SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




           A Quality of Service Strategy to Optimize
           Bandwidth Utilization in Mobile Networks
                                L. Arockiam1, P. Calduwel Newton2 and J. Isac Gnanaraj3
                           1
                       Associate Professor in Computer Science, St.Joseph’s College (Autonomous),
                       2
                      Assistant Professor in Computer Science, Bishop Heber College (Autonomous),
                 3
                   Research Scholar, Department of Computer Science, St.Joseph’s College (Autonomous),
                                             Tiruchirappalli, Tamil Nadu, India
                       Email: 1larockiam@yahoo.co.in, 2calduwel@yahoo.com, 3ajisac@gmail.com

Abstract - The mobile network that supports network mobility             the next router and the path. If the number of intermediate
is an emerging technology. It is also referred as NEMO                   routers is considerably high then the load of the packet will
(NEtwork MObility). It is more appropriate for mobile                    be increased at each router to a bigger size. This will cause
platforms such as car, bus, train, air plane, etc. It is a great         delay in the data traffic and the traffic flow will be more
challenge to provide Quality of Service (QoS) in NEMO. QoS
is a set of service requirements to be met by the network.
                                                                         critical.
There are various parameters by which QoS is provided. This                  In the virtual circuit switching, instead of adding the
paper concentrates on providing optimum bandwidth for data               address information the VC identifier is added. The idea
traffic. The objective of this paper is to propose a strategy to         behind the virtual circuit is to avoid choosing a new route
use Virtual Circuit (VC) approach in NEMO. It helps to                   for every packet. Instead of choosing new routes, when a
utilize the bandwidth effectively, to consume minimum time to            connection is established, a route is identified for all traffic
transfer the data and also to reduce overload of the mobile              flowing over the connection as part of the connection setup
router due to the minimum size of the header. Ultimately, it             and stored in the tables of the routers. Each packet carries
gives better results to enhance the QoS in mobile networks.              an identifier that tells which VC it belongs to.
Index Terms - Mobile Network, NEMO, Virtual Circuit,                          This paper is organized as follows. Section 2 highlights
QoS,Bandwidth                                                            the motivation to write this paper. Section 3 proposes a
                                                                         QoS strategy to utilize the bandwidth effectively. Section 4
                    I. INTRODUCTION                                      presents the results of the proposed strategy. Section 5
                                                                         gives the conclusion and future enhancements. Section 6
    Packet Switching is a method used in the digital
                                                                         lists the references.
communication networks which divides the content into
blocks, called packets irrespective of its size, type or
                                                                                              II. MOTIVATION
structure. During the travel through the network switches,
routers and other nodes, the packets are buffered and                        The datagram switching adds some additional
queued, results in variable delay and throughput depends                 information at each router. It causes delay and critical
on the traffic in the network. There are two major packet                network traffic. The VC adds only the identifier
switching modes. They are connectionless packet switching                information which doesn’t take much space. Instead of
which is known as datagram switching and connection-                     adding more information like source and destination
oriented packet switching which is known as Virtual                      address at each router, simply adds the VC Identifier (VCI)
Circuit (VC) switching [1].                                              will reduce the size of the header. The advantages of VC
    Virtual Circuit gains a lot of attention because of its              are connection-oriented services, Quality of Service is
congestion-controlled and delay-reduced approach for                     guaranteed, no congestion because resources allocated in
effective data transfer. In the datagram switching each                  advance, packets forwarded more quickly because no
packet includes complete addressing or routing                           routing decision is needed, etc.
information. The packets are routed individually and                         The VC can help to reduce the delay and to improve
sometimes in different paths.                                            QoS in mobile wireless networks [4]. The increasing use of
    Mobile IP is an IETF (Internet Engineering Task Force)               transferring multimedia applications such as voice, video
standard communications protocol that is designed to allow               and data needs the QoS support. Because Army moves
mobile devices to move from one network to another while                 organizationally, nodes in Tactical Internet (TI) have the
maintaining a permanent IP. Mobile IPv4 is described in                  characteristic of Group Mobility [5] and the topology of TI
IETF RFC 3344 [2] and Mobile IPv6 is described in IETF                   is not change tempestuously in mostly time. TI is an
RFC 3775 [3]. IPv6 is the next generation IP version                     important part of military applications using Ad Hoc
designated as the successor to IPv4. The IPv4 uses 32-bit                technology, which is the primary platform of tactical
address space and IPv6 uses 128-bit address space. IPv4                  communication in the future war. So it is meaningful to set
and IPv6 have different address space and also different                 up the virtual circuit in TI, which not only provides end-to-
header format.                                                           end QoS but also implements end-to-end compression of
    Whenever a packet is sent through the conventional                   packet header [6] to improve the efficiency of packet
Mobile IP from the source to the destination, at each                    transmission.
routers an extra information is added in order to identify


© 2010 ACEEE                                                        40
DOI: 01.IJNS.01.03.198
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



    The success of virtual circuit in Mobile Ad hoc                     possible that any mobile router may leave from the
NETworks (MANETs) closely depends on the scheme of                      established VC. In such case, the VC is re-established and
resource reservation at the Media Access Control layer.                 the data transfer is resumed. After the completion of the
QoS routing protocols search for routes with sufficient                 data transfer the VC will be terminated.
resources for the QoS requirements, which work with the                      Steps involved in the strategy:
resource management mechanisms to establish paths                          i. Determine number of channels in each link
through the network that meets end-to-end QoS                              ii. Assign Virtual Circuit Identifier (VCI) for each
requirements [6][7][8]. QoS routing is difficult in                             channel
MANETs. The overhead is too high for the bandwidth                        iii. Establish the VC
limited MANET because there need to be mechanisms for                     iv. Start data transmission
a mobile node to store and update link information [9].                     v. If any mobile router is away from the VC then re-
    Multicast service in virtual circuit networks requires a                    establish new VC
communication path from a sending node to a certain                       vi. Resume the data transfer
number of receiving nodes. Thus, multicast calls are                     vii. Terminate the VC after the completion of transfer
simultaneously set up in several directions. Consequently,
the service processes in these directions become mutually                              MN1           VCI:2           MN2
dependent and a blocking in one group influences a                                     MR1                          MR2
blocking in other groups participating in the connection
[10].
    Delay-Sensitive Mechanism to Establish Route                              MN1-N1                                       MN2-N1
Optimization (DeSMERO) helps to increase the Quality of
Service (QoS) in mobile networks with respect to delay.                             MN1-N2                            MN2-N2
The service providers can implement our idea to provide
better QoSs to the customers for delay-sensitive                                                          VCI: 1
applications like video conferencing, telephony, etc., [11].                                              VCI: 2
A novel technique has been proposed to predict reason(s)
for deterioration in the QoS and to identify the                                        Figure 1. Example Mobile Network
algorithm(s)/mechanism(s)          responsible      for     the
deterioration. It also gives better results to improve the QoS              Fig. 1. shows the proposed strategy for a mobile
and to improve the performance of the network [12].                     network. The VC is established between MR1 (Mobile
    Each network has different raw radio rates and user                 Router 1) and MR2 (Mobile Router 2). Let us assume, the
throughput. The actual throughput is always lesser than the             link between MR1 and MR2 has 2 channels. A MN1-N1
raw radio data rates [13]. There is a great need to use                 (Mobile Network 1’s Node 1) can transfer data to MN2-N2
bandwidth effectively which in turn increases the                       via one channel and MN1-N2 (Mobile Network 1’s Node
performance of the wireless network. In [14], detail                    2) can transfer data to MN2-N1 via other channel. Each
analysis of various internet applications and wireless                  mobile router maintains a table that has two major fields IN
technologies with network parameters such as bandwidth,                 and OUT. The VCI is stored in these fields. The mobile
radio rate, user throughput, type of duplex communication               router directs the packets based on the information
system was done. It also relates internet applications,                 available in the header and table. As the size of the packet
wireless technologies and network parameters to use the                 header is 5 bytes, it is possible to transfer more packets via
bandwidth effectively.                                                  VC. In other words, the bandwidth used by the control
    To sum up, providing QoS will be much more difficult                data is greatly reduced from 40 bytes to 5 bytes. The
in NEMO [15] (i.e. mobile network that supports network                 remaining bandwidth (35 bytes / packet) used by control
mobility) and so many factors or parameters are involved                data can be used to send more payload.
to provide QoS in mobile networks. As the mobile wireless
networks starve for bandwidth, it is appropriated to propose                                   IV. RESULTS
a technique to utilize the bandwidth effectively.                           In the conventional Mobile IP, the sizes of the packets
                                                                        are increased at each router by adding extra information
                  III. A QOS STRATEGY                                   like source and destination addresses. The additional bytes
    The proposed QoS strategy is based on ATM                           will increase the delay and cause ineffective bandwidth
(Asynchronous Transfer Mode) networks. The header size                  utilization. These complexities will be further increased in
of ATM is 5 bytes rather than 40 bytes in IP (Internet                  nested mobile networks. At each router the packets are
Protocol)-based networks. The Virtual Circuit (VC)                      wrapped up with the header information in order to route
approach uses the Identifier called as VCI (Virtual Circuit             the packet to the next router. Each router has to check the
Identifier) to establish a route between source and                     packets for the further action like deciding to which router
destination. Whenever there is a request for the data                   it has to be sent. When the packet reaches corresponding
transmission, a VC is established using VCIs. In other                  peer router, it will unwrap the header information. The
words, the route is established during the call setup using             process of unwrapping and wrapping of the packets
the VCI that is assigned to the intermediate channels. Now,             consume much time and causes more delay in the data
all the packets are transferred via the established VC. It is           transfer and also increases the load of the router. The

© 2010 ACEEE                                                       41
DOI: 01.IJNS.01.03.198
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



proposed strategy uses the essence of the VC switching.
The proposed strategy using VC approach is shown in the
Fig. 2.
              IN     OUT             IN     OUT
           MN1-N1 1 MR2 2           MR1 2 MN2-N1 1

              MN1                            MN2
                            VCI:2
             MR1                            MR2


    MN1-N1                                         MN2-N2


             MN1-N2                          MN2-N2


                                 VCI: 1
                                 VCI: 2


          Figure 2. Proposed Method with VC Approach

    The VC routing table maintained at MR1 and MR2 is                     Figure 3. Bandwidth Utilization for Header Information
given in Figure 2. It has two major fields such as IN and
                                                                      Figure 3 reveals that the existing approach uses 7 times
OUT [1]. The IN and OUT field have two subfields such as
                                                                   of extra bandwidth for header information than proposed
name of the node and VCI. If MN1-N1 wants to send data
                                                                   approach. The proposed strategy takes less time to process
to MN2-N2, MN1-N1 establishes a VC from MN1-N1
                                                                   a packet, reduces the overload of the mobile router. This
       MR1           MR2           MN2-N2. After VC is
                                                                   leads to effective utilization of bandwidth.
established, data transfer will take place.
    Let assume that the link bandwidth is 1 MBps and
Packet size is 512 bytes. The IP based network uses 40                                    CONCLUSIONS
bytes for header and ATM based network uses 5 bytes for                The great challenge for mobile networks is to provide
header. Each packet saves 35 bytes and it can be used for          QoS. Due to the mobile nature, providing QoS becomes
payload. Using 1 MBps link bandwidth, 2048 packets of              complex in mobile networks. As the users of mobile
512 bytes each can be transferred. In IP based network, 40         technology are increasing significantly, there is a great
bytes header information is used for all 2048 packets.             need to reduce the complexities involved in providing QoS.
Consider the following calculation.                                There are various factors involved to provide QoS. One
                                                                   such factor is an effective utilization of bandwidth. The
          Number of packets (NP) = 2048                            proposed QoS strategy uses VC approach in order to utilize
             IP header size (IPH) = 40B                            the bandwidth effectively. In other words, bandwidth
     ATM based network header size (ATMH) = 5B                     utilized by header information is greatly reduced and that
                                                                   bandwidth can be used by payload / data. The proposed
    Total bytes used by header information in IP-based             QoS strategy helps to consume less time and causes
              network (IP_Total)= NP X IPH                         minimum delay in the data transfer and also reduces
                   IP_Total= 2048 X 40B = 81920B                   overload of the router due to the minimum size of the
                                                                   header. Ultimately, it increases the throughput and
  Total bytes used by header information in ATM-based              performance of the mobile networks. Though this paper
          network (ATM_Total) = NP X ATMH                          provides some advantages, it has weakness as well. Due to
                                                                   the mobile nature, the VC has to be re-established
                ATM_Total = 2048 X 5B = 10240B
                                                                   whenever a mobile node is away.
           Hence, IP_Total = 8 X ATM_Total

   The above calculation reveals that IP header
information consumes 8 times of bandwidth than VC
approach. In other words, 7 times of extra bandwidth can
be saved if proposed QoS strategy is used.




© 2010 ACEEE                                                  42
DOI: 01.IJNS.01.03.198
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                         REFERENCES                                         [10] Yangang Wang, Zunming Lv, “Design and Simulation ofA
                                                                                   Virtual Circuit Protocol Based on TDMA-based Tactical
[1]   Tanenbaum, “Computer Networks”, 4th Edition, pp 347-352                      Internet Environment”, IEEE, 2008, pp.410-413.
[2]   Basavaraj Patil, Phil Roberts “IP Mobility Support for IPv4”,         [11]   Mariusz Gła˛bowski, Maciej Stasiak and Piotr
      RFC 3344, Aug. 2002                                                          Zwierzykowski, “Virtual Circuit Switching Node with
[3]   David B. Johnson , Charles E. Perkins , Jari Arkko,                          Bandwidth Reservation and Multicast Connections”,
      “Mobility Support in IPv6”, RFC 3775, Jun. 2004                              Proceedings of Asia-Pacific Conference on Communications,
[4]   Khaja Kamaluddin A, Muhammed Yousoof B, “Routing in                          Perth, Western Australia, 3 - 5 October 2005, pp.827-831.
      Mobile Wireless Networks for Realtime Multimedia                      [12]   P. Calduwel Newton, J. Isac Gnanaraj, L. Arockiam, “A
      Applications – Reuse of Virtual Circuits”, Journal of World                  Delay-Sensitive Mechanism to Establish Route Optimization
      Academy of Science, Engineering and Technology, Vol. 11,                     in Mobile Networks”, International Journal of Future
      Nov. 2005, ISSN: 2070-3724.                                                  Generation Communication and Networking (ISSN : 1738-
[5]   X. Hong, M. Gerla, G.Pei, C.C.Chiang, "A Group Mobility                      995x), Korea, Vol. 2, No.3, September 2009, pp.37-44.
      Model for Ad hoc Wireless Networks", Proceedings of                   [13]   P. Calduwel Newton, L. Arockiam, “A Novel Prediction
      ACM/IEEE MSWiM'99, Aug. 1999, pp. 53-60.                                     Technique to Improve Quality of Service (QoS) for
[6]   R.Sridharan,R.Sridhar,S.Mishra     "A      Robust     Header                 Heterogeneous Data Traffic”, Journal of Intelligent
      Compression Technique for Wireless Ad Hoc Networks",                         Manufacturing (ISSN: 0956-5515 (Print) /1572-8145
      MobiHoc'03[C], USA, June 2003.                                               (Online)), Springer Netherlands, DOI 10.1007/s10845-009-
[7]   Jawhar I, Wu J. “Quality of Service Routing in Mobile Ad                     0361-z, November 2009.
      Hoc Networks. Resource Management in Wireless                         [14]   Kostas Pentikousis, ”Wireless Data Networks”, The Internet
      Networking”, Cardei M, Cardei I, Du D-Z (eds.), Journal of                   Protocol Journal, Volume 8, No.1, March 2005
      Network Theory and Applications, Springer, 2005, pp.365-              [15]   J. Isac Gnanaraj, P. Calduwel Newton, L. Arockiam, “An
      400.                                                                         Efficient Analysis of Internet Applications with Wireless
[8]   C.R.Lin and C-C Liu,"An on-demand QoS routing protocol                       Technologies for Effective Utilisation of Bandwidth”,
      for mobile ad hoc networks", Proceedings of Conference                       Proceedings of International Conference on Advanced
      IEEE International Networks, 2000, pp.160 - 164.                             Computing, Macmillan Publishers, India, August 2009, pp.
[9]   Q.Xue, A.Ganz, "Ad hoc QoS on-demand routing (AQOR)                          402-407.
      in mobile ad hoc networks", Journal of Parallel and                   [16]   Vijay Devarapalli , Ryuji Wakikawa , Alexandru Petrescu,
      Distributed Computing, Vol.63, Issue 2, February 2003,                       Pascal Thubert, “Network Mobility (NEMO) Basic Support
      pp.154-165.                                                                  Protocol”, RFC 3963, Jan. 2005




© 2010 ACEEE                                                           43
DOI: 01.IJNS.01.03.198

Mais conteúdo relacionado

Mais procurados

SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXSERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXijngnjournal
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Juniper Networks
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
 
Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sPfedya
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...IJCNC
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)trayyoo
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...dlogumorappur
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdijistjournal
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 

Mais procurados (20)

SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXSERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
 
A2546035115
A2546035115A2546035115
A2546035115
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
Network Configuration Example: Deploying Scalable Services on an MX Series Ro...
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Admission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo sAdmission control for multihop wireless backhaul networks with qo s
Admission control for multihop wireless backhaul networks with qo s
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...8The Affects of Different Queuing Algorithms  within the Router on QoS VoIP a...
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP a...
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 

Destaque

Detection of Carotid Artery from Pre-Processed Magnetic Resonance Angiogram
Detection of Carotid Artery from Pre-Processed Magnetic Resonance AngiogramDetection of Carotid Artery from Pre-Processed Magnetic Resonance Angiogram
Detection of Carotid Artery from Pre-Processed Magnetic Resonance AngiogramIDES Editor
 
Towards a Software Framework for Automatic Business Process Redesign
Towards a Software Framework for Automatic Business Process RedesignTowards a Software Framework for Automatic Business Process Redesign
Towards a Software Framework for Automatic Business Process RedesignIDES Editor
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...IDES Editor
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelIDES Editor
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemIDES Editor
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksIDES Editor
 
Using PageRank Algorithm to Improve Coupling Metrics
Using PageRank Algorithm to Improve Coupling MetricsUsing PageRank Algorithm to Improve Coupling Metrics
Using PageRank Algorithm to Improve Coupling MetricsIDES Editor
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Destaque (9)

Detection of Carotid Artery from Pre-Processed Magnetic Resonance Angiogram
Detection of Carotid Artery from Pre-Processed Magnetic Resonance AngiogramDetection of Carotid Artery from Pre-Processed Magnetic Resonance Angiogram
Detection of Carotid Artery from Pre-Processed Magnetic Resonance Angiogram
 
Towards a Software Framework for Automatic Business Process Redesign
Towards a Software Framework for Automatic Business Process RedesignTowards a Software Framework for Automatic Business Process Redesign
Towards a Software Framework for Automatic Business Process Redesign
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
 
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov ModelA Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
A Novel Method for Speaker Independent Recognition Based on Hidden Markov Model
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection System
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
Using PageRank Algorithm to Improve Coupling Metrics
Using PageRank Algorithm to Improve Coupling MetricsUsing PageRank Algorithm to Improve Coupling Metrics
Using PageRank Algorithm to Improve Coupling Metrics
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Semelhante a A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks

AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthijcsity
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network IJECEIAES
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communicationeSAT Journals
 
Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communicationeSAT Publishing House
 

Semelhante a A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks (20)

AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communication
 
Qo s management for mobile satellite communication
Qo s management for mobile satellite communicationQo s management for mobile satellite communication
Qo s management for mobile satellite communication
 

Mais de IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 

Mais de IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks L. Arockiam1, P. Calduwel Newton2 and J. Isac Gnanaraj3 1 Associate Professor in Computer Science, St.Joseph’s College (Autonomous), 2 Assistant Professor in Computer Science, Bishop Heber College (Autonomous), 3 Research Scholar, Department of Computer Science, St.Joseph’s College (Autonomous), Tiruchirappalli, Tamil Nadu, India Email: 1larockiam@yahoo.co.in, 2calduwel@yahoo.com, 3ajisac@gmail.com Abstract - The mobile network that supports network mobility the next router and the path. If the number of intermediate is an emerging technology. It is also referred as NEMO routers is considerably high then the load of the packet will (NEtwork MObility). It is more appropriate for mobile be increased at each router to a bigger size. This will cause platforms such as car, bus, train, air plane, etc. It is a great delay in the data traffic and the traffic flow will be more challenge to provide Quality of Service (QoS) in NEMO. QoS is a set of service requirements to be met by the network. critical. There are various parameters by which QoS is provided. This In the virtual circuit switching, instead of adding the paper concentrates on providing optimum bandwidth for data address information the VC identifier is added. The idea traffic. The objective of this paper is to propose a strategy to behind the virtual circuit is to avoid choosing a new route use Virtual Circuit (VC) approach in NEMO. It helps to for every packet. Instead of choosing new routes, when a utilize the bandwidth effectively, to consume minimum time to connection is established, a route is identified for all traffic transfer the data and also to reduce overload of the mobile flowing over the connection as part of the connection setup router due to the minimum size of the header. Ultimately, it and stored in the tables of the routers. Each packet carries gives better results to enhance the QoS in mobile networks. an identifier that tells which VC it belongs to. Index Terms - Mobile Network, NEMO, Virtual Circuit, This paper is organized as follows. Section 2 highlights QoS,Bandwidth the motivation to write this paper. Section 3 proposes a QoS strategy to utilize the bandwidth effectively. Section 4 I. INTRODUCTION presents the results of the proposed strategy. Section 5 gives the conclusion and future enhancements. Section 6 Packet Switching is a method used in the digital lists the references. communication networks which divides the content into blocks, called packets irrespective of its size, type or II. MOTIVATION structure. During the travel through the network switches, routers and other nodes, the packets are buffered and The datagram switching adds some additional queued, results in variable delay and throughput depends information at each router. It causes delay and critical on the traffic in the network. There are two major packet network traffic. The VC adds only the identifier switching modes. They are connectionless packet switching information which doesn’t take much space. Instead of which is known as datagram switching and connection- adding more information like source and destination oriented packet switching which is known as Virtual address at each router, simply adds the VC Identifier (VCI) Circuit (VC) switching [1]. will reduce the size of the header. The advantages of VC Virtual Circuit gains a lot of attention because of its are connection-oriented services, Quality of Service is congestion-controlled and delay-reduced approach for guaranteed, no congestion because resources allocated in effective data transfer. In the datagram switching each advance, packets forwarded more quickly because no packet includes complete addressing or routing routing decision is needed, etc. information. The packets are routed individually and The VC can help to reduce the delay and to improve sometimes in different paths. QoS in mobile wireless networks [4]. The increasing use of Mobile IP is an IETF (Internet Engineering Task Force) transferring multimedia applications such as voice, video standard communications protocol that is designed to allow and data needs the QoS support. Because Army moves mobile devices to move from one network to another while organizationally, nodes in Tactical Internet (TI) have the maintaining a permanent IP. Mobile IPv4 is described in characteristic of Group Mobility [5] and the topology of TI IETF RFC 3344 [2] and Mobile IPv6 is described in IETF is not change tempestuously in mostly time. TI is an RFC 3775 [3]. IPv6 is the next generation IP version important part of military applications using Ad Hoc designated as the successor to IPv4. The IPv4 uses 32-bit technology, which is the primary platform of tactical address space and IPv6 uses 128-bit address space. IPv4 communication in the future war. So it is meaningful to set and IPv6 have different address space and also different up the virtual circuit in TI, which not only provides end-to- header format. end QoS but also implements end-to-end compression of Whenever a packet is sent through the conventional packet header [6] to improve the efficiency of packet Mobile IP from the source to the destination, at each transmission. routers an extra information is added in order to identify © 2010 ACEEE 40 DOI: 01.IJNS.01.03.198
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 The success of virtual circuit in Mobile Ad hoc possible that any mobile router may leave from the NETworks (MANETs) closely depends on the scheme of established VC. In such case, the VC is re-established and resource reservation at the Media Access Control layer. the data transfer is resumed. After the completion of the QoS routing protocols search for routes with sufficient data transfer the VC will be terminated. resources for the QoS requirements, which work with the Steps involved in the strategy: resource management mechanisms to establish paths i. Determine number of channels in each link through the network that meets end-to-end QoS ii. Assign Virtual Circuit Identifier (VCI) for each requirements [6][7][8]. QoS routing is difficult in channel MANETs. The overhead is too high for the bandwidth iii. Establish the VC limited MANET because there need to be mechanisms for iv. Start data transmission a mobile node to store and update link information [9]. v. If any mobile router is away from the VC then re- Multicast service in virtual circuit networks requires a establish new VC communication path from a sending node to a certain vi. Resume the data transfer number of receiving nodes. Thus, multicast calls are vii. Terminate the VC after the completion of transfer simultaneously set up in several directions. Consequently, the service processes in these directions become mutually MN1 VCI:2 MN2 dependent and a blocking in one group influences a MR1 MR2 blocking in other groups participating in the connection [10]. Delay-Sensitive Mechanism to Establish Route MN1-N1 MN2-N1 Optimization (DeSMERO) helps to increase the Quality of Service (QoS) in mobile networks with respect to delay. MN1-N2 MN2-N2 The service providers can implement our idea to provide better QoSs to the customers for delay-sensitive VCI: 1 applications like video conferencing, telephony, etc., [11]. VCI: 2 A novel technique has been proposed to predict reason(s) for deterioration in the QoS and to identify the Figure 1. Example Mobile Network algorithm(s)/mechanism(s) responsible for the deterioration. It also gives better results to improve the QoS Fig. 1. shows the proposed strategy for a mobile and to improve the performance of the network [12]. network. The VC is established between MR1 (Mobile Each network has different raw radio rates and user Router 1) and MR2 (Mobile Router 2). Let us assume, the throughput. The actual throughput is always lesser than the link between MR1 and MR2 has 2 channels. A MN1-N1 raw radio data rates [13]. There is a great need to use (Mobile Network 1’s Node 1) can transfer data to MN2-N2 bandwidth effectively which in turn increases the via one channel and MN1-N2 (Mobile Network 1’s Node performance of the wireless network. In [14], detail 2) can transfer data to MN2-N1 via other channel. Each analysis of various internet applications and wireless mobile router maintains a table that has two major fields IN technologies with network parameters such as bandwidth, and OUT. The VCI is stored in these fields. The mobile radio rate, user throughput, type of duplex communication router directs the packets based on the information system was done. It also relates internet applications, available in the header and table. As the size of the packet wireless technologies and network parameters to use the header is 5 bytes, it is possible to transfer more packets via bandwidth effectively. VC. In other words, the bandwidth used by the control To sum up, providing QoS will be much more difficult data is greatly reduced from 40 bytes to 5 bytes. The in NEMO [15] (i.e. mobile network that supports network remaining bandwidth (35 bytes / packet) used by control mobility) and so many factors or parameters are involved data can be used to send more payload. to provide QoS in mobile networks. As the mobile wireless networks starve for bandwidth, it is appropriated to propose IV. RESULTS a technique to utilize the bandwidth effectively. In the conventional Mobile IP, the sizes of the packets are increased at each router by adding extra information III. A QOS STRATEGY like source and destination addresses. The additional bytes The proposed QoS strategy is based on ATM will increase the delay and cause ineffective bandwidth (Asynchronous Transfer Mode) networks. The header size utilization. These complexities will be further increased in of ATM is 5 bytes rather than 40 bytes in IP (Internet nested mobile networks. At each router the packets are Protocol)-based networks. The Virtual Circuit (VC) wrapped up with the header information in order to route approach uses the Identifier called as VCI (Virtual Circuit the packet to the next router. Each router has to check the Identifier) to establish a route between source and packets for the further action like deciding to which router destination. Whenever there is a request for the data it has to be sent. When the packet reaches corresponding transmission, a VC is established using VCIs. In other peer router, it will unwrap the header information. The words, the route is established during the call setup using process of unwrapping and wrapping of the packets the VCI that is assigned to the intermediate channels. Now, consume much time and causes more delay in the data all the packets are transferred via the established VC. It is transfer and also increases the load of the router. The © 2010 ACEEE 41 DOI: 01.IJNS.01.03.198
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 proposed strategy uses the essence of the VC switching. The proposed strategy using VC approach is shown in the Fig. 2. IN OUT IN OUT MN1-N1 1 MR2 2 MR1 2 MN2-N1 1 MN1 MN2 VCI:2 MR1 MR2 MN1-N1 MN2-N2 MN1-N2 MN2-N2 VCI: 1 VCI: 2 Figure 2. Proposed Method with VC Approach The VC routing table maintained at MR1 and MR2 is Figure 3. Bandwidth Utilization for Header Information given in Figure 2. It has two major fields such as IN and Figure 3 reveals that the existing approach uses 7 times OUT [1]. The IN and OUT field have two subfields such as of extra bandwidth for header information than proposed name of the node and VCI. If MN1-N1 wants to send data approach. The proposed strategy takes less time to process to MN2-N2, MN1-N1 establishes a VC from MN1-N1 a packet, reduces the overload of the mobile router. This MR1 MR2 MN2-N2. After VC is leads to effective utilization of bandwidth. established, data transfer will take place. Let assume that the link bandwidth is 1 MBps and Packet size is 512 bytes. The IP based network uses 40 CONCLUSIONS bytes for header and ATM based network uses 5 bytes for The great challenge for mobile networks is to provide header. Each packet saves 35 bytes and it can be used for QoS. Due to the mobile nature, providing QoS becomes payload. Using 1 MBps link bandwidth, 2048 packets of complex in mobile networks. As the users of mobile 512 bytes each can be transferred. In IP based network, 40 technology are increasing significantly, there is a great bytes header information is used for all 2048 packets. need to reduce the complexities involved in providing QoS. Consider the following calculation. There are various factors involved to provide QoS. One such factor is an effective utilization of bandwidth. The Number of packets (NP) = 2048 proposed QoS strategy uses VC approach in order to utilize IP header size (IPH) = 40B the bandwidth effectively. In other words, bandwidth ATM based network header size (ATMH) = 5B utilized by header information is greatly reduced and that bandwidth can be used by payload / data. The proposed Total bytes used by header information in IP-based QoS strategy helps to consume less time and causes network (IP_Total)= NP X IPH minimum delay in the data transfer and also reduces IP_Total= 2048 X 40B = 81920B overload of the router due to the minimum size of the header. Ultimately, it increases the throughput and Total bytes used by header information in ATM-based performance of the mobile networks. Though this paper network (ATM_Total) = NP X ATMH provides some advantages, it has weakness as well. Due to the mobile nature, the VC has to be re-established ATM_Total = 2048 X 5B = 10240B whenever a mobile node is away. Hence, IP_Total = 8 X ATM_Total The above calculation reveals that IP header information consumes 8 times of bandwidth than VC approach. In other words, 7 times of extra bandwidth can be saved if proposed QoS strategy is used. © 2010 ACEEE 42 DOI: 01.IJNS.01.03.198
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 REFERENCES [10] Yangang Wang, Zunming Lv, “Design and Simulation ofA Virtual Circuit Protocol Based on TDMA-based Tactical [1] Tanenbaum, “Computer Networks”, 4th Edition, pp 347-352 Internet Environment”, IEEE, 2008, pp.410-413. [2] Basavaraj Patil, Phil Roberts “IP Mobility Support for IPv4”, [11] Mariusz Gła˛bowski, Maciej Stasiak and Piotr RFC 3344, Aug. 2002 Zwierzykowski, “Virtual Circuit Switching Node with [3] David B. Johnson , Charles E. Perkins , Jari Arkko, Bandwidth Reservation and Multicast Connections”, “Mobility Support in IPv6”, RFC 3775, Jun. 2004 Proceedings of Asia-Pacific Conference on Communications, [4] Khaja Kamaluddin A, Muhammed Yousoof B, “Routing in Perth, Western Australia, 3 - 5 October 2005, pp.827-831. Mobile Wireless Networks for Realtime Multimedia [12] P. Calduwel Newton, J. Isac Gnanaraj, L. Arockiam, “A Applications – Reuse of Virtual Circuits”, Journal of World Delay-Sensitive Mechanism to Establish Route Optimization Academy of Science, Engineering and Technology, Vol. 11, in Mobile Networks”, International Journal of Future Nov. 2005, ISSN: 2070-3724. Generation Communication and Networking (ISSN : 1738- [5] X. Hong, M. Gerla, G.Pei, C.C.Chiang, "A Group Mobility 995x), Korea, Vol. 2, No.3, September 2009, pp.37-44. Model for Ad hoc Wireless Networks", Proceedings of [13] P. Calduwel Newton, L. Arockiam, “A Novel Prediction ACM/IEEE MSWiM'99, Aug. 1999, pp. 53-60. Technique to Improve Quality of Service (QoS) for [6] R.Sridharan,R.Sridhar,S.Mishra "A Robust Header Heterogeneous Data Traffic”, Journal of Intelligent Compression Technique for Wireless Ad Hoc Networks", Manufacturing (ISSN: 0956-5515 (Print) /1572-8145 MobiHoc'03[C], USA, June 2003. (Online)), Springer Netherlands, DOI 10.1007/s10845-009- [7] Jawhar I, Wu J. “Quality of Service Routing in Mobile Ad 0361-z, November 2009. Hoc Networks. Resource Management in Wireless [14] Kostas Pentikousis, ”Wireless Data Networks”, The Internet Networking”, Cardei M, Cardei I, Du D-Z (eds.), Journal of Protocol Journal, Volume 8, No.1, March 2005 Network Theory and Applications, Springer, 2005, pp.365- [15] J. Isac Gnanaraj, P. Calduwel Newton, L. Arockiam, “An 400. Efficient Analysis of Internet Applications with Wireless [8] C.R.Lin and C-C Liu,"An on-demand QoS routing protocol Technologies for Effective Utilisation of Bandwidth”, for mobile ad hoc networks", Proceedings of Conference Proceedings of International Conference on Advanced IEEE International Networks, 2000, pp.160 - 164. Computing, Macmillan Publishers, India, August 2009, pp. [9] Q.Xue, A.Ganz, "Ad hoc QoS on-demand routing (AQOR) 402-407. in mobile ad hoc networks", Journal of Parallel and [16] Vijay Devarapalli , Ryuji Wakikawa , Alexandru Petrescu, Distributed Computing, Vol.63, Issue 2, February 2003, Pascal Thubert, “Network Mobility (NEMO) Basic Support pp.154-165. Protocol”, RFC 3963, Jan. 2005 © 2010 ACEEE 43 DOI: 01.IJNS.01.03.198