SlideShare a Scribd company logo
1 of 4
Download to read offline
S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1714-1717
    Survey On Multihop Wireless Networks Using Cross-Layer
                        Framework
                    1
                        S.Pradeep 2 D.Jamuna               3
                                                               Vikram Narayandas
             1
                Assistant Professor, Department of IT, Jayaprakash Narayan College of Engineering,
                                         Mahabubnagar, Andhra Pradesh,
             2
               Professor and Head, Department of CSE, Jayaprakash Narayan College of Engineering,
                                        , Mahabubnagar, Andhra Pradesh.
            3
              Associate Professor, Department of CSE, Jayaprakash Narayan College of Engineering,
                                          Mahabubnagar, Andhra Pradesh

Abstract:
         In this paper, we take approach to the           optimal as a whole. In order to improve the
protocol architecture design in multihop wireless         performance and achieve efficient resource
networks. Our goal is to integrate various protocol       allocation, we need to understand interactions across
layers into a rigorous framework, by regarding            layers and carry out cross-layer design. Moreover, in
them as distributed computations over the                 wireless networks there does not exist a good
network to solve some optimization problem.               interface between the physical and network layers.
Different layers carry out distributed computation        Wireless links are unreliable and wireless nodes
on different subsets of the decision variables using      usually rely on random access mechanism to access
local information to achieve individual optimality.       wireless channel. Thus, the performance of link layer
Taken together, these local algorithms (with              is not guaranteed, which will result in performance
respect to different layers) achieve a global             problems for the whole network such as degraded
optimality. Our current theory integrates three           TCP performance.
functions—congestion control, routing and                           So, we need cross-layer design, i.e., to
scheduling—in transport, network and link layers          exchange information between physical/link layer
into a coherent framework. These three functions          with higher layers in order to achieve better
interact through and are regulated by congestion          performance. Motivated by the duality model of TCP
price so as to achieve a global optimality, even in a     congestion control one approach to understand
time-varying environment. Within this context,            interactions across layers is to view the network as an
this model allows us to systematically derive the         optimization solver and various protocol layers as
layering structure of the various mechanisms of           distributed algorithms solving optimization problem.
different protocol layers, their interfaces, and the      This approach and the associated utility
control information that must cross these                 maximization problem were originally proposed as
interfaces to achieve a certain performance and           an analytical tool for reverse engineering TCP
robustness.                                               congestion control where a network with fixed link
                                                          capacities and pre specified routes is implicitly
 Keywords: Cross-layer design, Multihop wireless          assumed. A natural framework for cross-layer design
networks, Theory-based approach.                          is then to extend the basic utility maximization
                                                          problem to include decision variables of other layers,
1. INTRODUCTION:                                          and seek decomposition such that different layers
          The communication network has largely           carry out distributed computation on different subsets
been a result of adopting a layered architecture. With    of decision variables using local information to
this architecture, its design and implementation is       achieve individual optimality, and taken together,
divided into simpler modules that are separately          these local algorithms achieve the global optimality.
designed and implemented and then interconnected.                   We proposed to apply this approach to
A protocol stack typically has five layers, application,   design an overall framework for the protocol
transport (TCP), network (IP), data link (include         architecture in multihop wireless networks, with the
MAC) and physical layer. Each layer controls a            goal of achieving efficient resource allocation
subset of the decision variables, hides the complexity    through Cross-layer design. We first consider the
of the layer below and provides well-defined services      network with fixed channel or single-rate devices,
to the layer above. Together, they allocate networked     and formulate network resource allocation as a utility
resources to provide a reliable and usually best-effort   maximization problem with rate constraints at the
communication service to a large pool of competing        network layer and schedulability constraints at the
users. However, the layered structure addresses only      link layer. We apply duality theory to decompose the
abstract and high-level aspects of the whole network      system problem vertically into congestion control,
protocol design. Various layers of the network are put    routing and scheduling sub problems that interact
together often in an ad hoc manner, and might not be      through congestion prices. Based on this

                                                                                                1714 | P a g e
S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1714-1717
decomposition, a distributed sub gradient algorithm
for joint congestion control, routing and scheduling is
obtained, and proved to approach arbitrarily close to
the optimum of the system problem
          We finally apply the general algorithm to the
joint congestion control and medium access control
design over the network with single-path routing and
to the cross-layer congestion control, routing and
scheduling design in the network without pre
specified paths.

2. Cross Layer Design
          Cross Layer Design is a way of achieving
information sharing between all the layers in order to
obtain highest possible adaptively of any network.
This is required to meet the challenging Data rates,
higher performance gains and Quality of Services          Fig 2.2 Cross Layer Design for Wireless Network
requirements for various real time and non real time
applications. Each layer is characterized by some key     3 .Design modules:
parameters, which are passed to the adjacent layers to              For the efficient multi-hop wireless
help them determine the best operation modes that         networks design, namely:
best suit the current channel, network and application    -Network protocols and
conditions                                                -Network operations and management (O&M)
                                                                    The designs include both in a cross-layer
                                                          design paradigm to ensure the notion of service
                                                          quality, such as quality of service (QoS) in wireless
                                                          mesh networks (WMNs) and quality of information
                                                          (QoI) in wireless sensor networks (WSNs). The
                                                          implementation stage involves careful planning,
                                                          investigation of the existing system and it‘s
                                                          constraints on implementation, designing of methods
                                                          to achieve changeover and evaluation of changeover
                                                          methods.

                                                          3.1 Flow Contention Graph and Schedualbility
                                                          Constraint:
                                                                    The interference among wireless links is
                                                          usually specified by some interference model that
                                                          describes physical constraints regarding wireless
      Fig:2.1 cross layer architecture                    transmissions and successful receptions. For
                                                          example, in a network with primary interference,
The architecture of cross layer consists of               links that share a common node cannot transmit or
                                                          received simultaneously but links that do not share
2.1 Wireless Networking                                   nodes can do so. It models a wireless network with
Architecture: Connection Vs Connectionless, Energy        multiple       channels       where        simultaneous
efficient analysis of Manets and Traffic theory &         communications in a neighborhood are enabled by
protocols                                                 using orthogonal CDMA or FDMA channels. In a
                                                          network with secondary interference, links mutually
2.1Signal processing                                      interfere with each other whenever either the sender
Increasing the spectral efficiency, Reducing Bit Error    or the receiver of one is within the interference range
Rate and reducing transmission energy                     of the sender or receiver of the other. Given an
                                                          interference model, we can construct a flow
2.3 Information Theory                                    contention graph that captures the contention
Developing capacity limits, designing efficient           relations among the links. In the contention graph,
source coding and channel algorithms.                     each vertex represents a link, and an edge between
And system design of cross layer for wireless             two vertices denotes the contention between the
networks shown in fig 2.2                                 corresponding links: two links interfere with each
                                                          other and cannot transmit at the same time.



                                                                                                1715 | P a g e
S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1714-1717
3.2 Stochastic Stability:                                  independent set e as a L dimensional rate vector r-e
          Congestion price takes discrete values.          where the length entry .
Thus, congestion price evolves according to a                      1                     2
discrete-time, discrete-space Markov chain. We need                3
to show that this markov chain is stable, i.e., the        A                    B                    C
congestion price process reaches a steady state and
does not become unbounded. It is easy to check that                 4                      5                    6
the Markov chain has a countable state space, but is                Fig 4.1 Logical Links and corresponding
not necessarily irreducible. In such a general case, the            flow contention Graph
state space is partitioned in transient set T and          we formulate rate constraints for networks with
different recurrent classes Ri. We define the system       different kinds of routing .The network with single-
to be stable if all recurrent states are positive          Path Routing of each source S uses a path
recurrent and the Markov process hits the recurrent        considering of a set ‗ Ls‘ Subset ‗S ‗ links the set Ls
states with probability one. This will guarantee that      define an L × S routing matrix. The aggregate link
the Markov chain will be absorbed/reduced into some        should not exceed the link capacity. The network
recurrent class, and the positive recurrence ensures       without pre specified paths will use multi commodity
the periodicity of the Markov chain over this class.       flow model for routing .here we are denoting D as
                                                           destination of network layers. The aggregate capacity
3.3 Scheduling over Multihop Networks:                     of link allocated to flow for incoming and generated
          Scheduling over Multihop networks is a           flow to the destination should not exceed the
difficult problem and in general NP-hard. To see this,     summation of the capacities for its outgoing flows.
note that problem is equivalent to a maximum weight        The wireless channel is a shared medium and
independent set problem over the flow contention           interference –limited .the capacity they obtained
graph, which is NP-hard for general graphs. It is easy     depends on band width sharing .this may results in
to design some heuristic algorithm but is hard to bind     various TCP performances of wireless networks .the
its performance.                                           problems of TCP unfairness over Multihop wireless
                                                           networks .The following section says about related
4. PROCEDURE:                                              work of this paper .
         A Multihop wireless network is dynamically
self organized and self configured with nodes in the       5. Related work:
network automatically establishing and maintaining                   In proposed paper we have did survey and
Multihop connectivity among themselves .Multi hop          its related work on multi hop wireless networks and
wireless network designed for different types of           cross-layer protocols, protocol improvements, and
applications scenarios ..In wireless ad hoc mobile         design methodologies for wireless sensor networks
network ,every node has the responsibility to act as a     (WSNs) is reviewed and taxonomy is proposed. The
router and forward packets for each other .Because         communication protocols devised for WSNs that
nodes normally have limited transmission ranges            focus on cross-layer design techniques are reviewed
.Multihop delivery is necessary for communication          and classified based on the network layers they aim at
among nodes outside the transmission range.                replacing in the classical open system interconnection
         The Cross-layer Design of Multihop                (OSI) network stack. Furthermore, systematic
Wireless Networks is focusing dual decomposition           methodologies for the design of cross-layer solution
.consider a Multi hop wireless network with a set of       for sensor networks as resource allocation problems
N nodes and a set L Directed logical links .we             in the framework of non-linear optimization are
assume a static topology and each link l Є L which         discussed. Open research issues in the development
has finite capacity .here we assume a wireless             of cross-layer design methodologies for sensor
channel with a fixed a rate .wireless channel is           networks and        possible research directions are
interference limited .we will use flow Contention          indicated. Finally, possible shortcomings of cross-
Graph to capture the contention relation links. The        layer design techniques such as lack of modularity,
Flow Contention Graph and Schedualbility constraint        decreased      robustness,    and    instability   and
that captures the contention relations among links, its    precautionary guidelines are presented. Scheduling
each vertex represent a link an edge between two           component in this optimal cross-layered rate control
vertices denotes the contention between the                scheme has to solve a complex global optimization
corresponding links and the two links interfere with       problem at each time, and hence is too
each other and cannot transmit at the same time. The       computationally         expensive      for       online
given flow contention graph can identify all its           implementation. In this paper, we study how the
independents sets of vertices .the link is an              performance of cross-layer rate control can be
independent set can transmit simultaneously .let E         impacted if the network can only use an imperfect
denote the set of all independent sets with each           (and potentially distributed) scheduling component
independent set indexed by e. we represent an              that is easier to implement. We study both the case
                                                           when the number of users in the system is fixed and
                                                                                                 1716 | P a g e
S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research
                and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue4, July-August 2012, pp.1714-1717
the case with dynamic arrivals and departures of the       [5].     V. Kawadia and P.R. Kumar, ―A Cautionary
users, and we establish desirable results on the           Perspective on Cross-Layer Design‖, IEEE
performance bounds of cross-layered rate control           Wireless Communications, February, 2005, pp.3-11
with imperfect scheduling. Compared with a layered         [6].     C. Sadler, W. Chen, and L. Kant. , ―Cross-
approach that does not design rate control and             Layer Self-Healing in a Wireless Ad-Hoc Network‖,
scheduling together, our cross-layered approach has        U.S. Patent filed April 2005
provably     better   performance      bounds,      and
substantially outperforms the layered approach. The        Author’s Information
insights drawn from our analyses also enable us to
design a fully distributed cross-layered rate control
and scheduling algorithm for a restrictive interference
mode.

6. Conclusion:
         We proposed an alternative cross-layering
architecture for autonomic communications which is                         1
                                                                              S.Pradeep pursuing M.Tech CSE
based on local information as well as global               from jaya prakash Narayana College of Engineering
information and gossiping will be the mechanism to         & Technology B.Tech from jaya prakash narayana
collect the global view related information. We are        College of Engineering. Currently he is working as
currently engaged in exploring how we may provide          Assistant Professor at Jaya prakash Narayana College
cross-layer optimization of TCP/IP, simulating             of Engineering. His areas of interest include Data
existing TCP enhancements and comparing them to a          mining, Network Security, Software Engineering and
novel version whose adaptations are driven from a          Sensor Network.
knowledge plane populated using our gossiping
technique. This will allow us to evaluate both the                             2
                                                                                  Prof.D.Jamuna, Working as
gossiping approach and the various cross-layer                                 Professor & Head of CSE Dept.
parameters that can be used to influence TCP                                   Jayaprakash Narayan College of
behavior, as well as comparing them against                                    Engineering,     Mahabubnagar,
established approaches with less cross-layer                                   M.Tech(SE) from School of
influence. Our current theory integrates three                                 Information Technology, JNTUH,
functions—congestion      control,    routing  and                             Hyderabad. BE (CSE) from
scheduling—in transport, network and link layers                               Vijayanagara        Engineering
into a coherent framework.                                 College, Bellary. Experience 17 Years in Teaching
                                                           Profession. Her areas of Interest are in Wireless
References:                                                Sensor Networks, Data Mining, and Networking and
  [1].   Marco Conti, Gaia Maselli, Giovanni Turi,         guided M. Tech and B. Tech Students IEEE Projects.
         Sylvia Giordano ―Cross layering in mobile         She has published many papers in international
         Ad Hoc Network Design‖, IEEE Computer             journals. And she is Member of CSTA, IACSIT.
         Society, pages 48-51, February 2004
  [2].   Winter, R.; Schiller, S.; Nikaein, N.; Bonnet
         C., “Crosstalk: A Data Dissemination-based
         Cross-layer Architecture for Mobile Ad-hoc
         Networks”,      IEEE        Workshop        on
         Applications and Services in Wireless
         Networks (ASWN 2005), Paris, June 2005
  [3].   X. Gu, X. Fu.H. Tshofenig, and L. Wolf,                               3
         ―Towards Self-optimizing Protocol Stack for                           Vikram Narayandas Currently
         Autonomic       Communication:          Initial   working as Associate Professor at Jayaprakash
         Experience‖, Proceedings of the 2nd IFIP          Narayan College of Engineering, Mahabubnagar,
         International Workshop on Autonomic               M.Tech (CN) from Shadan College of Engineering.
         Communication        (WAC'05),        Springer    B.Tech (CSIT) from Sree Datta college of
         Lecture Notes in Computer Science Vol.            Engineering and. His areas of interest include Data
         3854 (LNCS), October, 2005.                       mining, Network Security, Software Engineering,
  [4].   Dzmitry Kliazovich and Fabrizio Granelli,         Sensor Networks, and Cloud Computing. He is the
         ―A     Cross-layer     Scheme      for    TCP     membership of, IACSIT, ISTE, IAENG, and CSTA.
         Performance Improvement in Wireless               He is Peer reviewer on honorary basis of GJCST. He
         LANs‖,       Globecom        2004,       IEEE     published 10 papers in International Journals.
         Communications Society.


                                                                                               1717 | P a g e

More Related Content

What's hot

Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...ranjith kumar
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Pvrtechnologies Nellore
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040IJMER
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...SBGC
 
Artigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkArtigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkDiogo Oliveira
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)CSCJournals
 

What's hot (20)

Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
Statistical dissemination controlIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO S...
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
Et24912915
Et24912915Et24912915
Et24912915
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Mod 2 end copy
Mod 2 end copyMod 2 end copy
Mod 2 end copy
 
Ax24329333
Ax24329333Ax24329333
Ax24329333
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040
 
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
 
Artigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkArtigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture Framework
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)International Journal of Computer Science and Security Volume (2) Issue (4)
International Journal of Computer Science and Security Volume (2) Issue (4)
 

Viewers also liked (20)

Kg2417521755
Kg2417521755Kg2417521755
Kg2417521755
 
Jk2416381644
Jk2416381644Jk2416381644
Jk2416381644
 
Kv2418301838
Kv2418301838Kv2418301838
Kv2418301838
 
Ih2414591461
Ih2414591461Ih2414591461
Ih2414591461
 
Km2417821785
Km2417821785Km2417821785
Km2417821785
 
Iz2415721576
Iz2415721576Iz2415721576
Iz2415721576
 
Le2418811888
Le2418811888Le2418811888
Le2418811888
 
Kt2418201822
Kt2418201822Kt2418201822
Kt2418201822
 
Lt2419681970
Lt2419681970Lt2419681970
Lt2419681970
 
Mh2420342042
Mh2420342042Mh2420342042
Mh2420342042
 
Kp2417961805
Kp2417961805Kp2417961805
Kp2417961805
 
It2415351540
It2415351540It2415351540
It2415351540
 
Ik2414801485
Ik2414801485Ik2414801485
Ik2414801485
 
Ki2417591763
Ki2417591763Ki2417591763
Ki2417591763
 
Jg2416171620
Jg2416171620Jg2416171620
Jg2416171620
 
Kk2417701773
Kk2417701773Kk2417701773
Kk2417701773
 
Mm2420662068
Mm2420662068Mm2420662068
Mm2420662068
 
Jo2416561659
Jo2416561659Jo2416561659
Jo2416561659
 
Iv2415471554
Iv2415471554Iv2415471554
Iv2415471554
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 

Similar to Survey on Using Cross-Layer Framework to Improve Performance of Multihop Wireless Networks

DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsIJMER
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Topology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioTopology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioIJERA Editor
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...csijjournal
 

Similar to Survey on Using Cross-Layer Framework to Improve Performance of Multihop Wireless Networks (20)

DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Reduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in ManetsReduction of Topology Control Using Cooperative Communications in Manets
Reduction of Topology Control Using Cooperative Communications in Manets
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Topology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks ScenarioTopology Management for Mobile Ad Hoc Networks Scenario
Topology Management for Mobile Ad Hoc Networks Scenario
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
C046022025
C046022025C046022025
C046022025
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
C0941017
C0941017C0941017
C0941017
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
 

Survey on Using Cross-Layer Framework to Improve Performance of Multihop Wireless Networks

  • 1. S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1714-1717 Survey On Multihop Wireless Networks Using Cross-Layer Framework 1 S.Pradeep 2 D.Jamuna 3 Vikram Narayandas 1 Assistant Professor, Department of IT, Jayaprakash Narayan College of Engineering, Mahabubnagar, Andhra Pradesh, 2 Professor and Head, Department of CSE, Jayaprakash Narayan College of Engineering, , Mahabubnagar, Andhra Pradesh. 3 Associate Professor, Department of CSE, Jayaprakash Narayan College of Engineering, Mahabubnagar, Andhra Pradesh Abstract: In this paper, we take approach to the optimal as a whole. In order to improve the protocol architecture design in multihop wireless performance and achieve efficient resource networks. Our goal is to integrate various protocol allocation, we need to understand interactions across layers into a rigorous framework, by regarding layers and carry out cross-layer design. Moreover, in them as distributed computations over the wireless networks there does not exist a good network to solve some optimization problem. interface between the physical and network layers. Different layers carry out distributed computation Wireless links are unreliable and wireless nodes on different subsets of the decision variables using usually rely on random access mechanism to access local information to achieve individual optimality. wireless channel. Thus, the performance of link layer Taken together, these local algorithms (with is not guaranteed, which will result in performance respect to different layers) achieve a global problems for the whole network such as degraded optimality. Our current theory integrates three TCP performance. functions—congestion control, routing and So, we need cross-layer design, i.e., to scheduling—in transport, network and link layers exchange information between physical/link layer into a coherent framework. These three functions with higher layers in order to achieve better interact through and are regulated by congestion performance. Motivated by the duality model of TCP price so as to achieve a global optimality, even in a congestion control one approach to understand time-varying environment. Within this context, interactions across layers is to view the network as an this model allows us to systematically derive the optimization solver and various protocol layers as layering structure of the various mechanisms of distributed algorithms solving optimization problem. different protocol layers, their interfaces, and the This approach and the associated utility control information that must cross these maximization problem were originally proposed as interfaces to achieve a certain performance and an analytical tool for reverse engineering TCP robustness. congestion control where a network with fixed link capacities and pre specified routes is implicitly Keywords: Cross-layer design, Multihop wireless assumed. A natural framework for cross-layer design networks, Theory-based approach. is then to extend the basic utility maximization problem to include decision variables of other layers, 1. INTRODUCTION: and seek decomposition such that different layers The communication network has largely carry out distributed computation on different subsets been a result of adopting a layered architecture. With of decision variables using local information to this architecture, its design and implementation is achieve individual optimality, and taken together, divided into simpler modules that are separately these local algorithms achieve the global optimality. designed and implemented and then interconnected. We proposed to apply this approach to A protocol stack typically has five layers, application, design an overall framework for the protocol transport (TCP), network (IP), data link (include architecture in multihop wireless networks, with the MAC) and physical layer. Each layer controls a goal of achieving efficient resource allocation subset of the decision variables, hides the complexity through Cross-layer design. We first consider the of the layer below and provides well-defined services network with fixed channel or single-rate devices, to the layer above. Together, they allocate networked and formulate network resource allocation as a utility resources to provide a reliable and usually best-effort maximization problem with rate constraints at the communication service to a large pool of competing network layer and schedulability constraints at the users. However, the layered structure addresses only link layer. We apply duality theory to decompose the abstract and high-level aspects of the whole network system problem vertically into congestion control, protocol design. Various layers of the network are put routing and scheduling sub problems that interact together often in an ad hoc manner, and might not be through congestion prices. Based on this 1714 | P a g e
  • 2. S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1714-1717 decomposition, a distributed sub gradient algorithm for joint congestion control, routing and scheduling is obtained, and proved to approach arbitrarily close to the optimum of the system problem We finally apply the general algorithm to the joint congestion control and medium access control design over the network with single-path routing and to the cross-layer congestion control, routing and scheduling design in the network without pre specified paths. 2. Cross Layer Design Cross Layer Design is a way of achieving information sharing between all the layers in order to obtain highest possible adaptively of any network. This is required to meet the challenging Data rates, higher performance gains and Quality of Services Fig 2.2 Cross Layer Design for Wireless Network requirements for various real time and non real time applications. Each layer is characterized by some key 3 .Design modules: parameters, which are passed to the adjacent layers to For the efficient multi-hop wireless help them determine the best operation modes that networks design, namely: best suit the current channel, network and application -Network protocols and conditions -Network operations and management (O&M) The designs include both in a cross-layer design paradigm to ensure the notion of service quality, such as quality of service (QoS) in wireless mesh networks (WMNs) and quality of information (QoI) in wireless sensor networks (WSNs). The implementation stage involves careful planning, investigation of the existing system and it‘s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. 3.1 Flow Contention Graph and Schedualbility Constraint: The interference among wireless links is usually specified by some interference model that describes physical constraints regarding wireless Fig:2.1 cross layer architecture transmissions and successful receptions. For example, in a network with primary interference, The architecture of cross layer consists of links that share a common node cannot transmit or received simultaneously but links that do not share 2.1 Wireless Networking nodes can do so. It models a wireless network with Architecture: Connection Vs Connectionless, Energy multiple channels where simultaneous efficient analysis of Manets and Traffic theory & communications in a neighborhood are enabled by protocols using orthogonal CDMA or FDMA channels. In a network with secondary interference, links mutually 2.1Signal processing interfere with each other whenever either the sender Increasing the spectral efficiency, Reducing Bit Error or the receiver of one is within the interference range Rate and reducing transmission energy of the sender or receiver of the other. Given an interference model, we can construct a flow 2.3 Information Theory contention graph that captures the contention Developing capacity limits, designing efficient relations among the links. In the contention graph, source coding and channel algorithms. each vertex represents a link, and an edge between And system design of cross layer for wireless two vertices denotes the contention between the networks shown in fig 2.2 corresponding links: two links interfere with each other and cannot transmit at the same time. 1715 | P a g e
  • 3. S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1714-1717 3.2 Stochastic Stability: independent set e as a L dimensional rate vector r-e Congestion price takes discrete values. where the length entry . Thus, congestion price evolves according to a 1 2 discrete-time, discrete-space Markov chain. We need 3 to show that this markov chain is stable, i.e., the A B C congestion price process reaches a steady state and does not become unbounded. It is easy to check that 4 5 6 the Markov chain has a countable state space, but is Fig 4.1 Logical Links and corresponding not necessarily irreducible. In such a general case, the flow contention Graph state space is partitioned in transient set T and we formulate rate constraints for networks with different recurrent classes Ri. We define the system different kinds of routing .The network with single- to be stable if all recurrent states are positive Path Routing of each source S uses a path recurrent and the Markov process hits the recurrent considering of a set ‗ Ls‘ Subset ‗S ‗ links the set Ls states with probability one. This will guarantee that define an L × S routing matrix. The aggregate link the Markov chain will be absorbed/reduced into some should not exceed the link capacity. The network recurrent class, and the positive recurrence ensures without pre specified paths will use multi commodity the periodicity of the Markov chain over this class. flow model for routing .here we are denoting D as destination of network layers. The aggregate capacity 3.3 Scheduling over Multihop Networks: of link allocated to flow for incoming and generated Scheduling over Multihop networks is a flow to the destination should not exceed the difficult problem and in general NP-hard. To see this, summation of the capacities for its outgoing flows. note that problem is equivalent to a maximum weight The wireless channel is a shared medium and independent set problem over the flow contention interference –limited .the capacity they obtained graph, which is NP-hard for general graphs. It is easy depends on band width sharing .this may results in to design some heuristic algorithm but is hard to bind various TCP performances of wireless networks .the its performance. problems of TCP unfairness over Multihop wireless networks .The following section says about related 4. PROCEDURE: work of this paper . A Multihop wireless network is dynamically self organized and self configured with nodes in the 5. Related work: network automatically establishing and maintaining In proposed paper we have did survey and Multihop connectivity among themselves .Multi hop its related work on multi hop wireless networks and wireless network designed for different types of cross-layer protocols, protocol improvements, and applications scenarios ..In wireless ad hoc mobile design methodologies for wireless sensor networks network ,every node has the responsibility to act as a (WSNs) is reviewed and taxonomy is proposed. The router and forward packets for each other .Because communication protocols devised for WSNs that nodes normally have limited transmission ranges focus on cross-layer design techniques are reviewed .Multihop delivery is necessary for communication and classified based on the network layers they aim at among nodes outside the transmission range. replacing in the classical open system interconnection The Cross-layer Design of Multihop (OSI) network stack. Furthermore, systematic Wireless Networks is focusing dual decomposition methodologies for the design of cross-layer solution .consider a Multi hop wireless network with a set of for sensor networks as resource allocation problems N nodes and a set L Directed logical links .we in the framework of non-linear optimization are assume a static topology and each link l Є L which discussed. Open research issues in the development has finite capacity .here we assume a wireless of cross-layer design methodologies for sensor channel with a fixed a rate .wireless channel is networks and possible research directions are interference limited .we will use flow Contention indicated. Finally, possible shortcomings of cross- Graph to capture the contention relation links. The layer design techniques such as lack of modularity, Flow Contention Graph and Schedualbility constraint decreased robustness, and instability and that captures the contention relations among links, its precautionary guidelines are presented. Scheduling each vertex represent a link an edge between two component in this optimal cross-layered rate control vertices denotes the contention between the scheme has to solve a complex global optimization corresponding links and the two links interfere with problem at each time, and hence is too each other and cannot transmit at the same time. The computationally expensive for online given flow contention graph can identify all its implementation. In this paper, we study how the independents sets of vertices .the link is an performance of cross-layer rate control can be independent set can transmit simultaneously .let E impacted if the network can only use an imperfect denote the set of all independent sets with each (and potentially distributed) scheduling component independent set indexed by e. we represent an that is easier to implement. We study both the case when the number of users in the system is fixed and 1716 | P a g e
  • 4. S.Pradeep, D.Jamunna, Vikram Narayandas / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1714-1717 the case with dynamic arrivals and departures of the [5]. V. Kawadia and P.R. Kumar, ―A Cautionary users, and we establish desirable results on the Perspective on Cross-Layer Design‖, IEEE performance bounds of cross-layered rate control Wireless Communications, February, 2005, pp.3-11 with imperfect scheduling. Compared with a layered [6]. C. Sadler, W. Chen, and L. Kant. , ―Cross- approach that does not design rate control and Layer Self-Healing in a Wireless Ad-Hoc Network‖, scheduling together, our cross-layered approach has U.S. Patent filed April 2005 provably better performance bounds, and substantially outperforms the layered approach. The Author’s Information insights drawn from our analyses also enable us to design a fully distributed cross-layered rate control and scheduling algorithm for a restrictive interference mode. 6. Conclusion: We proposed an alternative cross-layering architecture for autonomic communications which is 1 S.Pradeep pursuing M.Tech CSE based on local information as well as global from jaya prakash Narayana College of Engineering information and gossiping will be the mechanism to & Technology B.Tech from jaya prakash narayana collect the global view related information. We are College of Engineering. Currently he is working as currently engaged in exploring how we may provide Assistant Professor at Jaya prakash Narayana College cross-layer optimization of TCP/IP, simulating of Engineering. His areas of interest include Data existing TCP enhancements and comparing them to a mining, Network Security, Software Engineering and novel version whose adaptations are driven from a Sensor Network. knowledge plane populated using our gossiping technique. This will allow us to evaluate both the 2 Prof.D.Jamuna, Working as gossiping approach and the various cross-layer Professor & Head of CSE Dept. parameters that can be used to influence TCP Jayaprakash Narayan College of behavior, as well as comparing them against Engineering, Mahabubnagar, established approaches with less cross-layer M.Tech(SE) from School of influence. Our current theory integrates three Information Technology, JNTUH, functions—congestion control, routing and Hyderabad. BE (CSE) from scheduling—in transport, network and link layers Vijayanagara Engineering into a coherent framework. College, Bellary. Experience 17 Years in Teaching Profession. Her areas of Interest are in Wireless References: Sensor Networks, Data Mining, and Networking and [1]. Marco Conti, Gaia Maselli, Giovanni Turi, guided M. Tech and B. Tech Students IEEE Projects. Sylvia Giordano ―Cross layering in mobile She has published many papers in international Ad Hoc Network Design‖, IEEE Computer journals. And she is Member of CSTA, IACSIT. Society, pages 48-51, February 2004 [2]. Winter, R.; Schiller, S.; Nikaein, N.; Bonnet C., “Crosstalk: A Data Dissemination-based Cross-layer Architecture for Mobile Ad-hoc Networks”, IEEE Workshop on Applications and Services in Wireless Networks (ASWN 2005), Paris, June 2005 [3]. X. Gu, X. Fu.H. Tshofenig, and L. Wolf, 3 ―Towards Self-optimizing Protocol Stack for Vikram Narayandas Currently Autonomic Communication: Initial working as Associate Professor at Jayaprakash Experience‖, Proceedings of the 2nd IFIP Narayan College of Engineering, Mahabubnagar, International Workshop on Autonomic M.Tech (CN) from Shadan College of Engineering. Communication (WAC'05), Springer B.Tech (CSIT) from Sree Datta college of Lecture Notes in Computer Science Vol. Engineering and. His areas of interest include Data 3854 (LNCS), October, 2005. mining, Network Security, Software Engineering, [4]. Dzmitry Kliazovich and Fabrizio Granelli, Sensor Networks, and Cloud Computing. He is the ―A Cross-layer Scheme for TCP membership of, IACSIT, ISTE, IAENG, and CSTA. Performance Improvement in Wireless He is Peer reviewer on honorary basis of GJCST. He LANs‖, Globecom 2004, IEEE published 10 papers in International Journals. Communications Society. 1717 | P a g e