SlideShare a Scribd company logo
1 of 9
Download to read offline
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 111
Fuzzy Optimized Metric for Adaptive Network Routing
Ahmad Khader Haboush ahmad_ram2001@yahoo.com
Computer Science Department
Jerash University
jerash, 26150, Jordan
Abstract
In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each
candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp
values of the different metrics; a fuzzy membership function is defined. The parameters of these
membership functions reflect dynamically the requirement of the incoming traffic service as well
as the current state of the links in the path. And this paper investigates how three metrics, the
mean link bandwidth, queue utilization and the mean link delay, can be related using a simple
fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more
‘precise’ than either of the single metric, to solve routing problem .
Keywords: Adaptive Routing, Fuzzy logic, Short Path Routing Control, Link Cost, Network
Routing.
1. INTRODUCTION
Today network routing algorithms used to calculate least cost (shortest) paths between nodes.
The cost of a path is the sum of the cost of all links on that path. The cost of a link can be static (a
function of the link) or dynamic (a function of the link and its dynamic state). The paths for routing
that, using dynamic cost metrics can be recomputed based on prevailing traffic patterns to
reduce congestion, packet delay, and packet drops[1].
To reflect the actual state of the link, the use of a single metric for adaptive routing is insufficient.
As Known, there is a limitation on the accuracy of the link state information obtained by the
routing protocol [2, 3], as the accuracy of the metric is usually predetermined by the network state
update interval [4]. But better when two or more metrics can be associated to produce a single
metric that can describe the state of the link more accurately.
In 1965 Zadeh initiated the fuzzy set theory [5, 6], for solving problems that are either difficult to
tackle mathematically or when we need to improved performance, we can use Fuzzy logic. In
communication systems there are Many design and control problems are indeed well suited for
analysis using fuzzy logic.
In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each
candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp
values of the different metrics, a fuzzy membership function is defined .The parameters of these
membership functions reflect dynamically the requirement of the incoming traffic service as well
as the current state of the links in the path .
The remainder of the paper is organized as follows: Section 2 presents network model and
problem formulation. Key ideas of our approach are presented in Section 3. Section Simulation
results are shown in Section 4. Finally, Section 5 concludes the paper.
2. NETWORK MODEL AND PROBLEM FORMULATION
A network can be modeled as a graph G = V, E. Where (V) is the set of nodes represent
switches, routers and hosts. Edges (E) represent a set of communication links. That is, for node i
and j in V, the link li,j is in E if i and j are directly connected in G. Each link li,j in E is associated
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 112
with a primary cost parameter In our discussion, we assume that each link li, j is associated with a
link metric vector Wi,j = { W1, W2, W3} , in which Wi is an individual link metric.
2.1 Link Metrics
In shortest path routing algorithms link costs can be assigned dynamically and statically. The
simplest of all the metrics is the hop count. Delay, bandwidth of the link, Queue size, propagation
delay and some of the other metrics The selection of the routing metrics substantially affects the
performance parameters of the routing algorithms. The most common metrics are the bandwidth,
packet delay, queuing delay, and packet loss [7].
The packet delay, also known as latency, consists of three different types, namely, serialization
delay, propagation delay, and switching delay. Serialization delay, also called transmission delay,
is the time it takes a device to synchronize a packet on a specified output rate. This transmission
delay is a function of the bandwidth and the packet size[ 8].
ttra = Lp / B (1)
Where ttra represent link transmission packet delay, Lp packet length in bits and B the bandwidth
in bit/sec.
Propagation delay is the time it takes a bit to travel from a transmitter to a receiver. Physics set
upper limits on the speed of such a bit, making at best a fraction of the speed of light. Hence,
propagation delay is a function of the distance traveled and the link medium.
tpro = Bd/V (2)
Where d represents link length and V is the light velocity.
Switching delay is the time lag between receiving a packet and starting to retransmit it. The
switching delay is a function of the device speed which is small and can be neglect.
Transmission delay of the link is the major routing link metric. A useful way of looking at this is to
consider link length as compared to the typical frame transmitted. The length of the link,
expressed in bite, compared to the length of the typical frame is usually denoted by W1:
W1 = (length of link in bits) / (length of frame) (3)
Some manipulation shows that [8,9 ] :
W1 =propagation time / transition time (4)
Typical values of delay factor W1 range from about 0.01 to 0.1 for LNDs and 0.01 to over 1 for
other.
In addition to those three types of delay, other delays also contribute to the overall performance
of the network.. When the network is congested, queues will build up at the routers and start
affecting the end-to-end delays [10]. Queuing delay may be negligible when the network is fast
and not experiencing congestion. However, when the network is congested, the queuing delay
grows and becomes significant. The number of packets in a queue is a random variable and its
distribution depends on γ, the ratio of arrival rate to service rate. The probability p of having n
packets in the queue is computed as follows:
P(n) = ( 1 – γ ) x γn
(5)
The queuing utilization w1 is the ratio of the queue size to queue capacity Q. Queue size defines
the buffer length at the node and it refers to the number of packets waiting to get processed. The
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 113
queue size is a function of the number of packets n currently in the queue and packets length Lp
per second. The queuing utilization W2 can be computed as follows:
W2= n Lp / Q (6)
The values of w2 thus range from 0 to 1.
The term bandwidth defines the transmission capacity of an electronic line [11]. Theoretically, it
describes the range of possible transmission rates, or frequencies [12]. The significance of a link
bandwidth is that it determines the link capacity, which is the maximum information rate that can
be transmitted [13].
Each link in the network has residual bandwidth property. The residual bandwidth R is defined as
the difference between the link bandwidth B and the sum of the bandwidths of all the paths
already assigned to that link[16]. But to make the analysis completely independent of the actual
link rat, the residual bandwidth is expressed in a dimensionless normalized form:
W3 = R / B (7)
The value of W3 also ranged from 0 to 1.
To calculate least cost paths between nodes, we used the network routing algorithms. The cost of
a path is the sum of the cost of all links on that path. The use of a single metric for adaptive
routing is insufficient to reflect the actual state of the link. As known, for the link state information
obtained by the routing protocol there is a limitation on the accuracy. But to describe the state of
the link more accurately, if the above three metrics can be associated to produce a single metric.
2.2 Optimized Metric
Metrics combination reduces the complexity of the routing algorithm problem by combining more
metrics in a single metric and then using a traditional shortest-path algorithm to compute the path
that minimizes the resulting metric. In this work we combine the three above metrics in single
optimal one [17].
Every link has a state measured by the difference metrics of concern. In Figure 1, the link state is
a triple consisting of delay factor, Queue utilization and residual bandwidth. Every node also has
a state.
The node state can be measured by combined into the state of the adjacent links or,
independently in this paper,. For the latter case, the residual bandwidth is the minimal of the link
bandwidth; the delay of a link consists of the link transmission delay and the queuing delay at the
node; the cost of a link is determined by the total resource consumption at the link and the node.
FIGURE 1: Network state
As we will shown later link metrics (bandwidth, delay ,and queue utilization) will be consider as
input to fuzzy system and the output will be as metric which will represent optimized metric ( link
cost).
•
•
•
•
•
• (1. 2, .2, .5)
(.2, .2, .1)
(.2, .1, .1)
(.2, .2, .3)
(15, 2, 63)
(.5, .2 ,.3)
(1, .6, .1)
(2, .1, .2) l
ji
k
ts
( w1, w2, w3 )
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 114
3. THE FUZZY APPROACH DESCRIPTION
A fuzzy system [14, 15] is a rule-based system. The aim of a fuzzy system is to substitute for or
replace a skilled human operator with a fuzzy rule-based system. Based on the current state of a
system, and to guarantee that it is optimal in some certain senses, an inference engine equipped
with a fuzzy rule base determines an on-line decision to adjust the system.
The design process of a fuzzy control system consists of a the following steps. The first step is to
define the input variables and the control variables. The input variables may be fuzzy or crisp.
Each variable must be quantified; and, the variable temperature may be quantified as cold, warm,
or hot.
Each quantification of the variable is assigned a membership function. A for each quantification of
the input and control variables, must be design a fuzzy rules base. These rules base determine
what control actions take place under what input conditions. The rules are written in an if-then
format. To determine the fuzzy control action, an approximate reasoning method must be used.
The approximate reasoning method provides a means of activating the fuzzy rule base. A to
evaluate the individual if-then rules in the rule base, implication formula is used, but to aggregate
the rule results to yield a fuzzy output set, we use A composition .
The structure of fuzzy system translates inferring stage of metrics optimization processing
knowledge, and combines fuzzy rules with a inference mechanism into a unified model. In this
paper, two sets of rules were used: Fuzzy Rules base 1 and base 2, relationships between these
two rules base and all variable used in fuzzy system can be represented best by hierarchical
structure shown in Figure 2.
FIGURE 2: Hierarchical structure fuzzy system
3.1 Membership Functions
The implication formula provides a membership function that measures the degree of truth of the
implication relation (i.e., the “if then” rule) between the input and output variables. One frequently
used implication formula is that of Mamdani. Let a fuzzy rule be stated as follows:
if x is A, then y is N.
The implication formulas of Mamdani are as follows:
Rule Base 2: link cost Evaluation
Delay
factor(W1)
Queue
Utilize (W2)
Rule Base 1: Link delay Evaluation
Link delay Bandwidth (W3)
Optimal cost
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 115
µA → N (x,y)= µA(x) Λ µN(y) (8)
Where µA(x) is the membership of x in A, µN(y) is the membership of y in N, µA → N (x,y) is the
membership of the implication relation between x and y, and Λis the minimum operator.
In this paper, the membership functions for the fuzzy sets are chosen to be triangular and
trapezoidal fuzzy numbers to express linguistic terms. To describe the fuzzy rules, we use L, M, H
to indicate "Low", "Medium", and "High".
Trapezoidal membership functions were used for the linguistic variables that represent delay
factor and queue utilization. The trapezoidal membership function is specified by low, medium
and high as shown in Figure 3 and 4. The universes of discourse for the fuzzy delay factor were
chosen [0, 10].
FIGURE 3: Link Delay membership function FIGURE 4: Queue utilization membership function
Triangular membership functions were used for the linguistic variables that represent link delay,
bandwidth and link cost. The triangular membership function is specified as shown in Figure 5
and 6.
FIGURE 5: Queue utilization membership FIGURE 6: Bandwidth and Optimal cost membership
Membership Function Link Bandwidth
DegreeofMembership
Link Bandwidth and optimal cost
Low HighMedium
70% 100%
0
1.0
5
highmediumlow
.1 1 10.001
DegreeofMembership
Membership Function delay
factor
Delay factor
Membership Function Queue utilization
DegreeofMembership
Queue utilization
Low Medium High
50% 100%
1.0
0
highmediumlow
50% 100%0
DegreeofMembership
Membership Function like
delay
Link Delay
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 116
3.2 The Fuzzy Inference System
A fuzzy system is characterized by a set of linguistic statement based on expert knowledge. The
expert knowledge is usually in the form of “if-then” rule, which are easily implemented by fuzzy
condition statement in fuzzy logic. The collection of fuzzy control rules that are expressed as
fuzzy inference system [7].
In this paper, two sets of rules were used: Fuzzy Rules Set 1 and Set 2, as summarized in the
rule matrix on the tables 1 and 2 respectively. Table 1 illustrates the rule base 1 used in the fuzzy
inference system. Expert knowledge was used in developing the rule base. While the delay factor
and Q-utilization are represented in the X and Y-axis’s respectively, the link delay fills the table.
The reason that the fuzzy rules in Set 1 below having a symmetrical output responses
with respect to input conditions was simply for simplicity and was later used as a input variable for
the Fuzzy Rules Set 2. The two input parameters, link delay and link bandwidth, for the Fuzzy
Rules Set 2 were described in table 2. This gave a 3-by-3 matrix, with the columns
representing “Low”, “Medium” and “High” Link bandwidth, and the rows representing “Low”,
“Medium” and “High” link delay, as shown in table 2 below. The output parameter, namely
the fuzzy metric, was described using 3 variables also: Low, Medium and High.
TABLE 1: Rule Base1. TABLE 2: Rule Base1.
Using the rule-based structure of fuzzy logic, a series of IF X AND Y THEN Z rules were defined
for the output response given the input conditions. With a 3-by-3 rule matrix as above, there were
nine possible logical products (AND) output response conclusions:
The proposed approach is generic and should be easily modified to fit with different routing
metrics. The fuzzy control method used is the one proposed by Momdani, which is the most
widely used in fuzzy control [7]. Mamdani implication is used to represent the meaning of “if-then”
rules. This kind of implication is most popular in the fuzzy control field because it is
computationally simple and fits various practical applications.
A defuzzification method is then applied to the fuzzy control action to produce a crisp control
action. One simple and frequently used defuzzification method is then applied to the fuzzy control
action to produce a crisp control action. Center of Area Method (COA) is used as a defuxxification
method to produce the crisp (nonfuzzy) cost output.
In the COA method, the weighted strengths of each output variable were multiplied by their
respective output variable center points and summed. The area was then divided by the sum of
the weighted member function strengths and the result was taken as the crisp output.
4. THE ROUTING MODEL
There are generally two kinds of fuzzy logic controllers. One is feedback controller, which is not
suitable for the high performance communication networks. Another one, which is used in this
paper, is shown in Figure 7. This control mechanism is different from the conventional feedback
control and considered as an adaptive control.
To design the fuzzy controller, we need to explore the implicit and explicit relationships within the
system and subsequently develop the optimal fuzzy control rules as well as the knowledge base.
Q-utilization
Delay factor
H M L
H H H H
M H M M
L H M L LinkDelay
Link Bandwidth
L M H
L L M H
M M M H
H M H H
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 117
FIGURE 1: The fuzzy system
Figure 7 contains the different component of the routing system used to rout the incoming flows.
This system is based on the fuzzy inference system discussed in previous section.
The process of applying the rules and membership function is a combination of four sub-
processes: fuzzification, inference, composition and defuzzification.
5. APPLICATION RESULTS
The network model used for testing the fuzzy metrics is adapted from Balakrishnan et. al. [18],
and it is shown in Figure 8.
FIGURE 8: Experimental communication network topology [18]
For the sake of easy illustration, it is assumed that the links between the nodes are all with the
same length. In this case the propagation delay of a traffic flow in the high performance
communication is normally very small compared with its queuing delay at the switching nodes.
Each node has incoming packet buffer with a maximum capacity of Q.
The proposed network was tested on various load conditions. The performance measure used to
evaluate the proposed technique was optimal link cost. The existing metrics used for comparison
Path test
Fuzzification
Inference
Engine
KnowledgeBase
Defuzzification
Fuzzy
Fuzzy
Routing
path
Non-Fuzzy
Link Cost
Network
topology
Delay factor
Queue utilize
Bandwidth
Non-Fuzzy
10
4
1
5
8
7
6
9
2 3
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 118
are the delay factor, Q-utilization and the bandwidth. Tables 3 illustrate the optimal link cost for
different metrics for network.
Lij W1 W2% Link delay % W3% Link cost %
1-2 .02 10 14 90 80
1-9 .1 20 22 80 78
1-10 .5 30 41 50 48
1-4 1 40 46 30 40
1-8 1.5 50 58 20 36
2-9 2 60 62 90 92
2-4 6 70 80 10 72
2-7 9 80 85 60 83
2-3 5.3 90 83 1 52
10-4 3.1 11.5 81 65 63
10-8 .9 25 78 40 41
7-3 .05 35 20 55 60
7-6 1 45 47 75 70
4-5 1.5 55 50 12 28
8-5 .3 65 47 18 30
3-7 4 75 88 95 100
3-6 1.9 .85 83 100 100
3-5 .75 .95 75 30 70
5-6 2 1 100 80 100
9-7 2.4 .2 65 90 78
9-3 6 5 70 38 68
TABLE 3: link cost for different metrics for Network.
6. CONCLUSIONS
Metrics in communication networks using a fuzzy system was proposed in this paper. The
proposed fuzzy system showed better system performance and utilization of the network
resources when compared to other metrics under various load conditions. Increased flexibility in
the constraints that can be considered in the routing decision and the ease in considering multiple
constraints are the benefits of such system. The design of a simple fuzzy optimal metric is
presented and tested on an experimental network.
The results of this experiment prove that the proposed system can adapt the communication
network over time to deal with changing conditions, and the systems are easy to construct.
7. REFERENCES
[1] D. W. Glazer and C. Tropper. “A new metric for dynamic routing algorithm,” IEEE
transactions on communications, VOL. 38, NO. 3, pp. 360 – 367, 1990.
[2] R. A. Guerin and A. Orda. “QoS Routing in Networks with Inaccurate Information: Theory
and Algorithms,” in proceedings of INFOCOM, VOL.7, Issue.3, pp. 350 – 364, 1999.
[3] G. Apostolopoulos, G. Roch, K. Sanjay, and K. Satish. “Improving QoS Routing
Performance Under Inaccurate Link State Information,” George Apostolopoulos,. Tripathi, in
proceedings of ITC’16, 1999.
[4] R. Guerin, S. Kamat, S.K. Tripathi. “Quality of Service Based Routing: A Performance
Perspective,” George Apostolopoulous , proceedings of ACM SIGCOMM, 1998.
Ahmad Haboush
International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 119
[5] C.C. Lee. “Fuzzy Logic in Control Systems: Fuzzy Logic Controller –Part II,’” IEEE
Transactions on Systems, Man, and Cybernetics, Vol. 20, No. 2, pp. 404-435, 1990.
[6] J.M. Mendel. “Fuzzy Logic System for Engineering: A Tutorial,” Proceeding of the IEEE,
Vol.83, No. 3, pp. 345-377, 1995.
[7] Z. Wang and J. Crowcroft. “Analysis of shortest-path routing algorithms in a dynamic
network environment,” Computer communication review, ACM SIGCOMM, 2000.
[8] William Stallings. “Local Networks,” Macmillan Publishing Company, 1987.
[9] Gerd Keiser. “Local Area Networks,” McCraw Hill Companies, 2002.
[10] Vegesna, Srinivas. “IP Quality of Service,” Cisco Press, Indianapolis, IN, USA, 2001.
[11] Freedman, Alan. “The Computer Glossary: The Complete Illustrated Dictionary,” 9th edition.
AMACOM, New York, NY, USA, 2001.
[12] Sackett. George. “Cisco Router Handbook,” McGraw-Hill, New York, NY, USA, 2000.
[13] Saadawi. Tarek, M. Ammar, and A. El Hakeem. “Fundamentals of Telecommunication
Networks,” John Wiley & Sons, Inc. New York, NY, USA, 1994.
[14] D. Driankov, H. Hellendoorn, and M. Reinfrank. “An introduction to fuzzy control,” Springer-
Verlag, Berlin, New York, 1993.
[15] Y. Phillis and R. Zhang. “Fuzzy service rate control of queuing systems,” IEEE Trans.
Systems, Man, and Cybernetics, Part B, 29(4),pp. 503 -517, 1999.
[16] Y. Yang 1, L. Zhang, K. Jogesh, S. Muppala, and T. Chanson. “Bandwidth–delay
constrained routing algorithms,” Computer Networks, Vol. 42 , pp. 503–520, 2003.
[17] A. Jüttner, B. Szviatovszki, I. Mécs, and Z. Rajkَ. “Lagrange Relaxation Based Method for
the QoS Routing Problem,” IEEE INFOCOM, Anchorage, Alaska, 2001.
[18] K. Balakrishnan, D. Tipper, and D. Medhi. “Routing strategies for fault recovery in wide area
packet networks,” Proc. MILICOM'95, pp. 1139-1143, 1995.

More Related Content

What's hot

20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)IAESIJEECS
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6journalBEEI
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...eSAT Publishing House
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septianIAESIJEECS
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Editor IJCATR
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
Buffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkBuffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkredpel dot com
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153IJRAT
 

What's hot (18)

20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 
D0441722
D0441722D0441722
D0441722
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...Optimal scheduling algorithm for throughput maximization in multihop wireless...
Optimal scheduling algorithm for throughput maximization in multihop wireless...
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
Buffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkBuffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative network
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
 
F0313539
F0313539F0313539
F0313539
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 

Viewers also liked

Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Mobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPLMobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPLMaxime Denis
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsQuang Do
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_Sheetal Kshirsagar
 
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...Edielson P. Frigieri
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksLandry Simo
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
 

Viewers also liked (12)

Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Rpl
Rpl Rpl
Rpl
 
Mobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPLMobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPL
 
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
 
Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_
 
Rpl telecom bretagne
Rpl telecom bretagneRpl telecom bretagne
Rpl telecom bretagne
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...
M2M Protocols for Constrained Environments in the Context of IoT: A Compariso...
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy Networks
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 

Similar to Fuzzy Optimized Metric for Adaptive Network Routing

Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
 
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...Fransiskeran
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintsugandhasinghhooda
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 

Similar to Fuzzy Optimized Metric for Adaptive Network Routing (20)

Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
 
Gk2411581160
Gk2411581160Gk2411581160
Gk2411581160
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...
 
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
IMPACT OF ENERGY AND LINK QUALITY INDICATOR WITH LINK QUALITY ESTIMATORS IN W...
 
k fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraintk fault tolerance Mobile Adhoc Network under Cost Constraint
k fault tolerance Mobile Adhoc Network under Cost Constraint
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Fuzzy Optimized Metric for Adaptive Network Routing

  • 1. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 111 Fuzzy Optimized Metric for Adaptive Network Routing Ahmad Khader Haboush ahmad_ram2001@yahoo.com Computer Science Department Jerash University jerash, 26150, Jordan Abstract In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more ‘precise’ than either of the single metric, to solve routing problem . Keywords: Adaptive Routing, Fuzzy logic, Short Path Routing Control, Link Cost, Network Routing. 1. INTRODUCTION Today network routing algorithms used to calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The cost of a link can be static (a function of the link) or dynamic (a function of the link and its dynamic state). The paths for routing that, using dynamic cost metrics can be recomputed based on prevailing traffic patterns to reduce congestion, packet delay, and packet drops[1]. To reflect the actual state of the link, the use of a single metric for adaptive routing is insufficient. As Known, there is a limitation on the accuracy of the link state information obtained by the routing protocol [2, 3], as the accuracy of the metric is usually predetermined by the network state update interval [4]. But better when two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In 1965 Zadeh initiated the fuzzy set theory [5, 6], for solving problems that are either difficult to tackle mathematically or when we need to improved performance, we can use Fuzzy logic. In communication systems there are Many design and control problems are indeed well suited for analysis using fuzzy logic. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics, a fuzzy membership function is defined .The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path . The remainder of the paper is organized as follows: Section 2 presents network model and problem formulation. Key ideas of our approach are presented in Section 3. Section Simulation results are shown in Section 4. Finally, Section 5 concludes the paper. 2. NETWORK MODEL AND PROBLEM FORMULATION A network can be modeled as a graph G = V, E. Where (V) is the set of nodes represent switches, routers and hosts. Edges (E) represent a set of communication links. That is, for node i and j in V, the link li,j is in E if i and j are directly connected in G. Each link li,j in E is associated
  • 2. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 112 with a primary cost parameter In our discussion, we assume that each link li, j is associated with a link metric vector Wi,j = { W1, W2, W3} , in which Wi is an individual link metric. 2.1 Link Metrics In shortest path routing algorithms link costs can be assigned dynamically and statically. The simplest of all the metrics is the hop count. Delay, bandwidth of the link, Queue size, propagation delay and some of the other metrics The selection of the routing metrics substantially affects the performance parameters of the routing algorithms. The most common metrics are the bandwidth, packet delay, queuing delay, and packet loss [7]. The packet delay, also known as latency, consists of three different types, namely, serialization delay, propagation delay, and switching delay. Serialization delay, also called transmission delay, is the time it takes a device to synchronize a packet on a specified output rate. This transmission delay is a function of the bandwidth and the packet size[ 8]. ttra = Lp / B (1) Where ttra represent link transmission packet delay, Lp packet length in bits and B the bandwidth in bit/sec. Propagation delay is the time it takes a bit to travel from a transmitter to a receiver. Physics set upper limits on the speed of such a bit, making at best a fraction of the speed of light. Hence, propagation delay is a function of the distance traveled and the link medium. tpro = Bd/V (2) Where d represents link length and V is the light velocity. Switching delay is the time lag between receiving a packet and starting to retransmit it. The switching delay is a function of the device speed which is small and can be neglect. Transmission delay of the link is the major routing link metric. A useful way of looking at this is to consider link length as compared to the typical frame transmitted. The length of the link, expressed in bite, compared to the length of the typical frame is usually denoted by W1: W1 = (length of link in bits) / (length of frame) (3) Some manipulation shows that [8,9 ] : W1 =propagation time / transition time (4) Typical values of delay factor W1 range from about 0.01 to 0.1 for LNDs and 0.01 to over 1 for other. In addition to those three types of delay, other delays also contribute to the overall performance of the network.. When the network is congested, queues will build up at the routers and start affecting the end-to-end delays [10]. Queuing delay may be negligible when the network is fast and not experiencing congestion. However, when the network is congested, the queuing delay grows and becomes significant. The number of packets in a queue is a random variable and its distribution depends on γ, the ratio of arrival rate to service rate. The probability p of having n packets in the queue is computed as follows: P(n) = ( 1 – γ ) x γn (5) The queuing utilization w1 is the ratio of the queue size to queue capacity Q. Queue size defines the buffer length at the node and it refers to the number of packets waiting to get processed. The
  • 3. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 113 queue size is a function of the number of packets n currently in the queue and packets length Lp per second. The queuing utilization W2 can be computed as follows: W2= n Lp / Q (6) The values of w2 thus range from 0 to 1. The term bandwidth defines the transmission capacity of an electronic line [11]. Theoretically, it describes the range of possible transmission rates, or frequencies [12]. The significance of a link bandwidth is that it determines the link capacity, which is the maximum information rate that can be transmitted [13]. Each link in the network has residual bandwidth property. The residual bandwidth R is defined as the difference between the link bandwidth B and the sum of the bandwidths of all the paths already assigned to that link[16]. But to make the analysis completely independent of the actual link rat, the residual bandwidth is expressed in a dimensionless normalized form: W3 = R / B (7) The value of W3 also ranged from 0 to 1. To calculate least cost paths between nodes, we used the network routing algorithms. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. As known, for the link state information obtained by the routing protocol there is a limitation on the accuracy. But to describe the state of the link more accurately, if the above three metrics can be associated to produce a single metric. 2.2 Optimized Metric Metrics combination reduces the complexity of the routing algorithm problem by combining more metrics in a single metric and then using a traditional shortest-path algorithm to compute the path that minimizes the resulting metric. In this work we combine the three above metrics in single optimal one [17]. Every link has a state measured by the difference metrics of concern. In Figure 1, the link state is a triple consisting of delay factor, Queue utilization and residual bandwidth. Every node also has a state. The node state can be measured by combined into the state of the adjacent links or, independently in this paper,. For the latter case, the residual bandwidth is the minimal of the link bandwidth; the delay of a link consists of the link transmission delay and the queuing delay at the node; the cost of a link is determined by the total resource consumption at the link and the node. FIGURE 1: Network state As we will shown later link metrics (bandwidth, delay ,and queue utilization) will be consider as input to fuzzy system and the output will be as metric which will represent optimized metric ( link cost). • • • • • • (1. 2, .2, .5) (.2, .2, .1) (.2, .1, .1) (.2, .2, .3) (15, 2, 63) (.5, .2 ,.3) (1, .6, .1) (2, .1, .2) l ji k ts ( w1, w2, w3 )
  • 4. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 114 3. THE FUZZY APPROACH DESCRIPTION A fuzzy system [14, 15] is a rule-based system. The aim of a fuzzy system is to substitute for or replace a skilled human operator with a fuzzy rule-based system. Based on the current state of a system, and to guarantee that it is optimal in some certain senses, an inference engine equipped with a fuzzy rule base determines an on-line decision to adjust the system. The design process of a fuzzy control system consists of a the following steps. The first step is to define the input variables and the control variables. The input variables may be fuzzy or crisp. Each variable must be quantified; and, the variable temperature may be quantified as cold, warm, or hot. Each quantification of the variable is assigned a membership function. A for each quantification of the input and control variables, must be design a fuzzy rules base. These rules base determine what control actions take place under what input conditions. The rules are written in an if-then format. To determine the fuzzy control action, an approximate reasoning method must be used. The approximate reasoning method provides a means of activating the fuzzy rule base. A to evaluate the individual if-then rules in the rule base, implication formula is used, but to aggregate the rule results to yield a fuzzy output set, we use A composition . The structure of fuzzy system translates inferring stage of metrics optimization processing knowledge, and combines fuzzy rules with a inference mechanism into a unified model. In this paper, two sets of rules were used: Fuzzy Rules base 1 and base 2, relationships between these two rules base and all variable used in fuzzy system can be represented best by hierarchical structure shown in Figure 2. FIGURE 2: Hierarchical structure fuzzy system 3.1 Membership Functions The implication formula provides a membership function that measures the degree of truth of the implication relation (i.e., the “if then” rule) between the input and output variables. One frequently used implication formula is that of Mamdani. Let a fuzzy rule be stated as follows: if x is A, then y is N. The implication formulas of Mamdani are as follows: Rule Base 2: link cost Evaluation Delay factor(W1) Queue Utilize (W2) Rule Base 1: Link delay Evaluation Link delay Bandwidth (W3) Optimal cost
  • 5. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 115 µA → N (x,y)= µA(x) Λ µN(y) (8) Where µA(x) is the membership of x in A, µN(y) is the membership of y in N, µA → N (x,y) is the membership of the implication relation between x and y, and Λis the minimum operator. In this paper, the membership functions for the fuzzy sets are chosen to be triangular and trapezoidal fuzzy numbers to express linguistic terms. To describe the fuzzy rules, we use L, M, H to indicate "Low", "Medium", and "High". Trapezoidal membership functions were used for the linguistic variables that represent delay factor and queue utilization. The trapezoidal membership function is specified by low, medium and high as shown in Figure 3 and 4. The universes of discourse for the fuzzy delay factor were chosen [0, 10]. FIGURE 3: Link Delay membership function FIGURE 4: Queue utilization membership function Triangular membership functions were used for the linguistic variables that represent link delay, bandwidth and link cost. The triangular membership function is specified as shown in Figure 5 and 6. FIGURE 5: Queue utilization membership FIGURE 6: Bandwidth and Optimal cost membership Membership Function Link Bandwidth DegreeofMembership Link Bandwidth and optimal cost Low HighMedium 70% 100% 0 1.0 5 highmediumlow .1 1 10.001 DegreeofMembership Membership Function delay factor Delay factor Membership Function Queue utilization DegreeofMembership Queue utilization Low Medium High 50% 100% 1.0 0 highmediumlow 50% 100%0 DegreeofMembership Membership Function like delay Link Delay
  • 6. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 116 3.2 The Fuzzy Inference System A fuzzy system is characterized by a set of linguistic statement based on expert knowledge. The expert knowledge is usually in the form of “if-then” rule, which are easily implemented by fuzzy condition statement in fuzzy logic. The collection of fuzzy control rules that are expressed as fuzzy inference system [7]. In this paper, two sets of rules were used: Fuzzy Rules Set 1 and Set 2, as summarized in the rule matrix on the tables 1 and 2 respectively. Table 1 illustrates the rule base 1 used in the fuzzy inference system. Expert knowledge was used in developing the rule base. While the delay factor and Q-utilization are represented in the X and Y-axis’s respectively, the link delay fills the table. The reason that the fuzzy rules in Set 1 below having a symmetrical output responses with respect to input conditions was simply for simplicity and was later used as a input variable for the Fuzzy Rules Set 2. The two input parameters, link delay and link bandwidth, for the Fuzzy Rules Set 2 were described in table 2. This gave a 3-by-3 matrix, with the columns representing “Low”, “Medium” and “High” Link bandwidth, and the rows representing “Low”, “Medium” and “High” link delay, as shown in table 2 below. The output parameter, namely the fuzzy metric, was described using 3 variables also: Low, Medium and High. TABLE 1: Rule Base1. TABLE 2: Rule Base1. Using the rule-based structure of fuzzy logic, a series of IF X AND Y THEN Z rules were defined for the output response given the input conditions. With a 3-by-3 rule matrix as above, there were nine possible logical products (AND) output response conclusions: The proposed approach is generic and should be easily modified to fit with different routing metrics. The fuzzy control method used is the one proposed by Momdani, which is the most widely used in fuzzy control [7]. Mamdani implication is used to represent the meaning of “if-then” rules. This kind of implication is most popular in the fuzzy control field because it is computationally simple and fits various practical applications. A defuzzification method is then applied to the fuzzy control action to produce a crisp control action. One simple and frequently used defuzzification method is then applied to the fuzzy control action to produce a crisp control action. Center of Area Method (COA) is used as a defuxxification method to produce the crisp (nonfuzzy) cost output. In the COA method, the weighted strengths of each output variable were multiplied by their respective output variable center points and summed. The area was then divided by the sum of the weighted member function strengths and the result was taken as the crisp output. 4. THE ROUTING MODEL There are generally two kinds of fuzzy logic controllers. One is feedback controller, which is not suitable for the high performance communication networks. Another one, which is used in this paper, is shown in Figure 7. This control mechanism is different from the conventional feedback control and considered as an adaptive control. To design the fuzzy controller, we need to explore the implicit and explicit relationships within the system and subsequently develop the optimal fuzzy control rules as well as the knowledge base. Q-utilization Delay factor H M L H H H H M H M M L H M L LinkDelay Link Bandwidth L M H L L M H M M M H H M H H
  • 7. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 117 FIGURE 1: The fuzzy system Figure 7 contains the different component of the routing system used to rout the incoming flows. This system is based on the fuzzy inference system discussed in previous section. The process of applying the rules and membership function is a combination of four sub- processes: fuzzification, inference, composition and defuzzification. 5. APPLICATION RESULTS The network model used for testing the fuzzy metrics is adapted from Balakrishnan et. al. [18], and it is shown in Figure 8. FIGURE 8: Experimental communication network topology [18] For the sake of easy illustration, it is assumed that the links between the nodes are all with the same length. In this case the propagation delay of a traffic flow in the high performance communication is normally very small compared with its queuing delay at the switching nodes. Each node has incoming packet buffer with a maximum capacity of Q. The proposed network was tested on various load conditions. The performance measure used to evaluate the proposed technique was optimal link cost. The existing metrics used for comparison Path test Fuzzification Inference Engine KnowledgeBase Defuzzification Fuzzy Fuzzy Routing path Non-Fuzzy Link Cost Network topology Delay factor Queue utilize Bandwidth Non-Fuzzy 10 4 1 5 8 7 6 9 2 3
  • 8. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 118 are the delay factor, Q-utilization and the bandwidth. Tables 3 illustrate the optimal link cost for different metrics for network. Lij W1 W2% Link delay % W3% Link cost % 1-2 .02 10 14 90 80 1-9 .1 20 22 80 78 1-10 .5 30 41 50 48 1-4 1 40 46 30 40 1-8 1.5 50 58 20 36 2-9 2 60 62 90 92 2-4 6 70 80 10 72 2-7 9 80 85 60 83 2-3 5.3 90 83 1 52 10-4 3.1 11.5 81 65 63 10-8 .9 25 78 40 41 7-3 .05 35 20 55 60 7-6 1 45 47 75 70 4-5 1.5 55 50 12 28 8-5 .3 65 47 18 30 3-7 4 75 88 95 100 3-6 1.9 .85 83 100 100 3-5 .75 .95 75 30 70 5-6 2 1 100 80 100 9-7 2.4 .2 65 90 78 9-3 6 5 70 38 68 TABLE 3: link cost for different metrics for Network. 6. CONCLUSIONS Metrics in communication networks using a fuzzy system was proposed in this paper. The proposed fuzzy system showed better system performance and utilization of the network resources when compared to other metrics under various load conditions. Increased flexibility in the constraints that can be considered in the routing decision and the ease in considering multiple constraints are the benefits of such system. The design of a simple fuzzy optimal metric is presented and tested on an experimental network. The results of this experiment prove that the proposed system can adapt the communication network over time to deal with changing conditions, and the systems are easy to construct. 7. REFERENCES [1] D. W. Glazer and C. Tropper. “A new metric for dynamic routing algorithm,” IEEE transactions on communications, VOL. 38, NO. 3, pp. 360 – 367, 1990. [2] R. A. Guerin and A. Orda. “QoS Routing in Networks with Inaccurate Information: Theory and Algorithms,” in proceedings of INFOCOM, VOL.7, Issue.3, pp. 350 – 364, 1999. [3] G. Apostolopoulos, G. Roch, K. Sanjay, and K. Satish. “Improving QoS Routing Performance Under Inaccurate Link State Information,” George Apostolopoulos,. Tripathi, in proceedings of ITC’16, 1999. [4] R. Guerin, S. Kamat, S.K. Tripathi. “Quality of Service Based Routing: A Performance Perspective,” George Apostolopoulous , proceedings of ACM SIGCOMM, 1998.
  • 9. Ahmad Haboush International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (2) : 2012 119 [5] C.C. Lee. “Fuzzy Logic in Control Systems: Fuzzy Logic Controller –Part II,’” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 20, No. 2, pp. 404-435, 1990. [6] J.M. Mendel. “Fuzzy Logic System for Engineering: A Tutorial,” Proceeding of the IEEE, Vol.83, No. 3, pp. 345-377, 1995. [7] Z. Wang and J. Crowcroft. “Analysis of shortest-path routing algorithms in a dynamic network environment,” Computer communication review, ACM SIGCOMM, 2000. [8] William Stallings. “Local Networks,” Macmillan Publishing Company, 1987. [9] Gerd Keiser. “Local Area Networks,” McCraw Hill Companies, 2002. [10] Vegesna, Srinivas. “IP Quality of Service,” Cisco Press, Indianapolis, IN, USA, 2001. [11] Freedman, Alan. “The Computer Glossary: The Complete Illustrated Dictionary,” 9th edition. AMACOM, New York, NY, USA, 2001. [12] Sackett. George. “Cisco Router Handbook,” McGraw-Hill, New York, NY, USA, 2000. [13] Saadawi. Tarek, M. Ammar, and A. El Hakeem. “Fundamentals of Telecommunication Networks,” John Wiley & Sons, Inc. New York, NY, USA, 1994. [14] D. Driankov, H. Hellendoorn, and M. Reinfrank. “An introduction to fuzzy control,” Springer- Verlag, Berlin, New York, 1993. [15] Y. Phillis and R. Zhang. “Fuzzy service rate control of queuing systems,” IEEE Trans. Systems, Man, and Cybernetics, Part B, 29(4),pp. 503 -517, 1999. [16] Y. Yang 1, L. Zhang, K. Jogesh, S. Muppala, and T. Chanson. “Bandwidth–delay constrained routing algorithms,” Computer Networks, Vol. 42 , pp. 503–520, 2003. [17] A. Jüttner, B. Szviatovszki, I. Mécs, and Z. Rajkَ. “Lagrange Relaxation Based Method for the QoS Routing Problem,” IEEE INFOCOM, Anchorage, Alaska, 2001. [18] K. Balakrishnan, D. Tipper, and D. Medhi. “Routing strategies for fault recovery in wide area packet networks,” Proc. MILICOM'95, pp. 1139-1143, 1995.