SlideShare a Scribd company logo
1 of 7
Download to read offline
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 589
Volume 3, Issue 11, November-2016, pp. 589-595 ISSN (O): 2349-7084
International Journal of Computer Engineering In Research Trends
Robust Resource Allocation in Relay Node
Networks for Optimization Process
1
G.Lalitha, 2
Lakshmi Viveka K, 3
Leelavathy Narkedamilly
1
M.Tech, CSE Dept, Pragati Engineering College, Kakinada
2
Assistant Professor, Dept of CSE, Pragati Engineering College, Kakinada
3
Professor, HOD of CSE, Pragati Engineering College, Kakinada
Abstract: Overlay steering has risen as a promising way to deal with enhance unwavering quality and effectiveness of
the Internet. For one-jump overlay source steering, when a given essential way experiences the connection
disappointment or execution debasement, the source can reroute the movement to the destination by means of a
deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may
bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the
system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR),
in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay
ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition,
whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this
LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint
one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation.
Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed
calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing
administration.
——————————  ——————————
1. INTRODUCTION
Overlay steering is an application-level directing
component on overlay organizes that gives
application-level courses to network application
movement. An early and commonplace sample is the
Resilient Overlay Network (RON) [1], in which every
overlay hub measures the end-to-end idleness and
bundle misfortune proportion of the system ways to
different hubs. The way starting from the hub is
resolved for the overlay system movement, which can
be either an immediate way to the destination hub or
a transfer way that navigates different node(s) before
achieving the destination hub as delineated in Figure
1. In the present paper, the terms overlay directing
and IP steering are utilized to allude to movement
steering at the application-level and the IP-level,
separately.
One point of interest of overlay directing is that client
saw system execution, for example, end-to-end
dormancy and accessible data transmission, can be
enhanced without adjusting the present IP system [2]–
[4]. Such execution change is brought on basically by
the strategy bungle between IP directing and overlay
steering. IP directing is construct principally with
respect to measurements, for example, switch level
and Autonomous System (AS)- level bounce numbers.
Furthermore, Internet Service Providers (ISPs) that
work IP steering settle on their choices construct for
the most part in light of money related contracts with
their neighboring ISPs, which are either travel or
peering connections. Travel connects and peering
Available online at: www.ijcert.org
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 590
joins have diverse financial charging components for
activity trade, and each ISP arranges their directing as
per contrasts. On the other hand, overlay directing
worked by end clients principally picks the ways in a
way in order to upgrade client saw execution. Hence,
client saw execution is enhanced by overlay directing.
Despite the fact that this arrangement jumble
enhances end-to-end system execution, it creates an
issue for the ISPs' cost structure. In particular, the
between ISP travel cost (pretty much as travel expense
in the rest of this paper) is expanded over the whole
system [5], [6]. To lessen travel cost, the territory
mindful strategy has been proposed in [7] that
controls system movement in light of the region
construed from the IP address prefix or space name.
Be that as it may, those sorts of data are not generally
suitable for assessing the territory of the Internet
topology. Application-layer Traffic Optimization
(ALTO) [8], which depends on the idea of P4P [9] is
another methodology that endeavors to lessen travel
cost by controlling active movement from an ISP
while considering the usage of its associated travel
and peering joins. Be that as it may, such a component
can just improve active traf-fic from a solitary ISP, and
it can't control approaching movement. Also, that
system can't enhance the end-to-end system
movement administered by various interconnected
ISPs. To lessen travel cost over the whole system, a
directing instrument in view of travel cost data
between ISPs on end-to-end ways is required. Be that
as it may, the agreement data between ISPs is not
accessible by and large and a straightforward end-to-
end estimation or estimation strategy to acquire this
data has yet to be produced.
Notwithstanding when such control component of
overlay steering is acknowledged by ISPs or end
clients, the issue of approach jumble is again raised.
That is, when end clients control the overlay system in
view of their own destinations, it might corrupt the
fulfillment of ISPs, and the other way around. Along
these lines, a novel strategy is required that considers
the destinations of both ISPs and end clients.
In the present study, we propose a novel technique to
diminish the travel expense of overlay directing while
bookkeeping
Fig. 1 Overlay routing
Fig. 2 Increase in number of traversed transit links by
overlay routing
For the stances of end clients and ISPs, which we call a
constrained overlay directing. The proposed
technique picks overlay-directed ways utilizing a
travel cost metric of the ways. We propose two sorts
of way determination strategies for the restricted
overlay steering, which target end clients and ISPs
destinations, individually.
The constrained overlay steering needs the travel cost
metric of overlay-directed ways. For this reason, we
develop a technique to evaluate the travel expense of
overlay-steered ways from end-to-end system
execution values that can be measured effortlessly by
overlay hubs, for example, switch level jump tally,
end-to-end inactivity and accessible transfer speed.
The estimation technique depends on various relapse
examinations of system execution values.
We show the adequacy of the proposed strategy by
assessing the execution of the overlay steering that is
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 591
thought to be worked on overlay systems on a
PlanetLab [10] and a Japanese business system
situations. To set a benchmark for the talk, we first
assess the execution change of the overlay directing
without a restriction on the travel cost metric. Next,
we assess the constrained overlay directing utilizing
exact data on the sorts of between AS connections. At
that point, we demonstrate the relapse mathematical
statements used to gauge estimation of the travel cost
metric for both situations. After that, we assess the
execution of the restricted overlay directing by
utilizing the proposed estimation strategy and talk
about parameter settings from the viewpoints of ISPs
and end clients.
The rest of the present paper is composed as takes
after. In Section 2, research foundation on overlay
steering is given and the issue of expanded travel
expense and motivators for diminishing it are
depicted. In Section 3, we propose a technique to
diminish travel cost. In Section 4, we clarify the
dataset utilized for assessment of the proposed
technique, and afterward we display the
consequences of the assessment in Section 5. At last, in
Section 6, we compress our decisions.
2. BACKGROUND ON OVERLAY ROUTING
2.1 Effectiveness of overlay routing
Overlay steering can enhance end-to-end system
execution by picking the ways in light of use level
system execution measurements, for example, end-to-
end inactivity, bundle misfortune proportion,
accessible data transfer capacity, and TCP throughput.
This point of interest of overlay directing is chiefly a
consequence of the arrangement befuddled between
IP steering and overlay directing. Overlay directing
normally settles on their steering choices that enhance
client saw execution utilizing these measurements. On
the other hand, IP steering is constructing principally
with respect to measurements, for example, switch
level and AS-level jump numbers, which don't
generally associate to client saw execution.
Moreover, ISPs have their own particular cost
structures in light of business contracts with their
neighboring ISPs, and IP-level directing designs are
influenced extensively by these cost structures. Two
sorts of connections are normal between ASes† : travel
interfaces that associate the upper-level and the lower-
level ISPs, and peering joins that are utilized for
peering relationship. The fiscal expense of the travel
connection is normally dictated by the measure of
movement crossing the connection, and travel
connections can be utilized by an ISP's clients.
Interestingly, there is no money related charge for
peering joins, aside from the cost paid to bearer
organizations for the physical connection offices. In
this manner, peering connections can be utilized just
by activity between interconnected ISPs.
Figure 1 demonstrates a normal illustration of the
upside of overlay directing. We expect that IP steering
utilizes the immediate way and overlay directing
picks the transfer way. The length of the bolts speaks
to the estimation of the end-to-end idleness, which is
the whole of the engendering defers and defers
brought about by blockage at the switches. Looking at
the direct and hand-off ways, the immediate way has
a lower switch level jump number yet a higher end-to-
end inactivity. Such a circumstance happens, for
example, as a result of the blockage at the switches.
Hence, the overlay directing gives better user
perceived execution (i.e., lower end-to-end dormancy)
than the IP steering. For instance, [11] appeared from
their assessment results for a PlanetLab situation that
overlay steering could diminish end-to-end inactivity
in more than 80% of end-to-end ways.
2.2 Impact on the cost structure of ISPs
In spite of the fact that overlay directing can enhance
client saw execution, it might likewise create activity
that does not take after to the ISPs' cost structure (i.e.,
the IP steering approach gave by the ISPs), thus the
ISPs may bring about extra money related expense
because of such movement. On the off chance that
these cost increments aggregate, the travel cost over
the whole system is expanded.
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 592
Figure 2 demonstrates a basic case of this issue in
which three end has, all of which act as overlay hubs,
are associated by overlay interfaces each other. Every
overlay join incorporates different between AS
connections, each of which is either a travel (strong
line) or peering (dashed-line) join. We expect that
Node A creates movement that is steered to Node C.
At the point when utilizing the IP or overlay steering
that picks the immediate way, the movement crosses
two travel joins. Then again, when the overlay
steering uses the hand-off way by means of Node B,
the movement navigates four travel joins between
Nodes An and B, and those between Nodes B and C.
In this way, the aggregate of the travel joins navigated
by the transfer way is expanded by two contrasted
and the immediate way and as an outcome, the travel
cost over the whole system increments.
Actually, there are conceivable outcomes that the
hand-off way has lower travel taken a toll than the
immediate way. Nonetheless, we consider that the
transfer way as a rule has a higher travel taken a toll
since it is made out of various direct ways.
2.3 Related works
The technique proposed in [12] chooses the overlay
ways using estimation aftereffects of limit and
accessible data transmission. In [13], the creators
introduce the strategy to develop and keep up overlay
systems for enhancing client saw execution by narrow
minded neighbor hub determination. In [14], the
creators propose QoS-mindful overlay directing by
adjusting overlay activity among overlay hubs. Every
one of them focus to enhance client saw execution, for
example, end-to-end inactivity and accessible data
transfer capacity for end clients' activity, which is not
indicated for specific sorts of use. This element is the
same as that of our strategy proposed in this paper. In
any case, the strategies proposed in [12]–[14] are not
treat the between ISP travel cost that causes an
impressive effect from the overlay steering as depicted
in Subsection 2.2.
The strategy proposed in [15] utilizes an expense for
overlay way creation and overlay activity directing in
a theoretical way and upgrades the expense. In [16],
the creators concentrate on the asset assignment on
overlay systems and attempt to give it as
enhancement issue. In spite of the fact that these
strategies can treat different sorts of expense by
incorporating it in their enhancement issues, they
have not considered the between ISP travel cost.
3. PROPOSED METHOD
We first clarify the system model used in the present
paper. Next, we propose a constrained overlay
steering with two way choice techniques. One of those
strategies suitable to the point of view of end clients
and the other is for that of ISPs. At that point, we
show some utilization cases from both angles. At last,
we propose a strategy for evaluating a travel cost
metric from system execution values that can be
gotten effortlessly.
Fig. 3 Network model
3.1 Network model
We expect the system model delineated in Figure 3.
The underlay system is developed from various ASes,
and each AS is built from various IP switches. Each
AS is associated with its neighbors by travel or
peering joins. A travel expense is caused at whatever
point activity crosses a travel join. Note that we
disregard which ISPs associated by travel connections
are upper-level or lower-level ISPs, since we consider
decrease in the travel cost over the whole system.
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 593
An overlay system is developed over the underlay
system and end has situated at ASes execute as
overlay hubs. We term overlay hubs pretty much as
hubs in the rest of the present paper. We accept that
the overlay steering can use the overlay joins between
all hub sets to assess the potential execution to lessen
the travel cost because of the overlay directing. The
development strategy for the overlay system topology
is past the extent of the present paper.
An overlay steering is worked on the overlay arrange
and can give a course from the source hub to the
destination hub. We consider the accompanying two
sorts of overlay steered ways.
Direct path
It is a way from the source hub to the destination hub
that is steered straightforwardly. An immediate way
comprises of just a solitary overlay join between the
source and destination hubs, thus the immediate way
is equivalent to that gave by IP-level steering alone.
Relay path
It is a way from the source hub to the destination hub
by means of another hub. Here, we consider just two-
bounce ways, since ways with more prominent jump
numbers don't add to enhance client saw execution
[11]. Subsequently, a hand-off way comprises of two
overlay joins.
3.2 Limited overlay directing
The restricted overlay steering can be actualized
utilizing any of the measurements connected with
travel joins. As a speculation, we portray the restricted
overlay steering utilizing just a travel cost metric.
How, mi j is the estimation of the travel cost metric for
the overlay join between hubs i and j. Henceforth, the
estimation of travel cost metric for the immediate way
between hubs i and j and that of the hand-off way by
means of hub k are given, separately, as takes after.
Mi j = mi j
Mik j = mik + mk j
3.2.1 Improving user-perceived performance
under interISP transit cost constraint
One way choice technique concentrates on the
maximum furthest reaches of expansions in the
estimation of travel cost metric. This determination
strategy considers the end clients' destinations. The
limitation on the estimation of travel cost metric while
picking a transfer way rather than an immediate way
is characterized as takes after.
Mik j ≤ Mi j + α
Where α is the maximum furthest reaches of the
expansion in the estimation of travel cost metric
through utilizing the hand-off way. The overlay
steering hence chooses the hand-off way with the
most ideal execution from all hopefuls under this
imperative. Here, the execution of direct way between
hubs i and j is signified Pi j, and the execution of
hand-off way through hub k is indicated Pik j. At that
point, we characterize the change proportion of client
saw execution, which is indicated ˆIi j, as takes after.
ii j = Pi j/min k,i, j ( Pik j)
Ii j = max k,i, j ( Pik j) /Pi j
Here, Equation (4a) is utilized as a part of the case that
a low execution metric worth speaks to better
execution, for example, end-to-end dormancy. On the
other hand, Equation (4b) is utilized when a high
esteem speaks to better execution, for example,
accessible transmission capacity. Note that when no
transfer way has preferred execution over the
immediate way, the change proportion gets to be
littler than one. As such, the overlay steering with this
way determination technique gives the execution
change to the information transmission between hubs
under the restriction on the expansion level of the
estimation of travel cost metric.
3.2.2 Reducing inter-ISP transit cost under user-
perceived performance constraint
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 594
The other way determination technique concentrates
on the decline in the overlay directing execution. This
strategy considers the ISPs' goals. At the point when
the best execution by the overlay steering between
hubs i and j without considering the estimation of
travel cost metric is given by the hand-off way by
means of hub l, we characterize the requirements on
the level of reduction in overlay directing execution as
takes after.
Pik j ≤ Pil j × (1 + β)
Pik j ≥ Pil j × (1 − β)
Where β decides the lower furthest reaches of the
decline level of the execution of the overlay directing
contrasted and the best execution. Note that when a
low esteem speaks to better execution, Equation (5a)
ought to be fulfilled, and when a high esteem speaks
to better execution, Equation (5b) ought to be fulfilled.
At that point, the overlay steering chooses a way with
the most minimal estimation of travel cost metric
while fulfilling Equations (5a) or (5b). The decrease in
the estimation of travel cost metric, which is meant as
Mˆ i j, can be characterized as takes after.
Mˆ i j = Mil j − min k,i, j ( Mik j)
As it were, this way determination technique can
diminish the estimation of travel cost metric under a
given abatement in the client saw execution
contrasted and that of the best way.
4. CONCLUSION
In this paper, a one-jump overlay multipath steering
plan (LB-OOMR) is tended to by considering the heap
adjusting and the way assorted qualities. In our
proposed plan, when a way comes up short, the
source parts the movement and reroutes them to the
destination along different one-bounce overlay
disjoint ways that are built up by utilizing an
accumulation of transfer hubs. LB-OOMR gives load
adjusting at the application layer rather than IP layer,
which diminishes the system overhead and enhances
the system use. To decide an arrangement of ideal
split proportions for burden adjusting, a LP plan is
inferred, which is unraveled with a heuristic
calculation. The reenactment results demonstrate that
our proposed calculation is generally more proficient
in decreasing the clog proportion and enhancing the
unwavering quality of the system.
REFERENCE
[1] D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R.
Morris, “Resilient overlay networks,” Proceedings of SOSP 2001,
Oct. 2001.
[2] S. Banerjee, C. Kommareddy, K. Kar, B. Bhattacharjee, and S.
Khuller, “Construction of an efficient overlay multicast
infrastructure for real-time applications,” Proceedings of
INFOCOM 2003, April 2003.
[3] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, “Best-
path vs. multi-path overlay routing,” Proceedings of IMC 2003,
Oct. 2003.
*4+ C.L.T. Man, G. Hasegawa, and M. Murata, “Monitoring
overlay path bandwidth using an inline measurement
technique,” IARIA International Journal on Advances in
Systems and Measurements, vol.1, no.1, pp.50–60, Feb. 2008.
*5+ P. Rodriguez, S.M. Tan, and C. Gkantsidis, “On the feasibility
of commercial, legal P2P content distribution,” SIGCOMM
Computer Communication Review, vol.36, no.1, pp.75–78, Jan.
2006.
*6+ S. Seetharaman and M. Ammar, “Characterizing and
mitigating inter-domain policy violations in overlay routes,”
Proceedings of ICNP 2006, pp.259–268, Nov. 2006.
*7+ T. Karagiannis, P. Rodriguez, and K. Papagiannaki, “Should
Internet service providers fear peer-assisted content
distribution?,” Proceedings of IMC 2005, pp.6–6, Oct. 2005.
[8] IETF ALTO Working Group web site. available at http://
datatracker.ietf.org/wg/alto/.
[9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A.
Silberschatz, “P4P: Provider portal for applications,” SIGCOMM
Computer Communication Review, vol.38, no.4, pp.351–362,
Oct. 2008.
[10] Planet Lab web site. available at http://www.planet-lab.org/.
*11+ G. Hasegawa, Y. Hiraoka, and M. Murata, “Effectiveness of
overlay routing based on delay and bandwidth information,”
G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of
Computer Engineering In Research Trends, 3(11):589-595,November-2016.
©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 595
[12] S. J. Lee, S. Banerjee, P. Sharma, P. Yalagandula, and S. Basu,
“Bandwidth-aware routing in overlay networks,” Proceedings of
INFOCOM 2008, pp.1732–1740, April 2008.
[13] G. Smaragdakis, V. Lekakis, N. Laoutaris, A. Bestavros, J.W.
Byers, and M. Roussopoulos, “EGOIST: overlay routing using
selfish neighbor selection,” Proceedings of CoNEXT 2008, pp.1–
12, Dec. 2008.
[14] Z. Li and P. Mohapatra, “QRON: QoS-aware routing in
overlay networks,” IEEE Journal on Selected Areas in
Communications, vol.22, no.1, pp.29–40, Jan. 2004.
*15+ M. Kamel, C. Scoglio, and T. Easton, “Optimal topology
design for overlay networks,” Proceedings of NETWORKING
2007, pp.714– 725, May 2007.
*16+ R. Cohen and D. Raz, “Cost effective resource allocation of
overlay routing relay nodes,” Proceedings of INFOCOM 2011,
2011.
ABOUT THE AUTHORS
G.Lalitha is Pursing M.Tech CSE at Pragati engineering college, surampalem, and
completed B.Tech at ADARSH COLLEGE OF ENGINEERING CHEBROLU.
Name: Lakshmi Viveka K Designation: Assistant professor Dept.: CSE Areas of interest:
Networking, Security, Scheduling and IoT.
Leelavathy Narkedamilly has received her BE in Electronics and Communication
Engineering from Vasavi College of ngineering, Osmania University, Hyderabad, Telangana,
India in 1992 and her MTech in Computer Sciencefrom Jawaharlal Nehru Technological
University, Hyderabad,Telangana, India in 2003.She has received her Ph.D. in 2015 in
Computer Science and Engineering in the area of Image Processing from Jawaharlal Nehru
Technological University, Kakinada, East Godavari District, A.P., India. She is currently working as Professor
and Head of the Department, Computer Science and Engineering, Pragati Engineering College, Surampalem,
East Godavari District, Andhra Pradesh, India.She has sixteen years of experience in teaching undergraduate
and post-graduate students and four years of experience in IT industry. Her research interests are in the area
of Digital Image Processing, Image Watermarking, Cryptography, Hadoop, Big Data, and Network Security.

More Related Content

What's hot

JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay NodesJPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodeschennaijp
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
 
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET Journal
 
RTS service coverage analysis
RTS service coverage analysisRTS service coverage analysis
RTS service coverage analysisChangjie Chen
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
 
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...IJECEIAES
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ipAlvianus Dengen
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
 
DORA: Server Based VANETs and its Applications
DORA: Server Based VANETs and its ApplicationsDORA: Server Based VANETs and its Applications
DORA: Server Based VANETs and its ApplicationsIRJET Journal
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 

What's hot (20)

JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay NodesJPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
JPJ1433 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural NetworksIRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
IRJET- Efficient Data Dissemination using GWO Fuzzy in Neural Networks
 
RTS service coverage analysis
RTS service coverage analysisRTS service coverage analysis
RTS service coverage analysis
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningMaximizing Throughput using Adaptive Routing Based on Reinforcement Learning
Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning
 
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ip
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
 
DORA: Server Based VANETs and its Applications
DORA: Server Based VANETs and its ApplicationsDORA: Server Based VANETs and its Applications
DORA: Server Based VANETs and its Applications
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 

Viewers also liked

AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceIJCERT
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelIJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerIJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsIJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 

Viewers also liked (16)

AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related PerformanceOBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
OBD-II and Oxygen Sensor: Review the I.C Engine - Emissions related Performance
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 
Cloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin ModelCloud Partitioning of Load Balancing Using Round Robin Model
Cloud Partitioning of Load Balancing Using Round Robin Model
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 

Similar to Robust Resource Allocation in Relay Node Networks for Optimization Process

Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionseSAT Publishing House
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
Final Year IEEE Project 2013-2014 - Web Services Project Title and Abstract
Final Year IEEE Project 2013-2014  - Web Services Project Title and AbstractFinal Year IEEE Project 2013-2014  - Web Services Project Title and Abstract
Final Year IEEE Project 2013-2014 - Web Services Project Title and Abstractelysiumtechnologies
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...IEEEGLOBALSOFTTECHNOLOGIES
 
Distributed web systems performance forecasting
Distributed web systems performance forecastingDistributed web systems performance forecasting
Distributed web systems performance forecastingIEEEFINALYEARPROJECTS
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemIOSR Journals
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncctncct
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennaincct
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Projectncct
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projectsncct
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)ncct
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domainsncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domainsncct
 
Java Projects Ieee Projects
Java Projects Ieee ProjectsJava Projects Ieee Projects
Java Projects Ieee Projectsncct
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projectsncct
 

Similar to Robust Resource Allocation in Relay Node Networks for Optimization Process (20)

Grid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctionsGrid fabrication of traffic maintenance system clustering at road junctions
Grid fabrication of traffic maintenance system clustering at road junctions
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Final Year IEEE Project 2013-2014 - Web Services Project Title and Abstract
Final Year IEEE Project 2013-2014  - Web Services Project Title and AbstractFinal Year IEEE Project 2013-2014  - Web Services Project Title and Abstract
Final Year IEEE Project 2013-2014 - Web Services Project Title and Abstract
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
JAVA 2013 IEEE DATAMINING PROJECT Distributed web systems performance forecas...
 
Distributed web systems performance forecasting
Distributed web systems performance forecastingDistributed web systems performance forecasting
Distributed web systems performance forecasting
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology System
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncct
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
Wireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking ProjectWireless Networks Projects, Network Security Projects, Networking Project
Wireless Networks Projects, Network Security Projects, Networking Project
 
Polytechnic Projects
Polytechnic ProjectsPolytechnic Projects
Polytechnic Projects
 
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
Best Final Year Projects Latest New Innovative And Ieee 2009 2010 (1)
 
Software Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects DomainsSoftware Projects A Sp.Net Projects Ieee Projects Domains
Software Projects A Sp.Net Projects Ieee Projects Domains
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Ieee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects DomainsIeee Software Projects Java Projects Ieee Projects Domains
Ieee Software Projects Java Projects Ieee Projects Domains
 
Java Projects Ieee Projects
Java Projects Ieee ProjectsJava Projects Ieee Projects
Java Projects Ieee Projects
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projects
 

More from IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodIJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetIJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueIJCERT
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...IJCERT
 
V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceIJCERT
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.IJCERT
 

More from IJCERT (14)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
IJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSEIJCERT JOURNAL PUBLICATIONS HOUSE
IJCERT JOURNAL PUBLICATIONS HOUSE
 
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
 
V3 i301
V3 i301V3 i301
V3 i301
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
Ontology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold PreferenceOntology Based PMSE with Manifold Preference
Ontology Based PMSE with Manifold Preference
 
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.Green Computing: A Methodology of Saving Energy by Resource Virtualization.
Green Computing: A Methodology of Saving Energy by Resource Virtualization.
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Robust Resource Allocation in Relay Node Networks for Optimization Process

  • 1. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 589 Volume 3, Issue 11, November-2016, pp. 589-595 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Robust Resource Allocation in Relay Node Networks for Optimization Process 1 G.Lalitha, 2 Lakshmi Viveka K, 3 Leelavathy Narkedamilly 1 M.Tech, CSE Dept, Pragati Engineering College, Kakinada 2 Assistant Professor, Dept of CSE, Pragati Engineering College, Kakinada 3 Professor, HOD of CSE, Pragati Engineering College, Kakinada Abstract: Overlay steering has risen as a promising way to deal with enhance unwavering quality and effectiveness of the Internet. For one-jump overlay source steering, when a given essential way experiences the connection disappointment or execution debasement, the source can reroute the movement to the destination by means of a deliberately set transfer hub. Be that as it may, the over-substantial activity going through the same transfer hub may bring about incessant bundle misfortune and postponement jitter, which can corrupt the throughput and usage of the system. To defeat this issue, we propose a Load-Balanced One-jump Overlay Multipath Routing calculation (LB-OOMR), in which the activity is first part at the source edge hubs and afterward transmitted along numerous one-bounce overlay ways. So as to decide an ideal split proportion for the activity, we plan the issue as a direct programming (LP) definition, whose objective is to minimize the more regrettable case system blockage proportion. Since it is hard to take care of this LP issue in commonsense time, a heuristic calculation is acquainted with select the transfer hubs for building the disjoint one-jump overlay ways, which enormously lessens the computational multifaceted nature of the LP calculation. Reproductions in light of a genuine ISP system and an engineered Internet topology demonstrate that our proposed calculation can diminish the system clog proportion significantly, and accomplish top notch overlay directing administration. ——————————  —————————— 1. INTRODUCTION Overlay steering is an application-level directing component on overlay organizes that gives application-level courses to network application movement. An early and commonplace sample is the Resilient Overlay Network (RON) [1], in which every overlay hub measures the end-to-end idleness and bundle misfortune proportion of the system ways to different hubs. The way starting from the hub is resolved for the overlay system movement, which can be either an immediate way to the destination hub or a transfer way that navigates different node(s) before achieving the destination hub as delineated in Figure 1. In the present paper, the terms overlay directing and IP steering are utilized to allude to movement steering at the application-level and the IP-level, separately. One point of interest of overlay directing is that client saw system execution, for example, end-to-end dormancy and accessible data transmission, can be enhanced without adjusting the present IP system [2]– [4]. Such execution change is brought on basically by the strategy bungle between IP directing and overlay steering. IP directing is construct principally with respect to measurements, for example, switch level and Autonomous System (AS)- level bounce numbers. Furthermore, Internet Service Providers (ISPs) that work IP steering settle on their choices construct for the most part in light of money related contracts with their neighboring ISPs, which are either travel or peering connections. Travel connects and peering Available online at: www.ijcert.org
  • 2. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 590 joins have diverse financial charging components for activity trade, and each ISP arranges their directing as per contrasts. On the other hand, overlay directing worked by end clients principally picks the ways in a way in order to upgrade client saw execution. Hence, client saw execution is enhanced by overlay directing. Despite the fact that this arrangement jumble enhances end-to-end system execution, it creates an issue for the ISPs' cost structure. In particular, the between ISP travel cost (pretty much as travel expense in the rest of this paper) is expanded over the whole system [5], [6]. To lessen travel cost, the territory mindful strategy has been proposed in [7] that controls system movement in light of the region construed from the IP address prefix or space name. Be that as it may, those sorts of data are not generally suitable for assessing the territory of the Internet topology. Application-layer Traffic Optimization (ALTO) [8], which depends on the idea of P4P [9] is another methodology that endeavors to lessen travel cost by controlling active movement from an ISP while considering the usage of its associated travel and peering joins. Be that as it may, such a component can just improve active traf-fic from a solitary ISP, and it can't control approaching movement. Also, that system can't enhance the end-to-end system movement administered by various interconnected ISPs. To lessen travel cost over the whole system, a directing instrument in view of travel cost data between ISPs on end-to-end ways is required. Be that as it may, the agreement data between ISPs is not accessible by and large and a straightforward end-to- end estimation or estimation strategy to acquire this data has yet to be produced. Notwithstanding when such control component of overlay steering is acknowledged by ISPs or end clients, the issue of approach jumble is again raised. That is, when end clients control the overlay system in view of their own destinations, it might corrupt the fulfillment of ISPs, and the other way around. Along these lines, a novel strategy is required that considers the destinations of both ISPs and end clients. In the present study, we propose a novel technique to diminish the travel expense of overlay directing while bookkeeping Fig. 1 Overlay routing Fig. 2 Increase in number of traversed transit links by overlay routing For the stances of end clients and ISPs, which we call a constrained overlay directing. The proposed technique picks overlay-directed ways utilizing a travel cost metric of the ways. We propose two sorts of way determination strategies for the restricted overlay steering, which target end clients and ISPs destinations, individually. The constrained overlay steering needs the travel cost metric of overlay-directed ways. For this reason, we develop a technique to evaluate the travel expense of overlay-steered ways from end-to-end system execution values that can be measured effortlessly by overlay hubs, for example, switch level jump tally, end-to-end inactivity and accessible transfer speed. The estimation technique depends on various relapse examinations of system execution values. We show the adequacy of the proposed strategy by assessing the execution of the overlay steering that is
  • 3. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 591 thought to be worked on overlay systems on a PlanetLab [10] and a Japanese business system situations. To set a benchmark for the talk, we first assess the execution change of the overlay directing without a restriction on the travel cost metric. Next, we assess the constrained overlay directing utilizing exact data on the sorts of between AS connections. At that point, we demonstrate the relapse mathematical statements used to gauge estimation of the travel cost metric for both situations. After that, we assess the execution of the restricted overlay directing by utilizing the proposed estimation strategy and talk about parameter settings from the viewpoints of ISPs and end clients. The rest of the present paper is composed as takes after. In Section 2, research foundation on overlay steering is given and the issue of expanded travel expense and motivators for diminishing it are depicted. In Section 3, we propose a technique to diminish travel cost. In Section 4, we clarify the dataset utilized for assessment of the proposed technique, and afterward we display the consequences of the assessment in Section 5. At last, in Section 6, we compress our decisions. 2. BACKGROUND ON OVERLAY ROUTING 2.1 Effectiveness of overlay routing Overlay steering can enhance end-to-end system execution by picking the ways in light of use level system execution measurements, for example, end-to- end inactivity, bundle misfortune proportion, accessible data transfer capacity, and TCP throughput. This point of interest of overlay directing is chiefly a consequence of the arrangement befuddled between IP steering and overlay directing. Overlay directing normally settles on their steering choices that enhance client saw execution utilizing these measurements. On the other hand, IP steering is constructing principally with respect to measurements, for example, switch level and AS-level jump numbers, which don't generally associate to client saw execution. Moreover, ISPs have their own particular cost structures in light of business contracts with their neighboring ISPs, and IP-level directing designs are influenced extensively by these cost structures. Two sorts of connections are normal between ASes† : travel interfaces that associate the upper-level and the lower- level ISPs, and peering joins that are utilized for peering relationship. The fiscal expense of the travel connection is normally dictated by the measure of movement crossing the connection, and travel connections can be utilized by an ISP's clients. Interestingly, there is no money related charge for peering joins, aside from the cost paid to bearer organizations for the physical connection offices. In this manner, peering connections can be utilized just by activity between interconnected ISPs. Figure 1 demonstrates a normal illustration of the upside of overlay directing. We expect that IP steering utilizes the immediate way and overlay directing picks the transfer way. The length of the bolts speaks to the estimation of the end-to-end idleness, which is the whole of the engendering defers and defers brought about by blockage at the switches. Looking at the direct and hand-off ways, the immediate way has a lower switch level jump number yet a higher end-to- end inactivity. Such a circumstance happens, for example, as a result of the blockage at the switches. Hence, the overlay directing gives better user perceived execution (i.e., lower end-to-end dormancy) than the IP steering. For instance, [11] appeared from their assessment results for a PlanetLab situation that overlay steering could diminish end-to-end inactivity in more than 80% of end-to-end ways. 2.2 Impact on the cost structure of ISPs In spite of the fact that overlay directing can enhance client saw execution, it might likewise create activity that does not take after to the ISPs' cost structure (i.e., the IP steering approach gave by the ISPs), thus the ISPs may bring about extra money related expense because of such movement. On the off chance that these cost increments aggregate, the travel cost over the whole system is expanded.
  • 4. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 592 Figure 2 demonstrates a basic case of this issue in which three end has, all of which act as overlay hubs, are associated by overlay interfaces each other. Every overlay join incorporates different between AS connections, each of which is either a travel (strong line) or peering (dashed-line) join. We expect that Node A creates movement that is steered to Node C. At the point when utilizing the IP or overlay steering that picks the immediate way, the movement crosses two travel joins. Then again, when the overlay steering uses the hand-off way by means of Node B, the movement navigates four travel joins between Nodes An and B, and those between Nodes B and C. In this way, the aggregate of the travel joins navigated by the transfer way is expanded by two contrasted and the immediate way and as an outcome, the travel cost over the whole system increments. Actually, there are conceivable outcomes that the hand-off way has lower travel taken a toll than the immediate way. Nonetheless, we consider that the transfer way as a rule has a higher travel taken a toll since it is made out of various direct ways. 2.3 Related works The technique proposed in [12] chooses the overlay ways using estimation aftereffects of limit and accessible data transmission. In [13], the creators introduce the strategy to develop and keep up overlay systems for enhancing client saw execution by narrow minded neighbor hub determination. In [14], the creators propose QoS-mindful overlay directing by adjusting overlay activity among overlay hubs. Every one of them focus to enhance client saw execution, for example, end-to-end inactivity and accessible data transfer capacity for end clients' activity, which is not indicated for specific sorts of use. This element is the same as that of our strategy proposed in this paper. In any case, the strategies proposed in [12]–[14] are not treat the between ISP travel cost that causes an impressive effect from the overlay steering as depicted in Subsection 2.2. The strategy proposed in [15] utilizes an expense for overlay way creation and overlay activity directing in a theoretical way and upgrades the expense. In [16], the creators concentrate on the asset assignment on overlay systems and attempt to give it as enhancement issue. In spite of the fact that these strategies can treat different sorts of expense by incorporating it in their enhancement issues, they have not considered the between ISP travel cost. 3. PROPOSED METHOD We first clarify the system model used in the present paper. Next, we propose a constrained overlay steering with two way choice techniques. One of those strategies suitable to the point of view of end clients and the other is for that of ISPs. At that point, we show some utilization cases from both angles. At last, we propose a strategy for evaluating a travel cost metric from system execution values that can be gotten effortlessly. Fig. 3 Network model 3.1 Network model We expect the system model delineated in Figure 3. The underlay system is developed from various ASes, and each AS is built from various IP switches. Each AS is associated with its neighbors by travel or peering joins. A travel expense is caused at whatever point activity crosses a travel join. Note that we disregard which ISPs associated by travel connections are upper-level or lower-level ISPs, since we consider decrease in the travel cost over the whole system.
  • 5. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 593 An overlay system is developed over the underlay system and end has situated at ASes execute as overlay hubs. We term overlay hubs pretty much as hubs in the rest of the present paper. We accept that the overlay steering can use the overlay joins between all hub sets to assess the potential execution to lessen the travel cost because of the overlay directing. The development strategy for the overlay system topology is past the extent of the present paper. An overlay steering is worked on the overlay arrange and can give a course from the source hub to the destination hub. We consider the accompanying two sorts of overlay steered ways. Direct path It is a way from the source hub to the destination hub that is steered straightforwardly. An immediate way comprises of just a solitary overlay join between the source and destination hubs, thus the immediate way is equivalent to that gave by IP-level steering alone. Relay path It is a way from the source hub to the destination hub by means of another hub. Here, we consider just two- bounce ways, since ways with more prominent jump numbers don't add to enhance client saw execution [11]. Subsequently, a hand-off way comprises of two overlay joins. 3.2 Limited overlay directing The restricted overlay steering can be actualized utilizing any of the measurements connected with travel joins. As a speculation, we portray the restricted overlay steering utilizing just a travel cost metric. How, mi j is the estimation of the travel cost metric for the overlay join between hubs i and j. Henceforth, the estimation of travel cost metric for the immediate way between hubs i and j and that of the hand-off way by means of hub k are given, separately, as takes after. Mi j = mi j Mik j = mik + mk j 3.2.1 Improving user-perceived performance under interISP transit cost constraint One way choice technique concentrates on the maximum furthest reaches of expansions in the estimation of travel cost metric. This determination strategy considers the end clients' destinations. The limitation on the estimation of travel cost metric while picking a transfer way rather than an immediate way is characterized as takes after. Mik j ≤ Mi j + α Where α is the maximum furthest reaches of the expansion in the estimation of travel cost metric through utilizing the hand-off way. The overlay steering hence chooses the hand-off way with the most ideal execution from all hopefuls under this imperative. Here, the execution of direct way between hubs i and j is signified Pi j, and the execution of hand-off way through hub k is indicated Pik j. At that point, we characterize the change proportion of client saw execution, which is indicated ˆIi j, as takes after. ii j = Pi j/min k,i, j ( Pik j) Ii j = max k,i, j ( Pik j) /Pi j Here, Equation (4a) is utilized as a part of the case that a low execution metric worth speaks to better execution, for example, end-to-end dormancy. On the other hand, Equation (4b) is utilized when a high esteem speaks to better execution, for example, accessible transmission capacity. Note that when no transfer way has preferred execution over the immediate way, the change proportion gets to be littler than one. As such, the overlay steering with this way determination technique gives the execution change to the information transmission between hubs under the restriction on the expansion level of the estimation of travel cost metric. 3.2.2 Reducing inter-ISP transit cost under user- perceived performance constraint
  • 6. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 594 The other way determination technique concentrates on the decline in the overlay directing execution. This strategy considers the ISPs' goals. At the point when the best execution by the overlay steering between hubs i and j without considering the estimation of travel cost metric is given by the hand-off way by means of hub l, we characterize the requirements on the level of reduction in overlay directing execution as takes after. Pik j ≤ Pil j × (1 + β) Pik j ≥ Pil j × (1 − β) Where β decides the lower furthest reaches of the decline level of the execution of the overlay directing contrasted and the best execution. Note that when a low esteem speaks to better execution, Equation (5a) ought to be fulfilled, and when a high esteem speaks to better execution, Equation (5b) ought to be fulfilled. At that point, the overlay steering chooses a way with the most minimal estimation of travel cost metric while fulfilling Equations (5a) or (5b). The decrease in the estimation of travel cost metric, which is meant as Mˆ i j, can be characterized as takes after. Mˆ i j = Mil j − min k,i, j ( Mik j) As it were, this way determination technique can diminish the estimation of travel cost metric under a given abatement in the client saw execution contrasted and that of the best way. 4. CONCLUSION In this paper, a one-jump overlay multipath steering plan (LB-OOMR) is tended to by considering the heap adjusting and the way assorted qualities. In our proposed plan, when a way comes up short, the source parts the movement and reroutes them to the destination along different one-bounce overlay disjoint ways that are built up by utilizing an accumulation of transfer hubs. LB-OOMR gives load adjusting at the application layer rather than IP layer, which diminishes the system overhead and enhances the system use. To decide an arrangement of ideal split proportions for burden adjusting, a LP plan is inferred, which is unraveled with a heuristic calculation. The reenactment results demonstrate that our proposed calculation is generally more proficient in decreasing the clog proportion and enhancing the unwavering quality of the system. REFERENCE [1] D. G. Andersen, H. Balakrishnan, M. F. Kaashoek, and R. Morris, “Resilient overlay networks,” Proceedings of SOSP 2001, Oct. 2001. [2] S. Banerjee, C. Kommareddy, K. Kar, B. Bhattacharjee, and S. Khuller, “Construction of an efficient overlay multicast infrastructure for real-time applications,” Proceedings of INFOCOM 2003, April 2003. [3] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, “Best- path vs. multi-path overlay routing,” Proceedings of IMC 2003, Oct. 2003. *4+ C.L.T. Man, G. Hasegawa, and M. Murata, “Monitoring overlay path bandwidth using an inline measurement technique,” IARIA International Journal on Advances in Systems and Measurements, vol.1, no.1, pp.50–60, Feb. 2008. *5+ P. Rodriguez, S.M. Tan, and C. Gkantsidis, “On the feasibility of commercial, legal P2P content distribution,” SIGCOMM Computer Communication Review, vol.36, no.1, pp.75–78, Jan. 2006. *6+ S. Seetharaman and M. Ammar, “Characterizing and mitigating inter-domain policy violations in overlay routes,” Proceedings of ICNP 2006, pp.259–268, Nov. 2006. *7+ T. Karagiannis, P. Rodriguez, and K. Papagiannaki, “Should Internet service providers fear peer-assisted content distribution?,” Proceedings of IMC 2005, pp.6–6, Oct. 2005. [8] IETF ALTO Working Group web site. available at http:// datatracker.ietf.org/wg/alto/. [9] H. Xie, Y. R. Yang, A. Krishnamurthy, Y. G. Liu, and A. Silberschatz, “P4P: Provider portal for applications,” SIGCOMM Computer Communication Review, vol.38, no.4, pp.351–362, Oct. 2008. [10] Planet Lab web site. available at http://www.planet-lab.org/. *11+ G. Hasegawa, Y. Hiraoka, and M. Murata, “Effectiveness of overlay routing based on delay and bandwidth information,”
  • 7. G.Lalitha et.al," Robust Resource Allocation in Relay Node Networks for Optimization Process”, International Journal of Computer Engineering In Research Trends, 3(11):589-595,November-2016. ©2016, IJCERT All Rights Reserved DOI:10.22362/ijcert/2016/v3/i11/1211 Page | 595 [12] S. J. Lee, S. Banerjee, P. Sharma, P. Yalagandula, and S. Basu, “Bandwidth-aware routing in overlay networks,” Proceedings of INFOCOM 2008, pp.1732–1740, April 2008. [13] G. Smaragdakis, V. Lekakis, N. Laoutaris, A. Bestavros, J.W. Byers, and M. Roussopoulos, “EGOIST: overlay routing using selfish neighbor selection,” Proceedings of CoNEXT 2008, pp.1– 12, Dec. 2008. [14] Z. Li and P. Mohapatra, “QRON: QoS-aware routing in overlay networks,” IEEE Journal on Selected Areas in Communications, vol.22, no.1, pp.29–40, Jan. 2004. *15+ M. Kamel, C. Scoglio, and T. Easton, “Optimal topology design for overlay networks,” Proceedings of NETWORKING 2007, pp.714– 725, May 2007. *16+ R. Cohen and D. Raz, “Cost effective resource allocation of overlay routing relay nodes,” Proceedings of INFOCOM 2011, 2011. ABOUT THE AUTHORS G.Lalitha is Pursing M.Tech CSE at Pragati engineering college, surampalem, and completed B.Tech at ADARSH COLLEGE OF ENGINEERING CHEBROLU. Name: Lakshmi Viveka K Designation: Assistant professor Dept.: CSE Areas of interest: Networking, Security, Scheduling and IoT. Leelavathy Narkedamilly has received her BE in Electronics and Communication Engineering from Vasavi College of ngineering, Osmania University, Hyderabad, Telangana, India in 1992 and her MTech in Computer Sciencefrom Jawaharlal Nehru Technological University, Hyderabad,Telangana, India in 2003.She has received her Ph.D. in 2015 in Computer Science and Engineering in the area of Image Processing from Jawaharlal Nehru Technological University, Kakinada, East Godavari District, A.P., India. She is currently working as Professor and Head of the Department, Computer Science and Engineering, Pragati Engineering College, Surampalem, East Godavari District, Andhra Pradesh, India.She has sixteen years of experience in teaching undergraduate and post-graduate students and four years of experience in IT industry. Her research interests are in the area of Digital Image Processing, Image Watermarking, Cryptography, Hadoop, Big Data, and Network Security.