SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1627
Study on Different Mechanism for Congestion Control in Real Time
Traffic for MANETS
Preethika.P.Kotian1, Vaishnavi.K.Shetty2, Shifana Begum3
1,2Final Year UG Student, Dept. of CSE, Srinivas School of Engineering, Mangalore, India
3Asst.Professor, Dept. of CSE, Srinivas School of Engineering, Mangalore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –During real time data transmission in MANET,
the most promising issues include control of congestion at
the network devices such as routers which have limited
buffer capacity to hold incoming packets and forward them
towards their respective destinations.This paper highlights
on congestion control issues in real time environment as
well as proposes different mechanism to preventcongestion
in real time traffic .
Key Words: Open-loop control, Closed-loop control,
Traffic shaping, End-to-end flow control
1. INTRODUCTION
In a packet switching network,packets areintroducedin the
nodes and the nodes in-turn forwards the packets into the
network. When the “offered load” crosses certain limit, then
there is a sharp fall in the throughput. This phenomenon is
known as congestion. It affects queuing delay, packet loss or
the blocking of new connections and also affects Quality of
Service (QoS). QOS refers to the capability of network to
provide better service to selected network traffic over
various technologies.
Networks use congestion control and congestion avoidance
techniques to try to avoid collapse. The process of managing
the traffic flow inorder to control congestion is called
congestion control. The two classes ofcongestioncontrol are
closed-loop control and open-loop control.
1.1 CLOSED-LOOP CONTROL
A closed-loop system is also referred as a feedback control
system. These systems record the output instead of input
and modify it according to the need. It generates preferred
condition of the output as compared to the original one. It
doesn’t encounteranyexternal orinternal disturbances.This
mechanism tries to remove the congestion after it happens.
A closed loop system has got the ability to perform
accurately because of the feedback. Evenunderthepresence
of non linearity’s the system operates better than open loop
system. But it is less stable compared to open loop system.
Example: Pressure control system, speed control system,
robot control system, temperature control system.
1.2 OPEN-LOOP CONTROL
An open-loop control system takes input under the
consideration and does not react on the feedback to obtain
the output. This is why it is also called a non-feedback
control system. It has the ability to perform accurately, if its
calibration is good. If the calibration is not perfect its
performance will go down. In open-loop congestion control
policies are used to prevent the congestion before it
happens. If non-linearity are present thesystemoperationis
not good. In general it is more stable as the feedback is
absent. Example: Traffic control system, control of furnace
for coal heating, an electric washing machine.
2. LITERATURE SURVEY
Panos Gevros, Jon Crowcroft, Peter Kirstein, and Saleem
Bhatti proposed “Congestion Control Mechanisms and the
Best Effort Service Model” In this article we revisit the best
effort service model and the problem of congestion while
focusing on the importance of cooperative resource sharing
to the Internet’s success, and review the congestion control
principles and mechanism which facilitateInternetresource
sharing.
Mamata Rath, Umesh Prasad Rout, Niharika Pujari,Surendra
Kumar Nanda and Sambhu Prasad Panda proposed
“Congestion Control Mechanism for Real Time Traffic in
Mobile Adhoc Networks”Thispaperhighlightsoncongestion
control issues in real time environment as well as proposes
an upgraded traffic shaping mechanism in TCP/IP protocol
suite of network model for real time applications with basic
concept using the token bucket traffic shaping mechanism
during packet routing at the intermediate nodes.
Mamata Rath, Binod Kumar Pattanayak proposed “Energy
Competent Routing Protocol Design in MANET with Real
time Application Provision” In this paper the authors have
developed a robust and energy efficient routing protocol for
MANET with real time support. Their approach is different
as it calculates the remaining residual battery power,
bounded delay and packet processing rate of the
intermediate node before selecting a node to forward the
packet in the direction of destination.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1628
3. TRAFFIC SHAPING MECHANISM
Fig: Leaky bucket
The leaky bucket is an algorithm based on an analogyofhow
a bucket with a leak will overflow if either the average rate
at which the bucket leaks or if more water than the capacity
of the bucket is poured in all at once, and how the water is
from the bucket at a constant rate. It is used in packet
switched computer networks and telecommunications
networks in both the traffic policing and traffic shaping of
data transmissions in the form of packets.
Fig: Token bucket
The token bucket is an algorithm used in packet switched
computer networks and telecommunications networks. It
can be used to check that data transmissions in the form of
packets conform to define limits on bandwidth and
burstiness. It can also be used as scheduling algorithm to
determine the timing of transmissions that will comply with
the limits set for the bandwidth and burstiness. I t is based
on an analogy of a fixed capacity bucket into which tokens,
normally representing a unit of bytes or a single packet of
predetermined size, are added at a fixed rate.
4. THE PROBLEM OF CONGESTION
Congestion is the state of sustained network overloadwhere
the demand for network resources is close to or exceeds
capacity. Network resources, namely link bandwidth and
buffer space in the routers, are both finite and in many cases
still expensive. The Internet has suffered from the problem
of congestion which is inherent in best effort datagram
networks due to uncoordinated resource sharing. It is
possible for several IP packets to arrive at the router
simultaneously, needing to beforwardedonthesameoutput
link. Clearly, not all of them can be forwarded
simultaneously; there must be a service order.Intheinterim
buffer space must be provided as temporary storage for the
packets still awaiting transmission.
Sources that transmit simultaneously can create a demand
for network resources (arrival rate)higherthanthenetwork
can handle at a certain link. The buffer space in the routers
offers a first level of protection against an increase in traffic
arrival rate. However, if the situation persists, the buffer
space is exhausted and the router has to start dropping
packets. Traditionally Internet routers have used the first
come first served (FCFS) service order, typically
implemented by a first in first out (FIFO) queue, and drop
from the tail at buffer overflow as their queue management
strategy. The problem of congestion cannot be solved by
introducing “infinite” buffer space inside the network; the
queues would then grow without bound, and theend-to-end
delay would increase. Moreover, when packet lifetime is
finite, the packets coming out oftherouterwouldhavetimed
out already and been retransmitted by the transport
protocols[2].
5. CONGESTION CONTROL MECHANISMS
The Internet is decentralized by nature, comprising many
heterogeneous administrative domains; therefore, resource
management naturally involves both end-to-end as well as
local (per-link) decisions. We identify two broad classes of
congestion control mechanisms with regard to where these
mechanisms are implemented: host-basedandrouter-based
mechanisms.
raffic shaping is a technique for regulating the averagerate
and burstiness of a flow of data that enters the network.
Traffic in data network is bursty-typically arrives at non-
uniform rates as the traffic rate varies. When a flow is setup,
the user and the network agree on a certain traffic pattern.
Leaky bucket and token bucket algorithm make useoftraffic
shaping mechanism.
T
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1629
The entire Internet architecture was foundedontheconcept
that all flow-related state should be kept on the hosts;
therefore, the congestion control mechanisms were mainly
implemented in the end hosts. Upon detection of congestion
the sources should inject their packets into the network
more slowly. This mechanism is called end-to-end flow
control. In order for a host to be able to detect congestion,
the routers must be able to provide the information that the
network is currently (orisabouttobecome)overloaded;this
mechanism is called feedback.Flowcontrol andfeedback are
conceptually related, so they are often referred to as
feedback flow control. Although flow control should be
aware of the feedback semantics,theexactmechanismsused
to implement either are orthogonal, so we decided to treat
them separately in our context. The feedback mechanism is
distributed and can be implemented partly or entirely at the
end hosts (receiver side) or routers. Packet drops were, and
to a great extent are still, the only means for a router to fight
congestion. The sources become aware of the packet drops,
interpret them as a congestion indication, and reduce their
rates.
The feedback from the network and the response from the
source are the foundations of Internet congestion control
and are very important because they facilitate decentralized
resource allocation. However, with decisions made at the
end hosts and treatment of the network as a black box that
simply drops packets, there is clearly a limit on how much
control can be achieved over the allocation of network
resources. This also limits the range of services the network
is capable of offering. Routers, on the other hand, know
exactly how congested they are and can therefore perform
more drastic resource management. Thus, the introduction
of router mechanisms for congestion control thatwill enable
the network to more actively manage its own resources
seems inescapable. These mechanisms can be used as
building blocks for providing higher-level resource
management mechanisms such as link sharing, penalty
boxes, and pricing, which by means of financial incentives
controls the sharing of network resources.
The extension of router functionality per se does not
contradict the design philosophy of the Internet where all
state should be kept at the end hosts or, better, at the edges
of the network. Routers have two conceptually orthogonal
methods of managing their own resources: scheduling to
directly manage bandwidth allocation on an outputlink,and
queue/buffer management to manage buffer space and
queue occupancy, respectively, and thus indirectly affecting
bandwidth allocation [2].
6. CONGESTION CONTROL PHASES
Clearly congestion can be avoided at the expense of low
resource utilization; however, this is usually undesirable.
Thus, the goal of any congestion control mechanism, with
respect to resource utilization, is to operate the resource
(link) in a region close to its capacity .There are two phases
in congestion control:
• Congestion avoidance when the system operates about the
Knee.
• Congestion recovery (often confusingly referred to as
congestion control in the literature) when the state of the
system is between the knee and the cliff, and congestion has
occurred so that the total load should be decreased to avoid
collapse. We next treat in turn each of the four classes of
congestion control mechanisms identified above [2].
7. END-TO-END FLOW CONTROL
In control theory a controller changes its input to a black
box and observes the corresponding output. The goal is to
choose the input as a function of the observed output so that
the system state conforms to some desired objective,
provided that the system state can be observed. From a
control-theoretic viewpoint the end host flow adjustment is
the response to a servo-control loop which needs to match
the source’s sending rate to the rate that corresponds to its
fair share at the bottleneck link. The problem is that the
appropriate bottleneck service rate becomes known to the
source after a delay, and the new rate (after any
adjustments) takes effectatthebottleneck onlyafteranother
delay. The precision of the servo-control loop determines
performance; if the queue at the bottleneck link is empty,
throughput will be less than the maximum. If there are
always packets in the queue, the link will never be idle, butif
the queue size grows beyond a limit, packets will start being
discarded. However, in flow control,theoutputofthesystem
(the rate of a flow as seen at the receiver) does not depend
only on the actions of that particular flow, but also on the
actions of all other flows sharing the same path.
Open-loop flow control is acceptable onlyinan environment
without considerations about the impact of individual
actions to other network users. In an open-loop flow control
scheme the sender describes its rate to the network with
parameters like burst size and interburst interval. Simply
stating the rate is not sufficient because b packets/s may be
1 packet every 1/b s, but it can also mean a burst of b back-
to-back packets every second, which might be unacceptable
for a gateway that does not have enough buffer space to
store the burst. The network examines theparametersgiven
by the sender and if the request can be granted (admission
control based on availability or policy criteria) it reserves
resources, corresponding to these parameters, along the
path from the sender to the receiver. The sender simply
ensures that its rate conforms to the given description, and
in this fashion network congestionisavoided.Thisparadigm
fits nicely in a connection- oriented architecture like IntServ
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1630
but cannot be enforced only with end-to-end mechanisms;it
requires resource management mechanisms in all the
routers.
Closed-loop flow control schemes target more dynamic
network environments where it is a requirement for the
sources to dynamically adapt their rate to match their fair
share of network resources.Thefairshareusuallyfluctuates,
and the sender must be able to track these changes and
adjust its rate to allow for more efficient resourceutilization.
Closed-loop schemes can be adaptive window, in which the
source indirectly controls the transmission rate by
modifying the number of packets sent but not yet
acknowledged (window), or adaptive rate, in which the
source, every time it sends a packet, sets a timer with a
timeout value equal to the inverse of the appropriate
transmission rate and transmits the next packet when the
timer expires. The potential damage to the network is
constrained in different ways, but window-based schemes
are easier to implement because they do not require a fine-
grained timer, which is hard to implement in non-real-time
operating systems. If a closed-loop flow control scheme
appears ineffective, either the sources suffer from excessive
packet loss or the network resources are underutilized [2].
8. FEEDBACK MECHANISMS
The mechanism usedfornotifyingthesenderabout network
congestion or the appropriate sending rate is called the
feedback, and inherently involves both the routers that
generate the congestion signals and the receiverhost(s)that
propagates the signal to the sender for interpreting it
accordingly.[2] Closed loop flow control mechanisms and
overall network performance rely heavily on feedback.
Without a feedback mechanisma sourcewouldbecluelessas
to what to do with its sending rate, and the network could
become unstable, unfair, and either congested or
underutilized. Feedback involvesinformationaboutthestate
of the system, so in principle it should originate from the
network and ultimately be delivered to the sender. The
sender receives feedback eitherdirectlyfromthenetwork or
from the network via the receiver; therefore, there are two
forms of feedback: implicit or explicit.
8.1 IMPLICIT FEEDBACK
Implicit feedback requires the end-hosts to be responsible
for monitoring the performance of their own transmissions
(delay, loss) for indications that will let them infer the state
of the network and determine their appropriate sending
rate. Nevertheless, it is debatable how accurately this canbe
derived. The most common form of implicit feedback signal
is packet drop and has been traditionally used by Internet
routers. However, packet drop is not necessarily an
indication of congestion, for instance inerrorpronewireless
links. Another proposed method of implicit feedback is the
observation of the rate at which packets emerge from the
bottleneck or the measurement of the change in end-to-end
delay as the transmission rate changes.
The advantage of implicit feedback is simplicity in the
routers; routers are left to focus only on resource allocation,
and do not have to calculate and produce an appropriate
feedback signal. However, the scheduling mechanisms must
be known to the end hosts for implicit feedback to be useful;
otherwise, theobservedperformancemaybe misleadingand
not accurately describe the actual congestion state of the
network. For example, with FIFO scheduling an increase in
the rate may lead to an increase in the observed throughput,
although queues may have already started building up and
the total delay has increased [2].
8.2 EXPLICIT FEEDBACK
In principle explicit feedback can be in the form of
congestion notification or rate indication. Due to the
limitations in the information that can be carried inprotocol
headers explicit feedback can be binary or multivalued
(usually limited to a small number of values: “how much
congestion has been experienced”). In the case of binary
feedback the appropriate operating point is found through
an iteration process of network feedback and host
adjustments. For explicit feedback the only methods
proposed for TCP/IP networks is the ICMP Source Quench
messages and Explicit Congestion Notification (ECN)
proposal. The ICMP Source Quench message is sent bythe IP
layer of a host or router to throttle back a sender in case the
host/router runs out of buffers or throws datagram away
ICMP Source Quench is very rarely used in the Internet, and
although there is no substantial evidence,thecurrentfeeling
is to deprecate this message becauseitconsumes bandwidth
at times of congestion, and is generally an ineffective and
unfair fix to congestion . In the ECN feedback scheme the
router sets a bit in the packet header (CE bit) whenever it
detects incipient congestion. The receivercopiesthis bitinto
the header of the acknowledgment packet, and the flow
control mechanism at the sender is responsibleforadjusting
the window (or rate) based on a certain algorithm. The
algorithms used for congestion detection and window
adjustment as responses to explicit feedback are part of the
queue management and flow control mechanisms,
respectively. Explicit feedback implies an extra mechanism
in the router, but on the other hand provides more
quantitative control information which can be valuable for
the adjustment process. Explicit rate indication is another
method of explicit feedback in which the switches perform
rate allocation and the calculated rates are explicitly
communicated back to the sources (via the receiver) as
information in the packet headers; it has been used in ATM
networks but not in the Internet [2].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1631
9. CONCLUSION
Best effort service has been tremendously successful for
data traffic, which today accounts for the vast majority of
Internet traffic; there are no indications that this will stop
being the case in the future. The main reason for pursuing
QoS was concerns about the requirements of emerging real-
time and streaming multimedia applications, which could
not be met in the existing service model. Nevertheless, it has
been amply demonstrated that many popular applications
(packet audio, videoconferencing) are able to adapt to
dynamic network conditions by changing theirtransmission
rate using different coding techniques, and therefore
perform sufficiently well under moderate congestion levels.
Thus, it is likely for the Internet to evolve toward a best
effort network which, if controlled and provisioned
appropriately, will be able to satisfy the majority of popular
applications that are willing to tolerateservicedeterioration
due to transient congestion. This could sustain a large
market for best effort service and would limit the
applicability of service models for guaranteed QoS to
corporate intranets and virtual privatenetworks.Mostofthe
congestion control mechanisms presented in thisarticle,the
router-based ones in particular, were almost exclusively
studied in the context of guaranteed QoS and real time
traffic. There has been considerably lessresearchintheir use
within the best effort service framework, so there is a
widespread misconception that thebesteffortservicemodel
necessarily implies simple FIFO queues in the routers. If
appropriately used these mechanisms could provide, for
instance, preferentially lower delays to “fragile” interactive
applications (like telnet) without striving to provide any
quantitative QoS guarantees. The authors believe that their
use can considerably improve, enhance, and protectthebest
effort service model and that therefore this is a direction
which deserves further investigation [2].
REFERENCES
[1] Mamata Rath, Binod Kumar Pattanayak, “Energy
Competent Routing Protocol Design in MANET with Real
time Application Provision”, International Journal Of
Business Data Communications and Networking, 11(1),50–
60, January–March (2015).
[2] Panos Gevros, Jon Crowcroft, Peter Kirstein, and Saleem
Bhatti University College London IEEE Network May/June
2001
[3] Mamata Rath, Umesh Prasad Rout, Niharika Pujari,
Surendra Kumar Nanda and Sambhu Prasad Panda ©
Springer Nature Singapore Pte Ltd. 2017
[4] Rath M, Pattanayak, B.K. & U.P.Rout “Study of Challenges
and Survey on Protocols Based on Multiple Issues in Mobile
Adhoc Network”, International Journal of Applied
Engineering Research,, 2015, Volume 10, pp 36042– 36045,
(2015).
[5] Wireless Adhoc and Sensor Networks, Houda Lablod,
Wiley Publication, U.S.A, (2008).
[6] GhulamYasin, Syed Fakhar Abbas, S. R. Chaudhry
“MANET Routing Protocols for Real-Time Multimedia
Applications,” WSEAS Transactions Communications,Vol 12
Issue 8, Pages 386–395 August (2013).
[7] Shrivastava, L., Tomar, G.S., Bhadoria, S.S., “A Load-
Balancing Approach for Congestion Adaptivity in MANET,”
Computational Intelligence and Communication Networks
(CICN), 2011 International Conferenceon,Pages32–36,7–9
Oct. (2011).
[8] Al Alawi, K.; Al-Aqrabi, H., “Quality of service evaluation
Of VoIP over wireless networks,”in GCC Conference and
Exhibition (GCCCE), 2015 IEEE 8th, vol., no., pp. 1–6, 1– 4,
Feb.(2015).
[9] Seth, D.D.; Patnaik, S.; Pal, S., “A Quality of Service
Assured & faired MAC protocol for Mobile Adhoc Network,”
in Communications and Signal Processing (ICCSP), (2011).
[10] Rath M, B.K., Pattanayak & Bibudhendu Pati, “A
Contemporary Survey and Analysis of Delay and Power
Based Routing Protocols in MANET”, ARPN Journal of
Engineering and Applied Sciences, 2016, Vol 11, No 1Jan
2016.

More Related Content

What's hot

IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)IRJET Journal
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsEditor IJCATR
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkIRJET Journal
 
A Random waypoint mobility model for Controlling Traffic Congestion
A Random waypoint mobility model for Controlling Traffic CongestionA Random waypoint mobility model for Controlling Traffic Congestion
A Random waypoint mobility model for Controlling Traffic CongestionIRJET Journal
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 

What's hot (20)

IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...Impact of energy and link quality indicator with link quality estimators in w...
Impact of energy and link quality indicator with link quality estimators in w...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
iccet2015sp02
iccet2015sp02iccet2015sp02
iccet2015sp02
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc NetworkA Novel De Routing Scheme for Vehicular Ad-Hoc Network
A Novel De Routing Scheme for Vehicular Ad-Hoc Network
 
A Random waypoint mobility model for Controlling Traffic Congestion
A Random waypoint mobility model for Controlling Traffic CongestionA Random waypoint mobility model for Controlling Traffic Congestion
A Random waypoint mobility model for Controlling Traffic Congestion
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 

Similar to Study on Different Mechanism for Congestion Control in Real Time Traffic for MANETS

IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Chokepaperpublications3
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...IJMER
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...IJMER
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Journals
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Publishing House
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 

Similar to Study on Different Mechanism for Congestion Control in Real Time Traffic for MANETS (20)

IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
P43018691
P43018691P43018691
P43018691
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Choke
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
I1102014953
I1102014953I1102014953
I1102014953
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
 
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Study on Different Mechanism for Congestion Control in Real Time Traffic for MANETS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1627 Study on Different Mechanism for Congestion Control in Real Time Traffic for MANETS Preethika.P.Kotian1, Vaishnavi.K.Shetty2, Shifana Begum3 1,2Final Year UG Student, Dept. of CSE, Srinivas School of Engineering, Mangalore, India 3Asst.Professor, Dept. of CSE, Srinivas School of Engineering, Mangalore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –During real time data transmission in MANET, the most promising issues include control of congestion at the network devices such as routers which have limited buffer capacity to hold incoming packets and forward them towards their respective destinations.This paper highlights on congestion control issues in real time environment as well as proposes different mechanism to preventcongestion in real time traffic . Key Words: Open-loop control, Closed-loop control, Traffic shaping, End-to-end flow control 1. INTRODUCTION In a packet switching network,packets areintroducedin the nodes and the nodes in-turn forwards the packets into the network. When the “offered load” crosses certain limit, then there is a sharp fall in the throughput. This phenomenon is known as congestion. It affects queuing delay, packet loss or the blocking of new connections and also affects Quality of Service (QoS). QOS refers to the capability of network to provide better service to selected network traffic over various technologies. Networks use congestion control and congestion avoidance techniques to try to avoid collapse. The process of managing the traffic flow inorder to control congestion is called congestion control. The two classes ofcongestioncontrol are closed-loop control and open-loop control. 1.1 CLOSED-LOOP CONTROL A closed-loop system is also referred as a feedback control system. These systems record the output instead of input and modify it according to the need. It generates preferred condition of the output as compared to the original one. It doesn’t encounteranyexternal orinternal disturbances.This mechanism tries to remove the congestion after it happens. A closed loop system has got the ability to perform accurately because of the feedback. Evenunderthepresence of non linearity’s the system operates better than open loop system. But it is less stable compared to open loop system. Example: Pressure control system, speed control system, robot control system, temperature control system. 1.2 OPEN-LOOP CONTROL An open-loop control system takes input under the consideration and does not react on the feedback to obtain the output. This is why it is also called a non-feedback control system. It has the ability to perform accurately, if its calibration is good. If the calibration is not perfect its performance will go down. In open-loop congestion control policies are used to prevent the congestion before it happens. If non-linearity are present thesystemoperationis not good. In general it is more stable as the feedback is absent. Example: Traffic control system, control of furnace for coal heating, an electric washing machine. 2. LITERATURE SURVEY Panos Gevros, Jon Crowcroft, Peter Kirstein, and Saleem Bhatti proposed “Congestion Control Mechanisms and the Best Effort Service Model” In this article we revisit the best effort service model and the problem of congestion while focusing on the importance of cooperative resource sharing to the Internet’s success, and review the congestion control principles and mechanism which facilitateInternetresource sharing. Mamata Rath, Umesh Prasad Rout, Niharika Pujari,Surendra Kumar Nanda and Sambhu Prasad Panda proposed “Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks”Thispaperhighlightsoncongestion control issues in real time environment as well as proposes an upgraded traffic shaping mechanism in TCP/IP protocol suite of network model for real time applications with basic concept using the token bucket traffic shaping mechanism during packet routing at the intermediate nodes. Mamata Rath, Binod Kumar Pattanayak proposed “Energy Competent Routing Protocol Design in MANET with Real time Application Provision” In this paper the authors have developed a robust and energy efficient routing protocol for MANET with real time support. Their approach is different as it calculates the remaining residual battery power, bounded delay and packet processing rate of the intermediate node before selecting a node to forward the packet in the direction of destination.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1628 3. TRAFFIC SHAPING MECHANISM Fig: Leaky bucket The leaky bucket is an algorithm based on an analogyofhow a bucket with a leak will overflow if either the average rate at which the bucket leaks or if more water than the capacity of the bucket is poured in all at once, and how the water is from the bucket at a constant rate. It is used in packet switched computer networks and telecommunications networks in both the traffic policing and traffic shaping of data transmissions in the form of packets. Fig: Token bucket The token bucket is an algorithm used in packet switched computer networks and telecommunications networks. It can be used to check that data transmissions in the form of packets conform to define limits on bandwidth and burstiness. It can also be used as scheduling algorithm to determine the timing of transmissions that will comply with the limits set for the bandwidth and burstiness. I t is based on an analogy of a fixed capacity bucket into which tokens, normally representing a unit of bytes or a single packet of predetermined size, are added at a fixed rate. 4. THE PROBLEM OF CONGESTION Congestion is the state of sustained network overloadwhere the demand for network resources is close to or exceeds capacity. Network resources, namely link bandwidth and buffer space in the routers, are both finite and in many cases still expensive. The Internet has suffered from the problem of congestion which is inherent in best effort datagram networks due to uncoordinated resource sharing. It is possible for several IP packets to arrive at the router simultaneously, needing to beforwardedonthesameoutput link. Clearly, not all of them can be forwarded simultaneously; there must be a service order.Intheinterim buffer space must be provided as temporary storage for the packets still awaiting transmission. Sources that transmit simultaneously can create a demand for network resources (arrival rate)higherthanthenetwork can handle at a certain link. The buffer space in the routers offers a first level of protection against an increase in traffic arrival rate. However, if the situation persists, the buffer space is exhausted and the router has to start dropping packets. Traditionally Internet routers have used the first come first served (FCFS) service order, typically implemented by a first in first out (FIFO) queue, and drop from the tail at buffer overflow as their queue management strategy. The problem of congestion cannot be solved by introducing “infinite” buffer space inside the network; the queues would then grow without bound, and theend-to-end delay would increase. Moreover, when packet lifetime is finite, the packets coming out oftherouterwouldhavetimed out already and been retransmitted by the transport protocols[2]. 5. CONGESTION CONTROL MECHANISMS The Internet is decentralized by nature, comprising many heterogeneous administrative domains; therefore, resource management naturally involves both end-to-end as well as local (per-link) decisions. We identify two broad classes of congestion control mechanisms with regard to where these mechanisms are implemented: host-basedandrouter-based mechanisms. raffic shaping is a technique for regulating the averagerate and burstiness of a flow of data that enters the network. Traffic in data network is bursty-typically arrives at non- uniform rates as the traffic rate varies. When a flow is setup, the user and the network agree on a certain traffic pattern. Leaky bucket and token bucket algorithm make useoftraffic shaping mechanism. T
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1629 The entire Internet architecture was foundedontheconcept that all flow-related state should be kept on the hosts; therefore, the congestion control mechanisms were mainly implemented in the end hosts. Upon detection of congestion the sources should inject their packets into the network more slowly. This mechanism is called end-to-end flow control. In order for a host to be able to detect congestion, the routers must be able to provide the information that the network is currently (orisabouttobecome)overloaded;this mechanism is called feedback.Flowcontrol andfeedback are conceptually related, so they are often referred to as feedback flow control. Although flow control should be aware of the feedback semantics,theexactmechanismsused to implement either are orthogonal, so we decided to treat them separately in our context. The feedback mechanism is distributed and can be implemented partly or entirely at the end hosts (receiver side) or routers. Packet drops were, and to a great extent are still, the only means for a router to fight congestion. The sources become aware of the packet drops, interpret them as a congestion indication, and reduce their rates. The feedback from the network and the response from the source are the foundations of Internet congestion control and are very important because they facilitate decentralized resource allocation. However, with decisions made at the end hosts and treatment of the network as a black box that simply drops packets, there is clearly a limit on how much control can be achieved over the allocation of network resources. This also limits the range of services the network is capable of offering. Routers, on the other hand, know exactly how congested they are and can therefore perform more drastic resource management. Thus, the introduction of router mechanisms for congestion control thatwill enable the network to more actively manage its own resources seems inescapable. These mechanisms can be used as building blocks for providing higher-level resource management mechanisms such as link sharing, penalty boxes, and pricing, which by means of financial incentives controls the sharing of network resources. The extension of router functionality per se does not contradict the design philosophy of the Internet where all state should be kept at the end hosts or, better, at the edges of the network. Routers have two conceptually orthogonal methods of managing their own resources: scheduling to directly manage bandwidth allocation on an outputlink,and queue/buffer management to manage buffer space and queue occupancy, respectively, and thus indirectly affecting bandwidth allocation [2]. 6. CONGESTION CONTROL PHASES Clearly congestion can be avoided at the expense of low resource utilization; however, this is usually undesirable. Thus, the goal of any congestion control mechanism, with respect to resource utilization, is to operate the resource (link) in a region close to its capacity .There are two phases in congestion control: • Congestion avoidance when the system operates about the Knee. • Congestion recovery (often confusingly referred to as congestion control in the literature) when the state of the system is between the knee and the cliff, and congestion has occurred so that the total load should be decreased to avoid collapse. We next treat in turn each of the four classes of congestion control mechanisms identified above [2]. 7. END-TO-END FLOW CONTROL In control theory a controller changes its input to a black box and observes the corresponding output. The goal is to choose the input as a function of the observed output so that the system state conforms to some desired objective, provided that the system state can be observed. From a control-theoretic viewpoint the end host flow adjustment is the response to a servo-control loop which needs to match the source’s sending rate to the rate that corresponds to its fair share at the bottleneck link. The problem is that the appropriate bottleneck service rate becomes known to the source after a delay, and the new rate (after any adjustments) takes effectatthebottleneck onlyafteranother delay. The precision of the servo-control loop determines performance; if the queue at the bottleneck link is empty, throughput will be less than the maximum. If there are always packets in the queue, the link will never be idle, butif the queue size grows beyond a limit, packets will start being discarded. However, in flow control,theoutputofthesystem (the rate of a flow as seen at the receiver) does not depend only on the actions of that particular flow, but also on the actions of all other flows sharing the same path. Open-loop flow control is acceptable onlyinan environment without considerations about the impact of individual actions to other network users. In an open-loop flow control scheme the sender describes its rate to the network with parameters like burst size and interburst interval. Simply stating the rate is not sufficient because b packets/s may be 1 packet every 1/b s, but it can also mean a burst of b back- to-back packets every second, which might be unacceptable for a gateway that does not have enough buffer space to store the burst. The network examines theparametersgiven by the sender and if the request can be granted (admission control based on availability or policy criteria) it reserves resources, corresponding to these parameters, along the path from the sender to the receiver. The sender simply ensures that its rate conforms to the given description, and in this fashion network congestionisavoided.Thisparadigm fits nicely in a connection- oriented architecture like IntServ
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1630 but cannot be enforced only with end-to-end mechanisms;it requires resource management mechanisms in all the routers. Closed-loop flow control schemes target more dynamic network environments where it is a requirement for the sources to dynamically adapt their rate to match their fair share of network resources.Thefairshareusuallyfluctuates, and the sender must be able to track these changes and adjust its rate to allow for more efficient resourceutilization. Closed-loop schemes can be adaptive window, in which the source indirectly controls the transmission rate by modifying the number of packets sent but not yet acknowledged (window), or adaptive rate, in which the source, every time it sends a packet, sets a timer with a timeout value equal to the inverse of the appropriate transmission rate and transmits the next packet when the timer expires. The potential damage to the network is constrained in different ways, but window-based schemes are easier to implement because they do not require a fine- grained timer, which is hard to implement in non-real-time operating systems. If a closed-loop flow control scheme appears ineffective, either the sources suffer from excessive packet loss or the network resources are underutilized [2]. 8. FEEDBACK MECHANISMS The mechanism usedfornotifyingthesenderabout network congestion or the appropriate sending rate is called the feedback, and inherently involves both the routers that generate the congestion signals and the receiverhost(s)that propagates the signal to the sender for interpreting it accordingly.[2] Closed loop flow control mechanisms and overall network performance rely heavily on feedback. Without a feedback mechanisma sourcewouldbecluelessas to what to do with its sending rate, and the network could become unstable, unfair, and either congested or underutilized. Feedback involvesinformationaboutthestate of the system, so in principle it should originate from the network and ultimately be delivered to the sender. The sender receives feedback eitherdirectlyfromthenetwork or from the network via the receiver; therefore, there are two forms of feedback: implicit or explicit. 8.1 IMPLICIT FEEDBACK Implicit feedback requires the end-hosts to be responsible for monitoring the performance of their own transmissions (delay, loss) for indications that will let them infer the state of the network and determine their appropriate sending rate. Nevertheless, it is debatable how accurately this canbe derived. The most common form of implicit feedback signal is packet drop and has been traditionally used by Internet routers. However, packet drop is not necessarily an indication of congestion, for instance inerrorpronewireless links. Another proposed method of implicit feedback is the observation of the rate at which packets emerge from the bottleneck or the measurement of the change in end-to-end delay as the transmission rate changes. The advantage of implicit feedback is simplicity in the routers; routers are left to focus only on resource allocation, and do not have to calculate and produce an appropriate feedback signal. However, the scheduling mechanisms must be known to the end hosts for implicit feedback to be useful; otherwise, theobservedperformancemaybe misleadingand not accurately describe the actual congestion state of the network. For example, with FIFO scheduling an increase in the rate may lead to an increase in the observed throughput, although queues may have already started building up and the total delay has increased [2]. 8.2 EXPLICIT FEEDBACK In principle explicit feedback can be in the form of congestion notification or rate indication. Due to the limitations in the information that can be carried inprotocol headers explicit feedback can be binary or multivalued (usually limited to a small number of values: “how much congestion has been experienced”). In the case of binary feedback the appropriate operating point is found through an iteration process of network feedback and host adjustments. For explicit feedback the only methods proposed for TCP/IP networks is the ICMP Source Quench messages and Explicit Congestion Notification (ECN) proposal. The ICMP Source Quench message is sent bythe IP layer of a host or router to throttle back a sender in case the host/router runs out of buffers or throws datagram away ICMP Source Quench is very rarely used in the Internet, and although there is no substantial evidence,thecurrentfeeling is to deprecate this message becauseitconsumes bandwidth at times of congestion, and is generally an ineffective and unfair fix to congestion . In the ECN feedback scheme the router sets a bit in the packet header (CE bit) whenever it detects incipient congestion. The receivercopiesthis bitinto the header of the acknowledgment packet, and the flow control mechanism at the sender is responsibleforadjusting the window (or rate) based on a certain algorithm. The algorithms used for congestion detection and window adjustment as responses to explicit feedback are part of the queue management and flow control mechanisms, respectively. Explicit feedback implies an extra mechanism in the router, but on the other hand provides more quantitative control information which can be valuable for the adjustment process. Explicit rate indication is another method of explicit feedback in which the switches perform rate allocation and the calculated rates are explicitly communicated back to the sources (via the receiver) as information in the packet headers; it has been used in ATM networks but not in the Internet [2].
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1631 9. CONCLUSION Best effort service has been tremendously successful for data traffic, which today accounts for the vast majority of Internet traffic; there are no indications that this will stop being the case in the future. The main reason for pursuing QoS was concerns about the requirements of emerging real- time and streaming multimedia applications, which could not be met in the existing service model. Nevertheless, it has been amply demonstrated that many popular applications (packet audio, videoconferencing) are able to adapt to dynamic network conditions by changing theirtransmission rate using different coding techniques, and therefore perform sufficiently well under moderate congestion levels. Thus, it is likely for the Internet to evolve toward a best effort network which, if controlled and provisioned appropriately, will be able to satisfy the majority of popular applications that are willing to tolerateservicedeterioration due to transient congestion. This could sustain a large market for best effort service and would limit the applicability of service models for guaranteed QoS to corporate intranets and virtual privatenetworks.Mostofthe congestion control mechanisms presented in thisarticle,the router-based ones in particular, were almost exclusively studied in the context of guaranteed QoS and real time traffic. There has been considerably lessresearchintheir use within the best effort service framework, so there is a widespread misconception that thebesteffortservicemodel necessarily implies simple FIFO queues in the routers. If appropriately used these mechanisms could provide, for instance, preferentially lower delays to “fragile” interactive applications (like telnet) without striving to provide any quantitative QoS guarantees. The authors believe that their use can considerably improve, enhance, and protectthebest effort service model and that therefore this is a direction which deserves further investigation [2]. REFERENCES [1] Mamata Rath, Binod Kumar Pattanayak, “Energy Competent Routing Protocol Design in MANET with Real time Application Provision”, International Journal Of Business Data Communications and Networking, 11(1),50– 60, January–March (2015). [2] Panos Gevros, Jon Crowcroft, Peter Kirstein, and Saleem Bhatti University College London IEEE Network May/June 2001 [3] Mamata Rath, Umesh Prasad Rout, Niharika Pujari, Surendra Kumar Nanda and Sambhu Prasad Panda © Springer Nature Singapore Pte Ltd. 2017 [4] Rath M, Pattanayak, B.K. & U.P.Rout “Study of Challenges and Survey on Protocols Based on Multiple Issues in Mobile Adhoc Network”, International Journal of Applied Engineering Research,, 2015, Volume 10, pp 36042– 36045, (2015). [5] Wireless Adhoc and Sensor Networks, Houda Lablod, Wiley Publication, U.S.A, (2008). [6] GhulamYasin, Syed Fakhar Abbas, S. R. Chaudhry “MANET Routing Protocols for Real-Time Multimedia Applications,” WSEAS Transactions Communications,Vol 12 Issue 8, Pages 386–395 August (2013). [7] Shrivastava, L., Tomar, G.S., Bhadoria, S.S., “A Load- Balancing Approach for Congestion Adaptivity in MANET,” Computational Intelligence and Communication Networks (CICN), 2011 International Conferenceon,Pages32–36,7–9 Oct. (2011). [8] Al Alawi, K.; Al-Aqrabi, H., “Quality of service evaluation Of VoIP over wireless networks,”in GCC Conference and Exhibition (GCCCE), 2015 IEEE 8th, vol., no., pp. 1–6, 1– 4, Feb.(2015). [9] Seth, D.D.; Patnaik, S.; Pal, S., “A Quality of Service Assured & faired MAC protocol for Mobile Adhoc Network,” in Communications and Signal Processing (ICCSP), (2011). [10] Rath M, B.K., Pattanayak & Bibudhendu Pati, “A Contemporary Survey and Analysis of Delay and Power Based Routing Protocols in MANET”, ARPN Journal of Engineering and Applied Sciences, 2016, Vol 11, No 1Jan 2016.