SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
DOI:10.5121/iju.2015.6302 9
DETERMINING THE NETWORK THROUGHPUT AND
FLOW RATE USING GSR AND AAL2R
Adyasha Behera1
and Amrutanshu Panigrahi2
1
Department of Information Technology, College of Engineering and Technology,
Bhubaneswar, India
2
Department of Information Technology, College of Engineering and Technology,
Bhubaneswar, India
ABSTRACT
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
KEYWORDS
Wireless Mesh Networks, Multi-channel, Multi radio, GSR, AAL2R, Packet Aggregation, Packet
Forwarding.
1. INTRODUCTION
A wireless mesh network (WMN) is a communication network consisting of radio nodes
organized in a mesh topology [1]. Wireless mesh networks (WMNs) are becoming new and
promising technique for internet connection due to its elegant feature like low cost for
deployment, ease of use, long time network life, easy maintenance and robustness. Mesh router,
mesh client and the gateways are three measure components of WMN. Routers are static in nature
and provide the network backbone, the mesh clients are used to access the network through the
mesh routers and also they directly mesh with each other and the gateways are used by the router
for inter network communication. Some aspects like self- organising and self configuring of
WMN make it different form the traditional wireless network [2]. In contrast WMN is a self
sustaining network due to the above said features.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
10
The routing protocol in a wireless mesh network is in charge of routing packets in such a way not
to exceed the given available bandwidth on each link. Routing is the process of determining the
path from a source to a destination. The main objective of routing scheme is to maintain the QOS
of the end user with the optimizing way of utilizing the network resources. But to achieve these
above said goals is so easy due to some tradeoffs like black hole, routing loop, maximum
bandwidth problem and maximum flow problem. In hop by hop communication if one of the
intermediate hops goes down permanents and it is not able to forward any message to the next
hop, resulting the black hole in the network. Routing loop itself suggests the problem by its name
itself i.e., the message is not being forwarded to the destination as its being looped inside the
network. According to the maximum bandwidth problem the routing scheme has to carry
maximum number of traffic from source to destination while keeping the bandwidth satisfied.
The maximum flow rate problem is to find the maximum flow from a source to destination with a
given constant bandwidth. To overcome these tradeoffs the routing scheme has to consider some
metric such as Expected Transmission Count (ETX), Expected Transmission Time (ETT), energy
consumption and the path availability and reliability. Unfortunately, traditional destination-based
routing protocols do not take into account the link bandwidth availability resulting from a given
channel assignment and route packets along the shortest paths computed by using certain link
metrics. Finding a set of link costs such that a given set of traffic demands are routed so that the
link available bandwidths are not exceeded is a difficult problem. Also, such a solution would be
tightly coupled to a particular set of traffic demands and the network performance may decrease
as the traffic demands vary.
Figure 1. Infrastructure backbone of WMN
To overcome the shortcomings of traditional destination-based routing protocols, a new Layer-2.5
forwarding paradigm was proposed. In L2.5 [3], forwarding decisions are not taken by looking up
the routing table, but are based on two objectives: i) balance the traffic among the outgoing links
in proportion to their available bandwidth; ii) guarantee that all the packets reach the destination
in a predetermined maximum number of hops.
The objective of our work is to detail study of the packet aggregation and packet forwarding
strategy algorithms. Global state routing [4] and Aggregation Aware Layer 2.5 Routing (AAL2R)
[25] algorithm are two packet forwarding strategies. These are tried to implement by using NS3
simulation. Environmental are setup for AAL2R and global state routing according to
requirement specifications. Performance evaluation of WMN using global routing and AAL2R is
our main focus. To achieve that we have calculated some of the network influencing parameter
like network throughput, packet delivery ratio, packet loss ratio etc.
The paper is structured as follows. In chapter 2 a detailed literature study has been done on
different available link matrices, packet forwarding and routing schemes. In 3 we have elaborated
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
11
the packet forwarding and packet aggregation and described the AAL2R and GSR algorithm. In 4
a simulation study has been done in order to measure the network performance. Finally in 5 we
have concluded for this research paper.
2. LITERATURE STUDY
In [5] the authors has introduced Expected Transmission Count (ETX) to estimate the number of
transmission. The authors in [6] developed two metrics, the expected transmission time (ETT)
and the weighted cumulative ETT (WCETT). MIC (metric of interference and channel switching)
takes the interflow interference into account in addition to the intra-flow interference. A link
metric based on the estimated available bandwidth is intended to be used with a single path
destination-based routing protocol. In [7 and [8] authors had proposed two routing protocol
named AODV and OLSR respective in order to consider the above link metric into consideration
for ad-hoc network. These above said two routing protocols are single path routing protocols. The
routing protocol specified in the IEEE 802.11s is basically a modified version of AODV that
make the utilisation of the airtime link metric to associate each link with an estimated amount of
time for successfully completion of transmission. These single path routing protocols follows
some difficulties like limited capability and load balancing in the deployment phase. AODV-BR
[9], AOMDV [10] are the extension of the single path routing protocols by considering multiple
path between source and destination pair. Both finding considers the interference in some aspect,
but don‟t consider the bandwidth constraint resulting from the channel assignment.
R. Draves et.al. in [22] has developed adaptive load-aware routing scheme and according to
which the network is divided into multiple cluster. One cluster head is present for each cluster
which is responsible for controlling the communication of the nodes belonging to its own cluster.
A number of approaches exploit the broadcast nature of the wireless medium. ExOR [12] and
GATOR [13] are two opportunistic approaches. In ExOR the node broadcasts a packet and the
intermediate node receiving the packet will decide the next hop for further forwarding. This
process will be iterated until the packet arrives at the proposed; however the protocol used to
reach such agreement introduces some overhead. GATOR exploits the knowledge of geographic
coordinate of the intermediate nodes while selecting the node for receiving the packet for further
packet forwarding. But the drawback of the opportunistic approach is that it only considers the
neighbouring nodes that are listening on the channel of the sender are eligible for receiving the
packets. The authors in [13] has developed the ROMER which will result a mesh with minimum
path cost and each packet is allowed to travel by any path from that mesh only. The any path
routing paradigm [15] generalizes the opportunistic approach according to which every node is
pre computed with the set of next-hops with different priority level. A packet is allowed to be
forwarded to the highest priority next-hop and next hops are determined in decreasing order of
priority. In [16] the authors have proposed one forwarding strategy to find the least cost any path.
But Arun Raj et. al. [17] has extended the finding of [16] by considering more facts. First any path
routing requires a modified MAC to determine which next hop has to forward the packet.
Secondly, the load balancing need to be considered in case of failure of one node due to excessive
load. Stefano Avallone et al. [5] had proposed a layer 2.5 algorithm which solves the link flow
rates during channel assignment. In this L2.5, forwarding decisions are not taken by looking up
the routing table, but are based on two objectives i) balancing the traffic on each outgoing links;
ii) successful transmission of packets from source to destination must be constrained to a
predetermined maximum number of hops. Arun Raj et al. [20] have described RSAPS (Round
robin based Secure Aware Packet Scheduling) which will provide the forwarding strategy and
also considers dynamically increasing or decreasing the security levels of packets based on the
incoming load. RSAPS gives priority to schedulability rather than security. Stefano Avallone and
Giovanni Di Stasi et al [21] has introduced the MPLS splitting policy requires to identify a
suitable set of paths for each ingress-egress pair and to compute the set of split ratios.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
12
3. IMPLANTATION OF ROUTING ALGORITHMS
Packet Aggregation and Packet Forwarding
Packet aggregation increases the network capacity by transmitting several packets at a single time
interval. This technique sound to be elegantly effective when the overhead for a single
transmission is high in the network. The benefits of packet aggregation have been shown in [22],
[23], [24] and [25]. The recent IEEE 802.11n standard has also taken aggregation into
consideration to improve performance. Deploying packet aggregation in multi-channel multi-path
environments may result in suboptimal performance. This is because typically multi-path routing
algorithms are also responsible to send data packets to different nodes simultaneous, but the
aggregation concepts comes into account when multiple packet need to be forwarded to one
intended recipient. Collection of different packets that are aimed to be transferred to one node is
performed by the aggregation module. The aggregation module stores the packets into different
queue. Each queue is for one next hop node that can be reached through the network interface.
When a packet is received by the aggregation module, it is immediately time stamped and put into
the appropriate queue of the next-hop the packet is destined to. The time stamp is used to
determine long the packet has been queued already.
Packet Forwarding
The forwarding mechanism is nothing else the hop by hop routing. In packet forwarding one node
just forwards the data packet to the next hop by looking into its routing table. When a packet
arrives at one node it determines to keep the packet if that data packet is destined to it only
otherwise it simply forwards the packet to the next of by getting the information from its routing
table. By following this method iteratively packet is destined to the intended recipient. Due to the
independent flow of packet inside the network the path for data flow need not be pre computed
and the network is said to be connectionless [11], [25]. In order to properly route a packet, a
router must be able to determine the next hop for the packet. For this purpose the router builds the
routing table by considering the information returned by the routing protocol. The routing table
should be dynamically updated in order to successfully handing the traffic. The table at each
router is responsible for identifing the next hop for all known IP destination addresses. Routers
generally store IP prefixes rather than complete IP addresses in their forwarding tables [4].
3.1. AAL2R
In Aggregation Aware Layer 2 Routing algorithm follow the packet aggregation as well as the
forwarding strategy. All potential queues related to next-hop. The aggregation of the packet
should be done by selecting one queue while maintaining the constant flow rate for the network.
Finding the perfect transmission unit the packets follow the condition that the transmission unit
must be non empty set and secondly the spare space (SP) should greater than the packet size. (SP)
is defined as the interval between the transmissions of two packets. Hence SP is determined by
subtracting header size and the number of packets in one queue from the maximum transmission
unit.
SP= MTU-∑pϵQi Psize –Header Size (1)
Other condition which can arise during the transmission is the presence of empty set. In this case
the aggregation set must wait for the upcoming packets for scheduling the transmission. The
aggregation set is said to be empty in 2 cases. In 1st
case when the queues are empty or the queues
which are not empty and do not have enough spare space available for aggregation then the queue
remains unchanged and can potentially aggregate a packet when a packet will arrive at the queue.
In 2nd
case if all queues hold some packets with a spare space smaller than the packet size then all
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
13
the queues belonging to the candidate next-hops are considered eligible for sending the current
packet. When the eligible set of next-hops has been chosen the queue is ready to transmit. If more
than one queue are ready for transmission at the same time then the queue with the oldest packet
is served first to avoid starvation. The oldest packet is determined by checking the time stamp
attached with each packet as the time stamp shows the time that the packets has spent in queue for
a chance of transmission. According to this the packet which holds the highest time stamp will
have the highest priority for the transmission as the time stamp. By choosing one queue for
transmission all other queues inside the aggregation set will be remain unchanged. Hence all
queues are extracted from the aggregation set in the decreasing order of priority while the priority
of the queue is determined by the average time stamp for each packet inside it.
3.2. Global State Routing
The Global State Routing Protocol (GSR) is aimed to determine the next hop of one node that
wants to transmit the data into the wireless mesh network. The GSR also avoids the disadvantages
of flooding of data into the network by taking link state table which will dynamically respond to
the topology change inside the network and also periodically exchange the information with the
neighbour node in order to maintain connectivity. The network is modelled as an undirected
graph G = (V, E), where V is a set of |V| j nodes and E is a set of |E| undirected links connecting
nodes in V. In the network the each node has a unique identifier and represents a host with the
transmission range and an undirected link connecting two nodes i and j is formed when the
distance between i and j become less than or equal to transmission range. Link is removed from
the graph when both nodes move away from each other. For each node i, one neighbour list,
topology table, next hop table and distance table are maintained. Neighbour list contains the list
of adjacent node currently available to the corresponding node. The topology table contains the
link state information and the time stamp as well for the node. The next hop table contains the
adjacent nodes called as next hop to which the node can transmit the data for the destination node.
The distance table holds the shortest path between the source and destination node and it will be
getting update after every successful transmission of data to a node from a node. Since min-hop
and shortest path are only the two objective for this routing algorithm. A weight function is used
to compute the distance of a link for each node, this weight function simply returns 1 if two nodes
have direct connection, otherwise, it returns 0. For every node the weight function is applied to
find out the shortest next hop from available multiple hops before the transmission of the data
packet into the network.
4. SIMULATIONS AND RESULTS
In the following section our goal is to evaluate the packet forwarding strategies. And also
calculate the network parameters like throughput and packet delivery ratio to determine the
network performance. For this purpose we have used Network Simulator-3, which is an event
driven simulator used for calculating the network performance. We have set different number of
nodes and established the communication link between them. Then the UDP and TCP type
traffic has been used over the link while communication. The above environment has been
simulated in different time periods such as 10sec-60sec.
Environment configuration
To determine the performance of the algorithms by calculating some network parameters like
packet delivery ratio, packet loss ratio, overall throughput. Simulation is done under the simulator
version NS 3.20. In Figure 2 shows the arrangement of 10 nodes in ns3 environment Packet
length taken 512 KB.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
14
Figure 2. Node Setup in NS 3
Packet Delivery Ratio
Packet delivery ratio is defined as the ratio of data packets received by the destinations to those
generated by the sources. In figure 3 shows the ratio of the number of delivered data packet to the
destination. This illustrates the level of delivered data to the destination. Mathematically
represented as
Figurer 3. Packet Delivery Ratio of GSR
Packet Loss Ratio
The packet loss ratio defined as deference of total number of packet send and Number of packet
received. The figure 4 shows total number of packets dropped during the simulation a sample
path for the delay and loss of the probe packets. The fluctuation in the graph indicates that there is
a correlation between the loss and delay even in the actual network. Packet lost Ratio =∑ Number
of packet send – ∑Number of packet received.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
15
Figure 4. Packet Loss Ratio of GSR
Average Throughput
When used in the context of communication networks, such as Ethernet or packet radio,
throughput or network throughput is the rate of successful message delivery over a
communication channel. Figure 5 shows the data these messages belong to may be delivered over
a physical or logical link or it can pass through a certain network node. Throughput is usually
measured in bits per second (bit/s or bps), and sometimes in data packets per second or data
packets per time slot. It is defined as the total number of packets delivered over the total
simulation time.
Figure 5. GSR Throughput in mbps
We evaluated the behaviour of the considered forwarding paradigms under two different traffic
classes UDP and TCP for AAL2R. Figure 6 shows the throughput AAL2R using TCP. The
throughput of UDP simulation is shown in figure 7.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
16
Figure 6. Throughput of AAL2R using TCP
Figure 7. Throughput of AAL2R using UDP
5. CONCLUSIONS
In this paper we have studied and elaborated two packet forwarding schemes AAL2R and GSR.
AAL2R considers both packet aggregation and packet forwarding but the GSR considers only the
packet forwarding strategies. The performance of the resulting network by implementing both
algorithms, has been measured by calculating some network influencing parameters like packet
delivery ratio, packet loss ratio and throughput. By implementing these algorithms the simulation
study shows that that AAL2R has high packet delivery ratio than that of GSR. As the throughput
of the network is directly proportional to the packet delivery ratio, hence the AAL2R has also
high network throughput over GSR.
It can be concluded that in multi radio multi channel wireless mesh network AAL2R is
performing good as it is considering the packet aggregation which directly increases the network
capacity by enabling the node to transmit multiple packet in a single time interval. But GSR
considers only the packet forwarding which limits the network overhead and capacity. Also
AAL2R performs immensely while handling the interference with the presence of heavy traffic as
compared to GSR.
ACKNOWLEDGEMENTS
We would like to thank our parents, teachers and colleagues for their inspiration which helps us to
initiate the research work and also for the acceleration during the work. We also like to extend
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
17
our thanks to everyone from our institute side whose help and expertise advice greatly assist in
this research work. We would also like show our immense gratitude to everyone who share their
pearls of wisdom with us during the course of work.
REFERENCES
[1] Akyildiz, X. Wang, and W. Wang,(2005) “Wireless Mesh Networks: A Survey,” Comp. Networks
ELSEVIER, Vol. 47, no. 4, pp. 445–87.
[2] Akyildiz, I.H. Kasimoglu, (2004) “Wireless sensor and actor networks: research challenges”, Ad
Hoc Networks, ELSEVIER, Vol.2, no.4, pp. 351-367.
[3] S. Avallone, I. Akyildiz, and G. Ventre, (2009) “A channel and rate assignment algorithm and a
layer-2.5 forwarding paradigm for multi-radio wireless mesh networks,” IEEE/ACM Transactions
on Networking, Vol. 17, no. 1, pp. 267–280.
[4] Tsu-Wei Chen and Mario Gerla, (1998)“Global state routing: a new routing scheme for ad-hoc
wireless networks”, Conference Record, 1998 IEEE International Conference on Communication,
Vol.1, pp. 171 - 175.
[5] Stefano Avallone and Giovanni Di Stasi (2013), „A New MPLS-Based Forwarding Paradigm for
Multi Radio Wireless Mesh Networks‟, IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, Vol. 12, no. 8, pp. 3968-3979..
[6] R. Draves, J. Padhye, and B. Zill, (2004) “Routing in multi-radio, multi-hop wireless mesh
networks,” in Proc. 2004 ACM MobiCom, pp. 114–128.
[7] Perkins, E. Belding-Royer, and S. Das, (2003) “Ad hoc on-demand distance vector (AODV)
routing,” IETF, RFC 3561.
[8] T. Clausen and P. Jacquet (2003), “Optimized link state routing protocol (OLSR),” IETF, RFC
3626.
[9] S.-J. Lee and M. Gerla, (2000) “AODV-BR: backup routing in ad hoc networks,” in Proc. 2000
IEEE WCNC, vol. 3, pp. 1311–1316.
[10] M. Marina and S. Das, (2001) “On-demand multi-path distance vector routing in ad-hoc
networks,” IEEE ICNP, pp. 14-23.
[11] X. Hu and M. J. Lee, (2007) “An efficient multipath structure for concurrent data transport in
wireless mesh networks,” Computer Commun., vol. 30, pp. 3358–3367.
[12] S.Biswas and R. Morris, (2005) “ExOR: opportunistic multi-hop routing for wireless networks,” in
Proc. 2005 ACM SIGCOMM, pp. 133–143.
[13] Y. Yuan, H. Yang, S. Wong, S. Lu, and W. Arbaugh, “ROMER: resilient opportunistic mesh
routing for wireless mesh networks,” in Proc. 2005 IEEE WiMesh.
[14] B. Choi, T.Wong, and J. Shea, (2012) “Geographic transmission with optimized relaying
(GATOR) for the uplink in mesh networks,” IEEE Trans. Wireless Commun., vol. 11, no. 6, pp.
2095–2105.
[15] R. Laufer, H. Dubois-Ferriere, and L. Kleinrock, (2012) “Polynomial-time algorithms for multirate
anypath routing in wireless multihop networks,” IEEE/ACM Trans. Netw., vol. 20, no. 3, pp. 742–
755.
[16] X. Fang, D. Yang, and G. Xue, (2013) “MAP: multi-constrained anypath routing in wireless mesh
networks,” IEEE Transaction on Mobile Computing, Vol. 12, no. 10, pp. 1893-1906.
[17] Arun Raj, P. Blessed Prince, (2013) “Round robin based Secure-Aware Packet Scheduling in
Wireless Networks,” International Journal of Engineering Science and Technology (IJEST), Vol.
5, no. 3, pp. 570-575.
International Journal of UbiComp (IJU), Vol.6, No.3, July 2015
18
[18] S. Avallone, I. Akyildiz, and G. Ventre, (2009) “A channel and rate assignment algorithm and a
layer-2.5 forwarding paradigm for multi-radio wireless mesh networks,” Networking, IEEE/ACM
Transactions on, vol. 17, no. 1, pp. 267–280.
[19] Stefano Avallone and Giovanni Di Stasi (2013), „A New MPLS-Based Forwarding Paradigm for
Multi Radio Wireless Mesh Networks‟, IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, Vol. 12, no. 8, pp. 3968-3979.
[20] M. Marina and S. Das, (2001) “On-demand multi-path distance vector routing in ad-hoc
networks,” in Proc. 2001 IEEE ICNP, pp. 14-23.
[21] R. Draves, J. Padhye, and B. Zill, (2004) “Routing in multi-radio, multi-hop wireless mesh
networks,” in Proc. 2004 ACM MobiCom, pp. 114–128.
[22] R. Raghavendra, A. P. Jardosh, E. M. Belding, and H. Zheng, (2006) “IPAC: IPbased Adaptive
Packet Concatenation for Multihop Wireless Networks,” in Proc. Fortieth Asilomar Conference on
Signals, Systems and Computers ACSSC ‟06, 2006, pp. 2147–2153.
[23] J. Karlsson, A. Kassler, and A. Brunstrom, (2009) “Impact of packet aggregation on TCP
performance in Wireless Mesh Networks,” in WOWMOM. IEEE, 2009, pp. 1–7.
[24] P. Dely, A. Kassler, N. Bayer, and D. Sivchenko, (2010) “An Experimental Comparison of Burst
Packet Transmission Schemes in IEEE 802.11- Based Wireless Mesh Networks,” in
GLOBECOM, vol. 2010, 2010, pp. 1–5.
[25] Jonas Karlsson, Giovanni Di Stasi, Andreas Kassler, Stefano Avallone, (2011) “An Aggregation
Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks,” 2011 Eighth IEEE
International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 765-770.
[26] M. Castro, P. Dely, J. Karlsson, and A. Kassler, (2007) “Capacity Increase for Voice over IP
Traffic through Packet Aggregation in Wireless Multihop Mesh Networks,” Future Generation
Communication and Networking, vol. 2 pp. 350-355.
[27] R. Riggio, D. Miorandi, F. De Pellegrini, F. Granelli, and I. Chlamtac, (2008) “A traffic
aggregation and differentiation scheme for enhanced QoS in IEEE 802.11-based Wireless Mesh
Networks,” Computer communications, vol. 31, no. 7, pp. 1290–1300.
Authors
Ms Adyasha Behera
Ms Adyasha Behera has successfully completed her M.Tech in Information
Technology from College of Engineering and Technology, Odisha in 2014. Her
research interests include Wireless Mesh Network, Mobile Computing and
Programming Language.
Mr Amrutanshu Panigrahi
Mr Amrutanshu Panigrahi has successfully completed his M.Tech in Information
Technology from College of Engineering and Technology Odisha in 2014. His
research interests include Mobile Computing, Wireless Mesh Network, Distributed
System, Real-time operating system and Network security.

More Related Content

What's hot

CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 

What's hot (17)

CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
R045059297
R045059297R045059297
R045059297
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
E010322531
E010322531E010322531
E010322531
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Rough set based QoS enabled multipath source routing in MANET
Rough set based QoS enabled multipath source routing  in MANET Rough set based QoS enabled multipath source routing  in MANET
Rough set based QoS enabled multipath source routing in MANET
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 

Similar to GSR and AAL2R Algorithms for Determining Network Throughput

RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...IOSR Journals
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 

Similar to GSR and AAL2R Algorithms for Determining Network Throughput (20)

RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSSNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Recently uploaded

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

GSR and AAL2R Algorithms for Determining Network Throughput

  • 1. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 DOI:10.5121/iju.2015.6302 9 DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R Adyasha Behera1 and Amrutanshu Panigrahi2 1 Department of Information Technology, College of Engineering and Technology, Bhubaneswar, India 2 Department of Information Technology, College of Engineering and Technology, Bhubaneswar, India ABSTRACT In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study. KEYWORDS Wireless Mesh Networks, Multi-channel, Multi radio, GSR, AAL2R, Packet Aggregation, Packet Forwarding. 1. INTRODUCTION A wireless mesh network (WMN) is a communication network consisting of radio nodes organized in a mesh topology [1]. Wireless mesh networks (WMNs) are becoming new and promising technique for internet connection due to its elegant feature like low cost for deployment, ease of use, long time network life, easy maintenance and robustness. Mesh router, mesh client and the gateways are three measure components of WMN. Routers are static in nature and provide the network backbone, the mesh clients are used to access the network through the mesh routers and also they directly mesh with each other and the gateways are used by the router for inter network communication. Some aspects like self- organising and self configuring of WMN make it different form the traditional wireless network [2]. In contrast WMN is a self sustaining network due to the above said features.
  • 2. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 10 The routing protocol in a wireless mesh network is in charge of routing packets in such a way not to exceed the given available bandwidth on each link. Routing is the process of determining the path from a source to a destination. The main objective of routing scheme is to maintain the QOS of the end user with the optimizing way of utilizing the network resources. But to achieve these above said goals is so easy due to some tradeoffs like black hole, routing loop, maximum bandwidth problem and maximum flow problem. In hop by hop communication if one of the intermediate hops goes down permanents and it is not able to forward any message to the next hop, resulting the black hole in the network. Routing loop itself suggests the problem by its name itself i.e., the message is not being forwarded to the destination as its being looped inside the network. According to the maximum bandwidth problem the routing scheme has to carry maximum number of traffic from source to destination while keeping the bandwidth satisfied. The maximum flow rate problem is to find the maximum flow from a source to destination with a given constant bandwidth. To overcome these tradeoffs the routing scheme has to consider some metric such as Expected Transmission Count (ETX), Expected Transmission Time (ETT), energy consumption and the path availability and reliability. Unfortunately, traditional destination-based routing protocols do not take into account the link bandwidth availability resulting from a given channel assignment and route packets along the shortest paths computed by using certain link metrics. Finding a set of link costs such that a given set of traffic demands are routed so that the link available bandwidths are not exceeded is a difficult problem. Also, such a solution would be tightly coupled to a particular set of traffic demands and the network performance may decrease as the traffic demands vary. Figure 1. Infrastructure backbone of WMN To overcome the shortcomings of traditional destination-based routing protocols, a new Layer-2.5 forwarding paradigm was proposed. In L2.5 [3], forwarding decisions are not taken by looking up the routing table, but are based on two objectives: i) balance the traffic among the outgoing links in proportion to their available bandwidth; ii) guarantee that all the packets reach the destination in a predetermined maximum number of hops. The objective of our work is to detail study of the packet aggregation and packet forwarding strategy algorithms. Global state routing [4] and Aggregation Aware Layer 2.5 Routing (AAL2R) [25] algorithm are two packet forwarding strategies. These are tried to implement by using NS3 simulation. Environmental are setup for AAL2R and global state routing according to requirement specifications. Performance evaluation of WMN using global routing and AAL2R is our main focus. To achieve that we have calculated some of the network influencing parameter like network throughput, packet delivery ratio, packet loss ratio etc. The paper is structured as follows. In chapter 2 a detailed literature study has been done on different available link matrices, packet forwarding and routing schemes. In 3 we have elaborated
  • 3. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 11 the packet forwarding and packet aggregation and described the AAL2R and GSR algorithm. In 4 a simulation study has been done in order to measure the network performance. Finally in 5 we have concluded for this research paper. 2. LITERATURE STUDY In [5] the authors has introduced Expected Transmission Count (ETX) to estimate the number of transmission. The authors in [6] developed two metrics, the expected transmission time (ETT) and the weighted cumulative ETT (WCETT). MIC (metric of interference and channel switching) takes the interflow interference into account in addition to the intra-flow interference. A link metric based on the estimated available bandwidth is intended to be used with a single path destination-based routing protocol. In [7 and [8] authors had proposed two routing protocol named AODV and OLSR respective in order to consider the above link metric into consideration for ad-hoc network. These above said two routing protocols are single path routing protocols. The routing protocol specified in the IEEE 802.11s is basically a modified version of AODV that make the utilisation of the airtime link metric to associate each link with an estimated amount of time for successfully completion of transmission. These single path routing protocols follows some difficulties like limited capability and load balancing in the deployment phase. AODV-BR [9], AOMDV [10] are the extension of the single path routing protocols by considering multiple path between source and destination pair. Both finding considers the interference in some aspect, but don‟t consider the bandwidth constraint resulting from the channel assignment. R. Draves et.al. in [22] has developed adaptive load-aware routing scheme and according to which the network is divided into multiple cluster. One cluster head is present for each cluster which is responsible for controlling the communication of the nodes belonging to its own cluster. A number of approaches exploit the broadcast nature of the wireless medium. ExOR [12] and GATOR [13] are two opportunistic approaches. In ExOR the node broadcasts a packet and the intermediate node receiving the packet will decide the next hop for further forwarding. This process will be iterated until the packet arrives at the proposed; however the protocol used to reach such agreement introduces some overhead. GATOR exploits the knowledge of geographic coordinate of the intermediate nodes while selecting the node for receiving the packet for further packet forwarding. But the drawback of the opportunistic approach is that it only considers the neighbouring nodes that are listening on the channel of the sender are eligible for receiving the packets. The authors in [13] has developed the ROMER which will result a mesh with minimum path cost and each packet is allowed to travel by any path from that mesh only. The any path routing paradigm [15] generalizes the opportunistic approach according to which every node is pre computed with the set of next-hops with different priority level. A packet is allowed to be forwarded to the highest priority next-hop and next hops are determined in decreasing order of priority. In [16] the authors have proposed one forwarding strategy to find the least cost any path. But Arun Raj et. al. [17] has extended the finding of [16] by considering more facts. First any path routing requires a modified MAC to determine which next hop has to forward the packet. Secondly, the load balancing need to be considered in case of failure of one node due to excessive load. Stefano Avallone et al. [5] had proposed a layer 2.5 algorithm which solves the link flow rates during channel assignment. In this L2.5, forwarding decisions are not taken by looking up the routing table, but are based on two objectives i) balancing the traffic on each outgoing links; ii) successful transmission of packets from source to destination must be constrained to a predetermined maximum number of hops. Arun Raj et al. [20] have described RSAPS (Round robin based Secure Aware Packet Scheduling) which will provide the forwarding strategy and also considers dynamically increasing or decreasing the security levels of packets based on the incoming load. RSAPS gives priority to schedulability rather than security. Stefano Avallone and Giovanni Di Stasi et al [21] has introduced the MPLS splitting policy requires to identify a suitable set of paths for each ingress-egress pair and to compute the set of split ratios.
  • 4. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 12 3. IMPLANTATION OF ROUTING ALGORITHMS Packet Aggregation and Packet Forwarding Packet aggregation increases the network capacity by transmitting several packets at a single time interval. This technique sound to be elegantly effective when the overhead for a single transmission is high in the network. The benefits of packet aggregation have been shown in [22], [23], [24] and [25]. The recent IEEE 802.11n standard has also taken aggregation into consideration to improve performance. Deploying packet aggregation in multi-channel multi-path environments may result in suboptimal performance. This is because typically multi-path routing algorithms are also responsible to send data packets to different nodes simultaneous, but the aggregation concepts comes into account when multiple packet need to be forwarded to one intended recipient. Collection of different packets that are aimed to be transferred to one node is performed by the aggregation module. The aggregation module stores the packets into different queue. Each queue is for one next hop node that can be reached through the network interface. When a packet is received by the aggregation module, it is immediately time stamped and put into the appropriate queue of the next-hop the packet is destined to. The time stamp is used to determine long the packet has been queued already. Packet Forwarding The forwarding mechanism is nothing else the hop by hop routing. In packet forwarding one node just forwards the data packet to the next hop by looking into its routing table. When a packet arrives at one node it determines to keep the packet if that data packet is destined to it only otherwise it simply forwards the packet to the next of by getting the information from its routing table. By following this method iteratively packet is destined to the intended recipient. Due to the independent flow of packet inside the network the path for data flow need not be pre computed and the network is said to be connectionless [11], [25]. In order to properly route a packet, a router must be able to determine the next hop for the packet. For this purpose the router builds the routing table by considering the information returned by the routing protocol. The routing table should be dynamically updated in order to successfully handing the traffic. The table at each router is responsible for identifing the next hop for all known IP destination addresses. Routers generally store IP prefixes rather than complete IP addresses in their forwarding tables [4]. 3.1. AAL2R In Aggregation Aware Layer 2 Routing algorithm follow the packet aggregation as well as the forwarding strategy. All potential queues related to next-hop. The aggregation of the packet should be done by selecting one queue while maintaining the constant flow rate for the network. Finding the perfect transmission unit the packets follow the condition that the transmission unit must be non empty set and secondly the spare space (SP) should greater than the packet size. (SP) is defined as the interval between the transmissions of two packets. Hence SP is determined by subtracting header size and the number of packets in one queue from the maximum transmission unit. SP= MTU-∑pϵQi Psize –Header Size (1) Other condition which can arise during the transmission is the presence of empty set. In this case the aggregation set must wait for the upcoming packets for scheduling the transmission. The aggregation set is said to be empty in 2 cases. In 1st case when the queues are empty or the queues which are not empty and do not have enough spare space available for aggregation then the queue remains unchanged and can potentially aggregate a packet when a packet will arrive at the queue. In 2nd case if all queues hold some packets with a spare space smaller than the packet size then all
  • 5. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 13 the queues belonging to the candidate next-hops are considered eligible for sending the current packet. When the eligible set of next-hops has been chosen the queue is ready to transmit. If more than one queue are ready for transmission at the same time then the queue with the oldest packet is served first to avoid starvation. The oldest packet is determined by checking the time stamp attached with each packet as the time stamp shows the time that the packets has spent in queue for a chance of transmission. According to this the packet which holds the highest time stamp will have the highest priority for the transmission as the time stamp. By choosing one queue for transmission all other queues inside the aggregation set will be remain unchanged. Hence all queues are extracted from the aggregation set in the decreasing order of priority while the priority of the queue is determined by the average time stamp for each packet inside it. 3.2. Global State Routing The Global State Routing Protocol (GSR) is aimed to determine the next hop of one node that wants to transmit the data into the wireless mesh network. The GSR also avoids the disadvantages of flooding of data into the network by taking link state table which will dynamically respond to the topology change inside the network and also periodically exchange the information with the neighbour node in order to maintain connectivity. The network is modelled as an undirected graph G = (V, E), where V is a set of |V| j nodes and E is a set of |E| undirected links connecting nodes in V. In the network the each node has a unique identifier and represents a host with the transmission range and an undirected link connecting two nodes i and j is formed when the distance between i and j become less than or equal to transmission range. Link is removed from the graph when both nodes move away from each other. For each node i, one neighbour list, topology table, next hop table and distance table are maintained. Neighbour list contains the list of adjacent node currently available to the corresponding node. The topology table contains the link state information and the time stamp as well for the node. The next hop table contains the adjacent nodes called as next hop to which the node can transmit the data for the destination node. The distance table holds the shortest path between the source and destination node and it will be getting update after every successful transmission of data to a node from a node. Since min-hop and shortest path are only the two objective for this routing algorithm. A weight function is used to compute the distance of a link for each node, this weight function simply returns 1 if two nodes have direct connection, otherwise, it returns 0. For every node the weight function is applied to find out the shortest next hop from available multiple hops before the transmission of the data packet into the network. 4. SIMULATIONS AND RESULTS In the following section our goal is to evaluate the packet forwarding strategies. And also calculate the network parameters like throughput and packet delivery ratio to determine the network performance. For this purpose we have used Network Simulator-3, which is an event driven simulator used for calculating the network performance. We have set different number of nodes and established the communication link between them. Then the UDP and TCP type traffic has been used over the link while communication. The above environment has been simulated in different time periods such as 10sec-60sec. Environment configuration To determine the performance of the algorithms by calculating some network parameters like packet delivery ratio, packet loss ratio, overall throughput. Simulation is done under the simulator version NS 3.20. In Figure 2 shows the arrangement of 10 nodes in ns3 environment Packet length taken 512 KB.
  • 6. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 14 Figure 2. Node Setup in NS 3 Packet Delivery Ratio Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. In figure 3 shows the ratio of the number of delivered data packet to the destination. This illustrates the level of delivered data to the destination. Mathematically represented as Figurer 3. Packet Delivery Ratio of GSR Packet Loss Ratio The packet loss ratio defined as deference of total number of packet send and Number of packet received. The figure 4 shows total number of packets dropped during the simulation a sample path for the delay and loss of the probe packets. The fluctuation in the graph indicates that there is a correlation between the loss and delay even in the actual network. Packet lost Ratio =∑ Number of packet send – ∑Number of packet received.
  • 7. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 15 Figure 4. Packet Loss Ratio of GSR Average Throughput When used in the context of communication networks, such as Ethernet or packet radio, throughput or network throughput is the rate of successful message delivery over a communication channel. Figure 5 shows the data these messages belong to may be delivered over a physical or logical link or it can pass through a certain network node. Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. It is defined as the total number of packets delivered over the total simulation time. Figure 5. GSR Throughput in mbps We evaluated the behaviour of the considered forwarding paradigms under two different traffic classes UDP and TCP for AAL2R. Figure 6 shows the throughput AAL2R using TCP. The throughput of UDP simulation is shown in figure 7.
  • 8. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 16 Figure 6. Throughput of AAL2R using TCP Figure 7. Throughput of AAL2R using UDP 5. CONCLUSIONS In this paper we have studied and elaborated two packet forwarding schemes AAL2R and GSR. AAL2R considers both packet aggregation and packet forwarding but the GSR considers only the packet forwarding strategies. The performance of the resulting network by implementing both algorithms, has been measured by calculating some network influencing parameters like packet delivery ratio, packet loss ratio and throughput. By implementing these algorithms the simulation study shows that that AAL2R has high packet delivery ratio than that of GSR. As the throughput of the network is directly proportional to the packet delivery ratio, hence the AAL2R has also high network throughput over GSR. It can be concluded that in multi radio multi channel wireless mesh network AAL2R is performing good as it is considering the packet aggregation which directly increases the network capacity by enabling the node to transmit multiple packet in a single time interval. But GSR considers only the packet forwarding which limits the network overhead and capacity. Also AAL2R performs immensely while handling the interference with the presence of heavy traffic as compared to GSR. ACKNOWLEDGEMENTS We would like to thank our parents, teachers and colleagues for their inspiration which helps us to initiate the research work and also for the acceleration during the work. We also like to extend
  • 9. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 17 our thanks to everyone from our institute side whose help and expertise advice greatly assist in this research work. We would also like show our immense gratitude to everyone who share their pearls of wisdom with us during the course of work. REFERENCES [1] Akyildiz, X. Wang, and W. Wang,(2005) “Wireless Mesh Networks: A Survey,” Comp. Networks ELSEVIER, Vol. 47, no. 4, pp. 445–87. [2] Akyildiz, I.H. Kasimoglu, (2004) “Wireless sensor and actor networks: research challenges”, Ad Hoc Networks, ELSEVIER, Vol.2, no.4, pp. 351-367. [3] S. Avallone, I. Akyildiz, and G. Ventre, (2009) “A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi-radio wireless mesh networks,” IEEE/ACM Transactions on Networking, Vol. 17, no. 1, pp. 267–280. [4] Tsu-Wei Chen and Mario Gerla, (1998)“Global state routing: a new routing scheme for ad-hoc wireless networks”, Conference Record, 1998 IEEE International Conference on Communication, Vol.1, pp. 171 - 175. [5] Stefano Avallone and Giovanni Di Stasi (2013), „A New MPLS-Based Forwarding Paradigm for Multi Radio Wireless Mesh Networks‟, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, Vol. 12, no. 8, pp. 3968-3979.. [6] R. Draves, J. Padhye, and B. Zill, (2004) “Routing in multi-radio, multi-hop wireless mesh networks,” in Proc. 2004 ACM MobiCom, pp. 114–128. [7] Perkins, E. Belding-Royer, and S. Das, (2003) “Ad hoc on-demand distance vector (AODV) routing,” IETF, RFC 3561. [8] T. Clausen and P. Jacquet (2003), “Optimized link state routing protocol (OLSR),” IETF, RFC 3626. [9] S.-J. Lee and M. Gerla, (2000) “AODV-BR: backup routing in ad hoc networks,” in Proc. 2000 IEEE WCNC, vol. 3, pp. 1311–1316. [10] M. Marina and S. Das, (2001) “On-demand multi-path distance vector routing in ad-hoc networks,” IEEE ICNP, pp. 14-23. [11] X. Hu and M. J. Lee, (2007) “An efficient multipath structure for concurrent data transport in wireless mesh networks,” Computer Commun., vol. 30, pp. 3358–3367. [12] S.Biswas and R. Morris, (2005) “ExOR: opportunistic multi-hop routing for wireless networks,” in Proc. 2005 ACM SIGCOMM, pp. 133–143. [13] Y. Yuan, H. Yang, S. Wong, S. Lu, and W. Arbaugh, “ROMER: resilient opportunistic mesh routing for wireless mesh networks,” in Proc. 2005 IEEE WiMesh. [14] B. Choi, T.Wong, and J. Shea, (2012) “Geographic transmission with optimized relaying (GATOR) for the uplink in mesh networks,” IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2095–2105. [15] R. Laufer, H. Dubois-Ferriere, and L. Kleinrock, (2012) “Polynomial-time algorithms for multirate anypath routing in wireless multihop networks,” IEEE/ACM Trans. Netw., vol. 20, no. 3, pp. 742– 755. [16] X. Fang, D. Yang, and G. Xue, (2013) “MAP: multi-constrained anypath routing in wireless mesh networks,” IEEE Transaction on Mobile Computing, Vol. 12, no. 10, pp. 1893-1906. [17] Arun Raj, P. Blessed Prince, (2013) “Round robin based Secure-Aware Packet Scheduling in Wireless Networks,” International Journal of Engineering Science and Technology (IJEST), Vol. 5, no. 3, pp. 570-575.
  • 10. International Journal of UbiComp (IJU), Vol.6, No.3, July 2015 18 [18] S. Avallone, I. Akyildiz, and G. Ventre, (2009) “A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi-radio wireless mesh networks,” Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 267–280. [19] Stefano Avallone and Giovanni Di Stasi (2013), „A New MPLS-Based Forwarding Paradigm for Multi Radio Wireless Mesh Networks‟, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, Vol. 12, no. 8, pp. 3968-3979. [20] M. Marina and S. Das, (2001) “On-demand multi-path distance vector routing in ad-hoc networks,” in Proc. 2001 IEEE ICNP, pp. 14-23. [21] R. Draves, J. Padhye, and B. Zill, (2004) “Routing in multi-radio, multi-hop wireless mesh networks,” in Proc. 2004 ACM MobiCom, pp. 114–128. [22] R. Raghavendra, A. P. Jardosh, E. M. Belding, and H. Zheng, (2006) “IPAC: IPbased Adaptive Packet Concatenation for Multihop Wireless Networks,” in Proc. Fortieth Asilomar Conference on Signals, Systems and Computers ACSSC ‟06, 2006, pp. 2147–2153. [23] J. Karlsson, A. Kassler, and A. Brunstrom, (2009) “Impact of packet aggregation on TCP performance in Wireless Mesh Networks,” in WOWMOM. IEEE, 2009, pp. 1–7. [24] P. Dely, A. Kassler, N. Bayer, and D. Sivchenko, (2010) “An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11- Based Wireless Mesh Networks,” in GLOBECOM, vol. 2010, 2010, pp. 1–5. [25] Jonas Karlsson, Giovanni Di Stasi, Andreas Kassler, Stefano Avallone, (2011) “An Aggregation Aware Multi-path Forwarding Paradigm for Wireless Mesh Networks,” 2011 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 765-770. [26] M. Castro, P. Dely, J. Karlsson, and A. Kassler, (2007) “Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh Networks,” Future Generation Communication and Networking, vol. 2 pp. 350-355. [27] R. Riggio, D. Miorandi, F. De Pellegrini, F. Granelli, and I. Chlamtac, (2008) “A traffic aggregation and differentiation scheme for enhanced QoS in IEEE 802.11-based Wireless Mesh Networks,” Computer communications, vol. 31, no. 7, pp. 1290–1300. Authors Ms Adyasha Behera Ms Adyasha Behera has successfully completed her M.Tech in Information Technology from College of Engineering and Technology, Odisha in 2014. Her research interests include Wireless Mesh Network, Mobile Computing and Programming Language. Mr Amrutanshu Panigrahi Mr Amrutanshu Panigrahi has successfully completed his M.Tech in Information Technology from College of Engineering and Technology Odisha in 2014. His research interests include Mobile Computing, Wireless Mesh Network, Distributed System, Real-time operating system and Network security.