SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 10 | Page
Route Reservation In Adhoc Wireless Networks
Karthiga B.S ,Thresphine J.R
Department of Information Technology
PRIST UNIVERSITY, PUDUCHERRY
Abstract β€” this paper deals with whether and when Reservation Based (RB) communication can yield better
delay performance than NRB Communication in Ad hoc Wireless Networks. In addition to posing this
fundamental question (in terms of route discovery, MAC protocol and pipelining etc), the requirements for
making RB switching superior to NRB switching are also identified. While the conventional wisdom in current
adhoc wireless networking research favours NRB switching, when and under which conditions RB switching
might be preferable. Even under these strict and futuristic conditions, while RB switching provide a better delay
performances, NRB switching can generally achieve higher network good put and throughput. It is important to
understand that if these conditions are not satisfied, then NRB switching will be probable preferable. A novel
analytical framework is developed and the network performance under both schemes is quantified. This
advantage comes at the expense of lower throughput and goodput compared to NRB schemes.
Keywordsβ€” Ad hoc wireless networks, resource reservation, performance analysis, bit error rate, goodput,
throughput, delay
I. INTRODUCTION
The two principal switching techniques used in wired networks are circuit switching and packet
switching [1]. One of the main differences between them is the way resources are shared. Circuit switching
provides exclusive access to the resources by means of reservation. In packet switching, resources are shared on
demand, without prior reservation. In this paper, we investigate the performance of two switching paradigms:
reservation-based (RB) and non-reservation-based (NRB) switching. The concepts of reservation and non-
reservation are analogous to those of circuit switching and packet switching in wired networks, respectively.
However, there are some important differences, which can be summarized as follows:
In an NRB (Non Reservation Based) scheme, an intermediate node can simultaneously serve as relay for
more than one source. Hence, the resources (in terms of relaying nodes) are shared in an on-demand fashion.
This is typical for most of the routing protocols for wireless ad hoc networks proposed in the literature [2].
In an RB scheme, a source first reserves a multihop route to its destination, i.e., it reserves intermediate
nodes before the actual transmission begins. The reserved intermediate nodes are required to relay only the
message generated by the specific source. This gives the source an exclusive access to the path to the
destination. This particular route reservation approach for ad hoc wireless networks was first introduced in [3].
One of the important contributions of this work is to identify under which conditions, the delay
performance of the RB scheme can be superior to the NRB scheme.
II. OBJECTIVE OF THE PAPER
To create a new method of establishing and monitoring the routes prior to actual transmission of data.
The reserved path could enrich a good way to reach the destination without any loss or corruption or damage of
the transmitting data. Although, the main body of this analysis refers to ad hoc wireless networks with fixed
nodes, for example, sensor networks and wireless networks, it is also important to extend the scenario with
mobile nodes.
III. RESERVATION-BASED (RB) SWITCHING
The principle of operation of an RB scheme is: Prior to data transmission, a source node reserves a
multihop route to the destination through a route discovery phase [4]. Once an intermediate node agrees to relay
traffic for a particular source in the network, it cannot initiate a session or relay messages for any other source
until the on-going session is over. The source node releases the route after the session ends.
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 11 | Page
Figure 3.1 Reservation-based ad hoc wireless network models
In other words, the intermediate nodes dedicate their processing time only to the source which reserved
the route; however, reservation of a multihop route does not give any node an exclusive access to the shared
radio. Fig. 3.1 illustrates an example of reserved routes in a network where an RB scheme is used.
Fig 3.2 Conceptual queuing model for a reservation-based wireless network
IV NON-RESERVATIONBASED (NRB) SWITCHING
In NRB switching, there is no reservation of a route prior to data transmission. As opposed to an RB
scheme, in an NRB network communication scenario, multihop routes can overlap. In particular, a node can
serve as a relay node for more than one route. In other words, when a node receives a message from another
node (i.e., it acts as a relay), it places that message in its own queue (intermingled with its own generated
messages). The messages in the queue are transmitted sequentially (i.e., the priority given to relay and new
locally generated messages is the same). An example of routes in a network with an NRB scheme is shown in
Fig. 4.1.
Fig 4.1: Non-reservation-based ad hoc wireless network models
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 12 | Page
Unlike the case with RB switching, each multihop route is a tandem of queues and the whole network
can also be viewed as a tandem of queues. As a result, Burke’s theorem can be applied and each individual node
can be modeled as an M/M/.1 queue [1]. The conceptual model of an NRB network is shown in Fig. 4.2.
Fig 4.2 Conceptual queuing model for a reservation-based wireless network
V NETWORK MODELS AND ASSUMPTIONS
Network topology: Network Topology considered here is a square grid topology, with N nodes
distributed over a surface with finite area A. The node spatial density is defined as the number of nodes per unit
area and denoted as _sΒΌ4 N=A (dimension: Β½m_2_).
Figure 5.1: Tier structure of a grid network
In square grid topology, each node has four nearest neighbors. An example of such network topology is
shown in Fig. 5.1. Due to the structure of the square grid topology, the distance to the nearest neighbor, denoted
by rlink, is fixed, and a route corresponds to a sequence of hops with equal length.
Typical Routes: In a peer-to-peer ad hoc wireless network, where source/destination pairs are randomly
selected, the number of hops in each route is likely to be different. The routes with an average number of hops
are typical. Now, the average number of hops in a multihop route in a networking scenario with grid topology is
estimated.
Mobility: Although this work refers to ad hoc wireless networks with fixed nodes (e.g., sensor networks [5]
and wireless mesh networks [6]), it could be extended to a scenario with mobile nodes.
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 13 | Page
Assumptions for RB and NRB switching are as follows:
ο‚· Each node in the network generates messages according to a Poisson process with average arrival rate
_m (dimension: [msg/s]). While a node is acting as a relay, it still generates its own messages, which
are buffered for future transmission.
ο‚· The message length Lm is exponentially distributed3 with average value Lm (dimension: [b/msg]).
Considering a fixed transmission data rate Rb, the message duration is therefore exponentially
distributed with a mean value equal to Lm=Rb.
ο‚· Since intermediate nodes on a multihop route serve only one source node at a time, simultaneously
active multihop routes are disjoint. In addition, given that each multihop route has a certain average
length, there exists a maximum average number, denoted by Cs, of simultaneously active routes.
ο‚· If the number of nodes wishing to activate a multihop route is larger than Cs, then some nodes have to
wait before they can activate the route. The amount of time that a node has to wait before it can activate
a route is β€œaccess delay.”
ο‚· The route activation process can be described by a conceptual β€œvirtual request queue” which regulates
requests from all sources (see Fig. 2b and Fig. 3).
ο‚· The total delay between generation and complete transmission of a message, at each source node, is
obtained by adding three terms: 1) the time spent in the node’s own queue (denoted by WRB ), 2) the
time spent in the virtual request queue (denoted by WRB v ), and 3) the time spent in the server
(denoted by TRB s ). In particular, the queue at each node can be modeled as an M=G=1 queue with
service time _RB ΒΌ WRB v ΓΎ TRB s.
ο‚· The combination of the virtual request queue and the Cs virtual servers will be denoted as β€œvirtual
overlay system.” In particular, there are N flows of information at its input, coming from the N nodes.
VI ANALYSIS OF DELAY OF TWO SWITCHING TECHNIQUES
In an RB Switching scheme, With the assumptions specified in Section 4.1, each node is modeled as an
M=G=1 queue. The average delay that each message experiences is equal to the sum of the mean waiting time
in the source queue, denoted as EΒ½WRB o _, and the mean service time EΒ½_RB_, where, as previously defined,
_RB ΒΌ WRB v ΓΎ TRB s . The mean waiting time in an M=G=1 queue can be computed using the Pollaczeck-
Khinchin formula [1]:
E[Wo
RB
] =
m E[RB
2
]
2(1 βˆ’ m E[RB ])
(1)
It is clear from (1) that that one needs to compute the first and second moments of the service time 𝜏 𝑅𝐡,
which can be derived from the statistics of the total time spent in the M/M/Cs/1/N virtual overlay system. The
probability density function (pdf) of the time spent in the M/M/Cs/1/N system is [32]
π‘“πœ 𝑅𝐡
π‘₯ β‰œ πœ‡πœ–βˆ’πœ‡π‘₯
π‘Ž 𝑛
𝐢 π‘ βˆ’1
𝑛=0
+ π‘Ž 𝑛
π‘βˆ’1
𝑛=𝐢 𝑠
πœ‡πœ–βˆ’πœ‡π‘₯
𝐢𝑠
𝐢𝑠 βˆ’ 1
π‘›βˆ’πΆ 𝑠+1
βˆ’πœ‡
𝐢𝑠
𝐢𝑠 βˆ’ 1
π‘›βˆ’πΆ 𝑠+1
π‘’βˆ’πœ‡π‘₯
π‘›βˆ’πΆ 𝑠
π‘Ÿ=0
[πœ‡(𝐢𝑠 βˆ’ 1)π‘₯] π‘Ÿ
π‘Ÿ!
(2)
Where π‘Ž 𝑛 is the probability that a new arrival finds n β€œcustomers” in the virtual overlay system (i.e., n
nodes are transmitting or waiting to start transmitting an already generated message), and is the average service
rate.
The probability distribution {π‘Ž 𝑛 } of the number of customers that a new arrival sees in an M/M/Cs/1/N
system involves the computation of large factorials (e.g., N!), which leads to numerical problems. To analyze a
large-scale ad hoc network, we exploit the fact that when the number of sources is large, the steady-state
probability distribution of an M/M/Cs/1/N system follows that of an M/M/Cs system [32]. The first and second
moments of the time that each message spends in the system are given by
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 14 | Page
E[Ο„RB ] =
1
ΞΌ
+
Ξ“(Cs,
Ξ»m
ΞΌ
)
ΞΌCs βˆ’ Ξ»m
(3)
E[Ο„RB
2
] =
2
ΞΌ2
+
2Ξ“(Cs,
Ξ»m
ΞΌ
)
[ΞΌCs βˆ’ Ξ»m ]2
(4)
where
Ξ“(Cs,
Ξ»m
ΞΌ
) =
πœ† π‘š
πœ‡
2
𝑛!
𝐢 π‘ βˆ’1
𝑛=0
+
πœ† π‘š
πœ‡
Cs! 1 βˆ’
πœ† π‘š
πœ‡πΆπ‘ 
𝑋
πœ† π‘š
πœ‡
𝐢 𝑠
Cs! 1 βˆ’
πœ† π‘š
πœ‡πΆπ‘ 
(5)
Since the route is reserved, it is possible to transmit a message from source to destination using a pipelining
method. Assuming that the whole message of length 𝐿 π‘š bits is divided into packets of fixed length 𝑙 𝑝 bits, the
total number of packets per message is 𝐿 π‘š /𝑙 𝑝. Suppose there are π‘›β„Ž links on a route from source to destination.
The total time to transmit a message with a pipelining method can be computed as
𝜏 𝑆
𝑅𝐡
=
𝐿 π‘š
𝑅 𝑏
+ π‘›β„Ž βˆ’ 1
𝑙 𝑝
𝑅 𝑏
(6)
Consequently, the total transmission time 𝑇𝑠
𝑅𝐡
, as given in (5), is not exponentially distributed. This
violates the exponential service time assumption. However, if 𝐿 π‘šβ‰« π‘›β„Ž 𝑙 𝑝, then the second term on the right hand
side of (5) is negligible, and the exponential service time assumption still holds.
In the case of retransmission, the message transmission time can be generalized as
𝑇𝑆
𝑅𝐡
=
𝐿 π‘š
𝑅 𝑏
1 + 𝐾 + π‘›β„Ž βˆ’ 1
𝑙 𝑝
𝑅 𝑏
1 + 𝐾
(7)
where K is the number of retransmissions per link. Since K is a discrete random variable, the transmission time
becomes a function of two random variables (𝐿 π‘š and K). The pdf of the total delay in this case can be written as
𝑓𝑇𝑠
𝑅𝐡
𝑑 =
πœ‡π‘’
πœ‡π‘‘
1+𝑗
1 + 𝑗
∞
𝑗 =0
π‘ƒπΈπ‘…π‘™π‘–π‘›π‘˜
𝑗
1 βˆ’ π‘ƒπΈπ‘…π‘™π‘–π‘›π‘˜ 𝑒(𝑑)
(8)
where u(t) is the unit step function, defined as
𝑒(𝑑) β‰œ
1 𝑑 β‰₯ 0
0 𝑑 < 0
(9)
In particular, (8) can be derived directly from the total probability theorem; the expression in the first
square bracket is the conditional pdf of the transmission time given that the number of retransmission is j, and
the expression in the second square bracket is the probability mass function of the random variable K.
The pdf given in (8) is not exponential, and it may not have a closed-form expression. Fortunately,
given that the number of retransmissions is j, the conditional pdf of the transmission time has the following
exponential structure:
𝑓𝑇𝑠
𝑅𝐡
𝑑
𝑗
=
πœ‡
1 + 𝑗
𝑒
πœ‡π‘‘
1+𝑗 𝑒(𝑑)
(10)
Consequently, even in the case of retransmissions, one can still analyze the delay performance of the
network communication system using the same queuing model, but with a modified service time. From (10), it
can easily be observed that the new mean service time is
1+𝑗
πœ‡
. To take advantage of this, the number of
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15
www.ijres.org 15 | Page
retransmissions j must be specified. To be conservative, the number of per-link packet retransmissions which
will be used in the following is the maximum number of retransmissions is denoted by π‘˜ π‘šπ‘Žπ‘₯ . In this case, the
service time is exponential with mean service time
𝐿 π‘š 𝐾 π‘šπ‘Žπ‘₯ +1
𝑅 𝑏
In NRB, since each source does not have a dedicated route, a message transmitted in a route will
experience, in addition to the transmission delay, a queuing delay at each node it traverses. According to the
applicability of Burke’s theorem to an NRB switching network [1]), the average delay that a packet experiences
at each node it traverses corresponds to that of an M/M/1 queue and is given by
𝐸 𝑇 𝑁𝑅𝐡
=
1
𝑅 𝑏
𝐿 π‘š
βˆ’ total
(11)
The total average delay for a message from the source node to the destination node of a multihop route
is obtained as the sum of the average delays experienced at each intermediate node. In other words, 𝐸 π‘‡π‘‘π‘œπ‘‘π‘Žπ‘™
𝑁𝑅𝐡
=
π‘›β„Ž 𝐸 𝑇 𝑁𝑅𝐡
.
Given that the average number of retransmissions is 𝐾 π‘šπ‘Žπ‘₯ , the service time for transmitting a packet is
still exponentially distributed. If a message of size Lm bit is divided into packets of fixed length lp b/pck, this
time it takes to transmit a single packet is (1 + 𝐾 π‘šπ‘Žπ‘₯ ) / 𝑅 𝑏 . Since there are 𝐿 π‘š /𝑝𝑏 packets in a message, the time
the last packet will reach the next hop is (1 + kmax) 𝐿 π‘š /𝑅 𝑏 . Hence, in the case with retransmission, the expected
per-link message transmission time in (2) is given by
𝐸 𝑇 𝑁𝑅𝐡
=
1
𝑅 𝑏
𝐿 π‘š
βˆ’ total
(12)
VI CONCLUSION
This work answers an interesting question: if and when reservation-based switching makes sense in
contemporary wireless ad hoc networks. If the right requirements (in terms of route discovery, MAC protocol
used, pipelining, etc.) are met, then RB switching schemes can provide better delay performance than NRB
switching schemes. In return, the throughput and goodput performance of NRB schemes, even under these
somewhat stringent requirements, seem to be superior to RB schemes. This paper also provides the analytical
framework and model (queuing models) developed for analyzing the network performance (in terms of delay)
under the RB and NRB switching schemes. While RB schemes can provide better delay performance, NRB
schemes support higher traffic loads than RB schemes. In addition, NRB schemes can support a higher number
of routes because there is no constraint for the routes to be disjoint. Finally, RB schemes are more robust to
node mobility than NRB schemes.
REFERENCES
[1] D. Bertsekas and R. Gallager, Data Networks. Prentice Hall, 1992.
[2] E.M. Royer and C.-K. Toh, β€œA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal
Comm. Magazine, vol. 6, no. 2, pp. 46-55, Apr. 1999.
[3] G. Ferrari and O.K. Tonguz, β€œPerformance of Ad Hoc Wireless Networks with Aloha and PR-CSMA MAC Protocols,” Proc.
IEEE GLOBECOM, pp. 2824-2829, Dec. 2003.
[4] C.E. Perkins, Ad Hoc Networking. Addison-Wesley,2001.
[5] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, β€œA Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no.
8, pp.102-114, Aug.2002.
[6] B. Schrick and M.J. Riezenman, β€œWireless Broadband in a Box,” IEEE Spectrum, vol. 39, no. 6, pp. 38-43, June 2002.

More Related Content

What's hot

Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
Β 
Impact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyImpact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyElmabruk Elgembari
Β 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
Β 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Β 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Β 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
Β 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETidescitation
Β 
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...TELKOMNIKA JOURNAL
Β 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
Β 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
Β 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Β 
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...INFOGAIN PUBLICATION
Β 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Β 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
Β 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
Β 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...ijwmn
Β 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Β 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
Β 

What's hot (18)

Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
Β 
Impact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-CopyImpact Duration Time Session over The 19-Copy
Impact Duration Time Session over The 19-Copy
Β 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
Β 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
Β 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
Β 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Β 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
Β 
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Topology Design of Extended Torus and Ring for Low Latency Network-on-Chip Ar...
Β 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
Β 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
Β 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Β 
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...
4 ijaems jan-2016-8-performance analysis of mixed line rate optical wdm netwo...
Β 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Β 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
Β 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
Β 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
Β 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
Β 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Β 

Similar to Route Reservation In Adhoc Wireless Networks

Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Β 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
Β 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Β 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
Β 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Β 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAlexander Decker
Β 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Β 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
Β 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
Β 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
Β 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
Β 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Β 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
Β 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Β 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
Β 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Β 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Β 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
Β 

Similar to Route Reservation In Adhoc Wireless Networks (20)

Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Β 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
Β 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Β 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
Β 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
Β 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
Β 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Β 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Β 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Β 
H01115155
H01115155H01115155
H01115155
Β 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Β 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Β 
M010226367
M010226367M010226367
M010226367
Β 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
Β 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
Β 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
Β 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
Β 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
Β 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
Β 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Β 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
Β 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
Β 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Β 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
Β 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Β 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
Β 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Β 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Β 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Β 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Β 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Β 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
Β 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
Β 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
Β 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
Β 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Β 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Β 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
Β 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
Β 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
Β 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
Β 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Β 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Β 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Β 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
Β 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
Β 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
Β 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
Β 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
Β 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
Β 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
Β 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
Β 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
Β 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
Β 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
Β 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Β 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Β 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
Β 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
Β 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Β 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Β 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Β 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Β 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Β 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
Β 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
Β 
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Patryk Bandurski
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Β 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
Β 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Β 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
Β 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
Β 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
Β 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Β 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Β 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Β 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Β 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Β 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
Β 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Β 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Β 
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Β 
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY πŸ” 8264348440 πŸ” Call Girls in Diplomatic Enclave | Delhi
Β 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Β 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Β 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
Β 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Β 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Β 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Β 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Β 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
Β 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
Β 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Β 

Route Reservation In Adhoc Wireless Networks

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 10 | Page Route Reservation In Adhoc Wireless Networks Karthiga B.S ,Thresphine J.R Department of Information Technology PRIST UNIVERSITY, PUDUCHERRY Abstract β€” this paper deals with whether and when Reservation Based (RB) communication can yield better delay performance than NRB Communication in Ad hoc Wireless Networks. In addition to posing this fundamental question (in terms of route discovery, MAC protocol and pipelining etc), the requirements for making RB switching superior to NRB switching are also identified. While the conventional wisdom in current adhoc wireless networking research favours NRB switching, when and under which conditions RB switching might be preferable. Even under these strict and futuristic conditions, while RB switching provide a better delay performances, NRB switching can generally achieve higher network good put and throughput. It is important to understand that if these conditions are not satisfied, then NRB switching will be probable preferable. A novel analytical framework is developed and the network performance under both schemes is quantified. This advantage comes at the expense of lower throughput and goodput compared to NRB schemes. Keywordsβ€” Ad hoc wireless networks, resource reservation, performance analysis, bit error rate, goodput, throughput, delay I. INTRODUCTION The two principal switching techniques used in wired networks are circuit switching and packet switching [1]. One of the main differences between them is the way resources are shared. Circuit switching provides exclusive access to the resources by means of reservation. In packet switching, resources are shared on demand, without prior reservation. In this paper, we investigate the performance of two switching paradigms: reservation-based (RB) and non-reservation-based (NRB) switching. The concepts of reservation and non- reservation are analogous to those of circuit switching and packet switching in wired networks, respectively. However, there are some important differences, which can be summarized as follows: In an NRB (Non Reservation Based) scheme, an intermediate node can simultaneously serve as relay for more than one source. Hence, the resources (in terms of relaying nodes) are shared in an on-demand fashion. This is typical for most of the routing protocols for wireless ad hoc networks proposed in the literature [2]. In an RB scheme, a source first reserves a multihop route to its destination, i.e., it reserves intermediate nodes before the actual transmission begins. The reserved intermediate nodes are required to relay only the message generated by the specific source. This gives the source an exclusive access to the path to the destination. This particular route reservation approach for ad hoc wireless networks was first introduced in [3]. One of the important contributions of this work is to identify under which conditions, the delay performance of the RB scheme can be superior to the NRB scheme. II. OBJECTIVE OF THE PAPER To create a new method of establishing and monitoring the routes prior to actual transmission of data. The reserved path could enrich a good way to reach the destination without any loss or corruption or damage of the transmitting data. Although, the main body of this analysis refers to ad hoc wireless networks with fixed nodes, for example, sensor networks and wireless networks, it is also important to extend the scenario with mobile nodes. III. RESERVATION-BASED (RB) SWITCHING The principle of operation of an RB scheme is: Prior to data transmission, a source node reserves a multihop route to the destination through a route discovery phase [4]. Once an intermediate node agrees to relay traffic for a particular source in the network, it cannot initiate a session or relay messages for any other source until the on-going session is over. The source node releases the route after the session ends.
  • 2. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 11 | Page Figure 3.1 Reservation-based ad hoc wireless network models In other words, the intermediate nodes dedicate their processing time only to the source which reserved the route; however, reservation of a multihop route does not give any node an exclusive access to the shared radio. Fig. 3.1 illustrates an example of reserved routes in a network where an RB scheme is used. Fig 3.2 Conceptual queuing model for a reservation-based wireless network IV NON-RESERVATIONBASED (NRB) SWITCHING In NRB switching, there is no reservation of a route prior to data transmission. As opposed to an RB scheme, in an NRB network communication scenario, multihop routes can overlap. In particular, a node can serve as a relay node for more than one route. In other words, when a node receives a message from another node (i.e., it acts as a relay), it places that message in its own queue (intermingled with its own generated messages). The messages in the queue are transmitted sequentially (i.e., the priority given to relay and new locally generated messages is the same). An example of routes in a network with an NRB scheme is shown in Fig. 4.1. Fig 4.1: Non-reservation-based ad hoc wireless network models
  • 3. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 12 | Page Unlike the case with RB switching, each multihop route is a tandem of queues and the whole network can also be viewed as a tandem of queues. As a result, Burke’s theorem can be applied and each individual node can be modeled as an M/M/.1 queue [1]. The conceptual model of an NRB network is shown in Fig. 4.2. Fig 4.2 Conceptual queuing model for a reservation-based wireless network V NETWORK MODELS AND ASSUMPTIONS Network topology: Network Topology considered here is a square grid topology, with N nodes distributed over a surface with finite area A. The node spatial density is defined as the number of nodes per unit area and denoted as _sΒΌ4 N=A (dimension: Β½m_2_). Figure 5.1: Tier structure of a grid network In square grid topology, each node has four nearest neighbors. An example of such network topology is shown in Fig. 5.1. Due to the structure of the square grid topology, the distance to the nearest neighbor, denoted by rlink, is fixed, and a route corresponds to a sequence of hops with equal length. Typical Routes: In a peer-to-peer ad hoc wireless network, where source/destination pairs are randomly selected, the number of hops in each route is likely to be different. The routes with an average number of hops are typical. Now, the average number of hops in a multihop route in a networking scenario with grid topology is estimated. Mobility: Although this work refers to ad hoc wireless networks with fixed nodes (e.g., sensor networks [5] and wireless mesh networks [6]), it could be extended to a scenario with mobile nodes.
  • 4. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 13 | Page Assumptions for RB and NRB switching are as follows: ο‚· Each node in the network generates messages according to a Poisson process with average arrival rate _m (dimension: [msg/s]). While a node is acting as a relay, it still generates its own messages, which are buffered for future transmission. ο‚· The message length Lm is exponentially distributed3 with average value Lm (dimension: [b/msg]). Considering a fixed transmission data rate Rb, the message duration is therefore exponentially distributed with a mean value equal to Lm=Rb. ο‚· Since intermediate nodes on a multihop route serve only one source node at a time, simultaneously active multihop routes are disjoint. In addition, given that each multihop route has a certain average length, there exists a maximum average number, denoted by Cs, of simultaneously active routes. ο‚· If the number of nodes wishing to activate a multihop route is larger than Cs, then some nodes have to wait before they can activate the route. The amount of time that a node has to wait before it can activate a route is β€œaccess delay.” ο‚· The route activation process can be described by a conceptual β€œvirtual request queue” which regulates requests from all sources (see Fig. 2b and Fig. 3). ο‚· The total delay between generation and complete transmission of a message, at each source node, is obtained by adding three terms: 1) the time spent in the node’s own queue (denoted by WRB ), 2) the time spent in the virtual request queue (denoted by WRB v ), and 3) the time spent in the server (denoted by TRB s ). In particular, the queue at each node can be modeled as an M=G=1 queue with service time _RB ΒΌ WRB v ΓΎ TRB s. ο‚· The combination of the virtual request queue and the Cs virtual servers will be denoted as β€œvirtual overlay system.” In particular, there are N flows of information at its input, coming from the N nodes. VI ANALYSIS OF DELAY OF TWO SWITCHING TECHNIQUES In an RB Switching scheme, With the assumptions specified in Section 4.1, each node is modeled as an M=G=1 queue. The average delay that each message experiences is equal to the sum of the mean waiting time in the source queue, denoted as EΒ½WRB o _, and the mean service time EΒ½_RB_, where, as previously defined, _RB ΒΌ WRB v ΓΎ TRB s . The mean waiting time in an M=G=1 queue can be computed using the Pollaczeck- Khinchin formula [1]: E[Wo RB ] = m E[RB 2 ] 2(1 βˆ’ m E[RB ]) (1) It is clear from (1) that that one needs to compute the first and second moments of the service time 𝜏 𝑅𝐡, which can be derived from the statistics of the total time spent in the M/M/Cs/1/N virtual overlay system. The probability density function (pdf) of the time spent in the M/M/Cs/1/N system is [32] π‘“πœ 𝑅𝐡 π‘₯ β‰œ πœ‡πœ–βˆ’πœ‡π‘₯ π‘Ž 𝑛 𝐢 π‘ βˆ’1 𝑛=0 + π‘Ž 𝑛 π‘βˆ’1 𝑛=𝐢 𝑠 πœ‡πœ–βˆ’πœ‡π‘₯ 𝐢𝑠 𝐢𝑠 βˆ’ 1 π‘›βˆ’πΆ 𝑠+1 βˆ’πœ‡ 𝐢𝑠 𝐢𝑠 βˆ’ 1 π‘›βˆ’πΆ 𝑠+1 π‘’βˆ’πœ‡π‘₯ π‘›βˆ’πΆ 𝑠 π‘Ÿ=0 [πœ‡(𝐢𝑠 βˆ’ 1)π‘₯] π‘Ÿ π‘Ÿ! (2) Where π‘Ž 𝑛 is the probability that a new arrival finds n β€œcustomers” in the virtual overlay system (i.e., n nodes are transmitting or waiting to start transmitting an already generated message), and is the average service rate. The probability distribution {π‘Ž 𝑛 } of the number of customers that a new arrival sees in an M/M/Cs/1/N system involves the computation of large factorials (e.g., N!), which leads to numerical problems. To analyze a large-scale ad hoc network, we exploit the fact that when the number of sources is large, the steady-state probability distribution of an M/M/Cs/1/N system follows that of an M/M/Cs system [32]. The first and second moments of the time that each message spends in the system are given by
  • 5. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 14 | Page E[Ο„RB ] = 1 ΞΌ + Ξ“(Cs, Ξ»m ΞΌ ) ΞΌCs βˆ’ Ξ»m (3) E[Ο„RB 2 ] = 2 ΞΌ2 + 2Ξ“(Cs, Ξ»m ΞΌ ) [ΞΌCs βˆ’ Ξ»m ]2 (4) where Ξ“(Cs, Ξ»m ΞΌ ) = πœ† π‘š πœ‡ 2 𝑛! 𝐢 π‘ βˆ’1 𝑛=0 + πœ† π‘š πœ‡ Cs! 1 βˆ’ πœ† π‘š πœ‡πΆπ‘  𝑋 πœ† π‘š πœ‡ 𝐢 𝑠 Cs! 1 βˆ’ πœ† π‘š πœ‡πΆπ‘  (5) Since the route is reserved, it is possible to transmit a message from source to destination using a pipelining method. Assuming that the whole message of length 𝐿 π‘š bits is divided into packets of fixed length 𝑙 𝑝 bits, the total number of packets per message is 𝐿 π‘š /𝑙 𝑝. Suppose there are π‘›β„Ž links on a route from source to destination. The total time to transmit a message with a pipelining method can be computed as 𝜏 𝑆 𝑅𝐡 = 𝐿 π‘š 𝑅 𝑏 + π‘›β„Ž βˆ’ 1 𝑙 𝑝 𝑅 𝑏 (6) Consequently, the total transmission time 𝑇𝑠 𝑅𝐡 , as given in (5), is not exponentially distributed. This violates the exponential service time assumption. However, if 𝐿 π‘šβ‰« π‘›β„Ž 𝑙 𝑝, then the second term on the right hand side of (5) is negligible, and the exponential service time assumption still holds. In the case of retransmission, the message transmission time can be generalized as 𝑇𝑆 𝑅𝐡 = 𝐿 π‘š 𝑅 𝑏 1 + 𝐾 + π‘›β„Ž βˆ’ 1 𝑙 𝑝 𝑅 𝑏 1 + 𝐾 (7) where K is the number of retransmissions per link. Since K is a discrete random variable, the transmission time becomes a function of two random variables (𝐿 π‘š and K). The pdf of the total delay in this case can be written as 𝑓𝑇𝑠 𝑅𝐡 𝑑 = πœ‡π‘’ πœ‡π‘‘ 1+𝑗 1 + 𝑗 ∞ 𝑗 =0 π‘ƒπΈπ‘…π‘™π‘–π‘›π‘˜ 𝑗 1 βˆ’ π‘ƒπΈπ‘…π‘™π‘–π‘›π‘˜ 𝑒(𝑑) (8) where u(t) is the unit step function, defined as 𝑒(𝑑) β‰œ 1 𝑑 β‰₯ 0 0 𝑑 < 0 (9) In particular, (8) can be derived directly from the total probability theorem; the expression in the first square bracket is the conditional pdf of the transmission time given that the number of retransmission is j, and the expression in the second square bracket is the probability mass function of the random variable K. The pdf given in (8) is not exponential, and it may not have a closed-form expression. Fortunately, given that the number of retransmissions is j, the conditional pdf of the transmission time has the following exponential structure: 𝑓𝑇𝑠 𝑅𝐡 𝑑 𝑗 = πœ‡ 1 + 𝑗 𝑒 πœ‡π‘‘ 1+𝑗 𝑒(𝑑) (10) Consequently, even in the case of retransmissions, one can still analyze the delay performance of the network communication system using the same queuing model, but with a modified service time. From (10), it can easily be observed that the new mean service time is 1+𝑗 πœ‡ . To take advantage of this, the number of
  • 6. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 2 Issue 3 ǁ March. 2014 ǁ PP.10-15 www.ijres.org 15 | Page retransmissions j must be specified. To be conservative, the number of per-link packet retransmissions which will be used in the following is the maximum number of retransmissions is denoted by π‘˜ π‘šπ‘Žπ‘₯ . In this case, the service time is exponential with mean service time 𝐿 π‘š 𝐾 π‘šπ‘Žπ‘₯ +1 𝑅 𝑏 In NRB, since each source does not have a dedicated route, a message transmitted in a route will experience, in addition to the transmission delay, a queuing delay at each node it traverses. According to the applicability of Burke’s theorem to an NRB switching network [1]), the average delay that a packet experiences at each node it traverses corresponds to that of an M/M/1 queue and is given by 𝐸 𝑇 𝑁𝑅𝐡 = 1 𝑅 𝑏 𝐿 π‘š βˆ’ total (11) The total average delay for a message from the source node to the destination node of a multihop route is obtained as the sum of the average delays experienced at each intermediate node. In other words, 𝐸 π‘‡π‘‘π‘œπ‘‘π‘Žπ‘™ 𝑁𝑅𝐡 = π‘›β„Ž 𝐸 𝑇 𝑁𝑅𝐡 . Given that the average number of retransmissions is 𝐾 π‘šπ‘Žπ‘₯ , the service time for transmitting a packet is still exponentially distributed. If a message of size Lm bit is divided into packets of fixed length lp b/pck, this time it takes to transmit a single packet is (1 + 𝐾 π‘šπ‘Žπ‘₯ ) / 𝑅 𝑏 . Since there are 𝐿 π‘š /𝑝𝑏 packets in a message, the time the last packet will reach the next hop is (1 + kmax) 𝐿 π‘š /𝑅 𝑏 . Hence, in the case with retransmission, the expected per-link message transmission time in (2) is given by 𝐸 𝑇 𝑁𝑅𝐡 = 1 𝑅 𝑏 𝐿 π‘š βˆ’ total (12) VI CONCLUSION This work answers an interesting question: if and when reservation-based switching makes sense in contemporary wireless ad hoc networks. If the right requirements (in terms of route discovery, MAC protocol used, pipelining, etc.) are met, then RB switching schemes can provide better delay performance than NRB switching schemes. In return, the throughput and goodput performance of NRB schemes, even under these somewhat stringent requirements, seem to be superior to RB schemes. This paper also provides the analytical framework and model (queuing models) developed for analyzing the network performance (in terms of delay) under the RB and NRB switching schemes. While RB schemes can provide better delay performance, NRB schemes support higher traffic loads than RB schemes. In addition, NRB schemes can support a higher number of routes because there is no constraint for the routes to be disjoint. Finally, RB schemes are more robust to node mobility than NRB schemes. REFERENCES [1] D. Bertsekas and R. Gallager, Data Networks. Prentice Hall, 1992. [2] E.M. Royer and C.-K. Toh, β€œA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Comm. Magazine, vol. 6, no. 2, pp. 46-55, Apr. 1999. [3] G. Ferrari and O.K. Tonguz, β€œPerformance of Ad Hoc Wireless Networks with Aloha and PR-CSMA MAC Protocols,” Proc. IEEE GLOBECOM, pp. 2824-2829, Dec. 2003. [4] C.E. Perkins, Ad Hoc Networking. Addison-Wesley,2001. [5] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, β€œA Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp.102-114, Aug.2002. [6] B. Schrick and M.J. Riezenman, β€œWireless Broadband in a Box,” IEEE Spectrum, vol. 39, no. 6, pp. 38-43, June 2002.