5] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, Age matters:efficient route discovery in mobile ad hoc networks using encounter ages, in Proc. ACM MobiHoc, 2003, pp. 257 266. [6] A. Dvir and A. V. Vasilakos, Backpressure-based routing protocol for DTNs, in Proc. ACM SIGCOMM, 2010, pp. 405 406. [7] A. Elwhishi and P.-H. Ho, SARP A novel multi-copy routing pro- All Rights Reserved 2016 IJARMATE 8

tocol for intermittently connected mobile networks, in Proc. IEEE GLOBECOM, 2009, pp. 1 7. [8] L. Georgiadis, M. J. Neely, and L. Tassiulas, Resource allocation and cross-layer control in wireless networks, Foundations and Trends in Networking, vol. 1, no. 1, pp. 1 144, Apr. 2006. [9] M. Grossglauser and M. Vetterli, Locating mobile nodes with ease: Learning efficient routes from encounter histories alone, IEEE/ACM Trans. Networking, vol. 14, no. 3, pp. 457 469, Jun. 2006. [10] L. Huang and M. Neely, Delay reduction via Lagrange multipliers in stochastic network optimization, IEEE Trans. Autom. Contr., vol. 56, no. 4, pp. 842 857, Apr. 2011. [11] L. Huang, Deterministic mathematical optimization in stochastic net-work control, Ph.D. dissertation, Univ. Southern California, Los An-geles, CA, USA, 2011. [12] L. Huang, S. Moeller, M. Neely, and B. Krishnamachari, LIFO-back-pressure achieves near optimal utility-delay tradeoff, WiOpt 2011. Assistant G. Arul Selvan is currently working as Assistant Professor in Department of Computer Science Engineering in EGS Pillay Engineering College, Nagapattinam. M. Sivapriya is currently M. Tech Scholar in Department of Computer Science Engineering in EGS Pillay Engineering College, Nagapattinam. All Rights Reserved 2016 IJARMATE 9