SlideShare a Scribd company logo
1 of 7
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 78
Paper Publications
New Proposed Contention Avoidance Scheme
for Distributed Real-Time Systems
ENSAF A. AL-ZURQA
Department of Information Technology, Faculty of Engineering and Information Technology, Taiz University, Taiz, Yemen
Abstract: One method to handle collisions in a contention based distributed system is to optimize collision detection
and subsequent recovery. An alternative method to handle collisions in a contention based system is to attempt to
avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources when.
Other systems may have the senders listen to the channel immediately prior to transmitting and determine suitable
times to transmit. A primary challenge in Distributed Real-Time Systems applications is how to carry out data
given source-to-sink, end-to-end deadlines when the communication resources are scarce. A new scheme resolves
collisions and tries to reduce the number of potential collision events. In this paper, we develop New Avoiding
Contention Scheme that delays data packet transmission nonlinearly during forwarding for a duration that
correlates with their remaining deadline and distance to the destination, and avoiding the contention in bursty
traffic by using multi-path routing
Keywords: Bursty traffic, Contention avoidance, Real-Time scheme, Distributed systems, Multi-path Routing.
1. INTRODUCTION
Distributed Real-Time Systems typically operate under load that is depending on the application and then suddenly
become active in response to a detected or monitored event. Depending on the application this can result in the generation
of large, sudden, and correlated impulses of data that must be delivered to a small number of sinks without significantly
disrupting the performance (i.e., fidelity) of the sensing application. Although Distributed Real-Time Systems may spend
only a small fraction of time dealing with impulses, it is during this time that the information it delivers is of greatest
importance. The transport of event impulses is likely to lead to varying degrees of congestion in distributed systems. The
contention directly affects the system performance. Indeed each burst dropped means a wasted bandwidth, increased
delivery delay and decreased throughput. This means that the global efficiency and performance of the global system
depends on the loss rate, and hence the performance falls as the load gets higher
The performance is affected by both the routing scheme and the packet scheduling algorithm. Consider that in the absence
of contention, the delay of a packet is proportional to the number of hops on the path from the distributed to the sink,
where the selected path is determined by the routing scheme. In the presence of contention, additional delays are incurred
as the packets are queued behind other packets. In response to this, future contention avoidance mechanisms for
distributed systems must be capable of balancing the offered load, while attempting to maintain acceptable fidelity (i.e.,
rate of events) of the delivered signal at the sink during periods of transient and more persistent congestion. A number of
distinct congestion scenarios are likely to arise. First, densely deployed distributed generating impulse data events will
create persistent hotspots proportional to the impulse rate beginning at a location very close to the sources (e.g., within
one or two hops). In this scenario, localized, fast time scale mechanisms capable of providing backpressure from the
points of congestion back to the sources would be effective. Second, sparsely deployed distributed generating low data
rate events will create transient hotspots potentially anywhere in the distributed field but likely farther from the sources,
toward the sink. In this case, fast time scale resolution of localized hotspots using a combination of localized back-
pressure (between nodes identified in a hotspot region) and packet dropping techniques would be more effective. Because
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 79
Paper Publications
of the transient nature of congestion, source nodes may not be involved in the backpressure. Third, sparsely deployed
distributed generating high data-rate events will create both transient and persistent hotspots distributed throughout the
distributed field.
In this paper, we develop New Avoiding Contention Scheme that offers significant advantages over existing wireless real-
time data communication schemes. It reduces contentions to improve real-time performance by providing the flexibility of
the nonlinear slack allocation. Contention Avoidance Scheme delays data packet transmission nonlinearly during
forwarding for a duration that correlates with their remaining deadline and distance to the destination. Also we implement
the Contention Avoidance Scheme algorithm with a multi-path routing scheme that is intended to provide a reliable
transmission environment for data packet delivery and improve real-time performance. The braided multi-path routing
which we use in our scheme, choose the best path and shortest one without exceed the delayed time makes more efficient
used for the bandwidth and so decrease the packet miss ratio, drop ratio and overall delay which we consider them our
accuracy measure in distributed systems. This scheme efficiently utilizes the available memory resources of distributed
nodes. It also has a significant impact on the success of wireless real-time data communication data communication and
avoids contention. Simulation experiments show that the used scheme outperforms traditional schemes by establishing a
reliable path from the source to the sink by distributing the traffic load more evenly in the system. Moreover, delaying the
data packets before reaching the sink also helps the data aggregation/fusion and therefore energy efficiency. The primary
contribution of our work is more effective communication; and avoiding the contention in bursty traffic by using braided
multi-path routing. The reminder of paper is structures as follows: related works are introduced in section2. The
framework of the new scheme is illustrated in section 3. In section 4, the effect of increasing the number of created sub-
packets corresponds to the number of available paths is explained. Simulation results and conclusion are discussed in
sections 5 and 6, respectively.
2. RELATED WORKS
Clearly, the ability to meet real-time deadlines in the presence of contention is related to controlling the load presented to
the system. In terms of system resources, this is the problem of congestion control. Exploring the intersection of
contention avoidance and real-time scheduling is an interesting topic of future research. One of the proposed solutions for
real-time system [1] prioritizes packet transmission at the MAC layer according to the deadline and distance from the
sink. These works have several limitations: (1) Packets generated by different distributed systems at the same time (e.g.,
in response to a detected event), can lead to high contention rates. Jittering such packets can help reduce this hot-spotting;
(2) MAC level solutions cannot account for the queuing delay in the routing layer (which occurs above the MAC layer);
these delays can have a significant impact on end-to-end delay especially under high load; and (3) MAC level solutions
require reengineering of the distributed radio hardware and firmware, making deployment difficult and potentially causing
interoperability problems with earlier hardware that supports different MAC schemes. To meet QoS requirements such as
bounded delay or guaranteed delivery, contention is a key. Several methods have been proposed in the literature to
decrease the loss rate. Some of these techniques could be implemented in software, such as deflection [15] routing and
segmented bursts [1], while the others require specific hardware, such as burst buffering [16,7] and wavelength converters
[17,7]. These techniques may reduce the contention, but they all remain sensitive to the traffic load. Indeed, it is clear that
even in ideal systems, where the switches use a number of buffers and can perform wavelength conversion, contention
still occurs when the load gets higher. This means that the best way to deal with the contention problem is to control the
traffic and keep the load in an optimal range as long as possible. Furthermore, in OBS, the load control could be done
only by the edge nodes since they have more intelligence and they have physical resources such as buffers and can handle
both electronic and optical information. Unfortunately, they do not have enough information to adjust their throughput
accordingly. No global state is available and the edge nodes are sending data bursts without any coordination. In the
following section we will focus on an algorithm that controls the load and achieves fairness among all the system edges.
They will be able to share the available system capacity while keeping the dropping probability at a low level. In the same
time, whenever a burst is dropped the source node will be notified in order to retransmit the lost burst and hence guarantee
delivery, thus avoiding the long retransmission delay of TCP. Since the scheduling needs to consider the queuing delay in
the routing layer which is above the MAC layer, the impact of the routing schemes used must be carefully examined. The
effect of the routing scheme on the real-time scheduling success is not sufficiently understood. Some existing solutions [2]
[3] [4] for routing in real-time traffic context provide non-deterministic routing as an extension of stateless geographic-
based routing schemes. More specifically, these approaches use the best next hop with respect to the traffic/congestion
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 80
Paper Publications
situations, not only the geographic proximity as per the greedy Geographical Forwarding scheme. Furthermore, when
using a longer path in terms of number of hops, increased contention for the medium results as more transmissions are
needed to forward a packet. So we propose new scheduling scheme that schedules the data packets exponentially and uses
braided multi-path routing. This scheme overcomes those shortcomings.
The performance of Distributed Real-Time Systems applications is affected by both the packet scheduling algorithm and
routing scheme. The effectiveness of this communication can be measured in terms of the deadline miss ratio. Existing
solutions for real-time data communication in distributed systems prioritize packets at the MAC layer according to their
deadlines and distances to the sink. These solutions have several limitations including: when traffic is bursty, high
contention may result increasing transmission and queuing delays; and MAC level solutions can not account for the
queuing delay in the routing layer. In section 3, we introduce the framework of our scheme in detail.
3. CONTENTION AVOIDANCE SCHEME FRAMEWORK
In this work we propose an approach to keep the load in the acceptable area and make sure that all the edge nodes
contribute fairly to this load. The basic idea of this technique is that the edges receive statistical reports (concerning the
loss inside the system) that help to calculate the system performance, and hence determine from the loss-load relationship
the current traffic load. Therefore by learning from this statistical data, each node increases or reduces its throughput.
These statistical reports could be used by the edge nodes to monitor and control the whole system. A statistics distributor
protocol could be implemented, as an extension in a control plan, using the same wavelength used to carry the burst
headers. This approach aims to control the traffic and keeps it out of congestion area. Similar approaches to congestion
avoidance [18,19,20], have been considered in the literature for TCP/IP packet switched systems and asynchronous
transfer mode (ATM). Congestion control is a recovery mechanism that helps a system to get out of a congestion state,
whereas congestion avoidance scheme allows a system to operate in a safe area. Many solutions have been proposed in
the literature to practically control congestion, the most popular are window flow-control and rate flow control. In the
windows flow-control scheme [20] (used by TCP), the destination specifies a limit on the number of packet that could be
sent by the source. This limit is increased and decreased by the destination dynamically during the whole session to
regulate a data flow. In rate flow-control scheme, the destination or the system may ask a source to decrease its rate.
Besides that, ATM uses other sophisticated mechanisms to control congestion including traffic shaping and admission
control as well as resource reservation. Regardless of the efficiency of these mechanisms, all of them perform congestion
control in the electrical level where some resources are available especially buffers and storage spaces that contribute
actively in the control process. The idea of optical congestion control is to push some of these functions to the optical
domain where a new constraints (buffer-less system) and new challenges rise. Performing congestion avoidance and
congestion control in the optical domain increases the performance (in terms of loss rate) of optical burst switching and
improves resource utilization.
Contention Avoidance Scheme is the primary contribution of this paper. Contention Avoidance Scheme delays data
packet transmission during forwarding for a duration that correlates with their remaining deadline and distance to the
destination. Intuitively, this helps in heavy-traffic communication environment by making sure that priority inversion does
not occur. Inversion occurs due to a node with only low priority packets sending and preventing a node with high priority
packets from doing so. In summary, the following information is needed to schedule packets in Contention Avoidance
Scheme: End-to-end deadline information: this information is provided by the application in the data packet as required
by any real-time data communication application. For those applications where the header of data packet does not include
this information, an alternative way for Contention Avoidance Scheme to obtain the end-to-end deadline information is
needed. Also, End-to-end distance information: this information is obtained from the routing scheme. In geographic
routing, Euclidian distance measured as the distance from the current node to the destination. It can be used as the
distance metric. End-to-end distance which can be measured either in numbers of hops like in Shortest Path Routing or by
the difference between the average length of an alternate path and the length of the primary path as in Braid multi-path
routing. Contention Avoidance Scheme is possible to allocate the available slack time non-uniformly among the
intermediate hops along the path to the sink. For example, we may desire to provide the packets with additional time as it
gets closer to the sink. The intuition is that in a gathering application, the contention is higher as the packet moves closer
to the sink. More generally, we may want to allocate the slack time proportionately to the degree of contention along the
path. We explore an Exponential increasing delaying policy with multi-path routing to break down the available time. We
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 81
Paper Publications
used multi-path routing that choose the best path in the case of congestion and apply heuristic scheme that attempts to
pick the lowest latency path in Distributed Real-Time Systems without contention:
Delay is used to decide how long a data packet can be queued locally. If the Delay is zero, the packet is forwarded at
once. A single priority queue is used to queue all incoming data packets. In fact the Delay is the priority of the packets.
The Contention Avoidance Scheme scheduler resides above (or within) the routing layer. The Contention Avoidance
Scheme scheduler and the MAC layer scheme are not aware of each other. It uses routing level information such as the
end-to-end distance in making its scheduling decisions.
Existing real-time data communication work have developed packet scheduling schemes cannot completely support real-
time data communication requirements. In our work, we develop new scheme to reduce contentions and improve real-time
performance and demonstrate that the multi-path discipline has a significant impact on the success of real-time data
communication in wireless communication systems and avoid contention as we see in the next section. For any real-time
applications based on Contention Avoidance Scheme, the end-to-end real-time deadline is assumed to be included on the
data packet itself. Since Contention Avoidance Scheme is mainly designed for soft real-time applications, Contention
Avoidance Scheme immediately forwards such packets without any delay even if the packet misses the deadline. A single
priority queue for packet forwarding based on the computed target transmission time is used by the Contention Avoidance
Scheme scheduler. Transmission is accomplished via a timer that is set to the target transmission time of the head of the
queue. When the queue is full, the Contention Avoidance Scheme scheduler selects the packet at the head of the queue to
immediately forward it instead of dropping any packet in the queue. MAC layer prioritization is not needed by the
Contention Avoidance Scheme design since the packets are sent when their local deadline is reached. Not requiring
changes to the MAC layer is a desirable feature of Contention Avoidance Scheme. The output of Contention Avoidance
Scheme scheduler is the queuing delay. Queuing delay is used by the routing scheme to decide how long to delay an
incoming data packet before attempting to forward it (by passing it to the MAC layer). The queuing delay computes the
duration that is the packet used to be queued in the Distributed Real-Time Systems layer before it is handed to the MAC
layer for transmission. This delay can be directly controlled by the Contention Avoidance Scheme scheduler as we
illustrate in section 3.1.
3.1 Recourses Management:
To manage limited recourses such as bandwidth, Priority queuing can be used on a transmission line from a system router.
In the event of outgoing traffic queuing due to insufficient bandwidth, all other queues can be halted to send the traffic
from the highest priority queue upon arrival. This ensures that the prioritized traffic (such as real-time traffic) is
forwarded with the least delay and the least likelihood of being rejected due to a queue reaching its maximum capacity.
All other traffic can be handled when the highest priority queue is empty. Another approach used is to send
disproportionately more traffic from higher priority queues. Many modern schemes for wireless Contention Avoidance
Scheme systems also include the concept of Priority Queues at the MAC sub-layer to ensure that high-priority
applications experience lower latency than other applications which can be served with Best effort service. Examples
include IEEE 802.11e (an amendment to IEEE 802.11 which provides Quality of Service). A single priority queue is used
in the routing layer for forwarding packets. A single priority queue can better track the priority of data packets than the
approach of several FIFO queues with different priority levels. The processing time of queuing operations is much shorter
than the queuing delay, so this overhead does not affect the performance much as it does in Real-Time scheduling design.
The priority of each data packet is the queuing delay decided by the Contention Avoidance Scheme scheduler. This
priority does differentiate not only the requested delay of each data packet, but also their possible queuing status. When
the priority queue is full, the data packet at the head of the queue is forwarded at once no matter how long it needs to be
queued due the Contention Avoidance Scheme scheduling. As we can see, this is a best effort forwarding policy which
may cause the most urgent data packet to be dropped. However, the benefit of this solution is that the packet at the queue
head has a higher local priority and is less likely to be dropped by lower layer communication later. Real time multi-path
finds a least cost and energy efficient path that meets certain end-to-end delay during the connection. The link cost used is
a function that captures the nodesโ€™ energy reserve, transmission energy, error rate and other communication parameters. In
order to support both best effort and real time traffic at the same time, a class-based queuing model is employed. The
queuing model allows service sharing for real-time and non-real-time traffic. The scheme finds a list of least cost paths
and picks a path from that list which meets the end-to-end delay requirement. In section 4, we present some
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 82
Paper Publications
considerations on how to predict the number of paths that will successfully deliver a packet among the multiple disjoint
paths obtained from the route discovery process.
4. DATA PACKETS SPLITTING
The increase of the probability for the successful delivery comes at the trade-off of added redundancy. The entire data
package to be sent from the source to the destination over the available k disjoint paths will be split up into smaller sub-
packets of equal size. The number of created sub-packets corresponds to the number of available paths. Only a smaller
number of these sub-packets will then be needed at the destination to reconstruct the original packet. There exist several
fast and simple (i.e. linear) forward error correcting codes (or erasure codes) that allow the reconstruction of an original
packet that has been split up and of which not all parts arrive at the destination. In the following, we will focus on
approximating a value of successful paths. This value will then be used to determine the amount of redundancy to be
added for the split packet transmission.
The total number of sub-packets is a function dependent on the multi-path degree and on the failing probabilities of the
available paths. As these values change according to the positions of the source and the destination in the system, each
source must be able to decide on the parameters for the error correcting codes before the transmission of the actual data
sub-packets.
We want to send a data packet from a source to a destination and the process of route construction is finished, resulting in
k different paths that are to be used. Each path has some rate that corresponds to the probability of successfully delivering
a packet to the destination. This setting corresponds to a repeated experiment, the sub-run corresponding to the packet
transmission along the ith path. Note that we consider node-disjoint paths and therefore can assume these experiments to
be independent of each other. Obviously, each combination of the multi-path degree k and different probabilities will
yield a different normal distribution. To overcome this problem, we transform to the standard normal distribution. Now,
consider a given bound for the desired probability of being able to reconstruct the original packet at the destination after
being sent along the different paths. In terms of the input for the decision algorithm, the value for Ek is given by the
following expression which gives the number of successfully delivering paths with the overall success probability of .
5. SIMULATION RESULTS AND ANALYSIS
In order to evaluate the performance of the proposed congestion avoidance scheme, we performed a number of
simulations on a mesh system. In this simulation we consider a NSFNET topology with 14 nodes.
In a Contention Avoidance Scheme system, where node density is high and bandwidth is scarce, traffic hot spots are
easily created. In turn, such hot spots may interfere with real-time guarantees of critical traffic in the system. In our work,
we apply a combined Contention Avoidance Scheme and MAC layer congestion control scheme to alleviate this problem.
To test the congestion avoidance capabilities, each node publishes packets alternately at the pre-set data rate for 5 seconds
then stops publishing for the second 5. Figure 1; show a comparison of the loss ratios result of real time system with and
without using Contention Avoidance Scheme under the bursty traffic with end-to-end deadline from 0.1 second to 0.6
seconds.
Figure1: Contention Avoidance Ratio under bursty traffic
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 83
Paper Publications
From the figure we can see that the miss ratio of Contention Avoidance Scheme is much lower than that of with the bursty
traffic. Since Contention Avoidance Scheme uses multi-path routing which is necessary to make sure that the capacity of
the Distributed Real-Time Systems does not be exceeded, hence no packets are truncated. Contention Avoidance Scheme
can tolerate the traffic burst by routing some packets to free routes in the system. In addition, this scheme is necessary to
optimize the lifetime of the Distributed Real-Time Systems while meeting the minimum accuracy requirements of the
application. Thus, the congestion control must not only be based on the capacity of the system, but also on the accuracy
level at the observer.
In figure 2, we show the effect of applying the congestion control and avoid the contention in the Distributed Real-Time
Systems by decreasing the drop ratio and delivering more packets, and get small loss rate.
Figure2: the loss ratio
In this simulation all the nodes with traffic load beyond the critical load should return back to the critical load).
We observe that the loss is dropped sharply to the critical loss when the congestion is detected and continues to oscillate
around the critical loss. Nonetheless the result is very similar to the previous one where the loss is dropped progressively
to the critical loss. And both of them prove that the congestion control technique effectively controls the loss and
optimizes the resource utilization.
6. CONCLUSION
In heavy traffic environments, large queuing delays may be experienced at intermediate nodes before they are forwarded
to their next hop. This situation may occur at several intermediate nodes before the packet reaches its destination.
Contention Avoidance Scheme delays packet transmission during forwarding for a duration that correlates with their
remaining deadline and distance to the destination. Intuitively, this helps in heavy-traffic communication environment by
making sure that priority inversion does not occur due to a node with only low priority packets sending and preventing a
node with high priority packets from doing so.
Contention Avoidance Scheme utilizes multiple routes and distributes the data to multiple candidate neighbors to avoid
contention and control congestion problem. Contention Avoidance Scheme Scheduling makes sure that the capacity of the
Distributed Real-Time Systems does not be exceeded and hence no packets are truncated. It can avoid contention in the
system. Further, Contention Avoidance Scheme is a routing layer solution and does not require changes to lower level
schemes making it easier to deploy and independent of the underlying The Contention Avoidance Scheme focuses on
scheduling packets under heavy traffic situations. We did not examine the problem of scheduling under a light load. If the
traffic through the current node is not heavy and queuing time is small, real-time scheduling is not needed and in fact may
harm performance. If such a situation can be detected, the Contention Avoidance Scheme can be disabled and packets
forwarded normally. We noticed that the scheme efficiently utilizes the limited energy and available memory resources of
Contention Avoidance Scheme nodes and also has a significant impact on the success of real-time data dissemination and
avoids contention.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org
Page | 84
Paper Publications
REFERENCES
[1] Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, and Lydia E. Kavraki,
โ€œPractical Robust Localization over Large-Scale 802.11 Wireless Networks,โ€ EURASIP Journal on Advances in
Signal Processing, vol.14 n.4, pp.415-433, August 2008.
[2] Z. Li, W. Trappe, Y. Zhang, and B. Nath, โ€œRobust Statistical Methods for Securing Wireless Localization in
Networks,โ€nFourth Int'l Workshop Information Processing in Networks (IPSN '05), vol. 4 n.1, pp. 91-98, Apr. 2005.
[3] Chi-Fu Huang, Yu-Cheen Tseng, โ€œThe Coverage Problem in a Wireless Network, Mobile Networks and
Applications,โ€ Mobile Networks and Applications, vol.10 n.4, pp.519-528, August 2005.
[4] G. G. Finn. โ€œRouting and Addressing Problems in Large Metropolitan- scale Internetworks,โ€ ISI/RR-87-180, USC/
ISI, March 1987.
[5] Chenyang Lu, Brian M. Blum, Tarek F. Abdelzaher, John A. Stankovic, and Tian He, โ€œRAP: Real-Time
Communication Architecture for Large-Scale Wireless Networks,โ€ Real-Time and Embedded Technology and
Applications Symposium, vol. 38 n. 4, pp. 55-66, Spet. 2002.
[6] Tian He, John A. Stankovic, Chenyang Lu, and Tarek F. Abdelzaher, โ€œA Spatiotemporal Scheme for Wireless
Network,โ€ IEEE Transactions on Parallel and Distributed Systems, vol.16 n. 10, pp. 995-1006, 2005.
[7] A. Boukerche, H.A.B. Oliveira, E.F. Nakamura, and A.A.F. Loureiro, โ€œSecure Localization Algorithms for Wireless
Networks [Security in Mobile Ad Hoc],โ€ IEEE Comm. Magazine, vol. 46, n. 4, pp. 96-101, Apr. 2008.
[8] Diego Lรณpez de Ipiรฑa, Paulo R. S. Mendonรงa and Andy Hopper, โ€œA Low-Cost Vision-Based Location System for
Ubiquitous Computing,โ€ International Journal of Computer Vision, vol.71 n.1, pp.49-69, January 2007.
[9] Lance Doherty, Kristofer S. J. Pister, and Laurent El Ghaoui, โ€œConvex Position Estimation in Wireless Networks,โ€
In IEEE INFOCOM, vol. 3 n.1, pp. 1655- 1663, 2001.
[10] Fang Bian , Xin Li , Ramesh Govindan , Scott Shenker, โ€œUsing Hierarchical Location Names for Scalable Routing
and Rendezvous in Wireless Networks, โ€ International Journal of Ad Hoc and Ubiquitous Computing, vol.1 n.4,
pp.179-193, July 2006.
[11] Dragos Niculescu and Badri Nath,โ€œAd-hoc Positioning System (APS),โ€ IEEE GLOBECOM Global
Telecommunications Conference, pp. 2926-2931, Rutgers Univ., NJ, USA, November 25-29, 2001.
[12] Ensaf Alzurqa , Hesham Elmahdy, Gamal Darwish, โ€œImproved and Simple Scheduling Scheme for Real-Time Data
Communication in WSN,โ€ North Atlantic University Union, International Journal of Computers, Issue 4, Vol. 2, pp
462-469, 2008. ( http://www.naun.org/journals/computers/2008.html)
[13] K.D. Kang, K. Liu, N. Abu-Ghazaleh, โ€œSecuring Geographic Routing,โ€ the 9th Annual NYS Cyber Security
Conference: Symposium on Information Assurance, Albany, pp. 293-315, New York, USA, June 14-15, 2006.
[14] David Culler, Deborah Estrin, and Mani Srivastava. โ€œOverview of Networks,โ€ In Computer Magzine, vol. 37 n. 8,
pp. 41โ€“49. IEEE Computer Society, August 2004.
[15] Guoliang Xing, Chenyang Lu, Robert Pless, and Qingfeng Huang, โ€œOn Greedy Geographic Routing Algorithms in
Sensing-Covered Networks,โ€ Mobi-Hocโ€™04, vol. 15 n. 6, pp. 31-42. ACM Press 2004.
[16] Esler M., Hightower J., Anderson T., and Borriello G., โ€œNext Century Challenges: Data-Centric Networking for
Invisible Computing,โ€ ACM Mobicom, vol. 10 n.5, pp. 256 - 262 2000.
[17] B. Karp and H. T. Kung. โ€œGPSR: Greedy Perimeter Stateless Routing for Wireless Networks,โ€ In IEEE MobiCom,
vol.15 n. 6, pp. 243 - 254 August 2000.
[18] A. Y. Al-Zoubi. โ€œOptimized channel assignment scheme for TETRA networks,โ€ Proceedings of the 5th WSEAS
international conference on Applied electromagnetic, wireless and optical communications.
[19] F. Kuhn, R. Wattenhofer, A. Zollinger, โ€œAsymptotically Optimal Geometric Mobile Ad-hoc Routing,โ€ ACM
International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc), vol. 6 n.2, pp. 24โ€“ 33, 2003.

More Related Content

What's hot

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
ย 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
ย 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveyM H
ย 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
ย 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
ย 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksPolytechnique Montreal
ย 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
ย 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
ย 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
ย 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Polytechnique Montreal
ย 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
ย 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
ย 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERijdpsjournal
ย 
B031201016019
B031201016019B031201016019
B031201016019ijceronline
ย 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsijwmn
ย 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
ย 
A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
ย 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
ย 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569IJRAT
ย 

What's hot (20)

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
ย 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
ย 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
ย 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
ย 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
ย 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
ย 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
ย 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
ย 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithm
ย 
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
Joint Cooperative Spectrum Sensing and MAC Protocol Design for Multi-channel ...
ย 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
ย 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
ย 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLER
ย 
B031201016019
B031201016019B031201016019
B031201016019
ย 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elements
ย 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
ย 
A fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsnA fuzzy congestion controller to detect and balance congestion in wsn
A fuzzy congestion controller to detect and balance congestion in wsn
ย 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
ย 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
ย 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
ย 

Viewers also liked

Path Following Weaponary Robot
Path Following Weaponary RobotPath Following Weaponary Robot
Path Following Weaponary Robotpaperpublications3
ย 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETpaperpublications3
ย 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Stylepaperpublications3
ย 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypotpaperpublications3
ย 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysispaperpublications3
ย 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniquespaperpublications3
ย 
Automatic Fire Fighting Robot
Automatic Fire Fighting RobotAutomatic Fire Fighting Robot
Automatic Fire Fighting Robotpaperpublications3
ย 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categoriespaperpublications3
ย 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Schemepaperpublications3
ย 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Reviewpaperpublications3
ย 
Fuzzy ฮฑ^m-Separation Axioms
Fuzzy ฮฑ^m-Separation AxiomsFuzzy ฮฑ^m-Separation Axioms
Fuzzy ฮฑ^m-Separation Axiomspaperpublications3
ย 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
ย 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancerpaperpublications3
ย 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networkspaperpublications3
ย 
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Networkpaperpublications3
ย 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
ย 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Datapaperpublications3
ย 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...paperpublications3
ย 

Viewers also liked (20)

Path Following Weaponary Robot
Path Following Weaponary RobotPath Following Weaponary Robot
Path Following Weaponary Robot
ย 
Improved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANETImproved Greedy Routing Protocol for VANET
Improved Greedy Routing Protocol for VANET
ย 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
ย 
Network Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & HoneypotNetwork Security Using IDS, IPS & Honeypot
Network Security Using IDS, IPS & Honeypot
ย 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
ย 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniques
ย 
Automatic Fire Fighting Robot
Automatic Fire Fighting RobotAutomatic Fire Fighting Robot
Automatic Fire Fighting Robot
ย 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categories
ย 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
ย 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Review
ย 
Smart Password
Smart PasswordSmart Password
Smart Password
ย 
Fuzzy ฮฑ^m-Separation Axioms
Fuzzy ฮฑ^m-Separation AxiomsFuzzy ฮฑ^m-Separation Axioms
Fuzzy ฮฑ^m-Separation Axioms
ย 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
ย 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
ย 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
ย 
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network
ย 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
ย 
Diabetics Online
Diabetics OnlineDiabetics Online
Diabetics Online
ย 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
ย 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
ย 

Similar to New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems

Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
ย 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
ย 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
ย 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
ย 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
ย 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
ย 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
ย 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
ย 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
ย 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
ย 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
ย 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
ย 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
ย 
iccet2015sp02
iccet2015sp02iccet2015sp02
iccet2015sp02harpreet singh
ย 
Ttacca
TtaccaTtacca
Ttaccacsandit
ย 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
ย 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
ย 

Similar to New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems (20)

Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
ย 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
ย 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
ย 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
ย 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
ย 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
ย 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
ย 
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSCONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKS
ย 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
ย 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
ย 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
ย 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
ย 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
ย 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ย 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
ย 
iccet2015sp02
iccet2015sp02iccet2015sp02
iccet2015sp02
ย 
Ttacca
TtaccaTtacca
Ttacca
ย 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
ย 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
ย 
ShortPaper
ShortPaperShortPaper
ShortPaper
ย 

Recently uploaded

Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 

Recently uploaded (20)

Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Netaji Nagar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 

New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 78 Paper Publications New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems ENSAF A. AL-ZURQA Department of Information Technology, Faculty of Engineering and Information Technology, Taiz University, Taiz, Yemen Abstract: One method to handle collisions in a contention based distributed system is to optimize collision detection and subsequent recovery. An alternative method to handle collisions in a contention based system is to attempt to avoid them. Some systems may utilize a strict scheduling guideline to identify who may use which resources when. Other systems may have the senders listen to the channel immediately prior to transmitting and determine suitable times to transmit. A primary challenge in Distributed Real-Time Systems applications is how to carry out data given source-to-sink, end-to-end deadlines when the communication resources are scarce. A new scheme resolves collisions and tries to reduce the number of potential collision events. In this paper, we develop New Avoiding Contention Scheme that delays data packet transmission nonlinearly during forwarding for a duration that correlates with their remaining deadline and distance to the destination, and avoiding the contention in bursty traffic by using multi-path routing Keywords: Bursty traffic, Contention avoidance, Real-Time scheme, Distributed systems, Multi-path Routing. 1. INTRODUCTION Distributed Real-Time Systems typically operate under load that is depending on the application and then suddenly become active in response to a detected or monitored event. Depending on the application this can result in the generation of large, sudden, and correlated impulses of data that must be delivered to a small number of sinks without significantly disrupting the performance (i.e., fidelity) of the sensing application. Although Distributed Real-Time Systems may spend only a small fraction of time dealing with impulses, it is during this time that the information it delivers is of greatest importance. The transport of event impulses is likely to lead to varying degrees of congestion in distributed systems. The contention directly affects the system performance. Indeed each burst dropped means a wasted bandwidth, increased delivery delay and decreased throughput. This means that the global efficiency and performance of the global system depends on the loss rate, and hence the performance falls as the load gets higher The performance is affected by both the routing scheme and the packet scheduling algorithm. Consider that in the absence of contention, the delay of a packet is proportional to the number of hops on the path from the distributed to the sink, where the selected path is determined by the routing scheme. In the presence of contention, additional delays are incurred as the packets are queued behind other packets. In response to this, future contention avoidance mechanisms for distributed systems must be capable of balancing the offered load, while attempting to maintain acceptable fidelity (i.e., rate of events) of the delivered signal at the sink during periods of transient and more persistent congestion. A number of distinct congestion scenarios are likely to arise. First, densely deployed distributed generating impulse data events will create persistent hotspots proportional to the impulse rate beginning at a location very close to the sources (e.g., within one or two hops). In this scenario, localized, fast time scale mechanisms capable of providing backpressure from the points of congestion back to the sources would be effective. Second, sparsely deployed distributed generating low data rate events will create transient hotspots potentially anywhere in the distributed field but likely farther from the sources, toward the sink. In this case, fast time scale resolution of localized hotspots using a combination of localized back- pressure (between nodes identified in a hotspot region) and packet dropping techniques would be more effective. Because
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 79 Paper Publications of the transient nature of congestion, source nodes may not be involved in the backpressure. Third, sparsely deployed distributed generating high data-rate events will create both transient and persistent hotspots distributed throughout the distributed field. In this paper, we develop New Avoiding Contention Scheme that offers significant advantages over existing wireless real- time data communication schemes. It reduces contentions to improve real-time performance by providing the flexibility of the nonlinear slack allocation. Contention Avoidance Scheme delays data packet transmission nonlinearly during forwarding for a duration that correlates with their remaining deadline and distance to the destination. Also we implement the Contention Avoidance Scheme algorithm with a multi-path routing scheme that is intended to provide a reliable transmission environment for data packet delivery and improve real-time performance. The braided multi-path routing which we use in our scheme, choose the best path and shortest one without exceed the delayed time makes more efficient used for the bandwidth and so decrease the packet miss ratio, drop ratio and overall delay which we consider them our accuracy measure in distributed systems. This scheme efficiently utilizes the available memory resources of distributed nodes. It also has a significant impact on the success of wireless real-time data communication data communication and avoids contention. Simulation experiments show that the used scheme outperforms traditional schemes by establishing a reliable path from the source to the sink by distributing the traffic load more evenly in the system. Moreover, delaying the data packets before reaching the sink also helps the data aggregation/fusion and therefore energy efficiency. The primary contribution of our work is more effective communication; and avoiding the contention in bursty traffic by using braided multi-path routing. The reminder of paper is structures as follows: related works are introduced in section2. The framework of the new scheme is illustrated in section 3. In section 4, the effect of increasing the number of created sub- packets corresponds to the number of available paths is explained. Simulation results and conclusion are discussed in sections 5 and 6, respectively. 2. RELATED WORKS Clearly, the ability to meet real-time deadlines in the presence of contention is related to controlling the load presented to the system. In terms of system resources, this is the problem of congestion control. Exploring the intersection of contention avoidance and real-time scheduling is an interesting topic of future research. One of the proposed solutions for real-time system [1] prioritizes packet transmission at the MAC layer according to the deadline and distance from the sink. These works have several limitations: (1) Packets generated by different distributed systems at the same time (e.g., in response to a detected event), can lead to high contention rates. Jittering such packets can help reduce this hot-spotting; (2) MAC level solutions cannot account for the queuing delay in the routing layer (which occurs above the MAC layer); these delays can have a significant impact on end-to-end delay especially under high load; and (3) MAC level solutions require reengineering of the distributed radio hardware and firmware, making deployment difficult and potentially causing interoperability problems with earlier hardware that supports different MAC schemes. To meet QoS requirements such as bounded delay or guaranteed delivery, contention is a key. Several methods have been proposed in the literature to decrease the loss rate. Some of these techniques could be implemented in software, such as deflection [15] routing and segmented bursts [1], while the others require specific hardware, such as burst buffering [16,7] and wavelength converters [17,7]. These techniques may reduce the contention, but they all remain sensitive to the traffic load. Indeed, it is clear that even in ideal systems, where the switches use a number of buffers and can perform wavelength conversion, contention still occurs when the load gets higher. This means that the best way to deal with the contention problem is to control the traffic and keep the load in an optimal range as long as possible. Furthermore, in OBS, the load control could be done only by the edge nodes since they have more intelligence and they have physical resources such as buffers and can handle both electronic and optical information. Unfortunately, they do not have enough information to adjust their throughput accordingly. No global state is available and the edge nodes are sending data bursts without any coordination. In the following section we will focus on an algorithm that controls the load and achieves fairness among all the system edges. They will be able to share the available system capacity while keeping the dropping probability at a low level. In the same time, whenever a burst is dropped the source node will be notified in order to retransmit the lost burst and hence guarantee delivery, thus avoiding the long retransmission delay of TCP. Since the scheduling needs to consider the queuing delay in the routing layer which is above the MAC layer, the impact of the routing schemes used must be carefully examined. The effect of the routing scheme on the real-time scheduling success is not sufficiently understood. Some existing solutions [2] [3] [4] for routing in real-time traffic context provide non-deterministic routing as an extension of stateless geographic- based routing schemes. More specifically, these approaches use the best next hop with respect to the traffic/congestion
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 80 Paper Publications situations, not only the geographic proximity as per the greedy Geographical Forwarding scheme. Furthermore, when using a longer path in terms of number of hops, increased contention for the medium results as more transmissions are needed to forward a packet. So we propose new scheduling scheme that schedules the data packets exponentially and uses braided multi-path routing. This scheme overcomes those shortcomings. The performance of Distributed Real-Time Systems applications is affected by both the packet scheduling algorithm and routing scheme. The effectiveness of this communication can be measured in terms of the deadline miss ratio. Existing solutions for real-time data communication in distributed systems prioritize packets at the MAC layer according to their deadlines and distances to the sink. These solutions have several limitations including: when traffic is bursty, high contention may result increasing transmission and queuing delays; and MAC level solutions can not account for the queuing delay in the routing layer. In section 3, we introduce the framework of our scheme in detail. 3. CONTENTION AVOIDANCE SCHEME FRAMEWORK In this work we propose an approach to keep the load in the acceptable area and make sure that all the edge nodes contribute fairly to this load. The basic idea of this technique is that the edges receive statistical reports (concerning the loss inside the system) that help to calculate the system performance, and hence determine from the loss-load relationship the current traffic load. Therefore by learning from this statistical data, each node increases or reduces its throughput. These statistical reports could be used by the edge nodes to monitor and control the whole system. A statistics distributor protocol could be implemented, as an extension in a control plan, using the same wavelength used to carry the burst headers. This approach aims to control the traffic and keeps it out of congestion area. Similar approaches to congestion avoidance [18,19,20], have been considered in the literature for TCP/IP packet switched systems and asynchronous transfer mode (ATM). Congestion control is a recovery mechanism that helps a system to get out of a congestion state, whereas congestion avoidance scheme allows a system to operate in a safe area. Many solutions have been proposed in the literature to practically control congestion, the most popular are window flow-control and rate flow control. In the windows flow-control scheme [20] (used by TCP), the destination specifies a limit on the number of packet that could be sent by the source. This limit is increased and decreased by the destination dynamically during the whole session to regulate a data flow. In rate flow-control scheme, the destination or the system may ask a source to decrease its rate. Besides that, ATM uses other sophisticated mechanisms to control congestion including traffic shaping and admission control as well as resource reservation. Regardless of the efficiency of these mechanisms, all of them perform congestion control in the electrical level where some resources are available especially buffers and storage spaces that contribute actively in the control process. The idea of optical congestion control is to push some of these functions to the optical domain where a new constraints (buffer-less system) and new challenges rise. Performing congestion avoidance and congestion control in the optical domain increases the performance (in terms of loss rate) of optical burst switching and improves resource utilization. Contention Avoidance Scheme is the primary contribution of this paper. Contention Avoidance Scheme delays data packet transmission during forwarding for a duration that correlates with their remaining deadline and distance to the destination. Intuitively, this helps in heavy-traffic communication environment by making sure that priority inversion does not occur. Inversion occurs due to a node with only low priority packets sending and preventing a node with high priority packets from doing so. In summary, the following information is needed to schedule packets in Contention Avoidance Scheme: End-to-end deadline information: this information is provided by the application in the data packet as required by any real-time data communication application. For those applications where the header of data packet does not include this information, an alternative way for Contention Avoidance Scheme to obtain the end-to-end deadline information is needed. Also, End-to-end distance information: this information is obtained from the routing scheme. In geographic routing, Euclidian distance measured as the distance from the current node to the destination. It can be used as the distance metric. End-to-end distance which can be measured either in numbers of hops like in Shortest Path Routing or by the difference between the average length of an alternate path and the length of the primary path as in Braid multi-path routing. Contention Avoidance Scheme is possible to allocate the available slack time non-uniformly among the intermediate hops along the path to the sink. For example, we may desire to provide the packets with additional time as it gets closer to the sink. The intuition is that in a gathering application, the contention is higher as the packet moves closer to the sink. More generally, we may want to allocate the slack time proportionately to the degree of contention along the path. We explore an Exponential increasing delaying policy with multi-path routing to break down the available time. We
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 81 Paper Publications used multi-path routing that choose the best path in the case of congestion and apply heuristic scheme that attempts to pick the lowest latency path in Distributed Real-Time Systems without contention: Delay is used to decide how long a data packet can be queued locally. If the Delay is zero, the packet is forwarded at once. A single priority queue is used to queue all incoming data packets. In fact the Delay is the priority of the packets. The Contention Avoidance Scheme scheduler resides above (or within) the routing layer. The Contention Avoidance Scheme scheduler and the MAC layer scheme are not aware of each other. It uses routing level information such as the end-to-end distance in making its scheduling decisions. Existing real-time data communication work have developed packet scheduling schemes cannot completely support real- time data communication requirements. In our work, we develop new scheme to reduce contentions and improve real-time performance and demonstrate that the multi-path discipline has a significant impact on the success of real-time data communication in wireless communication systems and avoid contention as we see in the next section. For any real-time applications based on Contention Avoidance Scheme, the end-to-end real-time deadline is assumed to be included on the data packet itself. Since Contention Avoidance Scheme is mainly designed for soft real-time applications, Contention Avoidance Scheme immediately forwards such packets without any delay even if the packet misses the deadline. A single priority queue for packet forwarding based on the computed target transmission time is used by the Contention Avoidance Scheme scheduler. Transmission is accomplished via a timer that is set to the target transmission time of the head of the queue. When the queue is full, the Contention Avoidance Scheme scheduler selects the packet at the head of the queue to immediately forward it instead of dropping any packet in the queue. MAC layer prioritization is not needed by the Contention Avoidance Scheme design since the packets are sent when their local deadline is reached. Not requiring changes to the MAC layer is a desirable feature of Contention Avoidance Scheme. The output of Contention Avoidance Scheme scheduler is the queuing delay. Queuing delay is used by the routing scheme to decide how long to delay an incoming data packet before attempting to forward it (by passing it to the MAC layer). The queuing delay computes the duration that is the packet used to be queued in the Distributed Real-Time Systems layer before it is handed to the MAC layer for transmission. This delay can be directly controlled by the Contention Avoidance Scheme scheduler as we illustrate in section 3.1. 3.1 Recourses Management: To manage limited recourses such as bandwidth, Priority queuing can be used on a transmission line from a system router. In the event of outgoing traffic queuing due to insufficient bandwidth, all other queues can be halted to send the traffic from the highest priority queue upon arrival. This ensures that the prioritized traffic (such as real-time traffic) is forwarded with the least delay and the least likelihood of being rejected due to a queue reaching its maximum capacity. All other traffic can be handled when the highest priority queue is empty. Another approach used is to send disproportionately more traffic from higher priority queues. Many modern schemes for wireless Contention Avoidance Scheme systems also include the concept of Priority Queues at the MAC sub-layer to ensure that high-priority applications experience lower latency than other applications which can be served with Best effort service. Examples include IEEE 802.11e (an amendment to IEEE 802.11 which provides Quality of Service). A single priority queue is used in the routing layer for forwarding packets. A single priority queue can better track the priority of data packets than the approach of several FIFO queues with different priority levels. The processing time of queuing operations is much shorter than the queuing delay, so this overhead does not affect the performance much as it does in Real-Time scheduling design. The priority of each data packet is the queuing delay decided by the Contention Avoidance Scheme scheduler. This priority does differentiate not only the requested delay of each data packet, but also their possible queuing status. When the priority queue is full, the data packet at the head of the queue is forwarded at once no matter how long it needs to be queued due the Contention Avoidance Scheme scheduling. As we can see, this is a best effort forwarding policy which may cause the most urgent data packet to be dropped. However, the benefit of this solution is that the packet at the queue head has a higher local priority and is less likely to be dropped by lower layer communication later. Real time multi-path finds a least cost and energy efficient path that meets certain end-to-end delay during the connection. The link cost used is a function that captures the nodesโ€™ energy reserve, transmission energy, error rate and other communication parameters. In order to support both best effort and real time traffic at the same time, a class-based queuing model is employed. The queuing model allows service sharing for real-time and non-real-time traffic. The scheme finds a list of least cost paths and picks a path from that list which meets the end-to-end delay requirement. In section 4, we present some
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 82 Paper Publications considerations on how to predict the number of paths that will successfully deliver a packet among the multiple disjoint paths obtained from the route discovery process. 4. DATA PACKETS SPLITTING The increase of the probability for the successful delivery comes at the trade-off of added redundancy. The entire data package to be sent from the source to the destination over the available k disjoint paths will be split up into smaller sub- packets of equal size. The number of created sub-packets corresponds to the number of available paths. Only a smaller number of these sub-packets will then be needed at the destination to reconstruct the original packet. There exist several fast and simple (i.e. linear) forward error correcting codes (or erasure codes) that allow the reconstruction of an original packet that has been split up and of which not all parts arrive at the destination. In the following, we will focus on approximating a value of successful paths. This value will then be used to determine the amount of redundancy to be added for the split packet transmission. The total number of sub-packets is a function dependent on the multi-path degree and on the failing probabilities of the available paths. As these values change according to the positions of the source and the destination in the system, each source must be able to decide on the parameters for the error correcting codes before the transmission of the actual data sub-packets. We want to send a data packet from a source to a destination and the process of route construction is finished, resulting in k different paths that are to be used. Each path has some rate that corresponds to the probability of successfully delivering a packet to the destination. This setting corresponds to a repeated experiment, the sub-run corresponding to the packet transmission along the ith path. Note that we consider node-disjoint paths and therefore can assume these experiments to be independent of each other. Obviously, each combination of the multi-path degree k and different probabilities will yield a different normal distribution. To overcome this problem, we transform to the standard normal distribution. Now, consider a given bound for the desired probability of being able to reconstruct the original packet at the destination after being sent along the different paths. In terms of the input for the decision algorithm, the value for Ek is given by the following expression which gives the number of successfully delivering paths with the overall success probability of . 5. SIMULATION RESULTS AND ANALYSIS In order to evaluate the performance of the proposed congestion avoidance scheme, we performed a number of simulations on a mesh system. In this simulation we consider a NSFNET topology with 14 nodes. In a Contention Avoidance Scheme system, where node density is high and bandwidth is scarce, traffic hot spots are easily created. In turn, such hot spots may interfere with real-time guarantees of critical traffic in the system. In our work, we apply a combined Contention Avoidance Scheme and MAC layer congestion control scheme to alleviate this problem. To test the congestion avoidance capabilities, each node publishes packets alternately at the pre-set data rate for 5 seconds then stops publishing for the second 5. Figure 1; show a comparison of the loss ratios result of real time system with and without using Contention Avoidance Scheme under the bursty traffic with end-to-end deadline from 0.1 second to 0.6 seconds. Figure1: Contention Avoidance Ratio under bursty traffic
  • 6. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 83 Paper Publications From the figure we can see that the miss ratio of Contention Avoidance Scheme is much lower than that of with the bursty traffic. Since Contention Avoidance Scheme uses multi-path routing which is necessary to make sure that the capacity of the Distributed Real-Time Systems does not be exceeded, hence no packets are truncated. Contention Avoidance Scheme can tolerate the traffic burst by routing some packets to free routes in the system. In addition, this scheme is necessary to optimize the lifetime of the Distributed Real-Time Systems while meeting the minimum accuracy requirements of the application. Thus, the congestion control must not only be based on the capacity of the system, but also on the accuracy level at the observer. In figure 2, we show the effect of applying the congestion control and avoid the contention in the Distributed Real-Time Systems by decreasing the drop ratio and delivering more packets, and get small loss rate. Figure2: the loss ratio In this simulation all the nodes with traffic load beyond the critical load should return back to the critical load). We observe that the loss is dropped sharply to the critical loss when the congestion is detected and continues to oscillate around the critical loss. Nonetheless the result is very similar to the previous one where the loss is dropped progressively to the critical loss. And both of them prove that the congestion control technique effectively controls the loss and optimizes the resource utilization. 6. CONCLUSION In heavy traffic environments, large queuing delays may be experienced at intermediate nodes before they are forwarded to their next hop. This situation may occur at several intermediate nodes before the packet reaches its destination. Contention Avoidance Scheme delays packet transmission during forwarding for a duration that correlates with their remaining deadline and distance to the destination. Intuitively, this helps in heavy-traffic communication environment by making sure that priority inversion does not occur due to a node with only low priority packets sending and preventing a node with high priority packets from doing so. Contention Avoidance Scheme utilizes multiple routes and distributes the data to multiple candidate neighbors to avoid contention and control congestion problem. Contention Avoidance Scheme Scheduling makes sure that the capacity of the Distributed Real-Time Systems does not be exceeded and hence no packets are truncated. It can avoid contention in the system. Further, Contention Avoidance Scheme is a routing layer solution and does not require changes to lower level schemes making it easier to deploy and independent of the underlying The Contention Avoidance Scheme focuses on scheduling packets under heavy traffic situations. We did not examine the problem of scheduling under a light load. If the traffic through the current node is not heavy and queuing time is small, real-time scheduling is not needed and in fact may harm performance. If such a situation can be detected, the Contention Avoidance Scheme can be disabled and packets forwarded normally. We noticed that the scheme efficiently utilizes the limited energy and available memory resources of Contention Avoidance Scheme nodes and also has a significant impact on the success of real-time data dissemination and avoids contention.
  • 7. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (78-84), Month: October 2015 โ€“ March 2016, Available at: www.paperpublications.org Page | 84 Paper Publications REFERENCES [1] Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd, Algis Rudys, Dan S. Wallach, and Lydia E. Kavraki, โ€œPractical Robust Localization over Large-Scale 802.11 Wireless Networks,โ€ EURASIP Journal on Advances in Signal Processing, vol.14 n.4, pp.415-433, August 2008. [2] Z. Li, W. Trappe, Y. Zhang, and B. Nath, โ€œRobust Statistical Methods for Securing Wireless Localization in Networks,โ€nFourth Int'l Workshop Information Processing in Networks (IPSN '05), vol. 4 n.1, pp. 91-98, Apr. 2005. [3] Chi-Fu Huang, Yu-Cheen Tseng, โ€œThe Coverage Problem in a Wireless Network, Mobile Networks and Applications,โ€ Mobile Networks and Applications, vol.10 n.4, pp.519-528, August 2005. [4] G. G. Finn. โ€œRouting and Addressing Problems in Large Metropolitan- scale Internetworks,โ€ ISI/RR-87-180, USC/ ISI, March 1987. [5] Chenyang Lu, Brian M. Blum, Tarek F. Abdelzaher, John A. Stankovic, and Tian He, โ€œRAP: Real-Time Communication Architecture for Large-Scale Wireless Networks,โ€ Real-Time and Embedded Technology and Applications Symposium, vol. 38 n. 4, pp. 55-66, Spet. 2002. [6] Tian He, John A. Stankovic, Chenyang Lu, and Tarek F. Abdelzaher, โ€œA Spatiotemporal Scheme for Wireless Network,โ€ IEEE Transactions on Parallel and Distributed Systems, vol.16 n. 10, pp. 995-1006, 2005. [7] A. Boukerche, H.A.B. Oliveira, E.F. Nakamura, and A.A.F. Loureiro, โ€œSecure Localization Algorithms for Wireless Networks [Security in Mobile Ad Hoc],โ€ IEEE Comm. Magazine, vol. 46, n. 4, pp. 96-101, Apr. 2008. [8] Diego Lรณpez de Ipiรฑa, Paulo R. S. Mendonรงa and Andy Hopper, โ€œA Low-Cost Vision-Based Location System for Ubiquitous Computing,โ€ International Journal of Computer Vision, vol.71 n.1, pp.49-69, January 2007. [9] Lance Doherty, Kristofer S. J. Pister, and Laurent El Ghaoui, โ€œConvex Position Estimation in Wireless Networks,โ€ In IEEE INFOCOM, vol. 3 n.1, pp. 1655- 1663, 2001. [10] Fang Bian , Xin Li , Ramesh Govindan , Scott Shenker, โ€œUsing Hierarchical Location Names for Scalable Routing and Rendezvous in Wireless Networks, โ€ International Journal of Ad Hoc and Ubiquitous Computing, vol.1 n.4, pp.179-193, July 2006. [11] Dragos Niculescu and Badri Nath,โ€œAd-hoc Positioning System (APS),โ€ IEEE GLOBECOM Global Telecommunications Conference, pp. 2926-2931, Rutgers Univ., NJ, USA, November 25-29, 2001. [12] Ensaf Alzurqa , Hesham Elmahdy, Gamal Darwish, โ€œImproved and Simple Scheduling Scheme for Real-Time Data Communication in WSN,โ€ North Atlantic University Union, International Journal of Computers, Issue 4, Vol. 2, pp 462-469, 2008. ( http://www.naun.org/journals/computers/2008.html) [13] K.D. Kang, K. Liu, N. Abu-Ghazaleh, โ€œSecuring Geographic Routing,โ€ the 9th Annual NYS Cyber Security Conference: Symposium on Information Assurance, Albany, pp. 293-315, New York, USA, June 14-15, 2006. [14] David Culler, Deborah Estrin, and Mani Srivastava. โ€œOverview of Networks,โ€ In Computer Magzine, vol. 37 n. 8, pp. 41โ€“49. IEEE Computer Society, August 2004. [15] Guoliang Xing, Chenyang Lu, Robert Pless, and Qingfeng Huang, โ€œOn Greedy Geographic Routing Algorithms in Sensing-Covered Networks,โ€ Mobi-Hocโ€™04, vol. 15 n. 6, pp. 31-42. ACM Press 2004. [16] Esler M., Hightower J., Anderson T., and Borriello G., โ€œNext Century Challenges: Data-Centric Networking for Invisible Computing,โ€ ACM Mobicom, vol. 10 n.5, pp. 256 - 262 2000. [17] B. Karp and H. T. Kung. โ€œGPSR: Greedy Perimeter Stateless Routing for Wireless Networks,โ€ In IEEE MobiCom, vol.15 n. 6, pp. 243 - 254 August 2000. [18] A. Y. Al-Zoubi. โ€œOptimized channel assignment scheme for TETRA networks,โ€ Proceedings of the 5th WSEAS international conference on Applied electromagnetic, wireless and optical communications. [19] F. Kuhn, R. Wattenhofer, A. Zollinger, โ€œAsymptotically Optimal Geometric Mobile Ad-hoc Routing,โ€ ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc), vol. 6 n.2, pp. 24โ€“ 33, 2003.