SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 31
A STUDY ON CROSS LAYER METRICS OF WIRELESS MESH
NETWORK
Swarnali Chakraborty1
, Abhishek Majumder2
1
Department of Computer Science and Engineering, Tripura University
2
Department of Computer Science and Engineering, Tripura University
Abstract
Wireless mesh network (wmn) offers a flexible and cost effective network infrastructure for wireless communication. But due to
wireless environment and unpredictable user mobility, it suffers from the problem of routing path selection, security, scheduling,
resource allocation and congestione etc. For solving these problems, several metrics have been proposed. But using information from
only one layer the metric does not perform well. So, cross layer mertics have been proposed to achieve a better performance. This
paper presents a study on cross layer metrics in the light of their versatile uses for solving different problems in wmn.
Keywords: Wireless Mesh Network, Cross layer metrics, Routing, Scheduling.
----------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Wireless Mesh Network (WMN) emerges as a new and
promising technology for the next generation wireless
technologies [1][9]. In a WMN, communication among the
nodes situated at different location is done by relaying
information over wireless links [14]. The Mesh Networks are
self-organized, self-configured and easily adaptable to different
traffic requirements and network changes [11]. The three
different network elements that construct the mesh network
architecture are [14]: network gateways, mesh routers and
mobile nodes.
Network Gateway (NG): This element acts as an entrance to
another network.
Mesh Routers (MR): MRs performs routing of internet as
well as intranet traffic to and from the mobile nodes.
Mobile Nodes (MN): The Mobile Node (MN) is a device
whose location and point of attachment to the internet may
change frequently.
As WMN deal with the highly unstable wireless medium the
design of algorithms that consider link quality to choose the
best route are enabling routing metrics and protocols to evolve.
Cross layer metrics are the new hype of the wireless networks.
It has achieved a good result as in the cross layer approach
multiple parameters from different layers can intercourse
compactly [12].
In this paper some of the different utilities of cross layer
metrics have been discussed. The cross layer metrics are used
in many areas such as for the efficient routing, to manage the
traffic, to identify the selfish participants, etc. This paper
shows some of the aspects of the cross layer metrics.
Rest of the paper is organized as follows. Section 2 describes
the overview on cross layer metrics. Section 3 presents some of
the metric components. Section 4 discusses some of the use of
the cross layer metrics and finally in section the conclusion has
been presented.
2. OVERVIEW
Several metrics are used in WMN for performing a wide range
of functionalities. Generally the layered approach is followed.
This section gives an overview on the metrics for WMN.
In Open System Interconnection (OSI) model the design and
the implementation of the network is divided into modules.
Each layer controls its own decision variable. It hides the
complexity of the lower layer and provides well defined
services to the upper layer. It is easy for debugging, abstraction
design and implementation [8]. But it is not good for energy
efficiency and also for performance. There is no mechanism
for performance optimization between different layers.
To improve the performance interaction between the layers is
very much necessary. For this, cross layer approach has been
introduced. The main idea is to maintain the functionalities
associated to the original layers but allow coordination,
interaction and joint optimization of protocols crossing
different layers. Cross-layer design refers to protocol design
done by allowing layers to exchange state information in order
to obtain performance gains. Two approaches for cross-
layering can be defined [8]:
 Weak cross-layering: It enables interaction among
entities at different layers of the protocol stack.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 32
 Strong cross-layering: It enables joint design of the
algorithms implemented within any entity at any level
of the protocol stack.
Figure 1 shows the difference between the layered approach
and the cross layer approach
(a) (b)
Fig 1: (a) Layered approach (b) Cross layer approach
3. METRIC COMPONENTS
The key components that can be achieved by the metrics are
given as [12]:
 Number of Hops: Increase in the number of hops
increases the congestion. This component may also be
a metric itself.
 Link Capacity: It can be used to measure the
throughput of the link. Link capacity measures the
total load the link can transfer.
 Link Quality: It gives an idea about the rate at which
data can be transferred. It is obvious to choose a high
quality link to deliver data at a higher rates and lesser
errors.
 Channel Diversity: When the same channel is used
within the same path among multiple consecutive
hops, co-channel interference may occur. Thus the
nodes of the same path should operate on non-
overlapping channel. This is called channel diversity.
4. CROSS-LAYER METRICS
Many cross layer metrics have been proposed. The cross layer
metrics are useful in many areas for the efficient performance
of WMN. Some of its utilities are discussed as below:
4.1 Cross-Layer Metric for Selfish Participants
In WMN, there may be some participants that can exhibit
selfish behavior by selectively dropping packets sent by other
mesh routers to prioritize their own traffic. Stephano Paris
et.al. in [4] proposes a cross layer metric, Expected Forwarding
Counter (EFW), which combines the link quality measured by
the Expected Transmission Counter (ETX) and the forwarding
behavior of relaying node. The metric select the path by
considering both the quality of the link and the reliability of the
nodes. Routing metrics like ETX represent the transmission
reliability of the link. ETX calculates the number of
transmission, including the retransmissions.
Let (i, j) be a wireless link established between node i and j, pij
and pji denote the packet loss probability of the wireless link (i,
j) in forward and reverse directions, respectively. The
probability of a successful transmission on the wireless link (i,
j) can therefore be computed as ps,ij = (1−pij)·(1−pji).
The expected number of transmission necessary to deliver data
can be calculated as [4]-
 jiijijs ppp
ETX


1).1(
11
,
Though ETX selects the most reliable path it does not give the
delivery rate of a link accurately as it does not take into
account the forwarding behavior of the nodes. The selfish node
drop packets of other nodes after receiving the data frame and
transmission of acknowledgement successfully. To rectify the
dropping behavior of the selfish participants the link quality
value calculated by the ETX is combined with the forwarding
reliability of a relaying node. It is assumed that pd,ij be the
dropping probability of a network node j. Thus the probability
of successfully forwarding a packet sent through a node j is
calculated as –
   dijjiijijfwd pppp
EFW


11
11
,
Thus EFW represents a cross layer metric as it considers both
the physical condition of the link and also the selfishness of the
nodes.
4.2 Cross Layer Metric For Routing And Resource
Allocation
Wireless mesh network consisted of a number stationary
wireless mesh routers. The interference degrades the capacity
and performance of WMN. In [2] Taimur Adalgamouni et al.
propose joint cross layer routing and resource allocation metric
for multi-radio WMN. Frequency bands are assigned to the
Application layer
Network layer
MAC layer
Link layer
Application layer
Network layer
MAC layer
Link layer
C
r
o
s
s
l
a
y
e
r
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 33
links by the resource allocation algorithm to minimize the
interference and maximize the coherence time of the link.
A connection is first established between the source and
destination node. The traffic passing through the link is
calculated as:


1),(
),()(
src
cc rcxltraffic 
The delay experienced by the link is calculated as:
)(
1
)(
1 ltraffic
ldelay



A cost function is proposed to minimize the delay and total
interference of each link and maximize the coherence time that
will minimize the end to end delay and maximize the packet
delivery rate.
 
  
 
  


1
1 1
),( ...1
),( ..1
),(
),(
),(
),(),,(),(),(
)(
src Lf
src Intj Lf
fl
fly
rcx
fjyfjlflyrcx
ldelay


Inti is the set of all links that can interfere with link l, y(l,f) is a
binary control variable that equals to one only if link l is
assigned frequency band f and τ(l,f) is the coherence time of
link l when assigned band f.
4.3 Cross Layer Metric for Environmental Congnition
Huaiyu Wen et al. in [5] have proposed a routing protocol
based on Optimised Link State Routing Protocol (OLSR). CM-
OLSR (Cross Layer Metric based Optimized Link State
Routing) is a proactive routing protocol that refines the idea of
the cross layer design. The protocol makes use of a routing
metric CLM (Cross Layer Metric) which considers four aspects
of link quality. They are: bandwidth, load, transmission error
rate and wireless interference.
basic
available
B
B
B


 
Bωavailable denote available bandwidth and Bωbasic denote basic
data bandwidth.
maxQ
Q
Load wait

Qwait denote the number of data packets waiting to be sent in te
sending queue, Qmax denote the maximum length of waiting
queue.
sent
rev
F
F
PDR 
Frev denote number of frames successfully received and Fsent
denote the number of overall frames sent.
 
ISN
eIS
LI 
|IS(e)| denote the number of nodes of the set which may have
interference with wireless interference. ISN denote the number
of nodes contained by the largest IS(e) set.
    LIPDRLoadBeCLM .)1(.1.)(  α,β,γ,δ
are the weight factor and |α|+|β|+|γ|+|δ|=1
The network cross layer design has been followed by the
protocol in two ways. In the first design every layer of node
share their information with the sharing pool. In the second
design the strict hierarchical structure is not followed while
separation between layers is maintained and this allows the
different algorithms of different layers to exchange their
information about the network.The route calculation is done
using the Dijkstra algorithm.
4.4 Congestion Aware Cross Layer Metric for
Multipath Network
Many of the routing protocols of Wireless Mesh Network are
mainly dependent on the minimum hop count. But it is not
obvious that the path selected by the minimum hop count
should be the best one in multipath routing. Because in
multipath routing there may be more than one route having the
same minimum hop count. To avoid such conditions in [6]
Wenming Song et al. proposes two dynamic metric that check
the congestion status at nodes. One metric is a quantity called
Buffer Occupancy Ratio (BOR) which gives the resource
utilization of a node and ability of forwarding packet. Another
metric is the Successful Frame Sending Rate (SFSR) which is
used to give the contention of an area and the cost for sending
packets through that area. The limited resource availability at a
node in comparison with the incoming traffic is the main cause
for the congestion. BOR is used to calculate congestion status
at the node [6]:
BOR= occupied buffer size/ buffer size
SFSR is used to reflect both the channel condition and link
congestion.
SFSR=Number of received ACKs/Number of sent frames.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 34
No periodical broadcasting is required to gather the
information used to calculate both the metrics as they are
available at the nodes or can be collected.
In this routing protocol when a node wants to send data it will
check its route table to find whether a route is available or not.
If it is available, it will initiate the Route Request (RREQ). The
time stamp, SFSR and maximum acceptable delay fields are
attached with the RREQ. When a node receives the RREQ it
will decide whether it should forward the RREQ. At first, it
will check its BOR and will see whether it is becoming
congested. Secondly, it calculates the time for which the packet
has been survived then it will compare the time with the
maximum acceptable delay. If it is less then only the node will
forward it otherwise drop it. Thirdly, the node compares its
SFSR with the SFSR of the RREQ. If the RREQ SFSR value is
larger replace it with its SFSR. After checking whether the
packet is valid or not at the destination node a Route Reply
(RREP) is initiated. Before sending the RREP the reverse route
and SFSR value is recorded into the routing table. When a
source node receives the RREP it records the RREP into the
routing table and sends the packets through the route.
4.5 Cross Layer Metric For Scheduling
Though WMN acts as a backbone for many network
applications but it still suffers from scalability, poor end to end
throughput, QoS problems. Many scheduling techniques have
been proposed but all that mainly focuses only on one
characteristic. So a cross layering approach has been followed
by Jason B. Ernst in [3]. In this approach information from
many layers are gathered and optimized together. In scheduling
techniques can be taken from many approaches and optimize
together. Scheduling at MAC layer is difficult as there is no
proper information for scheduling. So information are gathered
from other layers such as queue length, channel quality etc,
which are more useful to decide how to allocate time and
resources to nodes.
In this approach, scheduling is done against three
characteristics. Firstly the biasing is done against the distance
from the gateways. The more distance from the gateway the
router is, the hop number increases so the probability of
successful delivery of packet decreases. Thus to achieve a
higher throughput it is good to send fewer packet through the
node that is farther away from the gateway. Secondly the
biasing is done against queues. The routers with full queues are
given priority than the routers with short queue length. The
routers with full queue are given priority because it will help
the shorter queues to build up and also allow full queue to
empty them so that fewer packet are dropped. Thirdly the
biasing is done against the poor links. The links with good
quality are given priority to achieve a good performance and
increase packet delivery rate.
Resources assigned to a node in these three techniques are
determined using the equation below.
21
1


cc
R


R is the resource allocated to the node
c is the measure of a particular characteristic. c>0
α is the weight of each bias technique, 0<α<1
β1, β2 are biasing constants that determines the strength of each
bias.
The last technique is the combined approach where several
bias techniques are combined to form a single scheduling
approach. In this technique a fraction of the resources is
assigned to each of the bias-technique.
The Combined mixed-bias is given as
332211 RRRR  
Where R is the resources allocated to the node
R1 is the resources calculated using above equation.
γ1 is the weight of technique 1 in the combined biasing
R2 is the resources calculated using above equation
γ2 is the weight of technique 2 in the combined biasing
R3 is the resources calculated using above equation.
γ3 is the weight of technique 3 in the combined biasing
γ1, γ2, γ3 > 0 and γ1 + γ2 + γ3 = 1
4.6 Cross Layer Routing Metric
A cross layer metric has been proposed by Da Gou et al. in
[10] that take into account the physical layer feature, MAC
layer feature and then combine them to form a hybrid metric.
The metric takes into account the Packet Success Rate (PSR)
of the link which denotes the physical link characteristics. The
link quality metric is taken from the MAC layer. It is
calculated by taking into account the RTS and CTS frame. The
quality of a link is dependent on the number of retransmission
of the RTS and Data Frame for each successful transmission.
The PSR is calculated from the Packet Error Rate (PER):
PSR = 1 – PER
From the physical layer PSR can be calculated and is
transmitted to the network layer.
Frame Transmission Efficiency (FTE) is calculated by
considering the success rate of transmitting frame based on the
average number of retransmission. The number of
retransmission of RTS and Data Frame denote the link quality.
The quality and the congestion of the link is determined by the
number of retransmission of the RTS and Data Frame for each
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 35
successful transmission in MAC layer. The number of
retransmission is assumed as:
Failure (k)=ACKFailureCount(k)+RTSFailureCount(k).
Ack_Failure_Count denote the number of Data retransmission
and RTS_Failure_count denotes the number of RTS
retransmission.
Thus FTE is calculated as-
2)(
2
)(


kFailure
kFTE
To choose the minimum path to transmit packet the minimum
hop count is used.
hopnumber
hop
Hopmetric
min

Thus the hybrid metric is expressed as:
PSRFTEHopmetricicHybridmetr 
4.7 Cross Layer Metric to Recognize Traffic
Sunghun Lee et al. in [7] have proposed a metric that is useful
to select the path with less interference. Wireless Mesh
Networks are also called static wireless networks.
Communications between the routers are done through the
radio nodes. When the two nodes want to transmit packet they
should be within the transmission range and no other sending
node should be present within that range. If any sending node
is present within the same transmission range collision would
occur. The nodes at the interference range between source and
destination has to wait for the medium to be cleared before
accessing it. A metric is proposed to select a path with less
congestion, minimum packet loss and less traffic. The MAC
architecture is mainly based on the Distributed Coordination
Function (DCF), Point Coordination Function (PCF). Here
each station maintains a contention window and a back off
timer. An initial value for the contention window is set. After
each retransmission occured due to collision the value of the
contention window is sequentially increased with integer
power of 2 and minus 1. But this technique does not give a
good result when the number of transmitting nodes increases.
So to overcome such obstacle the traffic recognizing metric
transmits data after checking traffic and interference by hearing
the RREP. A source node will broadcast a RREQ when it has
data to send. When the intermediate node receives the RREQ a
route is created to the source. The intermediate node then
checks if it is not the destination nor having the path to the
destination, it will rebroadcast the RREQ. After the destination
node receives the RREQ it generate the RREP and broadcast in
a hop-by-hop fashion to the source. Here the pure flooding
technique has been followed. When the RREP is received by
the intermediate nodes a path is set up from the destination
node and the neighboring nodes record the condition of
interference by overhearing RREP packets. Here let TXk is the
number of node that cause interference by generating traffic at
sending node; RXk the number at receiving node; and TXk ∩
RXk the number of nodes causing interference at the
intermediate of link.
    
linkk
kkkkk RXTXRXTXETTpath loglog
4.8 A Cross-Layer Load-Independent Link Cost
Metric
In [13] Marianna Carrera et al. have proposed Cross-layer
Unicast Transmission Time (X-UTT), a MAC-aware load-
independent link cost metric for wireless mesh networks. It is
designed to capture the wireless link capacity and is
independent of the load induced by self-interference and cross-
interference in a mesh network. The information acquired from
a network-layer unicast probing system and a MAC-layer
monitoring system is utilized by the X-UTT metric.
The performance of the Wireless network is mainly dependent
on the ability to route packets efficiently over the multi hop
wireless mesh infrastructure. The existing metric like ETX,
ETT etc are mainly incorporated with the loss of packets,
available bandwidth to measure the link quality. The X-UTT is
designed to be load-independent and characterize wireless link
quality only in terms of the link capacity presented to the
network layer by the underlying MAC protocol operation. X-
UTT is designed on the basis of unicast network-layer probes
subjected to MAC-layer (re)transmissions. The sum of the
transmission airtime and the backoff time of all its MAC layer
(re)transmissions give the packet transmission time of each
probe. The transmission air-time information which is a bit-
rate function, the backoff time prior to each (re)transmission
which is a function of the number of previously failed
transmissions, are extracted from a MAC layer monitoring
system implemented at the wireless card driver.X-UTT is
defined as the ratio between the average packet transmission
time (PTT) and the unicast probe delivery ratio as (du3)
3ud
PTT
XUTT 
IN 802.11 MAC layer error control (acks and retransmissions)
is same as perceived by the upper layers. X-UTT is designed to
capture the quality of 802.11 MAC layer. To hide losses to the
higher layers error control mechanism retransmits
unacknowledged frames and increases link capacity by
increasing the network layer delivery ratio. The transmission
time of a network layer packet is the sum of the time spent for
all the MAC layer retransmissions. The error control
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 36
mechanism of a network layer decreases the link capacity by
increasing the total time to transmit a packet. These opposite
effects are captured by the components of X-UTT.
5. CONCLUSIONS
The cross layering approach has been followed to discover
many metrics for the Wireless Mesh Network. The cross layer
approach is adapted to achieve a good performance and to
avoid less congested paths. Through cross layering a good idea
about the network can be achieved as the information from
different layers are optimized compactly. The cross layer
metrics are used for routing, to avoid traffic and congestion, to
improve the QoS and for many other purposes. In this paper
some of the metrics are mentioned. Many more metrics are still
to be identified to improve the performance of the wireless
mesh network.
REFERENCES
[1] Luigi Iannon, Ramin Khalili, Kav´e Salamatian, Serge
Fdida, “Cross-Layer Routing in Wireless Mesh
Networks” 1st
International Symposium in Wireless
Comuniction Systems, September 2004.
[2] Taimour Aldalgamouni,Ahmed Elhakeem,” A Joint
Cross Layer Routing and Resource Allocation
Algorithm for Multi-Radio WirelessMesh Networks” in
the proceedings of IEEE conference on june 2009 pp
349-354.
[3] Jason B. Ernst, Mieso K. Denko,” Cross-Layer Mixed
Bias Scheduling for Wireless Mesh Networks” in the
proc of IEEE conference on May 2010,pp 1-5.
[4] Stefano Paris, Cristina Nita-Rotaru, et al,” EFW: A
Cross-Layer Metric for Reliable Routing in Wireless
Mesh Networks with Selfish Participants” IEEE
INFOCOM , PP 576-580,2011.
[5] Huaiyu Wen,Guangchun Luo“Environmental Cognition
Based Wireless Mesh Network Cross-layer Routing
Protocol” in the proc of Information & Computational
Science 2012,pp 473-487.
[6] Wenming Song,et al,“A Congestion-Aware Multipath
Routing with Cross Layer Design for Wireless Mesh
Networks” in the proc of 15th
Asia Pacific Conference
oct.2009,pp 656-660.
[7] Sunghun Lee, Hyukjoon Lee and Hyungkeun Lee,“A
Cross Layer Routing Metric To Recognize Traffic
Interference in Wireless Mesh Networks” in the proc of
of IEEE conference 2010, pp 396-401.
[8] ProfNizar Zorba, Charalambos Skianis and Christos
Verikoukis, a book chapter “ CROSS LAYER
DESIGNS IN WLAN SYSTEMS”
[9] Ian F. Akyildiz, Xudong Wang, Kiyon,”A Survey on
Wireless Mesh Networking” IEEE Communications
Magazine, vol. 43(9), pp. S23–S30, Sept. 2005.
[10] Da Guo, Jun Li, Mei Song, Junde Song,“A Novel
Cross-Layer Routing Algorithm in Wireless Mesh
Network” in the proc. of IEEE International Conference
2007,pp 1-3,vol-07.
[11] B.Nandini, et al,“Cross-Layer Design for wireless mesh
networks” in the proc of IEEE Transaction onMobile
Computing,2008,pp 1363-1373.
[12] S. Siva Nageswara Rao, Y.K. Sundara Krishna, and K.
Nageswara Rao,“ A Study of Routing Metrics for
Wireless Mesh Networks” in the proc of International
Journalof Rsearch and Reviews of Wireless
Communication 2011.
[13] Marianna Carrera, Henrik Lundgren, Theodoros
Salonidis, Christophe Diot “A Cross-Layer Load-
Independent Link Cost Metric for Wireless Mesh
Networks” in the proc. 2007 ACM CoNEXT
conference.
[14] Jun Yuan,et al,“A Cross-Layer Optimization
Framework for Multi hop Multicast in Wireless Mesh
Networks” in the proceedings of IEEE on Selected areas
in communication, vol.24, no11, November 2006.

More Related Content

What's hot

Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsCSCJournals
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network IJECEIAES
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (20)

Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh Network
 
A New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
A Modified Diagonal Mesh Shuffle Exchange Interconnection Network
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Viewers also liked

Adsorption studies of colourremoval byactivated
Adsorption studies of colourremoval byactivatedAdsorption studies of colourremoval byactivated
Adsorption studies of colourremoval byactivatedeSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
Comparative analysis of edge based and region based active contour using leve...
Comparative analysis of edge based and region based active contour using leve...Comparative analysis of edge based and region based active contour using leve...
Comparative analysis of edge based and region based active contour using leve...eSAT Publishing House
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Application of dual tone multi frequency technology
Application of dual tone multi frequency technologyApplication of dual tone multi frequency technology
Application of dual tone multi frequency technologyeSAT Publishing House
 
Generalized fryze control strategy for shunt and
Generalized fryze control strategy for shunt andGeneralized fryze control strategy for shunt and
Generalized fryze control strategy for shunt andeSAT Publishing House
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...eSAT Publishing House
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseeSAT Publishing House
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...eSAT Publishing House
 
Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageeSAT Publishing House
 
Simulation of collision avoidance by navigation
Simulation of collision avoidance by navigationSimulation of collision avoidance by navigation
Simulation of collision avoidance by navigationeSAT Publishing House
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithmeSAT Publishing House
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...eSAT Publishing House
 
On approximate bounds of zeros of polynomials within
On approximate bounds of zeros of polynomials withinOn approximate bounds of zeros of polynomials within
On approximate bounds of zeros of polynomials withineSAT Publishing House
 
Tool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imagingTool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imagingeSAT Publishing House
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataeSAT Publishing House
 
Artificial intelligence based control approach for
Artificial intelligence based control approach forArtificial intelligence based control approach for
Artificial intelligence based control approach foreSAT Publishing House
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewatereSAT Publishing House
 

Viewers also liked (20)

Adsorption studies of colourremoval byactivated
Adsorption studies of colourremoval byactivatedAdsorption studies of colourremoval byactivated
Adsorption studies of colourremoval byactivated
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Comparative analysis of edge based and region based active contour using leve...
Comparative analysis of edge based and region based active contour using leve...Comparative analysis of edge based and region based active contour using leve...
Comparative analysis of edge based and region based active contour using leve...
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Application of dual tone multi frequency technology
Application of dual tone multi frequency technologyApplication of dual tone multi frequency technology
Application of dual tone multi frequency technology
 
Generalized fryze control strategy for shunt and
Generalized fryze control strategy for shunt andGeneralized fryze control strategy for shunt and
Generalized fryze control strategy for shunt and
 
Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...Performance analysis of dwdm based fiber optic communication with different m...
Performance analysis of dwdm based fiber optic communication with different m...
 
Optimization of physical parameters of α amylase
Optimization of physical parameters of α amylaseOptimization of physical parameters of α amylase
Optimization of physical parameters of α amylase
 
Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...Economical placement of shear walls in a moment resisting frame for earthquak...
Economical placement of shear walls in a moment resisting frame for earthquak...
 
Construction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor imageConstruction of sine and cosine hologram of brain tumor image
Construction of sine and cosine hologram of brain tumor image
 
Simulation of collision avoidance by navigation
Simulation of collision avoidance by navigationSimulation of collision avoidance by navigation
Simulation of collision avoidance by navigation
 
Digital watermarking with a new algorithm
Digital watermarking with a new algorithmDigital watermarking with a new algorithm
Digital watermarking with a new algorithm
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...
 
On approximate bounds of zeros of polynomials within
On approximate bounds of zeros of polynomials withinOn approximate bounds of zeros of polynomials within
On approximate bounds of zeros of polynomials within
 
Tool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imagingTool wear and surface finish investigation of hard turning using tool imaging
Tool wear and surface finish investigation of hard turning using tool imaging
 
A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
Data slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and dataData slicing technique to privacy preserving and data
Data slicing technique to privacy preserving and data
 
Artificial intelligence based control approach for
Artificial intelligence based control approach forArtificial intelligence based control approach for
Artificial intelligence based control approach for
 
Treatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewaterTreatment of distilleries and breweries spent wash wastewater
Treatment of distilleries and breweries spent wash wastewater
 

Similar to A study on cross layer metrics of wireless mesh network

Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) ineSAT Publishing House
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...eSAT Publishing House
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingeSAT Publishing House
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networkseSAT Publishing House
 

Similar to A study on cross layer metrics of wireless mesh network (20)

Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) in
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Reliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh NetworkReliable Metrics for Wireless Mesh Network
Reliable Metrics for Wireless Mesh Network
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...
 
50120140501004
5012014050100450120140501004
50120140501004
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding using
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
Ga based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networksGa based dynamic routing in wdm optical networks
Ga based dynamic routing in wdm optical networks
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

A study on cross layer metrics of wireless mesh network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 31 A STUDY ON CROSS LAYER METRICS OF WIRELESS MESH NETWORK Swarnali Chakraborty1 , Abhishek Majumder2 1 Department of Computer Science and Engineering, Tripura University 2 Department of Computer Science and Engineering, Tripura University Abstract Wireless mesh network (wmn) offers a flexible and cost effective network infrastructure for wireless communication. But due to wireless environment and unpredictable user mobility, it suffers from the problem of routing path selection, security, scheduling, resource allocation and congestione etc. For solving these problems, several metrics have been proposed. But using information from only one layer the metric does not perform well. So, cross layer mertics have been proposed to achieve a better performance. This paper presents a study on cross layer metrics in the light of their versatile uses for solving different problems in wmn. Keywords: Wireless Mesh Network, Cross layer metrics, Routing, Scheduling. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Wireless Mesh Network (WMN) emerges as a new and promising technology for the next generation wireless technologies [1][9]. In a WMN, communication among the nodes situated at different location is done by relaying information over wireless links [14]. The Mesh Networks are self-organized, self-configured and easily adaptable to different traffic requirements and network changes [11]. The three different network elements that construct the mesh network architecture are [14]: network gateways, mesh routers and mobile nodes. Network Gateway (NG): This element acts as an entrance to another network. Mesh Routers (MR): MRs performs routing of internet as well as intranet traffic to and from the mobile nodes. Mobile Nodes (MN): The Mobile Node (MN) is a device whose location and point of attachment to the internet may change frequently. As WMN deal with the highly unstable wireless medium the design of algorithms that consider link quality to choose the best route are enabling routing metrics and protocols to evolve. Cross layer metrics are the new hype of the wireless networks. It has achieved a good result as in the cross layer approach multiple parameters from different layers can intercourse compactly [12]. In this paper some of the different utilities of cross layer metrics have been discussed. The cross layer metrics are used in many areas such as for the efficient routing, to manage the traffic, to identify the selfish participants, etc. This paper shows some of the aspects of the cross layer metrics. Rest of the paper is organized as follows. Section 2 describes the overview on cross layer metrics. Section 3 presents some of the metric components. Section 4 discusses some of the use of the cross layer metrics and finally in section the conclusion has been presented. 2. OVERVIEW Several metrics are used in WMN for performing a wide range of functionalities. Generally the layered approach is followed. This section gives an overview on the metrics for WMN. In Open System Interconnection (OSI) model the design and the implementation of the network is divided into modules. Each layer controls its own decision variable. It hides the complexity of the lower layer and provides well defined services to the upper layer. It is easy for debugging, abstraction design and implementation [8]. But it is not good for energy efficiency and also for performance. There is no mechanism for performance optimization between different layers. To improve the performance interaction between the layers is very much necessary. For this, cross layer approach has been introduced. The main idea is to maintain the functionalities associated to the original layers but allow coordination, interaction and joint optimization of protocols crossing different layers. Cross-layer design refers to protocol design done by allowing layers to exchange state information in order to obtain performance gains. Two approaches for cross- layering can be defined [8]:  Weak cross-layering: It enables interaction among entities at different layers of the protocol stack.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 32  Strong cross-layering: It enables joint design of the algorithms implemented within any entity at any level of the protocol stack. Figure 1 shows the difference between the layered approach and the cross layer approach (a) (b) Fig 1: (a) Layered approach (b) Cross layer approach 3. METRIC COMPONENTS The key components that can be achieved by the metrics are given as [12]:  Number of Hops: Increase in the number of hops increases the congestion. This component may also be a metric itself.  Link Capacity: It can be used to measure the throughput of the link. Link capacity measures the total load the link can transfer.  Link Quality: It gives an idea about the rate at which data can be transferred. It is obvious to choose a high quality link to deliver data at a higher rates and lesser errors.  Channel Diversity: When the same channel is used within the same path among multiple consecutive hops, co-channel interference may occur. Thus the nodes of the same path should operate on non- overlapping channel. This is called channel diversity. 4. CROSS-LAYER METRICS Many cross layer metrics have been proposed. The cross layer metrics are useful in many areas for the efficient performance of WMN. Some of its utilities are discussed as below: 4.1 Cross-Layer Metric for Selfish Participants In WMN, there may be some participants that can exhibit selfish behavior by selectively dropping packets sent by other mesh routers to prioritize their own traffic. Stephano Paris et.al. in [4] proposes a cross layer metric, Expected Forwarding Counter (EFW), which combines the link quality measured by the Expected Transmission Counter (ETX) and the forwarding behavior of relaying node. The metric select the path by considering both the quality of the link and the reliability of the nodes. Routing metrics like ETX represent the transmission reliability of the link. ETX calculates the number of transmission, including the retransmissions. Let (i, j) be a wireless link established between node i and j, pij and pji denote the packet loss probability of the wireless link (i, j) in forward and reverse directions, respectively. The probability of a successful transmission on the wireless link (i, j) can therefore be computed as ps,ij = (1−pij)·(1−pji). The expected number of transmission necessary to deliver data can be calculated as [4]-  jiijijs ppp ETX   1).1( 11 , Though ETX selects the most reliable path it does not give the delivery rate of a link accurately as it does not take into account the forwarding behavior of the nodes. The selfish node drop packets of other nodes after receiving the data frame and transmission of acknowledgement successfully. To rectify the dropping behavior of the selfish participants the link quality value calculated by the ETX is combined with the forwarding reliability of a relaying node. It is assumed that pd,ij be the dropping probability of a network node j. Thus the probability of successfully forwarding a packet sent through a node j is calculated as –    dijjiijijfwd pppp EFW   11 11 , Thus EFW represents a cross layer metric as it considers both the physical condition of the link and also the selfishness of the nodes. 4.2 Cross Layer Metric For Routing And Resource Allocation Wireless mesh network consisted of a number stationary wireless mesh routers. The interference degrades the capacity and performance of WMN. In [2] Taimur Adalgamouni et al. propose joint cross layer routing and resource allocation metric for multi-radio WMN. Frequency bands are assigned to the Application layer Network layer MAC layer Link layer Application layer Network layer MAC layer Link layer C r o s s l a y e r
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 33 links by the resource allocation algorithm to minimize the interference and maximize the coherence time of the link. A connection is first established between the source and destination node. The traffic passing through the link is calculated as:   1),( ),()( src cc rcxltraffic  The delay experienced by the link is calculated as: )( 1 )( 1 ltraffic ldelay    A cost function is proposed to minimize the delay and total interference of each link and maximize the coherence time that will minimize the end to end delay and maximize the packet delivery rate.             1 1 1 ),( ...1 ),( ..1 ),( ),( ),( ),(),,(),(),( )( src Lf src Intj Lf fl fly rcx fjyfjlflyrcx ldelay   Inti is the set of all links that can interfere with link l, y(l,f) is a binary control variable that equals to one only if link l is assigned frequency band f and τ(l,f) is the coherence time of link l when assigned band f. 4.3 Cross Layer Metric for Environmental Congnition Huaiyu Wen et al. in [5] have proposed a routing protocol based on Optimised Link State Routing Protocol (OLSR). CM- OLSR (Cross Layer Metric based Optimized Link State Routing) is a proactive routing protocol that refines the idea of the cross layer design. The protocol makes use of a routing metric CLM (Cross Layer Metric) which considers four aspects of link quality. They are: bandwidth, load, transmission error rate and wireless interference. basic available B B B     Bωavailable denote available bandwidth and Bωbasic denote basic data bandwidth. maxQ Q Load wait  Qwait denote the number of data packets waiting to be sent in te sending queue, Qmax denote the maximum length of waiting queue. sent rev F F PDR  Frev denote number of frames successfully received and Fsent denote the number of overall frames sent.   ISN eIS LI  |IS(e)| denote the number of nodes of the set which may have interference with wireless interference. ISN denote the number of nodes contained by the largest IS(e) set.     LIPDRLoadBeCLM .)1(.1.)(  α,β,γ,δ are the weight factor and |α|+|β|+|γ|+|δ|=1 The network cross layer design has been followed by the protocol in two ways. In the first design every layer of node share their information with the sharing pool. In the second design the strict hierarchical structure is not followed while separation between layers is maintained and this allows the different algorithms of different layers to exchange their information about the network.The route calculation is done using the Dijkstra algorithm. 4.4 Congestion Aware Cross Layer Metric for Multipath Network Many of the routing protocols of Wireless Mesh Network are mainly dependent on the minimum hop count. But it is not obvious that the path selected by the minimum hop count should be the best one in multipath routing. Because in multipath routing there may be more than one route having the same minimum hop count. To avoid such conditions in [6] Wenming Song et al. proposes two dynamic metric that check the congestion status at nodes. One metric is a quantity called Buffer Occupancy Ratio (BOR) which gives the resource utilization of a node and ability of forwarding packet. Another metric is the Successful Frame Sending Rate (SFSR) which is used to give the contention of an area and the cost for sending packets through that area. The limited resource availability at a node in comparison with the incoming traffic is the main cause for the congestion. BOR is used to calculate congestion status at the node [6]: BOR= occupied buffer size/ buffer size SFSR is used to reflect both the channel condition and link congestion. SFSR=Number of received ACKs/Number of sent frames.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 34 No periodical broadcasting is required to gather the information used to calculate both the metrics as they are available at the nodes or can be collected. In this routing protocol when a node wants to send data it will check its route table to find whether a route is available or not. If it is available, it will initiate the Route Request (RREQ). The time stamp, SFSR and maximum acceptable delay fields are attached with the RREQ. When a node receives the RREQ it will decide whether it should forward the RREQ. At first, it will check its BOR and will see whether it is becoming congested. Secondly, it calculates the time for which the packet has been survived then it will compare the time with the maximum acceptable delay. If it is less then only the node will forward it otherwise drop it. Thirdly, the node compares its SFSR with the SFSR of the RREQ. If the RREQ SFSR value is larger replace it with its SFSR. After checking whether the packet is valid or not at the destination node a Route Reply (RREP) is initiated. Before sending the RREP the reverse route and SFSR value is recorded into the routing table. When a source node receives the RREP it records the RREP into the routing table and sends the packets through the route. 4.5 Cross Layer Metric For Scheduling Though WMN acts as a backbone for many network applications but it still suffers from scalability, poor end to end throughput, QoS problems. Many scheduling techniques have been proposed but all that mainly focuses only on one characteristic. So a cross layering approach has been followed by Jason B. Ernst in [3]. In this approach information from many layers are gathered and optimized together. In scheduling techniques can be taken from many approaches and optimize together. Scheduling at MAC layer is difficult as there is no proper information for scheduling. So information are gathered from other layers such as queue length, channel quality etc, which are more useful to decide how to allocate time and resources to nodes. In this approach, scheduling is done against three characteristics. Firstly the biasing is done against the distance from the gateways. The more distance from the gateway the router is, the hop number increases so the probability of successful delivery of packet decreases. Thus to achieve a higher throughput it is good to send fewer packet through the node that is farther away from the gateway. Secondly the biasing is done against queues. The routers with full queues are given priority than the routers with short queue length. The routers with full queue are given priority because it will help the shorter queues to build up and also allow full queue to empty them so that fewer packet are dropped. Thirdly the biasing is done against the poor links. The links with good quality are given priority to achieve a good performance and increase packet delivery rate. Resources assigned to a node in these three techniques are determined using the equation below. 21 1   cc R   R is the resource allocated to the node c is the measure of a particular characteristic. c>0 α is the weight of each bias technique, 0<α<1 β1, β2 are biasing constants that determines the strength of each bias. The last technique is the combined approach where several bias techniques are combined to form a single scheduling approach. In this technique a fraction of the resources is assigned to each of the bias-technique. The Combined mixed-bias is given as 332211 RRRR   Where R is the resources allocated to the node R1 is the resources calculated using above equation. γ1 is the weight of technique 1 in the combined biasing R2 is the resources calculated using above equation γ2 is the weight of technique 2 in the combined biasing R3 is the resources calculated using above equation. γ3 is the weight of technique 3 in the combined biasing γ1, γ2, γ3 > 0 and γ1 + γ2 + γ3 = 1 4.6 Cross Layer Routing Metric A cross layer metric has been proposed by Da Gou et al. in [10] that take into account the physical layer feature, MAC layer feature and then combine them to form a hybrid metric. The metric takes into account the Packet Success Rate (PSR) of the link which denotes the physical link characteristics. The link quality metric is taken from the MAC layer. It is calculated by taking into account the RTS and CTS frame. The quality of a link is dependent on the number of retransmission of the RTS and Data Frame for each successful transmission. The PSR is calculated from the Packet Error Rate (PER): PSR = 1 – PER From the physical layer PSR can be calculated and is transmitted to the network layer. Frame Transmission Efficiency (FTE) is calculated by considering the success rate of transmitting frame based on the average number of retransmission. The number of retransmission of RTS and Data Frame denote the link quality. The quality and the congestion of the link is determined by the number of retransmission of the RTS and Data Frame for each
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 35 successful transmission in MAC layer. The number of retransmission is assumed as: Failure (k)=ACKFailureCount(k)+RTSFailureCount(k). Ack_Failure_Count denote the number of Data retransmission and RTS_Failure_count denotes the number of RTS retransmission. Thus FTE is calculated as- 2)( 2 )(   kFailure kFTE To choose the minimum path to transmit packet the minimum hop count is used. hopnumber hop Hopmetric min  Thus the hybrid metric is expressed as: PSRFTEHopmetricicHybridmetr  4.7 Cross Layer Metric to Recognize Traffic Sunghun Lee et al. in [7] have proposed a metric that is useful to select the path with less interference. Wireless Mesh Networks are also called static wireless networks. Communications between the routers are done through the radio nodes. When the two nodes want to transmit packet they should be within the transmission range and no other sending node should be present within that range. If any sending node is present within the same transmission range collision would occur. The nodes at the interference range between source and destination has to wait for the medium to be cleared before accessing it. A metric is proposed to select a path with less congestion, minimum packet loss and less traffic. The MAC architecture is mainly based on the Distributed Coordination Function (DCF), Point Coordination Function (PCF). Here each station maintains a contention window and a back off timer. An initial value for the contention window is set. After each retransmission occured due to collision the value of the contention window is sequentially increased with integer power of 2 and minus 1. But this technique does not give a good result when the number of transmitting nodes increases. So to overcome such obstacle the traffic recognizing metric transmits data after checking traffic and interference by hearing the RREP. A source node will broadcast a RREQ when it has data to send. When the intermediate node receives the RREQ a route is created to the source. The intermediate node then checks if it is not the destination nor having the path to the destination, it will rebroadcast the RREQ. After the destination node receives the RREQ it generate the RREP and broadcast in a hop-by-hop fashion to the source. Here the pure flooding technique has been followed. When the RREP is received by the intermediate nodes a path is set up from the destination node and the neighboring nodes record the condition of interference by overhearing RREP packets. Here let TXk is the number of node that cause interference by generating traffic at sending node; RXk the number at receiving node; and TXk ∩ RXk the number of nodes causing interference at the intermediate of link.      linkk kkkkk RXTXRXTXETTpath loglog 4.8 A Cross-Layer Load-Independent Link Cost Metric In [13] Marianna Carrera et al. have proposed Cross-layer Unicast Transmission Time (X-UTT), a MAC-aware load- independent link cost metric for wireless mesh networks. It is designed to capture the wireless link capacity and is independent of the load induced by self-interference and cross- interference in a mesh network. The information acquired from a network-layer unicast probing system and a MAC-layer monitoring system is utilized by the X-UTT metric. The performance of the Wireless network is mainly dependent on the ability to route packets efficiently over the multi hop wireless mesh infrastructure. The existing metric like ETX, ETT etc are mainly incorporated with the loss of packets, available bandwidth to measure the link quality. The X-UTT is designed to be load-independent and characterize wireless link quality only in terms of the link capacity presented to the network layer by the underlying MAC protocol operation. X- UTT is designed on the basis of unicast network-layer probes subjected to MAC-layer (re)transmissions. The sum of the transmission airtime and the backoff time of all its MAC layer (re)transmissions give the packet transmission time of each probe. The transmission air-time information which is a bit- rate function, the backoff time prior to each (re)transmission which is a function of the number of previously failed transmissions, are extracted from a MAC layer monitoring system implemented at the wireless card driver.X-UTT is defined as the ratio between the average packet transmission time (PTT) and the unicast probe delivery ratio as (du3) 3ud PTT XUTT  IN 802.11 MAC layer error control (acks and retransmissions) is same as perceived by the upper layers. X-UTT is designed to capture the quality of 802.11 MAC layer. To hide losses to the higher layers error control mechanism retransmits unacknowledged frames and increases link capacity by increasing the network layer delivery ratio. The transmission time of a network layer packet is the sum of the time spent for all the MAC layer retransmissions. The error control
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Special Issue: 02 | Dec-2013, Available @ http://www.ijret.org 36 mechanism of a network layer decreases the link capacity by increasing the total time to transmit a packet. These opposite effects are captured by the components of X-UTT. 5. CONCLUSIONS The cross layering approach has been followed to discover many metrics for the Wireless Mesh Network. The cross layer approach is adapted to achieve a good performance and to avoid less congested paths. Through cross layering a good idea about the network can be achieved as the information from different layers are optimized compactly. The cross layer metrics are used for routing, to avoid traffic and congestion, to improve the QoS and for many other purposes. In this paper some of the metrics are mentioned. Many more metrics are still to be identified to improve the performance of the wireless mesh network. REFERENCES [1] Luigi Iannon, Ramin Khalili, Kav´e Salamatian, Serge Fdida, “Cross-Layer Routing in Wireless Mesh Networks” 1st International Symposium in Wireless Comuniction Systems, September 2004. [2] Taimour Aldalgamouni,Ahmed Elhakeem,” A Joint Cross Layer Routing and Resource Allocation Algorithm for Multi-Radio WirelessMesh Networks” in the proceedings of IEEE conference on june 2009 pp 349-354. [3] Jason B. Ernst, Mieso K. Denko,” Cross-Layer Mixed Bias Scheduling for Wireless Mesh Networks” in the proc of IEEE conference on May 2010,pp 1-5. [4] Stefano Paris, Cristina Nita-Rotaru, et al,” EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants” IEEE INFOCOM , PP 576-580,2011. [5] Huaiyu Wen,Guangchun Luo“Environmental Cognition Based Wireless Mesh Network Cross-layer Routing Protocol” in the proc of Information & Computational Science 2012,pp 473-487. [6] Wenming Song,et al,“A Congestion-Aware Multipath Routing with Cross Layer Design for Wireless Mesh Networks” in the proc of 15th Asia Pacific Conference oct.2009,pp 656-660. [7] Sunghun Lee, Hyukjoon Lee and Hyungkeun Lee,“A Cross Layer Routing Metric To Recognize Traffic Interference in Wireless Mesh Networks” in the proc of of IEEE conference 2010, pp 396-401. [8] ProfNizar Zorba, Charalambos Skianis and Christos Verikoukis, a book chapter “ CROSS LAYER DESIGNS IN WLAN SYSTEMS” [9] Ian F. Akyildiz, Xudong Wang, Kiyon,”A Survey on Wireless Mesh Networking” IEEE Communications Magazine, vol. 43(9), pp. S23–S30, Sept. 2005. [10] Da Guo, Jun Li, Mei Song, Junde Song,“A Novel Cross-Layer Routing Algorithm in Wireless Mesh Network” in the proc. of IEEE International Conference 2007,pp 1-3,vol-07. [11] B.Nandini, et al,“Cross-Layer Design for wireless mesh networks” in the proc of IEEE Transaction onMobile Computing,2008,pp 1363-1373. [12] S. Siva Nageswara Rao, Y.K. Sundara Krishna, and K. Nageswara Rao,“ A Study of Routing Metrics for Wireless Mesh Networks” in the proc of International Journalof Rsearch and Reviews of Wireless Communication 2011. [13] Marianna Carrera, Henrik Lundgren, Theodoros Salonidis, Christophe Diot “A Cross-Layer Load- Independent Link Cost Metric for Wireless Mesh Networks” in the proc. 2007 ACM CoNEXT conference. [14] Jun Yuan,et al,“A Cross-Layer Optimization Framework for Multi hop Multicast in Wireless Mesh Networks” in the proceedings of IEEE on Selected areas in communication, vol.24, no11, November 2006.