SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013

A CROSS LAYER OPTIMIZED RELIABLE MULTICAST
ROUTING PROTOCOL IN WIRELESS MESH
NETWORKS
Mijahed Nasser Aljober, R.C.Thool
Department of Information Technology, SGGS IE & T, Swami Ramanand Teerth
Marathwada University, Nanded, Maharashtra, India

ABSTRACT
The Optimal way to create a protocol in Wireless Mesh Networks is to take into account a cross layer due
to the interference among wireless transmissions. In this paper, we focus on designing and implementing a
reliable multicast protocol called Mesh Reliable Multicast Protocol (MRMP). A recovery tree built
dynamically which is joining with the multicast routing tree. Using the recovery tree the packet losses are
repaired locally. This Cross layer Technique between network layer (multicast routing) and transport layer
(reliability) using simulation results prove the effectiveness and optimization of cross layer in WMNs
compare with the conventional layer.

KEYWORDS
Multicat routing, reliable, WMN, Optimization, Cross layer Optimization.

1. INTRODUCTION
The main requirement for many applications, such as stock quotes, electronic newspapers,
distribution of software, billing records, and medical images is guarantee reliable delivery.
A WMN more concerned with scalable end-to-end throughput and satisfactory quality of service
(QoS) to deliver heterogeneous traffic which is differ from wireless sensor network and ad hoc
network. Thus, better to optimize the network performance of WMNs across layers protocol [1].
In the traditional network based on a layering approach on the protocol stack. In this modular
approach , fundamentals functionalities such as routing (network layer), access to the medium
(link layer) , congestion control (transport layer) are performed separately, This has proven to be
a very powerful and successful paradigm for wired networks, since the infrastructure is based on
links with constant capacity and high degree of reliability.
A cross-layer design approach on the other hand, is one that utilizes function across different
layers of the protocol stack. Recently several studies prove that cross-layer designs can yield
significant performance gains. The penalty that has to be paid for increasing system performance
by deploying cross layer designs is the complexity and communication overhead[1].
In this paper we describe a cross layer reliable protocol with assistance of MeshSPT multicast
routing protocol[2] , this protocol solve the implosion and exposure problems and repair loss
packet by recovery tree. The remaining of this paper is as following: in section 2 we present

DOI : 10.5121/ijdps.2013.4601

1
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013

related work, in section 3 we explain in details the MRMP protocol, experimental results will be
explained in section 4 and conclusion will be explained in section 5.

2. R ELATED WORK
Yuan et al. [3] propose a cross-layer optimization framework that scales the demand of network
flows at the network layer and the supply of link capacities at the physical layer in order to find
high throughput paths. Furthermore, Rong et al. [4] have proposed a Traffic Engineering and
preferred admission control policy for QoS Multicast routing in WMNs. However, They
considered only mesh backbone. Whereas backbone mesh routers and end-user mesh hosts have
to be considered and needed to discussed in QoS multicast mechanism. Ehsan Pourfakhar et al.
[5] in case of route disconnection or node use artificial neural network to predict that. To avoid
fault occurrence This prediction allow to recover the network. They also present an efficient
optimized multicast protocol based on a reliable effective framework to solve the problem of load
balancing and to enhance the QoS in multicast communication among Internet hosts and Mesh
hosts in WMNs dynamically.

3. THE PROPOSED PROTOCOL (MRMP)
3.1 BRIEF
In MRMP protocol we use tree-based hierarchical approach to solve the problem of ACK
implosion, grouping the receivers based on multicast sub-trees which is rooted at the mesh
routers, which called Specified Routers (SRs). Any nesh router in the multicast session and has at
least two branches will be chosen as SRs. Each SR will polish the data packets, also collect the
status message from the receiver in the same sub-tree, then retransmit repair packet to the
receivers (if it has) and report the status to upper level. MRMP protocol also solve the problem of
losing packets in multicast session.
A cross-layer design is used in MRMP protocol, which the data packets can examine by routers to
get the sequence numbers.
The protocol steps:
1. Using the multicast tree Sender S multicasts data packets to all receivers.
2. If there is later retransmission on the time of receiving the data packets, SRs will
retransmit the packets again.
3. At regular intervals status messages (contain some information about the packets which
have been received successfully) sent by each receiver to its corresponding SR.
4. Based on status message, The packets retransmitted which determine by SR. Locally in
the sub-tree the repair packets multicasts. The SR sends its status messages to the upper
level SR. same procedure executes again by SR upper level.
5. Multicasts new packets by sender S.

4. EXPERIMENTAL RESULTS
In this section, we explain the performance of network in term of throughput, average End-to-End
delay and packet delivery ration by simulation results to prove the achievement of cross layer
optimization compare with traditional layer in WMNs .

2
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013

4.1 PERFORMANCE METRICS
Following the evaluation metrics:




Packet delivery ratio (PSR) : define as the number of received packets to the number of
packets transmitted.
Average throughput: define as the sum of the throughput of all flows.
Average end-to-end delay(EED): define as the average delay of packets received from
end to another.

4.2 SIMULATION SETTING
The performance of proposed protocol is carried out using Glomosim [6], the same parameters
and conditions of [2] were applied. The underlying multicast routing protocol is the MeshSPT
protocol. We added some functions to MeshSPT so that it can handle ACK and RTT MEASURE
packets and retransmissions of repair packets. We measure the PDR, the average throughput, and
the average EED as the number of receivers in a multicast group varies. Each experiment was run
five times using different random seed numbers, and collected statistics were averaged over those
runs.

4.3 RESULTS AND ANALYSIS
Experimental results will be shown in the Figure 1,2. Based on the result we have the following
observations:
1. Rreceivers have a PDR of 100%, in both experiments. Means all the data packets are delivered
to all receivers.
2. The throughput is small when the network size is increased to 300 nodes. Means MRMP
multicast protocol scales well when the network size increases.
3. The average packet end-to-end delay decreases ,when the number of receivers increases from
10 to 20. The reason is that when the number of receivers increases, The SRs have more than one
branches as intermediate nodes so SRs buffer the received data packets and the lost packets
recovered quickly because SRs process the ACKs and retransmit repaired packets. However when
the number of receivers increase continues the average EED decreases.

5. C ONCLUSION
In this paper, we describe a cross layer reliable multicast routing protocol, the MRMP protocol.
With assistance of the underlying multicast routing protocol MeshSPT, MRMP builds a recovery
tree that dynamically synchronize with the multicast routing tree. Using the recovery tree the
packet losses are repaired locally. through simulation results cross layer optimization in WMNs
achieve high performance compare with the conventional layer.

REFERENCES
[1]
[2]

Ian F. Akyildiz, Fellow, , and Xudong Wang “Cross Layer Design in Wireless Mesh Networks”
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 2, MARCH 2008.
Mijahed Nasser Aljober, R. C. Thool,Atul Neg “A Sufficient and Scalable Multicast Routing Protocol
in Wireless Mesh Networks MeshSPT (Shortest Path Tree algorithm for wireless Mesh network)
“IJCA Proceedings on National Conference on Advancement in Electronics & Telecommunication
Engineering, 2012.
3
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013
[3]

[4]
[5]

[6]

Yuan, J., Li, Z., Yu, W., Li, B.: A Cross-Layer Optimization Framework for Multihop Multicast in
Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(11) (November
2006)
Rong, B., Qian, Y., Lu, K.: Enhanced QoS Multicast Routing in Wireless Mesh Networks. IEEE
Transactions on Wireless Communications 7(6) (June 2008)
Ehsan Pourfakhar , Amir Masoud Rahmani : Optimization of Multicast Routing Based on a Reliable
effective Framework in Wireless Mesh Networks. pp. 416 – 427, 2009. Springer-Verlag Berlin
Heidelberg (2009).
Jorge Nuevo,” A Comprehensible GloMoSim Tutorial compilation” , INRS - Universite du Quebec
nuevo@inrs-telecom.uquebec.ca March 4, 2004.

4
International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013

5

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...IOSR Journals
 

What's hot (19)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNPROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSN
 
Ttacca
TtaccaTtacca
Ttacca
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
 

Viewers also liked

AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...ijdpsjournal
 
Scalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load BalancingScalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load Balancingijdpsjournal
 
Alternative therapy around a hill
Alternative therapy around a hillAlternative therapy around a hill
Alternative therapy around a hillarulprakashmuthu
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collectionsijdpsjournal
 
Multilevel priority packet scheduling scheme for wireless networks
Multilevel priority packet scheduling scheme for wireless networksMultilevel priority packet scheduling scheme for wireless networks
Multilevel priority packet scheduling scheme for wireless networksijdpsjournal
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Contoh Soal Redoks Kimia + Jawaban
Contoh Soal Redoks Kimia + JawabanContoh Soal Redoks Kimia + Jawaban
Contoh Soal Redoks Kimia + JawabanFajar Sahrudin
 
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...ijdpsjournal
 
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HECWI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HECijdpsjournal
 
Contoh Soal Grafik Fungsi Trigonometri Berserta Jawabannya
Contoh Soal Grafik Fungsi Trigonometri Berserta JawabannyaContoh Soal Grafik Fungsi Trigonometri Berserta Jawabannya
Contoh Soal Grafik Fungsi Trigonometri Berserta JawabannyaFajar Sahrudin
 

Viewers also liked (14)

AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...
 
Scalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load BalancingScalable Distributed Job Processing with Dynamic Load Balancing
Scalable Distributed Job Processing with Dynamic Load Balancing
 
Alternative therapy around a hill
Alternative therapy around a hillAlternative therapy around a hill
Alternative therapy around a hill
 
Lock free parallel access collections
Lock free parallel access collectionsLock free parallel access collections
Lock free parallel access collections
 
Multilevel priority packet scheduling scheme for wireless networks
Multilevel priority packet scheduling scheme for wireless networksMultilevel priority packet scheduling scheme for wireless networks
Multilevel priority packet scheduling scheme for wireless networks
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
Tentang ASEAN
Tentang ASEANTentang ASEAN
Tentang ASEAN
 
Hill temples in india
Hill temples in indiaHill temples in india
Hill temples in india
 
Pengertian Organisasi
Pengertian OrganisasiPengertian Organisasi
Pengertian Organisasi
 
Contoh Soal Redoks Kimia + Jawaban
Contoh Soal Redoks Kimia + JawabanContoh Soal Redoks Kimia + Jawaban
Contoh Soal Redoks Kimia + Jawaban
 
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...
REAL-TIME BLEEDING DETECTION IN GASTROINTESTINAL TRACT ENDOSCOPIC EXAMINATION...
 
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HECWI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC
 
Tentang Minyak Bumi
Tentang Minyak BumiTentang Minyak Bumi
Tentang Minyak Bumi
 
Contoh Soal Grafik Fungsi Trigonometri Berserta Jawabannya
Contoh Soal Grafik Fungsi Trigonometri Berserta JawabannyaContoh Soal Grafik Fungsi Trigonometri Berserta Jawabannya
Contoh Soal Grafik Fungsi Trigonometri Berserta Jawabannya
 

Similar to A cross layer optimized reliable multicast routing protocol in wireless mesh networks

rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 

Similar to A cross layer optimized reliable multicast routing protocol in wireless mesh networks (20)

rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

A cross layer optimized reliable multicast routing protocol in wireless mesh networks

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013 A CROSS LAYER OPTIMIZED RELIABLE MULTICAST ROUTING PROTOCOL IN WIRELESS MESH NETWORKS Mijahed Nasser Aljober, R.C.Thool Department of Information Technology, SGGS IE & T, Swami Ramanand Teerth Marathwada University, Nanded, Maharashtra, India ABSTRACT The Optimal way to create a protocol in Wireless Mesh Networks is to take into account a cross layer due to the interference among wireless transmissions. In this paper, we focus on designing and implementing a reliable multicast protocol called Mesh Reliable Multicast Protocol (MRMP). A recovery tree built dynamically which is joining with the multicast routing tree. Using the recovery tree the packet losses are repaired locally. This Cross layer Technique between network layer (multicast routing) and transport layer (reliability) using simulation results prove the effectiveness and optimization of cross layer in WMNs compare with the conventional layer. KEYWORDS Multicat routing, reliable, WMN, Optimization, Cross layer Optimization. 1. INTRODUCTION The main requirement for many applications, such as stock quotes, electronic newspapers, distribution of software, billing records, and medical images is guarantee reliable delivery. A WMN more concerned with scalable end-to-end throughput and satisfactory quality of service (QoS) to deliver heterogeneous traffic which is differ from wireless sensor network and ad hoc network. Thus, better to optimize the network performance of WMNs across layers protocol [1]. In the traditional network based on a layering approach on the protocol stack. In this modular approach , fundamentals functionalities such as routing (network layer), access to the medium (link layer) , congestion control (transport layer) are performed separately, This has proven to be a very powerful and successful paradigm for wired networks, since the infrastructure is based on links with constant capacity and high degree of reliability. A cross-layer design approach on the other hand, is one that utilizes function across different layers of the protocol stack. Recently several studies prove that cross-layer designs can yield significant performance gains. The penalty that has to be paid for increasing system performance by deploying cross layer designs is the complexity and communication overhead[1]. In this paper we describe a cross layer reliable protocol with assistance of MeshSPT multicast routing protocol[2] , this protocol solve the implosion and exposure problems and repair loss packet by recovery tree. The remaining of this paper is as following: in section 2 we present DOI : 10.5121/ijdps.2013.4601 1
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013 related work, in section 3 we explain in details the MRMP protocol, experimental results will be explained in section 4 and conclusion will be explained in section 5. 2. R ELATED WORK Yuan et al. [3] propose a cross-layer optimization framework that scales the demand of network flows at the network layer and the supply of link capacities at the physical layer in order to find high throughput paths. Furthermore, Rong et al. [4] have proposed a Traffic Engineering and preferred admission control policy for QoS Multicast routing in WMNs. However, They considered only mesh backbone. Whereas backbone mesh routers and end-user mesh hosts have to be considered and needed to discussed in QoS multicast mechanism. Ehsan Pourfakhar et al. [5] in case of route disconnection or node use artificial neural network to predict that. To avoid fault occurrence This prediction allow to recover the network. They also present an efficient optimized multicast protocol based on a reliable effective framework to solve the problem of load balancing and to enhance the QoS in multicast communication among Internet hosts and Mesh hosts in WMNs dynamically. 3. THE PROPOSED PROTOCOL (MRMP) 3.1 BRIEF In MRMP protocol we use tree-based hierarchical approach to solve the problem of ACK implosion, grouping the receivers based on multicast sub-trees which is rooted at the mesh routers, which called Specified Routers (SRs). Any nesh router in the multicast session and has at least two branches will be chosen as SRs. Each SR will polish the data packets, also collect the status message from the receiver in the same sub-tree, then retransmit repair packet to the receivers (if it has) and report the status to upper level. MRMP protocol also solve the problem of losing packets in multicast session. A cross-layer design is used in MRMP protocol, which the data packets can examine by routers to get the sequence numbers. The protocol steps: 1. Using the multicast tree Sender S multicasts data packets to all receivers. 2. If there is later retransmission on the time of receiving the data packets, SRs will retransmit the packets again. 3. At regular intervals status messages (contain some information about the packets which have been received successfully) sent by each receiver to its corresponding SR. 4. Based on status message, The packets retransmitted which determine by SR. Locally in the sub-tree the repair packets multicasts. The SR sends its status messages to the upper level SR. same procedure executes again by SR upper level. 5. Multicasts new packets by sender S. 4. EXPERIMENTAL RESULTS In this section, we explain the performance of network in term of throughput, average End-to-End delay and packet delivery ration by simulation results to prove the achievement of cross layer optimization compare with traditional layer in WMNs . 2
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013 4.1 PERFORMANCE METRICS Following the evaluation metrics:    Packet delivery ratio (PSR) : define as the number of received packets to the number of packets transmitted. Average throughput: define as the sum of the throughput of all flows. Average end-to-end delay(EED): define as the average delay of packets received from end to another. 4.2 SIMULATION SETTING The performance of proposed protocol is carried out using Glomosim [6], the same parameters and conditions of [2] were applied. The underlying multicast routing protocol is the MeshSPT protocol. We added some functions to MeshSPT so that it can handle ACK and RTT MEASURE packets and retransmissions of repair packets. We measure the PDR, the average throughput, and the average EED as the number of receivers in a multicast group varies. Each experiment was run five times using different random seed numbers, and collected statistics were averaged over those runs. 4.3 RESULTS AND ANALYSIS Experimental results will be shown in the Figure 1,2. Based on the result we have the following observations: 1. Rreceivers have a PDR of 100%, in both experiments. Means all the data packets are delivered to all receivers. 2. The throughput is small when the network size is increased to 300 nodes. Means MRMP multicast protocol scales well when the network size increases. 3. The average packet end-to-end delay decreases ,when the number of receivers increases from 10 to 20. The reason is that when the number of receivers increases, The SRs have more than one branches as intermediate nodes so SRs buffer the received data packets and the lost packets recovered quickly because SRs process the ACKs and retransmit repaired packets. However when the number of receivers increase continues the average EED decreases. 5. C ONCLUSION In this paper, we describe a cross layer reliable multicast routing protocol, the MRMP protocol. With assistance of the underlying multicast routing protocol MeshSPT, MRMP builds a recovery tree that dynamically synchronize with the multicast routing tree. Using the recovery tree the packet losses are repaired locally. through simulation results cross layer optimization in WMNs achieve high performance compare with the conventional layer. REFERENCES [1] [2] Ian F. Akyildiz, Fellow, , and Xudong Wang “Cross Layer Design in Wireless Mesh Networks” IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 2, MARCH 2008. Mijahed Nasser Aljober, R. C. Thool,Atul Neg “A Sufficient and Scalable Multicast Routing Protocol in Wireless Mesh Networks MeshSPT (Shortest Path Tree algorithm for wireless Mesh network) “IJCA Proceedings on National Conference on Advancement in Electronics & Telecommunication Engineering, 2012. 3
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013 [3] [4] [5] [6] Yuan, J., Li, Z., Yu, W., Li, B.: A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications 24(11) (November 2006) Rong, B., Qian, Y., Lu, K.: Enhanced QoS Multicast Routing in Wireless Mesh Networks. IEEE Transactions on Wireless Communications 7(6) (June 2008) Ehsan Pourfakhar , Amir Masoud Rahmani : Optimization of Multicast Routing Based on a Reliable effective Framework in Wireless Mesh Networks. pp. 416 – 427, 2009. Springer-Verlag Berlin Heidelberg (2009). Jorge Nuevo,” A Comprehensible GloMoSim Tutorial compilation” , INRS - Universite du Quebec nuevo@inrs-telecom.uquebec.ca March 4, 2004. 4
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.6, November 2013 5