SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
HOP-BY-HOP ROUTING IN WIRELESS MESH
NETWORKS WITH BANDWIDTH GUARANTEES
ABSTRACT
Wireless Mesh Network (WMN) has become an important edge network to provide
Internet access to remote areas and wireless connections in a metropolitan scale. In this paper,
we study the problem of identifying the maximum available bandwidth path, a fundamental issue
in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-
known bottleneck metric in wired networks, is neither concave nor additive in wireless networks.
We propose a new path weight which captures the available path bandwidth information. We
formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the
consistency and loop-freeness requirements. The consistency property guarantees that each node
makes a proper packet forwarding decision, so that a data packet does traverse over the intended
path. Our extensive simulation experiments also show that our proposed path weight outperforms
existing path metrics in identifying high-throughput paths.
EXISTING SYSTEM:
Wireless Mesh Network has become an important edge network to provide Internet
access to remote areas and wireless connections in a metropolitan scale. We study the problem of
identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-
service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric
in wired networks, is neither concave nor additive in wireless networks.
Seeking the path with the maximum available bandwidth is one of the fundamental issues for
supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the
maximum additional rate a flow can push before saturating its path.
DISADVANTAGES:
 Identifying the maximum available bandwidth path from a source to destination.
PROPOSED SYSTEM:
We propose a new path weight that captures the concept of available bandwidth. We give
the mechanism to compare two paths based on the new path weight. We formally prove
that the proposed path weight is left-isotonic.
We describe how to construct the routing table and distance table, and we develop a hop-
by-hop packet forwarding scheme. We formally prove that our routing protocol satisfies
the optimality and consistency requirements.
Finally, we implement our routing protocol based on the DSDV protocol in the NS2
simulator. The extensive simulation experiments demonstrate that our routing protocol
outperforms the existing routing protocols for finding the maximum available bandwidth
paths.
ADVANTAGES:
Our routing protocol satisfies the optimality and consistency requirements.
Finds the maximum available bandwidth paths.
INTRODUCTION
Awareness mesh network (WMN) consists of a large number of wireless nodes. The
nodes form a wireless overlay to cover the service area while a few nodes are wired to the
Internet. As part of the Internet, WMN has to support diversified multimedia applications for its
users. It is essential to provide efficient Quality-of-Service (QoS) support in this kind of
networks. Seeking the path with the maximum available bandwidth is one of the fundamental
issues for supporting QoS in the wireless mesh networks. The available path bandwidth is
defined as the maximum additional rate a flow can push before saturating its path. Therefore, if
the traffic rate of a new flow on a path is no greater than the available bandwidth of this path,
accepting the new traffic will not violate the bandwidth guaranteed of the existing flows. This
paper focuses on the problem of identifying the maximum available bandwidth path from a
source to a destination, which is also called the Maximum Bandwidth Problem (MBP). MBP is a
sub problem of the Bandwidth-Constrained Routing Problem (BCRP), the problem of identifying
a path with at least a given amount of available bandwidth. In the literatures, maximum available
bandwidth path is also called widest path.
Finding the widest path between the source and the destination in wireless networks is very
challenging due to the wireless transmission interference. Generally speaking, there are two
types of interference: interflow interference and interflow interference. Interflow interference
refers to the situation that the resource available for a flow is affected by the presence of other
flows. In other words, the interflow interference affects the amount of residual channel resources
on each link that can be allocated for a new flow. The work gives how to estimate the available
bandwidth (residual channel resources) of each link. It means that if the link has to carry another
1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can
be at most the available bandwidth of the link. On the other hand, interflow interference refers to
the scenario where when a data packet is being transmitted on a link along a path, some link
along the path has to remain idle to avoid conflict. Interflow interference complicates the process
of developing hop-by-hop routing protocol for finding widest paths. Considering interflow
interference, the works present a formula to compute the available bandwidth of a path with the
knowledge of the available bandwidth on individual links of the path. Unfortunately, finding
widest path in a hop-by-hop manner is still not solved.
The unique structure of the path bandwidth computation formula introduces two challenges
described below:
1. Some nodes may not find the widest path if only the available bandwidth is used as the routing
metric.
2. Even though a source identifies a widest path to a destination, intermediate nodes on the
widest path may not make a consistent packet forwarding decisions by using the traditional
destination-based hop-by-hop packet forwarding mechanism.
MODULES:
 Path Selection
We would like to develop a distance-vector based mechanism. In the traditional distance-
vector mechanism, a node only has to advertise the information of its own best path to its
neighbors. Each neighbor can then identify its own best path. If a node only advertises the widest
path from its own perspective, its neighbors may not be able to find the widest path. In order to
assure that the widest path from each node to a destination can be identified, a trivial way is to
advertise all the possible paths to a destination. This is definitely too expensive. On the other
hand, as long as we advertise every path which is a sub path of a widest path (e.g., <v; a; b; c; d>
is a sub path of the widest path of <s; v; a; b; c; d>), we allow every node to identify its own
widest path. Thus, to reduce the overhead, we should not advertise those paths that would not be
a sub path of any widest path.
 Isotonic Path Weight
We introduce our new isotonic path weight, while the next section describes how we use
the path weight to construct routing tables. The is tonicity property of a path weight is the
necessary and sufficient condition for developing a routing protocol satisfying the optimality and
consistency requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better
than p2 by comparing their weights. If the path weight used is left-isotonic, given any path p0
from a node v to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is
not left isotonic.
 Table Construction and Optimality
The is tonicity property of the proposed path weight allows us to develop a routing
protocol that can identify the maximum bandwidth path from each node to each destination. In
particular, it tells us whether a path is worthwhile to be advertised, meaning whether a path is a
potential sub path of a widest path. In our routing protocol, if a node finds a new nondominated
path, it will advertise this path information to its neighbors. We call the packet carrying the path
information the route packet. Based on the information contained in a route packet, each node
knows the information about the first four hops of a path identified.
Each node keeps two tables: distance table and routing table. Node s puts all the nondominated
paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found
by s itself in its routing table.
 Packet Forwarding and Consistency
In a traditional hop-by-hop routing protocol, a packet carries the destination of the
packet, and when a node receives a packet, it looks up the next hop by the destination only. In
our mechanism, apart from the destination, a packet also carries a Routing Field which specifies
the next four hops the packet should traverse. When a node receives this packet, it identifies the
path based on the information in the Routing Field. It updates the Routing Field and sends it to
the next hop. In our packet forwarding mechanism, each intermediate node determines the fourth
next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism
still requires each intermediate node to make route decision based on its routing table. Besides,
only the information of the first few hops of a path is kept in the routing table in each node and
the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a
hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme.
 Route Update
After the network accepts a new flow or releases an existing connection, the local
available bandwidth of each node will change, and thus the widest path from a source to a
destination may be different. When the change of the local available bandwidth of a node is
larger than a threshold (say 10 percent), the node will advertise the new information to its
neighbors. After receiving the new bandwidth information, the available bandwidth of a path to a
destination may be changed. Although the node is static, the network state information changes
very often. Therefore, our routing protocol applies the route update mechanism in DSDV . Based
on DSDV, each routing entry is tagged with a sequence number which is originated by the
destination, so that nodes can quickly distinguish stale routes from the new ones. Each node
periodically transmits updates and transmits updates immediately when significant new route
information is available. Given two route entries from a source to a destination, the source
always selects the one the larger sequence number, which is newer, to be kept in the routing
table. Only if two entries have the same sequence number, our path comparison is used to
determine which path should be kept. Due to the delay of the route update propagation, it is
possible that route information kept in some nodes is inconsistent. For instance, the widest path
kept in the routing table may not be the widest anymore. Routing loops may occur as well. The
situations are referred as inconsistency due to transient route updates, which is different from the
definition used in. In and this paper, we consider whether packets can be routed on the computed
widest path when the routing tables are stable. How to avoid loops when routing tables change is
an important but difficult problem, and is outside the scope of this paper. We refer readers to
[29] for the techniques to reduce route update inconsistencies in the distance-vector protocol
which can be applied in our mechanism as well.
System Requirements:
SOFTWARE Requirements
 PLATFORM : JDK 1.5
 TOOL : Java Swing
 DATABASES : SQL Server
HARDARE Requirements
 PROCESSOR : PENTIUM IV 2.6 GHz
 RAM : 512 MB DD RAM
 MONITOR : 15” COLOR
 HARD DISK : 40 GB
 KEYBOARD : STANDARD 102 KEYS
 MOUSE : 3 BUTTON
REFERENCES
[1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multichip Wireless
Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008.
[2] T. Salonidis, M. Garrett, A. Sasha, and E. Knightly, “Identifying High Throughput Paths in
802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols
(ICNP ’07), pp. 21-30, Oct. 2007.
[3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem
in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp.
4-14, Jan. 2008.
[4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in
Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005.
[5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,”
IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009.
[6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel
Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53,
Apr. 2009.
[7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless
Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008.
[29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector
Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994.
CONCLUSION
In this paper, we studied the maximum available bandwidth path problem, which is a
fundamental issue to support quality-of-service in wireless mesh networks. The main
contribution of our work is a new left-isotonic path weight which captures the available path
bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to
develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol
satisfies the optimality and consistency requirements. Based on the available path bandwidth
information, a source can immediately determine some infeasible connection requests with the
high bandwidth requirement. We tested the performance of our protocol under different
scenarios.

Mais conteúdo relacionado

Mais procurados

Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...ijsrd.com
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...IOSR Journals
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationProf Ansari
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 

Mais procurados (16)

ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...Analysis of Selfish behavior in energy consumption model based Multihop cellu...
Analysis of Selfish behavior in energy consumption model based Multihop cellu...
 
G343741
G343741G343741
G343741
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 

Destaque

Hat giong tam hon 9
Hat giong tam hon 9Hat giong tam hon 9
Hat giong tam hon 9Đặng Vui
 
A distortion resistant routing framework for videotraffic in wireless multiho...
A distortion resistant routing framework for videotraffic in wireless multiho...A distortion resistant routing framework for videotraffic in wireless multiho...
A distortion resistant routing framework for videotraffic in wireless multiho...Shakas Technologies
 
Secrets Of A Social Media Campaign by Matt Astifan
Secrets Of A Social Media Campaign by Matt AstifanSecrets Of A Social Media Campaign by Matt Astifan
Secrets Of A Social Media Campaign by Matt AstifanDavid Doyle
 
Hanh phuc tai tam
Hanh phuc tai tamHanh phuc tai tam
Hanh phuc tai tamĐặng Vui
 
African Origins of Soccer Research Paper (1)
African Origins of Soccer Research Paper (1)African Origins of Soccer Research Paper (1)
African Origins of Soccer Research Paper (1)Jamar Harp
 
Gestió riscos centres educatius segons ISO 9001
Gestió riscos centres educatius segons ISO 9001Gestió riscos centres educatius segons ISO 9001
Gestió riscos centres educatius segons ISO 9001José A. Andrés Villena
 
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuong
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuongTruoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuong
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuongkhosachdientu2015
 
Session 1 - Keynote Presentation by Jan Rotmans
Session 1 - Keynote Presentation by Jan RotmansSession 1 - Keynote Presentation by Jan Rotmans
Session 1 - Keynote Presentation by Jan RotmansOECD Environment
 
ISO 9001:2015 SGQ interpretació per a centres educatius
ISO 9001:2015 SGQ interpretació per a centres educatiusISO 9001:2015 SGQ interpretació per a centres educatius
ISO 9001:2015 SGQ interpretació per a centres educatiusProjecte de Qualitat
 

Destaque (11)

Hat giong tam hon 9
Hat giong tam hon 9Hat giong tam hon 9
Hat giong tam hon 9
 
A distortion resistant routing framework for videotraffic in wireless multiho...
A distortion resistant routing framework for videotraffic in wireless multiho...A distortion resistant routing framework for videotraffic in wireless multiho...
A distortion resistant routing framework for videotraffic in wireless multiho...
 
Mat day tam den
Mat day tam denMat day tam den
Mat day tam den
 
Secrets Of A Social Media Campaign by Matt Astifan
Secrets Of A Social Media Campaign by Matt AstifanSecrets Of A Social Media Campaign by Matt Astifan
Secrets Of A Social Media Campaign by Matt Astifan
 
Hanh phuc tai tam
Hanh phuc tai tamHanh phuc tai tam
Hanh phuc tai tam
 
African Origins of Soccer Research Paper (1)
African Origins of Soccer Research Paper (1)African Origins of Soccer Research Paper (1)
African Origins of Soccer Research Paper (1)
 
Gestió riscos centres educatius segons ISO 9001
Gestió riscos centres educatius segons ISO 9001Gestió riscos centres educatius segons ISO 9001
Gestió riscos centres educatius segons ISO 9001
 
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuong
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuongTruoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuong
Truoc tien hay-pha-bo-nhung-le-thoi-tu-duy-thong-thuong
 
ABA Techniques
ABA TechniquesABA Techniques
ABA Techniques
 
Session 1 - Keynote Presentation by Jan Rotmans
Session 1 - Keynote Presentation by Jan RotmansSession 1 - Keynote Presentation by Jan Rotmans
Session 1 - Keynote Presentation by Jan Rotmans
 
ISO 9001:2015 SGQ interpretació per a centres educatius
ISO 9001:2015 SGQ interpretació per a centres educatiusISO 9001:2015 SGQ interpretació per a centres educatius
ISO 9001:2015 SGQ interpretació per a centres educatius
 

Semelhante a Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-phpapp02

2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...IEEEFINALSEMSTUDENTSPROJECTS
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...ijwmn
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathIMPULSE_TECHNOLOGY
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 

Semelhante a Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-phpapp02 (20)

2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
 
D017252327
D017252327D017252327
D017252327
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
9517cnc06
9517cnc069517cnc06
9517cnc06
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Mais de Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

Mais de Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Último

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Último (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-phpapp02

  • 1. HOP-BY-HOP ROUTING IN WIRELESS MESH NETWORKS WITH BANDWIDTH GUARANTEES ABSTRACT Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well- known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth information. We formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the consistency and loop-freeness requirements. The consistency property guarantees that each node makes a proper packet forwarding decision, so that a data packet does traverse over the intended path. Our extensive simulation experiments also show that our proposed path weight outperforms existing path metrics in identifying high-throughput paths. EXISTING SYSTEM: Wireless Mesh Network has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. We study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of- service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. DISADVANTAGES:
  • 2.  Identifying the maximum available bandwidth path from a source to destination. PROPOSED SYSTEM: We propose a new path weight that captures the concept of available bandwidth. We give the mechanism to compare two paths based on the new path weight. We formally prove that the proposed path weight is left-isotonic. We describe how to construct the routing table and distance table, and we develop a hop- by-hop packet forwarding scheme. We formally prove that our routing protocol satisfies the optimality and consistency requirements. Finally, we implement our routing protocol based on the DSDV protocol in the NS2 simulator. The extensive simulation experiments demonstrate that our routing protocol outperforms the existing routing protocols for finding the maximum available bandwidth paths. ADVANTAGES: Our routing protocol satisfies the optimality and consistency requirements. Finds the maximum available bandwidth paths. INTRODUCTION Awareness mesh network (WMN) consists of a large number of wireless nodes. The nodes form a wireless overlay to cover the service area while a few nodes are wired to the Internet. As part of the Internet, WMN has to support diversified multimedia applications for its users. It is essential to provide efficient Quality-of-Service (QoS) support in this kind of networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a path is no greater than the available bandwidth of this path, accepting the new traffic will not violate the bandwidth guaranteed of the existing flows. This
  • 3. paper focuses on the problem of identifying the maximum available bandwidth path from a source to a destination, which is also called the Maximum Bandwidth Problem (MBP). MBP is a sub problem of the Bandwidth-Constrained Routing Problem (BCRP), the problem of identifying a path with at least a given amount of available bandwidth. In the literatures, maximum available bandwidth path is also called widest path. Finding the widest path between the source and the destination in wireless networks is very challenging due to the wireless transmission interference. Generally speaking, there are two types of interference: interflow interference and interflow interference. Interflow interference refers to the situation that the resource available for a flow is affected by the presence of other flows. In other words, the interflow interference affects the amount of residual channel resources on each link that can be allocated for a new flow. The work gives how to estimate the available bandwidth (residual channel resources) of each link. It means that if the link has to carry another 1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can be at most the available bandwidth of the link. On the other hand, interflow interference refers to the scenario where when a data packet is being transmitted on a link along a path, some link along the path has to remain idle to avoid conflict. Interflow interference complicates the process of developing hop-by-hop routing protocol for finding widest paths. Considering interflow interference, the works present a formula to compute the available bandwidth of a path with the knowledge of the available bandwidth on individual links of the path. Unfortunately, finding widest path in a hop-by-hop manner is still not solved. The unique structure of the path bandwidth computation formula introduces two challenges described below: 1. Some nodes may not find the widest path if only the available bandwidth is used as the routing metric. 2. Even though a source identifies a widest path to a destination, intermediate nodes on the widest path may not make a consistent packet forwarding decisions by using the traditional destination-based hop-by-hop packet forwarding mechanism.
  • 4. MODULES:  Path Selection We would like to develop a distance-vector based mechanism. In the traditional distance- vector mechanism, a node only has to advertise the information of its own best path to its neighbors. Each neighbor can then identify its own best path. If a node only advertises the widest path from its own perspective, its neighbors may not be able to find the widest path. In order to assure that the widest path from each node to a destination can be identified, a trivial way is to advertise all the possible paths to a destination. This is definitely too expensive. On the other hand, as long as we advertise every path which is a sub path of a widest path (e.g., <v; a; b; c; d> is a sub path of the widest path of <s; v; a; b; c; d>), we allow every node to identify its own widest path. Thus, to reduce the overhead, we should not advertise those paths that would not be a sub path of any widest path.  Isotonic Path Weight We introduce our new isotonic path weight, while the next section describes how we use the path weight to construct routing tables. The is tonicity property of a path weight is the necessary and sufficient condition for developing a routing protocol satisfying the optimality and consistency requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better than p2 by comparing their weights. If the path weight used is left-isotonic, given any path p0 from a node v to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is not left isotonic.  Table Construction and Optimality The is tonicity property of the proposed path weight allows us to develop a routing protocol that can identify the maximum bandwidth path from each node to each destination. In particular, it tells us whether a path is worthwhile to be advertised, meaning whether a path is a potential sub path of a widest path. In our routing protocol, if a node finds a new nondominated path, it will advertise this path information to its neighbors. We call the packet carrying the path information the route packet. Based on the information contained in a route packet, each node knows the information about the first four hops of a path identified.
  • 5. Each node keeps two tables: distance table and routing table. Node s puts all the nondominated paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found by s itself in its routing table.  Packet Forwarding and Consistency In a traditional hop-by-hop routing protocol, a packet carries the destination of the packet, and when a node receives a packet, it looks up the next hop by the destination only. In our mechanism, apart from the destination, a packet also carries a Routing Field which specifies the next four hops the packet should traverse. When a node receives this packet, it identifies the path based on the information in the Routing Field. It updates the Routing Field and sends it to the next hop. In our packet forwarding mechanism, each intermediate node determines the fourth next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism still requires each intermediate node to make route decision based on its routing table. Besides, only the information of the first few hops of a path is kept in the routing table in each node and the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme.  Route Update After the network accepts a new flow or releases an existing connection, the local available bandwidth of each node will change, and thus the widest path from a source to a destination may be different. When the change of the local available bandwidth of a node is larger than a threshold (say 10 percent), the node will advertise the new information to its neighbors. After receiving the new bandwidth information, the available bandwidth of a path to a destination may be changed. Although the node is static, the network state information changes very often. Therefore, our routing protocol applies the route update mechanism in DSDV . Based on DSDV, each routing entry is tagged with a sequence number which is originated by the destination, so that nodes can quickly distinguish stale routes from the new ones. Each node periodically transmits updates and transmits updates immediately when significant new route
  • 6. information is available. Given two route entries from a source to a destination, the source always selects the one the larger sequence number, which is newer, to be kept in the routing table. Only if two entries have the same sequence number, our path comparison is used to determine which path should be kept. Due to the delay of the route update propagation, it is possible that route information kept in some nodes is inconsistent. For instance, the widest path kept in the routing table may not be the widest anymore. Routing loops may occur as well. The situations are referred as inconsistency due to transient route updates, which is different from the definition used in. In and this paper, we consider whether packets can be routed on the computed widest path when the routing tables are stable. How to avoid loops when routing tables change is an important but difficult problem, and is outside the scope of this paper. We refer readers to [29] for the techniques to reduce route update inconsistencies in the distance-vector protocol which can be applied in our mechanism as well. System Requirements: SOFTWARE Requirements  PLATFORM : JDK 1.5  TOOL : Java Swing  DATABASES : SQL Server HARDARE Requirements  PROCESSOR : PENTIUM IV 2.6 GHz  RAM : 512 MB DD RAM  MONITOR : 15” COLOR  HARD DISK : 40 GB  KEYBOARD : STANDARD 102 KEYS  MOUSE : 3 BUTTON
  • 7. REFERENCES [1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multichip Wireless Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. [2] T. Salonidis, M. Garrett, A. Sasha, and E. Knightly, “Identifying High Throughput Paths in 802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’07), pp. 21-30, Oct. 2007. [3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 4-14, Jan. 2008. [4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. [5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. [6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, Apr. 2009. [7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. [29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994. CONCLUSION In this paper, we studied the maximum available bandwidth path problem, which is a fundamental issue to support quality-of-service in wireless mesh networks. The main contribution of our work is a new left-isotonic path weight which captures the available path bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol satisfies the optimality and consistency requirements. Based on the available path bandwidth
  • 8. information, a source can immediately determine some infeasible connection requests with the high bandwidth requirement. We tested the performance of our protocol under different scenarios.