SlideShare a Scribd company logo
1 of 10
Bandwidth Estimation for IEEE 802.11-Based Ad
Hoc Networks

Synopsis
Introduction
AD hoc networks are autonomous, self-organized, wireless, and mobile
networks. They do not require setting up any fixed infrastructure such as
access points, as the nodes organize themselves automatically to transfer
data packets and manage topology changes due to mobility. Many of the
current contributions in the ad hoc networking community assume that the
underlying wireless technology is the IEEE 802.11 standard due to the broad
availability of interface cards and simulation models. This standard provides
an ad hoc mode, allowing mobiles to communicate directly. As the
communication range is limited by regulations, a distributed routing protocol
is required to allow long distance communications. However, this standard
has not been targeted especially for multihop ad hoc operation, and it is
therefore not perfectly suited to this type of networks. Nowadays, several
applications generate multimedia data flows or rely on the proper and
efficient transmission of sensitive control traffic. These applications may
benefit from a quality of service (QoS) support in the network. That is why
this domain has been extensively studied and more and more QoS solutions
are proposed for ad hoc networks. However, the term QoS is vague and
gathers several concepts. Some protocols intend to offer strong guarantees
to

the

applications

on

the

transmission

characteristics,

for

instance

bandwidth, delay, packet loss, or network load. Other solutions, which seem
more suited to a mobile environment, only select the best route among all
possible choices regarding the same criteria. In both cases, an accurate
evaluation of the capabilities of the routes is necessary. Most of the current
QoS proposals leave this problem aside, relying on the assumption that the
link layer protocols are able to perform such an evaluation. However, they
are not. The resource evaluation problem is far from being trivial as it must
take into account several phenomena related to the wireless environment
but also dependent on less measurable parameters such as the node
mobility.
The IEEE 802.11-based networks have been able to provide a certain
level of quality of service (QoS) by the means of service differentiation, due
to the IEEE 802.11e amendment. Such an evaluation would, however, be a
good asset for bandwidth-constrained applications. In multihop ad hoc
networks, such evaluation becomes even more difficult. Consequently,
despite the various contributions around this research topic, the estimation
of the available bandwidth still represents one of the main issues in this
field.

Scope of the Project
The scope of the project is to reduce the collision and we want to
improve the Throughput value and finally we find the Bandwidth.
Abstract:

Since 2005, IEEE 802.11-based networks have been able to provide a
certain level of quality of service (QoS) by the means of service
differentiation,

due

to

the

IEEE

802.11e

amendment.

However,

no

mechanism or method has been standardized to accurately evaluate the
amount of resources remaining on a given channel. Such an evaluation
would, however, be a good asset for bandwidth-constrained applications. In
multihop ad hoc networks, such evaluation becomes even more difficult.
Consequently, despite the various contributions around this research topic,
the estimation of the available bandwidth still represents one of the main
issues in this field. In this paper, we propose an improved mechanism to
estimate the available bandwidth in IEEE 802.11-based ad hoc networks.
Through simulations, we compare the accuracy of the estimation we propose
to the estimation performed by other state-of-the-art QoS protocols, BRuIT,
AAC, and QoS-AODV.
Existing System:
 The ad hoc networking community assumes that the underlying
wireless technology is the IEEE 802.11 standard due to the broad
availability of interface cards and simulation models.
 This standard has not been targeted especially for multihop ad hoc
operation, and it is therefore not perfectly suited to this type.
 An accurate evaluation of the capabilities of the routes is necessary.
Most of the current QoS proposals leave this problem aside, relying on
the assumption that the link layer protocols are able to perform such
an evaluation.

Proposed System:
 In this system they are using 802.11 MAC layer to evaluate the correct
bandwidth.
 This method combines channel monitoring to estimate each node’s
medium occupancy.
 Probabilistic

combination

of

the

values

is

to

account

for

synchronization between nodes, estimation of the collision probability
between each couple of nodes, and variable overhead’s impact
estimation.
 This mechanism only requires one-hop information communication and
may be applied without generating a too high additional overhead.
 We show the accuracy of the available bandwidth measurement
through NS-2 simulations.
 These results show that single-hop flows and multihop flows are
admitted more accurately, resulting in a better stability and overall
performance.

Modules
 Packet creation
 Apply the RREQ And get RREP
 Admission Control Mechanism
 Utilized Bandwidth

Module Description
Packet Creation
In this module we split the Data in to N number of Fixed size packet with
Maximum length of 48 Characters.

Apply the RREQ and get RREP
The aim of the RREQ is to find a route between the sender and the
receiver that meets the constraints specified by the application level in terms
of Bandwidth. Therefore, two flows with the same source and destination can
follow different routes depending on the network state.
When a source node has data to send, it broadcasts a route request
(RREQ) to its neighbors. The RREQ packet contains the address of the
sender, and the requirements at the application level, the destination
address, and a sequence number. The Intermediate Node or Destination
Node sends RREP if it is free, otherwise, it silently discards the message.
Admission Control Mechanism
The Admission Control Mechanism is done in the receiver side. The
Admission Control Mechanism has the all status of the node so if the nodes
want to send RREP or discard the message, the particular node check the
status by using the Admission Control Mechanism.
Bandwidth Utilized
After the source nodes send the total message to the Destination Node
finally we calculate the end to end delivery of the Bandwidth and Time delay.
In module given input and expected output
The source node selects the destination node first and then by using
the browse button we select some text file and this text file is send to the
destination side.
System Requirements
Hardware:
PROCESSOR

: PENTIUM IV 2.6 GHz

RAM

: 512 MB DD RAM

MONITOR

: 15” COLOR

HARD DISK

: 20 GB

FLOPPY DRIVE

:

1.44 MB

CDDRIVE

: LG 52X

KEYBOARD

: STANDARD 102 KEYS

MOUSE

: 3 BUTTONS

Software:
Front End

: Java, Swing

Back End

: MS Access

Tools Used

: JFrameBuilder

Operating System : WindowsXP
Technique used or algorithm used
•

The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a
routing protocol designed for ad hoc mobile networks.

•

It is an on demand algorithm, meaning that it builds routes between
nodes only as desired by source nodes. It maintains these routes as
long as they are needed by the sources.

Advantages
•

Lower getting-started cost because no need to install base stations

•

We reduce the collision and network congestion problem

Applications
•

Peer-to-Peer
–

Direct communication between peers is mandatory

–

No centralized authority at the application level

Ad-hoc networks are suited for use in situations where an
infrastructure is unavailable or to deploy one is not cost effective.
Technique used or algorithm used
•

The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a
routing protocol designed for ad hoc mobile networks.

•

It is an on demand algorithm, meaning that it builds routes between
nodes only as desired by source nodes. It maintains these routes as
long as they are needed by the sources.

Advantages
•

Lower getting-started cost because no need to install base stations

•

We reduce the collision and network congestion problem

Applications
•

Peer-to-Peer
–

Direct communication between peers is mandatory

–

No centralized authority at the application level

Ad-hoc networks are suited for use in situations where an
infrastructure is unavailable or to deploy one is not cost effective.

More Related Content

What's hot

Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...Shakas Technologies
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnetredpel dot com
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical NetworksFrom GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical NetworksFIBRE Testbed
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...IJECEIAES
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01M srinivasu
 

What's hot (19)

Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical NetworksFrom GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
 
Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...Comparative analysis of the performance of various active queue management te...
Comparative analysis of the performance of various active queue management te...
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01Wireless zigbee communication technology 141215052616-conversion-gate01
Wireless zigbee communication technology 141215052616-conversion-gate01
 

Viewers also liked

Angel enhancing the utility of generalization for privacy preserving publicat...
Angel enhancing the utility of generalization for privacy preserving publicat...Angel enhancing the utility of generalization for privacy preserving publicat...
Angel enhancing the utility of generalization for privacy preserving publicat...Mumbai Academisc
 
Album foto
Album fotoAlbum foto
Album fotoTohotom
 
ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่coolboy004
 
Impresii portile de fier
Impresii portile de fierImpresii portile de fier
Impresii portile de fierTohotom
 
ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่coolboy004
 
Campanii de ecologizare
Campanii de ecologizareCampanii de ecologizare
Campanii de ecologizareTohotom
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 

Viewers also liked (7)

Angel enhancing the utility of generalization for privacy preserving publicat...
Angel enhancing the utility of generalization for privacy preserving publicat...Angel enhancing the utility of generalization for privacy preserving publicat...
Angel enhancing the utility of generalization for privacy preserving publicat...
 
Album foto
Album fotoAlbum foto
Album foto
 
ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่
 
Impresii portile de fier
Impresii portile de fierImpresii portile de fier
Impresii portile de fier
 
ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่ใบงานที่ 2 16 งานคู่
ใบงานที่ 2 16 งานคู่
 
Campanii de ecologizare
Campanii de ecologizareCampanii de ecologizare
Campanii de ecologizare
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 

Similar to Bandwidth estimation for ieee 802

band width ppt
band width pptband width ppt
band width pptSai Nukala
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3imec.archive
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 

Similar to Bandwidth estimation for ieee 802 (20)

band width ppt
band width pptband width ppt
band width ppt
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
A Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication SystemA Survey on Vehicle to Infrastructure Communication System
A Survey on Vehicle to Infrastructure Communication System
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
011001010 a
011001010 a011001010 a
011001010 a
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 

More from Mumbai Academisc

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Bandwidth estimation for ieee 802

  • 1. Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Synopsis
  • 2. Introduction AD hoc networks are autonomous, self-organized, wireless, and mobile networks. They do not require setting up any fixed infrastructure such as access points, as the nodes organize themselves automatically to transfer data packets and manage topology changes due to mobility. Many of the current contributions in the ad hoc networking community assume that the underlying wireless technology is the IEEE 802.11 standard due to the broad availability of interface cards and simulation models. This standard provides an ad hoc mode, allowing mobiles to communicate directly. As the communication range is limited by regulations, a distributed routing protocol is required to allow long distance communications. However, this standard has not been targeted especially for multihop ad hoc operation, and it is therefore not perfectly suited to this type of networks. Nowadays, several applications generate multimedia data flows or rely on the proper and efficient transmission of sensitive control traffic. These applications may benefit from a quality of service (QoS) support in the network. That is why this domain has been extensively studied and more and more QoS solutions are proposed for ad hoc networks. However, the term QoS is vague and gathers several concepts. Some protocols intend to offer strong guarantees to the applications on the transmission characteristics, for instance bandwidth, delay, packet loss, or network load. Other solutions, which seem more suited to a mobile environment, only select the best route among all possible choices regarding the same criteria. In both cases, an accurate evaluation of the capabilities of the routes is necessary. Most of the current QoS proposals leave this problem aside, relying on the assumption that the link layer protocols are able to perform such an evaluation. However, they are not. The resource evaluation problem is far from being trivial as it must take into account several phenomena related to the wireless environment
  • 3. but also dependent on less measurable parameters such as the node mobility. The IEEE 802.11-based networks have been able to provide a certain level of quality of service (QoS) by the means of service differentiation, due to the IEEE 802.11e amendment. Such an evaluation would, however, be a good asset for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult. Consequently, despite the various contributions around this research topic, the estimation of the available bandwidth still represents one of the main issues in this field. Scope of the Project The scope of the project is to reduce the collision and we want to improve the Throughput value and finally we find the Bandwidth.
  • 4. Abstract: Since 2005, IEEE 802.11-based networks have been able to provide a certain level of quality of service (QoS) by the means of service differentiation, due to the IEEE 802.11e amendment. However, no mechanism or method has been standardized to accurately evaluate the amount of resources remaining on a given channel. Such an evaluation would, however, be a good asset for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult. Consequently, despite the various contributions around this research topic, the estimation of the available bandwidth still represents one of the main issues in this field. In this paper, we propose an improved mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks. Through simulations, we compare the accuracy of the estimation we propose to the estimation performed by other state-of-the-art QoS protocols, BRuIT, AAC, and QoS-AODV.
  • 5. Existing System:  The ad hoc networking community assumes that the underlying wireless technology is the IEEE 802.11 standard due to the broad availability of interface cards and simulation models.  This standard has not been targeted especially for multihop ad hoc operation, and it is therefore not perfectly suited to this type.  An accurate evaluation of the capabilities of the routes is necessary. Most of the current QoS proposals leave this problem aside, relying on the assumption that the link layer protocols are able to perform such an evaluation. Proposed System:  In this system they are using 802.11 MAC layer to evaluate the correct bandwidth.  This method combines channel monitoring to estimate each node’s medium occupancy.  Probabilistic combination of the values is to account for synchronization between nodes, estimation of the collision probability between each couple of nodes, and variable overhead’s impact estimation.  This mechanism only requires one-hop information communication and may be applied without generating a too high additional overhead.
  • 6.  We show the accuracy of the available bandwidth measurement through NS-2 simulations.  These results show that single-hop flows and multihop flows are admitted more accurately, resulting in a better stability and overall performance. Modules  Packet creation  Apply the RREQ And get RREP  Admission Control Mechanism  Utilized Bandwidth Module Description Packet Creation In this module we split the Data in to N number of Fixed size packet with Maximum length of 48 Characters. Apply the RREQ and get RREP The aim of the RREQ is to find a route between the sender and the receiver that meets the constraints specified by the application level in terms of Bandwidth. Therefore, two flows with the same source and destination can follow different routes depending on the network state. When a source node has data to send, it broadcasts a route request (RREQ) to its neighbors. The RREQ packet contains the address of the sender, and the requirements at the application level, the destination
  • 7. address, and a sequence number. The Intermediate Node or Destination Node sends RREP if it is free, otherwise, it silently discards the message. Admission Control Mechanism The Admission Control Mechanism is done in the receiver side. The Admission Control Mechanism has the all status of the node so if the nodes want to send RREP or discard the message, the particular node check the status by using the Admission Control Mechanism. Bandwidth Utilized After the source nodes send the total message to the Destination Node finally we calculate the end to end delivery of the Bandwidth and Time delay. In module given input and expected output The source node selects the destination node first and then by using the browse button we select some text file and this text file is send to the destination side.
  • 8. System Requirements Hardware: PROCESSOR : PENTIUM IV 2.6 GHz RAM : 512 MB DD RAM MONITOR : 15” COLOR HARD DISK : 20 GB FLOPPY DRIVE : 1.44 MB CDDRIVE : LG 52X KEYBOARD : STANDARD 102 KEYS MOUSE : 3 BUTTONS Software: Front End : Java, Swing Back End : MS Access Tools Used : JFrameBuilder Operating System : WindowsXP
  • 9. Technique used or algorithm used • The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile networks. • It is an on demand algorithm, meaning that it builds routes between nodes only as desired by source nodes. It maintains these routes as long as they are needed by the sources. Advantages • Lower getting-started cost because no need to install base stations • We reduce the collision and network congestion problem Applications • Peer-to-Peer – Direct communication between peers is mandatory – No centralized authority at the application level Ad-hoc networks are suited for use in situations where an infrastructure is unavailable or to deploy one is not cost effective.
  • 10. Technique used or algorithm used • The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile networks. • It is an on demand algorithm, meaning that it builds routes between nodes only as desired by source nodes. It maintains these routes as long as they are needed by the sources. Advantages • Lower getting-started cost because no need to install base stations • We reduce the collision and network congestion problem Applications • Peer-to-Peer – Direct communication between peers is mandatory – No centralized authority at the application level Ad-hoc networks are suited for use in situations where an infrastructure is unavailable or to deploy one is not cost effective.