SlideShare a Scribd company logo
1 of 7
Download to read offline
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
109
CONGESTION MANAGEMENT THROUGH MVCM AND
CONGESTION CONTROL BASED ON MOBILE AGENTS
Reshma Rajan1
, Jeena Kuriakose2
, Vidhya PM3
1, 2, 3
Department of CSE, SNGCE, Kadayiruppu, Kerala, India
ABSTRACT
Contention between several packets trying to use the same link/channel in a network is the major cause for
congestion. When congestion appears, the network will come to a state where a node or link carries so much data that it
may deteriorate network service quality; resulting in queuing delay, frame or data packets loss and the blocking of new
connections. Congestion Management and control in network is a serious problem. Most of the congestion management
mechanisms try to adjust packet injection rate at the source, in response to the explicit congestion Notifications.
Although these mechanisms are effective there are not able to completely manage the heavy load on the network or
having some drawbacks. This paper focus on mechanism referred to as Marking and Validation Congestion Management
(MVCM). It is always better to take care that the congestion does not happen in network than to have to solve the
problem afterwards. So this paper also uses a Mobile Agent based congestion control technique along with MVCM.
Main aim of MVCM is to properly identify the flows responsible for congestion, by using a more refined packet marking
strategy and then performs necessary corrective actions.
Keywords: AODV Routing Protocol, Congestion, Head-Of-Line (HOL), Mobile Agent (MA), Total Congestion Metric
(TCM).
1. INTRODUCTION
Mobile networks are infrastructure-less network. The nodes in the networks are free to move and thus change
the network topology. Packets are send from source node to destination node by forwarding the packets to neighboring
nodes. These packets are forwarded through the channels to and from each node[1]
. Packets arriving at each node will be
buffered and then forwarded. There may chance of congestion when there are many packets injected to the network than
the network can handle. This may cause packet loss and degrading network performance. Obstruction occurs due to the
packet losses and controlling these obstructions in mobile ad-hoc networks are a key problem. It can be reduced by
involving congestion control and management.
Once congestion is detected in a network, and if it remains for long, packets start accumulate at the queues. As a
consequence advancing of packets at the previous nodes are also get delayed. If this condition persists for long time, will
generate Head-of-Line (HOL) blocking phenomenon- Which prevents forwarding of packets to noncongested links. The
result is that the overall network performance will be low[2]
. So we have to apply congestion management mechanisms in
order to reduce injection rate of packets to the flows that are responsible for congestion. When congestion is detected,
packets are marked to warn the source hosts to reduce the flow. In response the source hosts apply some corrective
actions.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 109-115
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
110
We all know that prevention is better than cure, so it is better to avoid the chance of congestion to occur. So
Congestion control mechanisms are needed. Shared wireless channel and dynamic topology of mobile ad-hoc network
increases the chance of congestion. Congestion control mechanisms include routing algorithms and a flow control. In
order to balance the network load and the performance stable, routing nodes load and congestion degree in network is
taken into consideration.
2. BACKGROUND
Fig.1 shows the process of generating congestion in a network
(a) (b)
(c)
Fig.1: generation of congestion process
Fig.1 shows the process of generating congestion in a network. Fig.1(a) shows the initial situation for three
different flows (f1, f2, and f3) crossing the node N. Packets belongs to the flow f1 cross the node from the input channel
IC1 to the output channel OC1. The flow f2 forwards from ICn to OC1, and the flow f3 from ICn to OCn. Suppose the
combined input traffic rate for f1+f2 flows is greater than the bandwidth of the output channel OC1. In such a situation,
packets belonging to the flows f1 and f2 will have to compete for the output channel OC1 and, it may results in the start
of accumulation of packets in the output buffer as shown in Fig.1(b). If the situation remains for long, and f1, f2, f3 flows
are continue being injecting packets into the node, packets may start to accumulate at the input buffer, spreading the
congestion along them[3]
. A possible congestion situation is shown in Fig.1(c). Since the incoming packets are stopped at
the input buffer of the channel ICn, the Head of Line blocking phenomenon appears. This may cause advancing packets
belonging to the flow f3 and addressed towards the noncongested channel OCn. In effect the node as well as the overall
network performance will be degraded. If this situation persists, congestion will be spread along previous nodes, stopping
and accumulating packet at those output buffers.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
111
3. PROBLEM DISCOVERY AND PROPOSED SYSTEM OVERVIEW
Ad-hoc networks consist of randomly varying network architecture. So adhoc networks require a dynamic
routing protocol that can work with this randomly varying environment. Congestion control[4]
deals with controlling the
incoming traffic to a network. Congestion control and dependability mechanism in association with TCP[5]
is used for
controlling congestion[6]
, and it is not providing information or feedback about the position where congestion occurs. The
drawbacks of a congestion non-adaptive routing protocols is long delay, high overhead and many packet losses[7]
. Packet
loss occurs due to the delay in congestion. This problem can be overcome by using congestion-adaptive routing
protocols-AODV[8].
Ad-hoc On-demand Distance Vector routing (AODV) protocol is a better solution to use for
controlling the packet loss.
Each node in AODV maintains a sequence number[9].
When there is a variation in local connectivity information
of a node, the sequence number is incremented. The fact that the routes are loop-free is promised by these sequence
numbers. A mobile agent based congestion control AODV routing protocol is used here. Some mobile agents inthe
network are collected and these mobile agents aids in selecting the next hop and less loaded neighbor nodes are selected
as next hop.
There can be a possibility for the congestion controlling mechanism to fail. If any congestion appears in the
network, it is necessary to get back the network to its normal performance. So we need efficient congestion management
mechanisms that are able to detect congestion early and to apply appropriate corrective actions that will avoid HOL
blocking and throughput degradation. Current approaches for CMM (Congestion Management Mechanism) do not
guarantee the fact that the corrective actions are carried out on only those packet flows that results congestion.
3.1 Basic strategies applied by current CMMs
Packets provoking congestion are marked by setting 1 bit in the packet header. There are mainly two packet
marking techniques used[10]
.
3.1.1 IPM (Input Packet Marking) Strategy
This strategy is based on marking packets at input buffers. Before packets are stopped and marked, the
congestion tree need to grow at least until reaching the input buffer of the congested node, as shown in Fig1. The
drawback of this strategy is delay. IPM produces a delay, because an output buffer needs to be completely filled before
any input buffer detects congestion. In Fig.1(c), without considering the destination, packets belonging to the flows f2
and f3 are marked. The strategy doesn’t check whether packets are addressed to the congested link OC1 or to non
congested link OCn..Therefore IPM is not much effective because of two drawbacks. First, a delay in detecting
congestion and second an incorrect identification of flows truly causing congestion.
3.1.2 OPM (Output Packet Marking) Strategy
Packets are marked at the output buffer. Consider Fig. 1(b); packets belonging to the flows f1 and f2 are marked
since they are addressed to the congested link OC1. These packets are marked when the output buffer occupancy exceeds
the threshold which is predefined. The contention in this node has been triggered by the flows f1 and f2, those sharing the
congested output link, are responsible for this congestion regardless of their final destination. OPM strategy is not able to
detect whether congestion is affecting other flows which are non responsible for congestion or not. But OPM detects
congestion sooner than IPM.
4. MOBILE AGENT BASED CONGESTION CONTROL AND ROUTING
In mobile agent (MA) based congestion control [11]
,the mobile agents are moves through the network. They
collect and distribute the information about network congestion. They carry routing information and nodes congestion
status within the network.
4.1 Mobile Agent (MA)
Mobile Agent[12]
visits each node in the network. Each node maintains a routing table with k fresh information
records from itself to every other node in the network. Each node id indicated as [S,{(Tci, NHi, ANi, NPi)…..(Tcm, NHm,
ANm, NPm)}] where Tc1 >Tc2 >……>Tm .
m- number of entries and For each i(1 ≤i ≤ m) ,
Tci-time of visiting the adjacent node ANi,
NHi- number of hops
NPi- number of MAs on ANi.
When MA with the history (S,Tc, NH, AN, NP) visits a node N , then the routing information of the node[S,{(Tci, NHi,
ANi, NPi)….(Tcm, NHm, ANm, NPm)}] is updated to[ S;{ ( Tc, NH; AN, NP ),( Tci, NHi, ANi, NPi, NPi)…….( Tcm-1,
NHm-1, ANm-1, NPm-1 ) } ]
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
112
4.2. Total Congestion Metric (TCM)
Mobile agent calculates TCM of each path from source to destination, and selects the path with minimum TCM
value for routing. TCM can be obtained from the estimated queue length and the channel contention.
4.2.1 Queue Length Estimation
The distribution of the queue length PR(Q1), indicates the probability that there are Q1 packets in the queue:
(1)
where Loi represent the offered load at the queue of node i:
(2)
where ARi is aggregate arrival rate of packets produced and forwarded at node i and SRi is the service rate at
node i.
4.2.2 Channel Contention Estimation
Channel occupation due to contention is:
(3)
where,
tRTS= time consumed on Request To Send
tCTS=time consumed on Clear to Send
tSIFS = Short Inter Frame Space(SIFS) period.
Tacc= Time taken due to access contention.
Total congestion metric:
(4)
4.2.3 Architecture
Fig.2: Mobile Agent based congestion control Architectural diagram
This works as follows-
Mobile agent travels to the available one hop neighbors of source S. Then MA selects the shortest path to
destination D. MA1 Moves towards the destination D in a hop-hop manner through the path P1 and MA2 through path
P2. Then MA1 Calculates the total congestion metric TCM1 of path P1, and MA2 calculates that of P2. After calculating
the destination D sends the total congestion metric TCM1 And TCM2 to source S. Source selects path with minimum
value of TCM, that is min(TCM1,TCM2) and sends the packets through that path.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
113
5. MARKING AND VALIDATION CONGESTION MANAGEMENT MECHANISM
Main aim of Marking and Validation Congestion Management (MVCM)[10]
is to correctly identify the packet
flows that are truly responsible for the congestion in the network and apply the packet injection limitation only at source
nodes that are actually causing congestion.
5.1 Congestion Detection
MVCM mechanism uses a new packet marking strategy by taking the benefits of both Input Packet Marking
strategy and Output Packet Marking strategy; referred as Marking and Validation Packet Marking strategy (MVPM).
MVPM based on the fact that packets are marked at the input buffer and are validated at the output buffers. When the
number of packets in the input buffer exceeds the threshold[13]
, packets arriving to the buffer are marked by setting the
marking bit (MB) in the packet header. When packets are addressed to saturated output link, they are validated by
activating an validation bit (VB) in the packet header. Only marked flows are getting validated.
5.2 Congestion Correction
Two phases of corrective actions are applied in MVCM. These actions are according to the type of flow
classified by MVPM. In the first phase of actions, packet injection rate is reduced by adjusting the dynamic window size.
If congestion persists after window size is fixed to one, then second phase of actions applied, that will reduce even more
the packet injection rate by introducing a waiting interval in between two consecutive packets.
Table 1: Flow classifications and corrective actions
ACK bits
MB VB Types of
flows
Actions
0 0 Cold-flows no actions
1 0 Warm-
flows
Moderate
1 1 Hot-flows Imminent
Cold flows-Flows those are non responsible for congestion.
Hot flows-Flows truly responsible for congestion
Warm flows- flows that are cold flows at the beginning but become hot flows as the congestion spread along the
network.
Moderate Actions-Moderate actions are applied to warm flows. Dynamic window (DW) is modified by reducing its
current value by subtracting one per each marked bit. When window size reaches value equal to one, that is the minimum
value, and then no additional actions are performed. It remains in that stage until a nonmarked ACK packet come. Then
the window size will be increased by one by one.
Imminent Actions - Imminent actions are meant for hot flows. At the beginning this mechanism react by reducing the
window size as moderate actions do. If more and more validated packets are receiving continually, second phase of
actions are applied. Introducing a Waiting Slot (WS) between two consecutive injected packets in such a way that every
received ACK packet with both marking and validation bits set will increase the number of waiting slot.
Window size is initialized according to the minimum RTT (Round Trip Time) of packets. RTTmin= time required by the
data packet to reach destination (tdata) + time required to receive ACK at the origin.( tack) :
(5)
(6)
where
h- no of network hops
thop – routing + switching + link delays.
Ldata–length of data packet
Lack –length of ack packet
B- Channel bandwidth
(7)
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
114
Optimum value of window size will be imposed by the maximum number of packets that can be sent by the
source during the time interval. Window size:
(8)
(9)
where (2* h* t hop *B +Lack ) results in a constant K.So window size can be bounded by the maximum and minimum
allowed data packet sizes:
≤ W ≤
Waiting interval is calculated as follows:
• In the absence of congestion, total number of waiting slots (number_WS) = 0.
• When first ACK with MB and VB bits set arrives, then number_WS =1.
• If more validated ACK received, then number_WS is increased by a constant K..
• Number_WScurrent = K * number_WSprevious assume that WS equal to RTTmin, thenWaiting Interval =
number_WScurrent * RTTmin (10).
5. CONCLUSIONS
In this paper, Mobile Agent based Congestion Control and Marking and Validation Congestion Management
mechanisms are used. Mobile Agents (MA) visits every node in the network, each time when a MA visits a node, it
brings its own history of movements and update the routing table of the node. Total Congestion Metric comprises of
queue length and channel contention of each path, is applied to the routing protocol to select the minimum congested
route in the network. Thus delay and packet loss will be reduced. If any congestion happens then it can be managed by
using Marking and Validation Congestion Management Mechanism. This mechanism is characterized by an effective
packet marking strategy and a fair set of corrective actions. The main advantage of Marking and Validation Packet
Marking strategy is the ability to detect different levels of congestion by classifying the network flows. Further packet
injection limitation is applied with proper intensity according to the level of congestion, thus avoiding the negative
effects over the flows nonresponsible for congestion. As a result recourses are evenly distributed among the network
nodes. Both Congestion Control and Management Mechanisms improve the network throughput and performance.
REFERENCES
[1] Baboo, S.S., Narasimhan, B.:A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile
Ad-hoc Networks. International Journal of Computer Science and Information Security. (2009).
[2] Lochert, C., Scheuermann, B., Mauve, M.: A Survey on Congestion Control for Mobile Ad-Hoc Networks.
Wireless Communications and Mobile Computing, InterScience. (2007).
[3] P. Garcia, J. Flich, J. Duato, I. Johnson, F. Quiles, and F. Naven, “Dynamic Evolution of Congestion Trees:
Analysis and Impact on Switch Architecture,” Proc. Int’l Symp. HiPEAC, 2005.
[4] http://www.linktionary.com/c/congestion.html.
[5] Lien, Y.N., Hsiao, H.C.: A New TCP Congestion Control Mechanism over Wireless Ad Hoc Networks by
Router-Assisted Approach. 27th IEEE International Conference on Distributed Computing Systems
Workshops. (2007).
[6] http://en.wikipedia.org/wiki/Congestion_control.
[7] Tran, D.A., Raghavendra, H.: Congestion Adaptive Routing in Mobile Ad Hoc Networks. IEEE Transactions
on Parallel and Distributed Systems. (2006).
[8] Chen, X., Jones, H.M., Jayalath, A.D.S.: Congestion-Aware Routing Protocol for Mobile AdHoc Networks.
IEEE 66th Conference in Vehicular Technology. (2007).
[9] Elizabeth M. Royer,P. Michael Melliar-Smith,and Louise E. “Moser, An Analysis of the Optimum Node
Density forAd hoc Mobile Networks”.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
115
[10] Joan-LluisFerrer, Elvira Baydal, Antonio Robles, Pedro Lopez and Jose Duato “Progressive Congestion
Management Based on Packet Marking and Validation Techniques” IEEE Transactions on Computers, VOL
61, NO 9, September 2012.
[11] Vishnu Kumar Sharma and Dr. Saritha Singh Bhadauria, “Mobile Agent Based Congestion Control using
AODV Routing Protocol Technique for Mobile Ad-hoc Network” International Journal of Wireless & Mobile
Networks (IJWMN) Vol. 4, No. 2, April 2012.
[12] BhadauriaSS, SharmaV., Framework and Implementation of an Agent Based Congestion Control Technique
for Mobile Ad-hoc Network ,ICAC3 2011, CCIS 125, pp. 318–327, 2011.
[13] P. Devkota and A. Reddy, “Performance of Quantized Congestion Notification in TCP in cast Scenarios of
Data Centers,” Proc. IEEE Int’l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm.
Systems (MASCOTS), 2010.
[14] Poonam Pahuja and Dr. Tarun Shrimali, “Routing Management for Mobile Ad-Hoc Networks”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 464 - 468, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.
[15] Jyoti Attri and Suman Kumari, “Enhanced Power-Aware Hybrid Intrusion Detection Architecture in an Ad-
Hoc Network using Mobile Agents”, International journal of Computer Engineering & Technology (IJCET),
Volume 5, Issue 7, 2014, pp. 85 - 92, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.IRJET Journal
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Eiko Seidel
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...CSCJournals
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...TELKOMNIKA JOURNAL
 
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
 
Protocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX NetworkProtocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX Networkidescitation
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETIRJET Journal
 

What's hot (20)

Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
 
B04502005008
B04502005008B04502005008
B04502005008
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...Reduce the probability of blocking for handoff and calls in cellular systems ...
Reduce the probability of blocking for handoff and calls in cellular systems ...
 
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...
 
Protocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX NetworkProtocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX Network
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 

Viewers also liked

Plano estadual de_saude_2012-2015__2_
Plano estadual de_saude_2012-2015__2_Plano estadual de_saude_2012-2015__2_
Plano estadual de_saude_2012-2015__2_Via Seg
 
Новый год
Новый годНовый год
Новый годSchool1195
 
Tics en la enseñanza aprendizaje
Tics en la enseñanza  aprendizajeTics en la enseñanza  aprendizaje
Tics en la enseñanza aprendizajeLilai Lazo
 
new in windows 10
new in windows 10new in windows 10
new in windows 10ehabksa
 
M S Azure
M S AzureM S Azure
M S Azureehabksa
 
John Lewis WP Recommendation
John Lewis WP RecommendationJohn Lewis WP Recommendation
John Lewis WP RecommendationMoghis Khan
 
Academic approaches to games
Academic approaches to gamesAcademic approaches to games
Academic approaches to gamesZoya Street
 
Forbes Insights-The Age of Brand, Agency & Customer Collaboration
Forbes Insights-The Age of Brand, Agency & Customer CollaborationForbes Insights-The Age of Brand, Agency & Customer Collaboration
Forbes Insights-The Age of Brand, Agency & Customer CollaborationPeerasak C.
 
Histéria da enfemagem
Histéria da enfemagemHistéria da enfemagem
Histéria da enfemagemAdhonias Moura
 
Sistema nervioso en el Caballo embriologia y transtornos
Sistema nervioso en el Caballo embriologia y transtornos Sistema nervioso en el Caballo embriologia y transtornos
Sistema nervioso en el Caballo embriologia y transtornos ALEXANDER HERNANDEZ
 
Community based natural resource management
Community based natural resource managementCommunity based natural resource management
Community based natural resource managementKherlen Shinebayar
 

Viewers also liked (16)

NCME 2015 Hurtz Brown
NCME 2015 Hurtz BrownNCME 2015 Hurtz Brown
NCME 2015 Hurtz Brown
 
Plano estadual de_saude_2012-2015__2_
Plano estadual de_saude_2012-2015__2_Plano estadual de_saude_2012-2015__2_
Plano estadual de_saude_2012-2015__2_
 
Новый год
Новый годНовый год
Новый год
 
Tics en la enseñanza aprendizaje
Tics en la enseñanza  aprendizajeTics en la enseñanza  aprendizaje
Tics en la enseñanza aprendizaje
 
new in windows 10
new in windows 10new in windows 10
new in windows 10
 
M S Azure
M S AzureM S Azure
M S Azure
 
John Lewis WP Recommendation
John Lewis WP RecommendationJohn Lewis WP Recommendation
John Lewis WP Recommendation
 
Academic approaches to games
Academic approaches to gamesAcademic approaches to games
Academic approaches to games
 
What Makes Pieter Baert Horny?
What Makes Pieter Baert Horny?What Makes Pieter Baert Horny?
What Makes Pieter Baert Horny?
 
Forbes Insights-The Age of Brand, Agency & Customer Collaboration
Forbes Insights-The Age of Brand, Agency & Customer CollaborationForbes Insights-The Age of Brand, Agency & Customer Collaboration
Forbes Insights-The Age of Brand, Agency & Customer Collaboration
 
Histéria da enfemagem
Histéria da enfemagemHistéria da enfemagem
Histéria da enfemagem
 
2015 GS Caltex Solvent Catalog
2015 GS Caltex Solvent Catalog2015 GS Caltex Solvent Catalog
2015 GS Caltex Solvent Catalog
 
Sistema nervioso en el Caballo embriologia y transtornos
Sistema nervioso en el Caballo embriologia y transtornos Sistema nervioso en el Caballo embriologia y transtornos
Sistema nervioso en el Caballo embriologia y transtornos
 
Shoulder region
Shoulder regionShoulder region
Shoulder region
 
Community based natural resource management
Community based natural resource managementCommunity based natural resource management
Community based natural resource management
 
Plasticidad Neural
Plasticidad NeuralPlasticidad Neural
Plasticidad Neural
 

Similar to Congestion management through mvcm and congestion control based on mobile agents

A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
 
Adaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksAdaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksijwmn
 
congestion control.pdf
congestion control.pdfcongestion control.pdf
congestion control.pdfJayaprasanna4
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV          A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV IRJET Journal
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...csandit
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...AIRCC Publishing Corporation
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...ijcsit
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...eSAT Journals
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREDEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREVLSICS Design
 

Similar to Congestion management through mvcm and congestion control based on mobile agents (20)

A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsn
 
Adaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksAdaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networks
 
congestion control.pdf
congestion control.pdfcongestion control.pdf
congestion control.pdf
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
I1102014953
I1102014953I1102014953
I1102014953
 
A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV          A Review on Congestion Control using AODV and Enhance AODV
A Review on Congestion Control using AODV and Enhance AODV
 
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...
 
A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...A fuzzy based congestion controller for control and balance congestion in gri...
A fuzzy based congestion controller for control and balance congestion in gri...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREDEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Congestion management through mvcm and congestion control based on mobile agents

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 109 CONGESTION MANAGEMENT THROUGH MVCM AND CONGESTION CONTROL BASED ON MOBILE AGENTS Reshma Rajan1 , Jeena Kuriakose2 , Vidhya PM3 1, 2, 3 Department of CSE, SNGCE, Kadayiruppu, Kerala, India ABSTRACT Contention between several packets trying to use the same link/channel in a network is the major cause for congestion. When congestion appears, the network will come to a state where a node or link carries so much data that it may deteriorate network service quality; resulting in queuing delay, frame or data packets loss and the blocking of new connections. Congestion Management and control in network is a serious problem. Most of the congestion management mechanisms try to adjust packet injection rate at the source, in response to the explicit congestion Notifications. Although these mechanisms are effective there are not able to completely manage the heavy load on the network or having some drawbacks. This paper focus on mechanism referred to as Marking and Validation Congestion Management (MVCM). It is always better to take care that the congestion does not happen in network than to have to solve the problem afterwards. So this paper also uses a Mobile Agent based congestion control technique along with MVCM. Main aim of MVCM is to properly identify the flows responsible for congestion, by using a more refined packet marking strategy and then performs necessary corrective actions. Keywords: AODV Routing Protocol, Congestion, Head-Of-Line (HOL), Mobile Agent (MA), Total Congestion Metric (TCM). 1. INTRODUCTION Mobile networks are infrastructure-less network. The nodes in the networks are free to move and thus change the network topology. Packets are send from source node to destination node by forwarding the packets to neighboring nodes. These packets are forwarded through the channels to and from each node[1] . Packets arriving at each node will be buffered and then forwarded. There may chance of congestion when there are many packets injected to the network than the network can handle. This may cause packet loss and degrading network performance. Obstruction occurs due to the packet losses and controlling these obstructions in mobile ad-hoc networks are a key problem. It can be reduced by involving congestion control and management. Once congestion is detected in a network, and if it remains for long, packets start accumulate at the queues. As a consequence advancing of packets at the previous nodes are also get delayed. If this condition persists for long time, will generate Head-of-Line (HOL) blocking phenomenon- Which prevents forwarding of packets to noncongested links. The result is that the overall network performance will be low[2] . So we have to apply congestion management mechanisms in order to reduce injection rate of packets to the flows that are responsible for congestion. When congestion is detected, packets are marked to warn the source hosts to reduce the flow. In response the source hosts apply some corrective actions. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 109-115 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 110 We all know that prevention is better than cure, so it is better to avoid the chance of congestion to occur. So Congestion control mechanisms are needed. Shared wireless channel and dynamic topology of mobile ad-hoc network increases the chance of congestion. Congestion control mechanisms include routing algorithms and a flow control. In order to balance the network load and the performance stable, routing nodes load and congestion degree in network is taken into consideration. 2. BACKGROUND Fig.1 shows the process of generating congestion in a network (a) (b) (c) Fig.1: generation of congestion process Fig.1 shows the process of generating congestion in a network. Fig.1(a) shows the initial situation for three different flows (f1, f2, and f3) crossing the node N. Packets belongs to the flow f1 cross the node from the input channel IC1 to the output channel OC1. The flow f2 forwards from ICn to OC1, and the flow f3 from ICn to OCn. Suppose the combined input traffic rate for f1+f2 flows is greater than the bandwidth of the output channel OC1. In such a situation, packets belonging to the flows f1 and f2 will have to compete for the output channel OC1 and, it may results in the start of accumulation of packets in the output buffer as shown in Fig.1(b). If the situation remains for long, and f1, f2, f3 flows are continue being injecting packets into the node, packets may start to accumulate at the input buffer, spreading the congestion along them[3] . A possible congestion situation is shown in Fig.1(c). Since the incoming packets are stopped at the input buffer of the channel ICn, the Head of Line blocking phenomenon appears. This may cause advancing packets belonging to the flow f3 and addressed towards the noncongested channel OCn. In effect the node as well as the overall network performance will be degraded. If this situation persists, congestion will be spread along previous nodes, stopping and accumulating packet at those output buffers.
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 111 3. PROBLEM DISCOVERY AND PROPOSED SYSTEM OVERVIEW Ad-hoc networks consist of randomly varying network architecture. So adhoc networks require a dynamic routing protocol that can work with this randomly varying environment. Congestion control[4] deals with controlling the incoming traffic to a network. Congestion control and dependability mechanism in association with TCP[5] is used for controlling congestion[6] , and it is not providing information or feedback about the position where congestion occurs. The drawbacks of a congestion non-adaptive routing protocols is long delay, high overhead and many packet losses[7] . Packet loss occurs due to the delay in congestion. This problem can be overcome by using congestion-adaptive routing protocols-AODV[8]. Ad-hoc On-demand Distance Vector routing (AODV) protocol is a better solution to use for controlling the packet loss. Each node in AODV maintains a sequence number[9]. When there is a variation in local connectivity information of a node, the sequence number is incremented. The fact that the routes are loop-free is promised by these sequence numbers. A mobile agent based congestion control AODV routing protocol is used here. Some mobile agents inthe network are collected and these mobile agents aids in selecting the next hop and less loaded neighbor nodes are selected as next hop. There can be a possibility for the congestion controlling mechanism to fail. If any congestion appears in the network, it is necessary to get back the network to its normal performance. So we need efficient congestion management mechanisms that are able to detect congestion early and to apply appropriate corrective actions that will avoid HOL blocking and throughput degradation. Current approaches for CMM (Congestion Management Mechanism) do not guarantee the fact that the corrective actions are carried out on only those packet flows that results congestion. 3.1 Basic strategies applied by current CMMs Packets provoking congestion are marked by setting 1 bit in the packet header. There are mainly two packet marking techniques used[10] . 3.1.1 IPM (Input Packet Marking) Strategy This strategy is based on marking packets at input buffers. Before packets are stopped and marked, the congestion tree need to grow at least until reaching the input buffer of the congested node, as shown in Fig1. The drawback of this strategy is delay. IPM produces a delay, because an output buffer needs to be completely filled before any input buffer detects congestion. In Fig.1(c), without considering the destination, packets belonging to the flows f2 and f3 are marked. The strategy doesn’t check whether packets are addressed to the congested link OC1 or to non congested link OCn..Therefore IPM is not much effective because of two drawbacks. First, a delay in detecting congestion and second an incorrect identification of flows truly causing congestion. 3.1.2 OPM (Output Packet Marking) Strategy Packets are marked at the output buffer. Consider Fig. 1(b); packets belonging to the flows f1 and f2 are marked since they are addressed to the congested link OC1. These packets are marked when the output buffer occupancy exceeds the threshold which is predefined. The contention in this node has been triggered by the flows f1 and f2, those sharing the congested output link, are responsible for this congestion regardless of their final destination. OPM strategy is not able to detect whether congestion is affecting other flows which are non responsible for congestion or not. But OPM detects congestion sooner than IPM. 4. MOBILE AGENT BASED CONGESTION CONTROL AND ROUTING In mobile agent (MA) based congestion control [11] ,the mobile agents are moves through the network. They collect and distribute the information about network congestion. They carry routing information and nodes congestion status within the network. 4.1 Mobile Agent (MA) Mobile Agent[12] visits each node in the network. Each node maintains a routing table with k fresh information records from itself to every other node in the network. Each node id indicated as [S,{(Tci, NHi, ANi, NPi)…..(Tcm, NHm, ANm, NPm)}] where Tc1 >Tc2 >……>Tm . m- number of entries and For each i(1 ≤i ≤ m) , Tci-time of visiting the adjacent node ANi, NHi- number of hops NPi- number of MAs on ANi. When MA with the history (S,Tc, NH, AN, NP) visits a node N , then the routing information of the node[S,{(Tci, NHi, ANi, NPi)….(Tcm, NHm, ANm, NPm)}] is updated to[ S;{ ( Tc, NH; AN, NP ),( Tci, NHi, ANi, NPi, NPi)…….( Tcm-1, NHm-1, ANm-1, NPm-1 ) } ]
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 112 4.2. Total Congestion Metric (TCM) Mobile agent calculates TCM of each path from source to destination, and selects the path with minimum TCM value for routing. TCM can be obtained from the estimated queue length and the channel contention. 4.2.1 Queue Length Estimation The distribution of the queue length PR(Q1), indicates the probability that there are Q1 packets in the queue: (1) where Loi represent the offered load at the queue of node i: (2) where ARi is aggregate arrival rate of packets produced and forwarded at node i and SRi is the service rate at node i. 4.2.2 Channel Contention Estimation Channel occupation due to contention is: (3) where, tRTS= time consumed on Request To Send tCTS=time consumed on Clear to Send tSIFS = Short Inter Frame Space(SIFS) period. Tacc= Time taken due to access contention. Total congestion metric: (4) 4.2.3 Architecture Fig.2: Mobile Agent based congestion control Architectural diagram This works as follows- Mobile agent travels to the available one hop neighbors of source S. Then MA selects the shortest path to destination D. MA1 Moves towards the destination D in a hop-hop manner through the path P1 and MA2 through path P2. Then MA1 Calculates the total congestion metric TCM1 of path P1, and MA2 calculates that of P2. After calculating the destination D sends the total congestion metric TCM1 And TCM2 to source S. Source selects path with minimum value of TCM, that is min(TCM1,TCM2) and sends the packets through that path.
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 113 5. MARKING AND VALIDATION CONGESTION MANAGEMENT MECHANISM Main aim of Marking and Validation Congestion Management (MVCM)[10] is to correctly identify the packet flows that are truly responsible for the congestion in the network and apply the packet injection limitation only at source nodes that are actually causing congestion. 5.1 Congestion Detection MVCM mechanism uses a new packet marking strategy by taking the benefits of both Input Packet Marking strategy and Output Packet Marking strategy; referred as Marking and Validation Packet Marking strategy (MVPM). MVPM based on the fact that packets are marked at the input buffer and are validated at the output buffers. When the number of packets in the input buffer exceeds the threshold[13] , packets arriving to the buffer are marked by setting the marking bit (MB) in the packet header. When packets are addressed to saturated output link, they are validated by activating an validation bit (VB) in the packet header. Only marked flows are getting validated. 5.2 Congestion Correction Two phases of corrective actions are applied in MVCM. These actions are according to the type of flow classified by MVPM. In the first phase of actions, packet injection rate is reduced by adjusting the dynamic window size. If congestion persists after window size is fixed to one, then second phase of actions applied, that will reduce even more the packet injection rate by introducing a waiting interval in between two consecutive packets. Table 1: Flow classifications and corrective actions ACK bits MB VB Types of flows Actions 0 0 Cold-flows no actions 1 0 Warm- flows Moderate 1 1 Hot-flows Imminent Cold flows-Flows those are non responsible for congestion. Hot flows-Flows truly responsible for congestion Warm flows- flows that are cold flows at the beginning but become hot flows as the congestion spread along the network. Moderate Actions-Moderate actions are applied to warm flows. Dynamic window (DW) is modified by reducing its current value by subtracting one per each marked bit. When window size reaches value equal to one, that is the minimum value, and then no additional actions are performed. It remains in that stage until a nonmarked ACK packet come. Then the window size will be increased by one by one. Imminent Actions - Imminent actions are meant for hot flows. At the beginning this mechanism react by reducing the window size as moderate actions do. If more and more validated packets are receiving continually, second phase of actions are applied. Introducing a Waiting Slot (WS) between two consecutive injected packets in such a way that every received ACK packet with both marking and validation bits set will increase the number of waiting slot. Window size is initialized according to the minimum RTT (Round Trip Time) of packets. RTTmin= time required by the data packet to reach destination (tdata) + time required to receive ACK at the origin.( tack) : (5) (6) where h- no of network hops thop – routing + switching + link delays. Ldata–length of data packet Lack –length of ack packet B- Channel bandwidth (7)
  • 6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 114 Optimum value of window size will be imposed by the maximum number of packets that can be sent by the source during the time interval. Window size: (8) (9) where (2* h* t hop *B +Lack ) results in a constant K.So window size can be bounded by the maximum and minimum allowed data packet sizes: ≤ W ≤ Waiting interval is calculated as follows: • In the absence of congestion, total number of waiting slots (number_WS) = 0. • When first ACK with MB and VB bits set arrives, then number_WS =1. • If more validated ACK received, then number_WS is increased by a constant K.. • Number_WScurrent = K * number_WSprevious assume that WS equal to RTTmin, thenWaiting Interval = number_WScurrent * RTTmin (10). 5. CONCLUSIONS In this paper, Mobile Agent based Congestion Control and Marking and Validation Congestion Management mechanisms are used. Mobile Agents (MA) visits every node in the network, each time when a MA visits a node, it brings its own history of movements and update the routing table of the node. Total Congestion Metric comprises of queue length and channel contention of each path, is applied to the routing protocol to select the minimum congested route in the network. Thus delay and packet loss will be reduced. If any congestion happens then it can be managed by using Marking and Validation Congestion Management Mechanism. This mechanism is characterized by an effective packet marking strategy and a fair set of corrective actions. The main advantage of Marking and Validation Packet Marking strategy is the ability to detect different levels of congestion by classifying the network flows. Further packet injection limitation is applied with proper intensity according to the level of congestion, thus avoiding the negative effects over the flows nonresponsible for congestion. As a result recourses are evenly distributed among the network nodes. Both Congestion Control and Management Mechanisms improve the network throughput and performance. REFERENCES [1] Baboo, S.S., Narasimhan, B.:A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks. International Journal of Computer Science and Information Security. (2009). [2] Lochert, C., Scheuermann, B., Mauve, M.: A Survey on Congestion Control for Mobile Ad-Hoc Networks. Wireless Communications and Mobile Computing, InterScience. (2007). [3] P. Garcia, J. Flich, J. Duato, I. Johnson, F. Quiles, and F. Naven, “Dynamic Evolution of Congestion Trees: Analysis and Impact on Switch Architecture,” Proc. Int’l Symp. HiPEAC, 2005. [4] http://www.linktionary.com/c/congestion.html. [5] Lien, Y.N., Hsiao, H.C.: A New TCP Congestion Control Mechanism over Wireless Ad Hoc Networks by Router-Assisted Approach. 27th IEEE International Conference on Distributed Computing Systems Workshops. (2007). [6] http://en.wikipedia.org/wiki/Congestion_control. [7] Tran, D.A., Raghavendra, H.: Congestion Adaptive Routing in Mobile Ad Hoc Networks. IEEE Transactions on Parallel and Distributed Systems. (2006). [8] Chen, X., Jones, H.M., Jayalath, A.D.S.: Congestion-Aware Routing Protocol for Mobile AdHoc Networks. IEEE 66th Conference in Vehicular Technology. (2007). [9] Elizabeth M. Royer,P. Michael Melliar-Smith,and Louise E. “Moser, An Analysis of the Optimum Node Density forAd hoc Mobile Networks”.
  • 7. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 115 [10] Joan-LluisFerrer, Elvira Baydal, Antonio Robles, Pedro Lopez and Jose Duato “Progressive Congestion Management Based on Packet Marking and Validation Techniques” IEEE Transactions on Computers, VOL 61, NO 9, September 2012. [11] Vishnu Kumar Sharma and Dr. Saritha Singh Bhadauria, “Mobile Agent Based Congestion Control using AODV Routing Protocol Technique for Mobile Ad-hoc Network” International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012. [12] BhadauriaSS, SharmaV., Framework and Implementation of an Agent Based Congestion Control Technique for Mobile Ad-hoc Network ,ICAC3 2011, CCIS 125, pp. 318–327, 2011. [13] P. Devkota and A. Reddy, “Performance of Quantized Congestion Notification in TCP in cast Scenarios of Data Centers,” Proc. IEEE Int’l Symp. Modeling, Analysis, and Simulation of Computer and Telecomm. Systems (MASCOTS), 2010. [14] Poonam Pahuja and Dr. Tarun Shrimali, “Routing Management for Mobile Ad-Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 464 - 468, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [15] Jyoti Attri and Suman Kumari, “Enhanced Power-Aware Hybrid Intrusion Detection Architecture in an Ad- Hoc Network using Mobile Agents”, International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 7, 2014, pp. 85 - 92, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.