SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Pharmaceutical Science Invention
ISSN (Online): 2319 – 6718, ISSN (Print): 2319 – 670X
www.ijpsi.org Volume 2 Issue 7‖ July2013 ‖ PP.01-04
www.ijpsi.org 1 | P a g e
Distributed randomized Schedulling and Traffic Monitoring
for qos Manet
B.Niveditha Sai’, C.Dinesh’’
ABSTRACT: Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath
routing protocols, which should provide the fault tolerance for broken links and the load balance for extending
bandwidth and equalizing energy consumption. A cross-layer framework is introduced for the effective
dissemination of real-time and elastic traffic in multihop wireless networks called Scheduling and Traffic
Management in Ordered Routing Meshes (STORM). UNICAST and MULTICAST routes are established in
coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and
delay guarantees can be enforced on a per-hop and end-to-end basis.
KEYWORDS: Strom,trafficmanagement,multihop,UNICAST,MULTICAST,DSR,FORP.
I. INTRODUCTION
1.1 wireless networks
Wireless networks are generally implemented with some type of remote information transmission
system that uses electromagnetic waves, and is commonly associated with a telecommunications network whose
interconnections between nodes is implemented without the use of wires.
1.2 Destination-Sequenced Distance Vector routing
Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc
mobile networks. Each entry in the routing table contains a sequence number, the sequence numbers are
generally “even number” if a link is present; else, an odd number is used. The sequence number is generated by
the destination. Routing information is distributed between nodes by sending full dumps infrequently and
smaller incremental updates more frequently.
1.3 ad hoc on-demand distance vector routing
In ad hoc mobile networks, routes are mainly multihop because of the limited radio propagation range
and topology changes frequently and unpredictably since each network host moves randomly. Hence on-
demand routing protocol has been proposed for ad hoc networks. Network hosts maintain route table entries
only to destinations that they communicate with.
Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc
networks (MANETs) and other wireless ad-hoc networks. AODV is capable of both UNICAST and
MULTICAST routing. It is a reactive routing protocol, meaning that it establishes a route to a destination only
on demand. It is an “on demand algorithm”, meaning that it builds routes between nodes only as desired by
source nodes. It maintains these routes as long as they are needed by the sources. Additionally, AODV forms
trees which connect MULTICAST group members. The trees are composed of the group members and the
nodes needed to connect the members.
II. RELATED WORK
2.1 flow handoff in ad hoc wireless networks
W.Su and M.Gerla gives in an ad hoc wireless network mobile hosts are acting as routers and the
network topology is constantly changing due to node mobility. The disruptions can cause serious degradation
for real time session. A new concept called multi hop handoff is introduced to anticipate topological changes
and perform rerouting thus limiting the disruption of a flow due to the changing topology.
2.2 the flow oriented routing protocol (forp)
The protocol is inspired by on demand schemes such as LMR (Lightweight Mobile
Routing), DSR (Dynamic Source Routing), ABR (Associativity-Based Routing), AODV (Adhoc On-Demand
Distance Vector) and TORA (Temporally Ordered Routing Algorithm). The only routes for active source
destination pairs are maintained. As a difference from previous schemes however, the destination predicts the
Distributed randomized schedulling…
www.ijpsi.org 2 | P a g e
change of topology ahead of time and determines when the flow needs to be rerouted or hand off based on the
mobility information contained in the data packets.
2.3Opportunistic Multi Hop Routing for Wireless Networks
S.Biswas and R.Morris, gives Ex OR, an integrated routing and MAC protocol that increases the
throughput of large unicast transfers in multi-hop wireless networks. Ex OR chooses each hop of a packet's
route after the transmission for that hop, so that the choice can reflect which intermediate nodes actually
received the transmission. This deferred choice gives each transmission multiple opportunities to make
progress. As a result Ex OR can use long radio links with high loss rates, which would be avoided by traditional
routing. Ex OR increases a connection's throughput while using no more network capacity than traditional
routing.
III. EXISTING SYSTEM
 Calculates distance from the destination based on location information of the destination that will be
extracted from the request packet while uses the relative neighborhood graph (RNG) which together with
local information of distance to neighbors and distances between neighbors will minimize the total energy
consumption while still maintaining the whole network coverage through broadcasting.
 Restricted flooding is based on distance from the node to the destination is used to determine nodes
participation in the route discovery process. Nodes that are further away from source will not participate
IV. PROPOSED SYSTEM
4.1 Scheme 1: Framework of MANET
The MANET requires routing protocols to ensure that out of range node can communicate with each
other via intermediate node
Pro-active (table-driven) routing
This type of protocols maintains fresh lists of destinations and their routes by periodically distributing
routing tables throughout the network.
Reactive (on-demand) routing
This type of protocols finds a route on demand by flooding the network with Route Request packets. The
main disadvantages of such algorithms are:
1. High latency time in route finding.
2. Excessive flooding can lead to network clogging.
Hybrid (both pro-active and reactive) routing
This type of protocols combines the advantages of proactive and of reactive routing. The routing is
initially established with some proactively prospected routes and then serves the demand from additionally
activated nodes through reactive flooding. The choice for one or the other method requires predetermination for
typical cases.
The main disadvantages of such algorithms are:
1. Advantage depends on amount of nodes activated.
Reaction to traffic demand depends on gradient of traffic volume.
4.2 Scheme 2: Neighboring node selection
MANET is the collection of mobile nodes in which the nodes communicate with each other without the
help of any fixed infrastructure. The monitoring nodes consumes more energy in the MANET in intrusion
detection.
The neighbor protocol is also used to detect when two nodes in a two hop neighborhood have reserved
the same slot.To resolve a conflicting reservation, the node with the larger identifier keeps its reservation over
the particular slot,whereas the node with the lower identifier has to give up its current reservation and start a
new reservation transaction over a different slot.
The main source of these conflicting reservations is node mobility, which changes the neighborhood of
nodes.The neighborhood information contained in hello messages allow nodes to detect these collision before
the conflicting node become one-hop neighbors.
Distributed randomized schedulling…
www.ijpsi.org 3 | P a g e
4.3 Scheme 3; Loop free interest driven routing
Routing in STORM is based on destination meshes, routing meshes, and enclaves. To integrate unicast
and multicast routing, a destination is treated as a connected destination mesh containing one or more nodes.
STORM adopt the interest driven approach. However, unlike our prior work, the routing meshes used in
STORM have the restriction that each node in those path is flow ordered.
When a source has data to send, it checks whwther it has received an MA advertising the intended
destination within the last three MA periods.If that is the case, the sender simply broadcasts the data packet,
otherwise, it broadcasts an MR.Upon reception of a data packet, a node checks for a hit in its data-packets
cache. If tha pair is already in the cache, the packet is silently dropped. Otherwise, the receiving node inserts the
pair in its cache and determines whether it has to relay the data packet or not.If the node is part of the
destination, it also passes the data packet to upper layers.
V. PERFORMANCE EVALUATION
5.1 simulation overview
A simulation result was gained by averaging over 20 runs with different seeds to increase the
confidence of the results. We study the following metrics:
1. Packet delivery ratio. The ratio of the packets delivered to those originated by CBR sources.
2. Control overhead. The total number of control message transmissions (the forwarding of a control message
at each hop is counted as one control transmission) divided by the total number of data packets received.
3. Average number of data packet forwarding per delivered packet. The total number of data packet
forwarding accumulated from each hop (including rerouting and retransmissions due to collisions) over the total
number of data packets received. Both the non-optimal routing and rerouting due to unreachable next hop will
increase the forwarding overhead.
4. Average end to end delay. The average time interval for the data packets to traverse from the CBR sources to
the destinations.
To demonstrate the effectiveness of our algorithms and protocols i n supporting robust
communications under various conditions, we have performed extensive simulations with the variations of
mobility and thus the rate of network topology changes, node density, traffic load, and the accuracy level of the
destination position. I n e ach performance study, only the parameter to evaluate is varied, and the remaining
parameters .
VI. CONCLUSION
A cross-layer framework is introduced for the effective dissemination of real-time and elastic
traffic in multihop wireless networks called Scheduling and Traffic Management in Ordered Routing Meshes
(STORM). UNICAST and MULTICAST routes are established in coordination with the scheduling of
transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on a
per-hop and end-to-end basis. STORM establishes and maintains loop-free routes from sources to destinations
and, just as important, that the reservations established along these paths provide bounded end-to-end delays
reduces the impact of node mobility on the quality of service perceived by real-time flows.
In future, the infrastructure, ad hoc configurations and the factors such as overhead, security and
reliability will be considered. The other parameters such as jitter and bandwidth can also be taken to improve
the performance even better. This multipath video multicasting adopting AODV protocol would be highly
efficient when applied for applications that run on real time such as VOIP, Teleconferencing and video
streaming.
REFERENCE
[1]. Badis.H and K. Al Agha,[2005] "QOLSR, QoS routing for Ad Hoc Wireless Networks Using OLSR", European
Transactions on Telecommunications, Vol. 15, No. 4, 2005.
[2]. Chen.L, T. Ho, S. Low, M. Chiang, and J. C. Doyle,[2007] “Optimization based rate control for multicast with network
coding,”in Proc. of Infocom, Anchorage, AK.
[3]. Chen, M., Zakhor, A., [2004]. Rate Contcrol for Streaming Video over Wireless. Proc. Twenty-third Annual Joint Conference of
the IEEE Computer and Communications Societies (INFOCOM’04). Hong Kong, China, p.1181- 1190.
[4]. Cordeiro.C, Gossain.H and Agrawal.D,[2003] “Multicast over wireless mobile ad hoc networks: Present and future directions,”
IEEE Netw., vol.17, number 1, pp. 52–59, Jan. /Feb. 2003.
[5]. Gwalani.G, Royer.E, Charles E. Perkins,[2003] “AODVPA: AODV with Path Accumulation”, Next Generation Internet
Symposium, held in conjunction with ICC, Anchorage, Alaska, May 2003.
Distributed randomized schedulling…
www.ijpsi.org 4 | P a g e
[6]. Internet Engineering Task Force (IETF) Mobile Ad Hoc Networks (MANET) Working Group
Charter,http://www.ietf.org/html.charters/manet-charter.html.
[7]. Jones, E.P.C,. Karsten.M, and P. A. S. Ward.[2005]” Multipath load balancing in multi-hop wireless networks”. Wireless And
Mobile Computing, Networking and Communications, 2005. (WiMob’2005), IEEE.
[8]. Ke, C. H. Lin, C. K. Shieh, and W. S. Hwang.[2006] “A novel realistic simulation tool for video transmission over wireless
network,” IEEE (SUTC2006), June 5–7, 2006.
[9]. Liang, M. and M.K. Denko, [2007]. A routing metric for load-balancing in wireless mesh networks. Proceeding of the 21st
International Conference on Advanced Information Networking and Applications Workshops, May 21-23, IEEE Xplore
Press, Niagara Falls, Ont., andpp:409-411. I:10.1109/AINAW.2007.50.
[10]. LI YA PING, [2007]“Analyze and implementation of a New Route Protocol Based on MSAODV”, Control& Automation, 2007,
pp.225-227.
Author 1
Author 2
B.Niveditha Sai, received B.E (CSE) degree in 2011 from Anna University
Coimbatore, India. Currently pursuing M.E degree in Computer Science and
Engineering in Easa college of Engineering and Technology. Coimbatore,
C.Dinesh, received B.E (CSE) degree from Anna University Chennai, India.
M.E (CSE) degree from Anna University Chennai, India

Mais conteúdo relacionado

Mais procurados

PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationProf Ansari
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
 

Mais procurados (15)

E010322531
E010322531E010322531
E010322531
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 

Destaque

Ab dhcp 2003
Ab   dhcp 2003Ab   dhcp 2003
Ab dhcp 2003louischar
 
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3Pat Longsiri
 
The occurrence script final
The occurrence script  finalThe occurrence script  final
The occurrence script final2010savannah96
 
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA""OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"Self-employed
 
Final paper psy 202
Final paper psy 202Final paper psy 202
Final paper psy 202fatcatlover
 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...chennaijp
 
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...Crónicas del despojo
 
Error resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysisError resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysisijma
 
tecnologia 13 octubre 2011
tecnologia 13 octubre 2011tecnologia 13 octubre 2011
tecnologia 13 octubre 2011anyomave
 
Cierre de semestre UBB
Cierre de semestre UBBCierre de semestre UBB
Cierre de semestre UBBmovilizadosubb
 
Programa de objetos 3 d wire
Programa de objetos 3 d wirePrograma de objetos 3 d wire
Programa de objetos 3 d wireRené Domínguez
 

Destaque (20)

Gsma presentation
Gsma presentationGsma presentation
Gsma presentation
 
Ab dhcp 2003
Ab   dhcp 2003Ab   dhcp 2003
Ab dhcp 2003
 
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3
สมุนไพรจุลินทรีย์ และแชมพูผมดำนำเข้าด้วยสมุนไพรจากอเมริกา ขวดละ 3
 
The occurrence script final
The occurrence script  finalThe occurrence script  final
The occurrence script final
 
E021201032037
E021201032037E021201032037
E021201032037
 
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA""OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"
"OUTSOURCING PHOTO EDITING and IMAGE ENHANCEMENT SERVICES @ PHOTO EDITING INDIA"
 
Final paper psy 202
Final paper psy 202Final paper psy 202
Final paper psy 202
 
Bb m series
Bb m seriesBb m series
Bb m series
 
Practica 3
Practica 3Practica 3
Practica 3
 
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...JPM1413   Phase-Based Binarization of Ancient Document Images: Model and Appl...
JPM1413 Phase-Based Binarization of Ancient Document Images: Model and Appl...
 
Rd
RdRd
Rd
 
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...
Informe "No tenemos miedo. Defensores del derecho a la tierra: atacados por e...
 
GPU
GPUGPU
GPU
 
842
842842
842
 
Et24912915
Et24912915Et24912915
Et24912915
 
Error resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysisError resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysis
 
Im3514741479
Im3514741479Im3514741479
Im3514741479
 
tecnologia 13 octubre 2011
tecnologia 13 octubre 2011tecnologia 13 octubre 2011
tecnologia 13 octubre 2011
 
Cierre de semestre UBB
Cierre de semestre UBBCierre de semestre UBB
Cierre de semestre UBB
 
Programa de objetos 3 d wire
Programa de objetos 3 d wirePrograma de objetos 3 d wire
Programa de objetos 3 d wire
 

Semelhante a International Journal of Pharmaceutical Science Invention (IJPSI)

A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)IISRT
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 

Semelhante a International Journal of Pharmaceutical Science Invention (IJPSI) (20)

A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
X04505122126
X04505122126X04505122126
X04505122126
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
J0935461
J0935461J0935461
J0935461
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Eb34777780
Eb34777780Eb34777780
Eb34777780
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
I017616468
I017616468I017616468
I017616468
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

International Journal of Pharmaceutical Science Invention (IJPSI)

  • 1. International Journal of Pharmaceutical Science Invention ISSN (Online): 2319 – 6718, ISSN (Print): 2319 – 670X www.ijpsi.org Volume 2 Issue 7‖ July2013 ‖ PP.01-04 www.ijpsi.org 1 | P a g e Distributed randomized Schedulling and Traffic Monitoring for qos Manet B.Niveditha Sai’, C.Dinesh’’ ABSTRACT: Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross-layer framework is introduced for the effective dissemination of real-time and elastic traffic in multihop wireless networks called Scheduling and Traffic Management in Ordered Routing Meshes (STORM). UNICAST and MULTICAST routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on a per-hop and end-to-end basis. KEYWORDS: Strom,trafficmanagement,multihop,UNICAST,MULTICAST,DSR,FORP. I. INTRODUCTION 1.1 wireless networks Wireless networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires. 1.2 Destination-Sequenced Distance Vector routing Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile networks. Each entry in the routing table contains a sequence number, the sequence numbers are generally “even number” if a link is present; else, an odd number is used. The sequence number is generated by the destination. Routing information is distributed between nodes by sending full dumps infrequently and smaller incremental updates more frequently. 1.3 ad hoc on-demand distance vector routing In ad hoc mobile networks, routes are mainly multihop because of the limited radio propagation range and topology changes frequently and unpredictably since each network host moves randomly. Hence on- demand routing protocol has been proposed for ad hoc networks. Network hosts maintain route table entries only to destinations that they communicate with. Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for mobile ad hoc networks (MANETs) and other wireless ad-hoc networks. AODV is capable of both UNICAST and MULTICAST routing. It is a reactive routing protocol, meaning that it establishes a route to a destination only on demand. It is an “on demand algorithm”, meaning that it builds routes between nodes only as desired by source nodes. It maintains these routes as long as they are needed by the sources. Additionally, AODV forms trees which connect MULTICAST group members. The trees are composed of the group members and the nodes needed to connect the members. II. RELATED WORK 2.1 flow handoff in ad hoc wireless networks W.Su and M.Gerla gives in an ad hoc wireless network mobile hosts are acting as routers and the network topology is constantly changing due to node mobility. The disruptions can cause serious degradation for real time session. A new concept called multi hop handoff is introduced to anticipate topological changes and perform rerouting thus limiting the disruption of a flow due to the changing topology. 2.2 the flow oriented routing protocol (forp) The protocol is inspired by on demand schemes such as LMR (Lightweight Mobile Routing), DSR (Dynamic Source Routing), ABR (Associativity-Based Routing), AODV (Adhoc On-Demand Distance Vector) and TORA (Temporally Ordered Routing Algorithm). The only routes for active source destination pairs are maintained. As a difference from previous schemes however, the destination predicts the
  • 2. Distributed randomized schedulling… www.ijpsi.org 2 | P a g e change of topology ahead of time and determines when the flow needs to be rerouted or hand off based on the mobility information contained in the data packets. 2.3Opportunistic Multi Hop Routing for Wireless Networks S.Biswas and R.Morris, gives Ex OR, an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. Ex OR chooses each hop of a packet's route after the transmission for that hop, so that the choice can reflect which intermediate nodes actually received the transmission. This deferred choice gives each transmission multiple opportunities to make progress. As a result Ex OR can use long radio links with high loss rates, which would be avoided by traditional routing. Ex OR increases a connection's throughput while using no more network capacity than traditional routing. III. EXISTING SYSTEM  Calculates distance from the destination based on location information of the destination that will be extracted from the request packet while uses the relative neighborhood graph (RNG) which together with local information of distance to neighbors and distances between neighbors will minimize the total energy consumption while still maintaining the whole network coverage through broadcasting.  Restricted flooding is based on distance from the node to the destination is used to determine nodes participation in the route discovery process. Nodes that are further away from source will not participate IV. PROPOSED SYSTEM 4.1 Scheme 1: Framework of MANET The MANET requires routing protocols to ensure that out of range node can communicate with each other via intermediate node Pro-active (table-driven) routing This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. Reactive (on-demand) routing This type of protocols finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are: 1. High latency time in route finding. 2. Excessive flooding can lead to network clogging. Hybrid (both pro-active and reactive) routing This type of protocols combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice for one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are: 1. Advantage depends on amount of nodes activated. Reaction to traffic demand depends on gradient of traffic volume. 4.2 Scheme 2: Neighboring node selection MANET is the collection of mobile nodes in which the nodes communicate with each other without the help of any fixed infrastructure. The monitoring nodes consumes more energy in the MANET in intrusion detection. The neighbor protocol is also used to detect when two nodes in a two hop neighborhood have reserved the same slot.To resolve a conflicting reservation, the node with the larger identifier keeps its reservation over the particular slot,whereas the node with the lower identifier has to give up its current reservation and start a new reservation transaction over a different slot. The main source of these conflicting reservations is node mobility, which changes the neighborhood of nodes.The neighborhood information contained in hello messages allow nodes to detect these collision before the conflicting node become one-hop neighbors.
  • 3. Distributed randomized schedulling… www.ijpsi.org 3 | P a g e 4.3 Scheme 3; Loop free interest driven routing Routing in STORM is based on destination meshes, routing meshes, and enclaves. To integrate unicast and multicast routing, a destination is treated as a connected destination mesh containing one or more nodes. STORM adopt the interest driven approach. However, unlike our prior work, the routing meshes used in STORM have the restriction that each node in those path is flow ordered. When a source has data to send, it checks whwther it has received an MA advertising the intended destination within the last three MA periods.If that is the case, the sender simply broadcasts the data packet, otherwise, it broadcasts an MR.Upon reception of a data packet, a node checks for a hit in its data-packets cache. If tha pair is already in the cache, the packet is silently dropped. Otherwise, the receiving node inserts the pair in its cache and determines whether it has to relay the data packet or not.If the node is part of the destination, it also passes the data packet to upper layers. V. PERFORMANCE EVALUATION 5.1 simulation overview A simulation result was gained by averaging over 20 runs with different seeds to increase the confidence of the results. We study the following metrics: 1. Packet delivery ratio. The ratio of the packets delivered to those originated by CBR sources. 2. Control overhead. The total number of control message transmissions (the forwarding of a control message at each hop is counted as one control transmission) divided by the total number of data packets received. 3. Average number of data packet forwarding per delivered packet. The total number of data packet forwarding accumulated from each hop (including rerouting and retransmissions due to collisions) over the total number of data packets received. Both the non-optimal routing and rerouting due to unreachable next hop will increase the forwarding overhead. 4. Average end to end delay. The average time interval for the data packets to traverse from the CBR sources to the destinations. To demonstrate the effectiveness of our algorithms and protocols i n supporting robust communications under various conditions, we have performed extensive simulations with the variations of mobility and thus the rate of network topology changes, node density, traffic load, and the accuracy level of the destination position. I n e ach performance study, only the parameter to evaluate is varied, and the remaining parameters . VI. CONCLUSION A cross-layer framework is introduced for the effective dissemination of real-time and elastic traffic in multihop wireless networks called Scheduling and Traffic Management in Ordered Routing Meshes (STORM). UNICAST and MULTICAST routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on a per-hop and end-to-end basis. STORM establishes and maintains loop-free routes from sources to destinations and, just as important, that the reservations established along these paths provide bounded end-to-end delays reduces the impact of node mobility on the quality of service perceived by real-time flows. In future, the infrastructure, ad hoc configurations and the factors such as overhead, security and reliability will be considered. The other parameters such as jitter and bandwidth can also be taken to improve the performance even better. This multipath video multicasting adopting AODV protocol would be highly efficient when applied for applications that run on real time such as VOIP, Teleconferencing and video streaming. REFERENCE [1]. Badis.H and K. Al Agha,[2005] "QOLSR, QoS routing for Ad Hoc Wireless Networks Using OLSR", European Transactions on Telecommunications, Vol. 15, No. 4, 2005. [2]. Chen.L, T. Ho, S. Low, M. Chiang, and J. C. Doyle,[2007] “Optimization based rate control for multicast with network coding,”in Proc. of Infocom, Anchorage, AK. [3]. Chen, M., Zakhor, A., [2004]. Rate Contcrol for Streaming Video over Wireless. Proc. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’04). Hong Kong, China, p.1181- 1190. [4]. Cordeiro.C, Gossain.H and Agrawal.D,[2003] “Multicast over wireless mobile ad hoc networks: Present and future directions,” IEEE Netw., vol.17, number 1, pp. 52–59, Jan. /Feb. 2003. [5]. Gwalani.G, Royer.E, Charles E. Perkins,[2003] “AODVPA: AODV with Path Accumulation”, Next Generation Internet Symposium, held in conjunction with ICC, Anchorage, Alaska, May 2003.
  • 4. Distributed randomized schedulling… www.ijpsi.org 4 | P a g e [6]. Internet Engineering Task Force (IETF) Mobile Ad Hoc Networks (MANET) Working Group Charter,http://www.ietf.org/html.charters/manet-charter.html. [7]. Jones, E.P.C,. Karsten.M, and P. A. S. Ward.[2005]” Multipath load balancing in multi-hop wireless networks”. Wireless And Mobile Computing, Networking and Communications, 2005. (WiMob’2005), IEEE. [8]. Ke, C. H. Lin, C. K. Shieh, and W. S. Hwang.[2006] “A novel realistic simulation tool for video transmission over wireless network,” IEEE (SUTC2006), June 5–7, 2006. [9]. Liang, M. and M.K. Denko, [2007]. A routing metric for load-balancing in wireless mesh networks. Proceeding of the 21st International Conference on Advanced Information Networking and Applications Workshops, May 21-23, IEEE Xplore Press, Niagara Falls, Ont., andpp:409-411. I:10.1109/AINAW.2007.50. [10]. LI YA PING, [2007]“Analyze and implementation of a New Route Protocol Based on MSAODV”, Control& Automation, 2007, pp.225-227. Author 1 Author 2 B.Niveditha Sai, received B.E (CSE) degree in 2011 from Anna University Coimbatore, India. Currently pursuing M.E degree in Computer Science and Engineering in Easa college of Engineering and Technology. Coimbatore, C.Dinesh, received B.E (CSE) degree from Anna University Chennai, India. M.E (CSE) degree from Anna University Chennai, India