SlideShare a Scribd company logo
1 of 7
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Hop-by-Hop Routing in Wireless Mesh 
Networks with Bandwidth Guarantees 
Abstract 
Wireless Mesh Network (WMN) has become an important edge network to provide Internet 
access to remote areas and wireless connections in a metropolitan scale. In this paper, we study 
the problem of identifying the maximum available bandwidth path, a fundamental issue in 
supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known 
bottleneck metric in wired networks, is neither concave nor additive in wireless networks. 
We propose a new path weight which captures the available path bandwidth information. We 
formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the 
consistency and loop-freeness requirements. The consistency property guarantees that each node 
makes a proper packet forwarding decision, so that a data packet does traverse over the intended 
path. Our extensive simulation experiments also show that our proposed path weight outperforms 
existing path metrics in identifying high-throughput paths. 
Existing System: 
Wireless Mesh Network has become an important edge network to provide Internet access to 
remote areas and wireless connections in a metropolitan scale. We study the problem of 
identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service 
in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric 
in wired networks, is neither concave nor additive in wireless networks. 
Seeking the path with the maximum available bandwidth is one of the fundamental issues for 
supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the 
maximum additional rate a flow can push before saturating its path. 
Disadvantages:
 Identifying the maximum available bandwidth path from a source to destination. 
Proposed System: 
We propose a new path weight that captures the concept of available bandwidth. We give 
the mechanism to compare two paths based on the new path weight. We formally prove 
that the proposed path weight is left-isotonic. 
We describe how to construct the routing table and distance table, and we develop a hop-by- 
hop packet forwarding scheme. We formally prove that our routing protocol satisfies 
the optimality and consistency requirements. 
Finally, we implement our routing protocol based on the DSDV protocol in the NS2 
simulator. The extensive simulation experiments demonstrate that our routing protocol 
outperforms the existing routing protocols for finding the maximum available bandwidth 
paths. 
Advantages: 
Our routing protocol satisfies the optimality and consistency requirements. 
Finds the maximum available bandwidth paths. 
INTRODUCTION 
Awireless mesh network (WMN) consists of a large number of wireless nodes. The nodes form a 
wireless overlay to cover the service area while a few nodes are wired to the Internet. As part of 
the Internet, WMN has to support diversified multimedia applications for its users. It is essential 
to provide efficient Quality-of-Service (QoS) support in this kind of networks. Seeking the path 
with the maximum available bandwidth is one of the fundamental issues for supporting QoS in 
the wireless mesh networks. The available path bandwidth is defined as the maximum additional 
rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a 
path is no greater than the available bandwidth of this path, accepting the new traffic will not 
violate the bandwidth guaranteed of the existing flows. This paper focuses on the problem of 
identifying the maximum available bandwidth path from a source to a destination, which is also 
called the Maximum Bandwidth Problem (MBP). MBP is a subproblem of the Bandwidth- 
Constrained Routing Problem (BCRP), the problem of identifying a path with at least a given 
amount of available bandwidth. In the literatures, maximum available bandwidth path is also 
called widest path.
Finding the widest path between the source and the destination in wireless networks is very 
challenging due to the wireless transmission interference. Generally speaking, there are two 
types of interference: interflow interference and intraflow interference. Interflow interference 
refers to the situation that the resource available for a flow is affected by the presence of other 
flows. In other words, the interflow interference affects the amount of residual channel resources 
on each link that can be allocated for a new flow. The work gives how to estimate the available 
bandwidth (residual channel resources) of each link. It means that if the link has to carry another 
1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can 
be at most the available bandwidth of the link. On the other hand, intraflow interference refers to 
the scenario where when a data packet is being transmitted on a link along a path, some link 
along the path has to remain idle to avoid conflict. Intraflow interference complicates the process 
of developing hop-by-hop routing protocol for finding widest paths. Considering intraflow 
interference, the works present a formula to compute the available bandwidth of a path with the 
knowledge of the available bandwidth on individual links of the path. Unfortunately, finding 
widest path in a hop-by-hop manner is still not solved. 
The unique structure of the path bandwidth computation formula introduces two challenges 
described below: 
1. Some nodes may not find the widest path if only the available bandwidth is used as the routing 
metric. 
2. Even though a source identifies a widest path to a destination, intermediate nodes on the 
widest path may not make a consistent packet forwarding decisions by using the traditional 
destination-based hop-by-hop packet forwarding mechanism. 
Modules: 
Path Selection 
We would like to develop a distance-vector based mechanism. In the traditional distance-vector 
mechanism, a node only has to advertise the information of its own best path to its neighbors. 
Each neighbor can then identify its own best path. If a node only advertises the widest path from 
its own perspective, its neighbors may not be able to find the widest path. In order to assure that 
the widest path from each node to a destination can be identified, a trivial way is to advertise all 
the possible paths to a destination. This is definitely too expensive. On the other hand, as long as 
we advertise every path which is a subpath of a widest path (e.g., <v; a; b; c; d> is a subpath of
the widest path of <s; v; a; b; c; d>), we allow every node to identify its own widest path. Thus, 
to reduce the overhead, we should not advertise those paths that would not be a subpath of any 
widest path. 
Isotonic Path Weight 
We introduce our new isotonic path weight, while the next section describes how we use the path 
weight to construct routing tables. The isotonicity property of a path weight is the necessary and 
sufficient condition for developing a routing protocol satisfying the optimality and consistency 
requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better than p2 by 
comparing their weights. If the path weight used is left-isotonic, given any path p0 from a node v 
to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is not leftisotonic. 
Table Construction and Optimality 
The isotonicity property of the proposed path weight allows us to develop a routing protocol that 
can identify the maximum bandwidth path from each node to each destination. In particular, it 
tells us whether a path is worthwhile to be advertised, meaning whether a path is a potential 
subpath of a widest path. In our routing protocol, if a node finds a new nondominated path, it 
will advertise this path information to its neighbors. We call the packet carrying the path 
information the route packet. Based on the information contained in a route packet, each node 
knows the information about the first four hops of a path identified. 
Each node keeps two tables: distance table and routing table. Node s puts all the nondominated 
paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found 
by s itself in its routing table. 
Packet Forwarding and Consistency 
In a traditional hop-by-hop routing protocol, a packet carries the destination of the packet, and 
when a node receives a packet, it looks up the next hop by the destination only. In our 
mechanism, apart from the destination, a packet also carries a Routing Field which specifies the 
next four hops the packet should traverse. When a node receives this packet, it identifies the path 
based on the information in the Routing Field. It updates the Routing Field and sends it to the 
next hop. In our packet forwarding mechanism, each intermediate node determines the fourth 
next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism 
still requires each intermediate node to make route decision based on its routing table. Besides, 
only the information of the first few hops of a path is kept in the routing table in each node and
the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a 
hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme. 
Route Update 
After the network accepts a new flow or releases an existing connection, the local available 
bandwidth of each node will change, and thus the widest path from a source to a destination may 
be different. When the change of the local available bandwidth of a node is larger than a 
threshold (say 10 percent), the node will advertise the new information to its neighbors. After 
receiving the new bandwidth information, the available bandwidth of a path to a destination may 
be changed. Although the node is static, the network state information changes very often. 
Therefore, our routing protocol applies the route update mechanism in DSDV . Based on DSDV, 
each routing entry is tagged with a sequence number which is originated by the destination, so 
that nodes can quickly distinguish stale routes from the new ones. Each node periodically 
transmits updates and transmits updates immediately when significant new route information is 
available. Given two route entries from a source to a destination, the source always selects the 
one the larger sequence number, which is newer, to be kept in the routing table. Only if two 
entries have the same sequence number, our path comparison is used to determine which path 
should be kept. Due to the delay of the route update propagation, it is possible that route 
information kept in some nodes is inconsistent. For instance, the widest path kept in the routing 
table may not be the widest anymore. Routing loops may occur as well. The situations are 
referred as inconsistency due to transient route updates, which is different from the definition 
used in. In and this paper, we consider whether packets can be routed on the computed widest 
path when the routing tables are stable. How to avoid loops when routing tables change is an 
important but difficult problem, and is outside the scope of this paper. We refer readers to [29] 
for the techniques to reduce route update inconsistencies in the distance-vector protocol which 
can be applied in our mechanism as well. 
System Requirements: 
SOFTWARE Requirements
 PLATFORM : JDK 1.5 
 TOOL : Java Swing 
 DATABASES : SQL Server 
HARDARE Requirements 
 PROCESSOR : PENTIUM IV 2.6 GHz 
 RAM : 512 MB DD RAM 
 MONITOR : 15” COLOR 
 HARD DISK : 40 GB 
 KEYBOARD : STANDARD 102 KEYS 
 MOUSE : 3 BUTTON 
REFERENCES 
[1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multihop Wireless 
Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. 
[2] T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying High Throughput Paths in 
802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols 
(ICNP ’07), pp. 21-30, Oct. 2007. 
[3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem 
in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 
4-14, Jan. 2008. 
[4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in 
Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. 
[5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” 
IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. 
[6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel 
Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, 
Apr. 2009.
[7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless 
Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. 
[29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector 
Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994. 
CONCLUSION 
In this paper, we studied the maximum available bandwidth path problem, which is a 
fundamental issue to support quality-of-service in wireless mesh networks. The main 
contribution of our work is a new left-isotonic path weight which captures the available path 
bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to 
develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol 
satisfies the optimality and consistency requirements. Based on the available path bandwidth 
information, a source can immediately determine some infeasible connection requests with the 
high bandwidth requirement. We tested the performance of our protocol under different 
scenarios.

More Related Content

What's hot

Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationProf Ansari
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 

What's hot (18)

Eb34777780
Eb34777780Eb34777780
Eb34777780
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
E010322531
E010322531E010322531
E010322531
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 

Similar to IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networks with bandwidth guarantees

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...ijwmn
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathIMPULSE_TECHNOLOGY
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivityiosrjce
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSgraphhoc
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 

Similar to IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networks with bandwidth guarantees (20)

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
 
D017252327
D017252327D017252327
D017252327
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
I017616468
I017616468I017616468
I017616468
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 

More from IEEEGLOBALSOFTSTUDENTPROJECTS

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...IEEEGLOBALSOFTSTUDENTPROJECTS
 

More from IEEEGLOBALSOFTSTUDENTPROJECTS (20)

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Peer assisted vo d systems an ef...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On social delay tolerant network...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Constructing load balanced data ...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS An ontology based hybrid approac...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS A security and privacy aware loc...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Transformation based monetary cost op...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable distributed service integrit...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Scalable analytics for iaa s cloud av...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Optimal power allocation and load dis...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic heterogeneity aware resource ...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Dynamic cloud pricing for revenue max...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Automatic scaling of internet applica...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Adaptive algorithm for minimizing clo...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop routing in wireless mesh networks with bandwidth guarantees

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth information. We formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the consistency and loop-freeness requirements. The consistency property guarantees that each node makes a proper packet forwarding decision, so that a data packet does traverse over the intended path. Our extensive simulation experiments also show that our proposed path weight outperforms existing path metrics in identifying high-throughput paths. Existing System: Wireless Mesh Network has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. We study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Disadvantages:
  • 2.  Identifying the maximum available bandwidth path from a source to destination. Proposed System: We propose a new path weight that captures the concept of available bandwidth. We give the mechanism to compare two paths based on the new path weight. We formally prove that the proposed path weight is left-isotonic. We describe how to construct the routing table and distance table, and we develop a hop-by- hop packet forwarding scheme. We formally prove that our routing protocol satisfies the optimality and consistency requirements. Finally, we implement our routing protocol based on the DSDV protocol in the NS2 simulator. The extensive simulation experiments demonstrate that our routing protocol outperforms the existing routing protocols for finding the maximum available bandwidth paths. Advantages: Our routing protocol satisfies the optimality and consistency requirements. Finds the maximum available bandwidth paths. INTRODUCTION Awireless mesh network (WMN) consists of a large number of wireless nodes. The nodes form a wireless overlay to cover the service area while a few nodes are wired to the Internet. As part of the Internet, WMN has to support diversified multimedia applications for its users. It is essential to provide efficient Quality-of-Service (QoS) support in this kind of networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a path is no greater than the available bandwidth of this path, accepting the new traffic will not violate the bandwidth guaranteed of the existing flows. This paper focuses on the problem of identifying the maximum available bandwidth path from a source to a destination, which is also called the Maximum Bandwidth Problem (MBP). MBP is a subproblem of the Bandwidth- Constrained Routing Problem (BCRP), the problem of identifying a path with at least a given amount of available bandwidth. In the literatures, maximum available bandwidth path is also called widest path.
  • 3. Finding the widest path between the source and the destination in wireless networks is very challenging due to the wireless transmission interference. Generally speaking, there are two types of interference: interflow interference and intraflow interference. Interflow interference refers to the situation that the resource available for a flow is affected by the presence of other flows. In other words, the interflow interference affects the amount of residual channel resources on each link that can be allocated for a new flow. The work gives how to estimate the available bandwidth (residual channel resources) of each link. It means that if the link has to carry another 1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can be at most the available bandwidth of the link. On the other hand, intraflow interference refers to the scenario where when a data packet is being transmitted on a link along a path, some link along the path has to remain idle to avoid conflict. Intraflow interference complicates the process of developing hop-by-hop routing protocol for finding widest paths. Considering intraflow interference, the works present a formula to compute the available bandwidth of a path with the knowledge of the available bandwidth on individual links of the path. Unfortunately, finding widest path in a hop-by-hop manner is still not solved. The unique structure of the path bandwidth computation formula introduces two challenges described below: 1. Some nodes may not find the widest path if only the available bandwidth is used as the routing metric. 2. Even though a source identifies a widest path to a destination, intermediate nodes on the widest path may not make a consistent packet forwarding decisions by using the traditional destination-based hop-by-hop packet forwarding mechanism. Modules: Path Selection We would like to develop a distance-vector based mechanism. In the traditional distance-vector mechanism, a node only has to advertise the information of its own best path to its neighbors. Each neighbor can then identify its own best path. If a node only advertises the widest path from its own perspective, its neighbors may not be able to find the widest path. In order to assure that the widest path from each node to a destination can be identified, a trivial way is to advertise all the possible paths to a destination. This is definitely too expensive. On the other hand, as long as we advertise every path which is a subpath of a widest path (e.g., <v; a; b; c; d> is a subpath of
  • 4. the widest path of <s; v; a; b; c; d>), we allow every node to identify its own widest path. Thus, to reduce the overhead, we should not advertise those paths that would not be a subpath of any widest path. Isotonic Path Weight We introduce our new isotonic path weight, while the next section describes how we use the path weight to construct routing tables. The isotonicity property of a path weight is the necessary and sufficient condition for developing a routing protocol satisfying the optimality and consistency requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better than p2 by comparing their weights. If the path weight used is left-isotonic, given any path p0 from a node v to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is not leftisotonic. Table Construction and Optimality The isotonicity property of the proposed path weight allows us to develop a routing protocol that can identify the maximum bandwidth path from each node to each destination. In particular, it tells us whether a path is worthwhile to be advertised, meaning whether a path is a potential subpath of a widest path. In our routing protocol, if a node finds a new nondominated path, it will advertise this path information to its neighbors. We call the packet carrying the path information the route packet. Based on the information contained in a route packet, each node knows the information about the first four hops of a path identified. Each node keeps two tables: distance table and routing table. Node s puts all the nondominated paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found by s itself in its routing table. Packet Forwarding and Consistency In a traditional hop-by-hop routing protocol, a packet carries the destination of the packet, and when a node receives a packet, it looks up the next hop by the destination only. In our mechanism, apart from the destination, a packet also carries a Routing Field which specifies the next four hops the packet should traverse. When a node receives this packet, it identifies the path based on the information in the Routing Field. It updates the Routing Field and sends it to the next hop. In our packet forwarding mechanism, each intermediate node determines the fourth next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism still requires each intermediate node to make route decision based on its routing table. Besides, only the information of the first few hops of a path is kept in the routing table in each node and
  • 5. the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme. Route Update After the network accepts a new flow or releases an existing connection, the local available bandwidth of each node will change, and thus the widest path from a source to a destination may be different. When the change of the local available bandwidth of a node is larger than a threshold (say 10 percent), the node will advertise the new information to its neighbors. After receiving the new bandwidth information, the available bandwidth of a path to a destination may be changed. Although the node is static, the network state information changes very often. Therefore, our routing protocol applies the route update mechanism in DSDV . Based on DSDV, each routing entry is tagged with a sequence number which is originated by the destination, so that nodes can quickly distinguish stale routes from the new ones. Each node periodically transmits updates and transmits updates immediately when significant new route information is available. Given two route entries from a source to a destination, the source always selects the one the larger sequence number, which is newer, to be kept in the routing table. Only if two entries have the same sequence number, our path comparison is used to determine which path should be kept. Due to the delay of the route update propagation, it is possible that route information kept in some nodes is inconsistent. For instance, the widest path kept in the routing table may not be the widest anymore. Routing loops may occur as well. The situations are referred as inconsistency due to transient route updates, which is different from the definition used in. In and this paper, we consider whether packets can be routed on the computed widest path when the routing tables are stable. How to avoid loops when routing tables change is an important but difficult problem, and is outside the scope of this paper. We refer readers to [29] for the techniques to reduce route update inconsistencies in the distance-vector protocol which can be applied in our mechanism as well. System Requirements: SOFTWARE Requirements
  • 6.  PLATFORM : JDK 1.5  TOOL : Java Swing  DATABASES : SQL Server HARDARE Requirements  PROCESSOR : PENTIUM IV 2.6 GHz  RAM : 512 MB DD RAM  MONITOR : 15” COLOR  HARD DISK : 40 GB  KEYBOARD : STANDARD 102 KEYS  MOUSE : 3 BUTTON REFERENCES [1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multihop Wireless Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. [2] T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying High Throughput Paths in 802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’07), pp. 21-30, Oct. 2007. [3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 4-14, Jan. 2008. [4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. [5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. [6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, Apr. 2009.
  • 7. [7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. [29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994. CONCLUSION In this paper, we studied the maximum available bandwidth path problem, which is a fundamental issue to support quality-of-service in wireless mesh networks. The main contribution of our work is a new left-isotonic path weight which captures the available path bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol satisfies the optimality and consistency requirements. Based on the available path bandwidth information, a source can immediately determine some infeasible connection requests with the high bandwidth requirement. We tested the performance of our protocol under different scenarios.