SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
DOI : 10.5121/ijans.2012.2102 13
Congestion Control and QOS Improvement for
AEERG protocol in MANET
S.Rajeswari1
, Dr.Y.Venkataramani2
1
Associate professor, Dept. of Electronics and Communication Engineering, Saranathan
college of Engineering.
rajee_ravi@sify.com
2
Principal, Saranathan college of Engineering,
diracads@saranathan.ac.in.
ABSTRACT
QOS improvement has been a subject of intensive discussion. The research in the network field for
congestion control is by means of scheduling packets from different traffic flows for processing at a specific
node. When that particular node is selected for the transmission of all traffic flows since it has been chosen
as an emerging node for the shortest path in the adaptive energy efficient algorithm, queue scheduling
disciplines have been used to improve the quality of service. In this paper, we evaluate the performance of
four queuing disciplines (FIFO, PQ, RED and WFQ) which is implemented in the AEERG protocol. This
paper gives the NS-2 simulation results to compare their relative performance based on queuing delay,
packet drop rate and end-to-end delay for the above queuing techniques.
KEYWORDS:
Ad hoc Networks, Queuing schedule, Drop-Tail, Priority, RED, WFQ.
I. Introduction
Ad Hoc network is a wireless, mobile, multi-hop self-organizing network, no infrastructure. The
node’s mobile features of Ad Hoc network make the network topology change frequently. They
are connected through wireless channel, there is no specific routing facilities, each node in the
network also acts as a router, forwarding data packets for other nodes, there is also no naming
service, directory services and other functions --- these features make the traditional wired
networks Quality of Service policies no longer apply to mobile Ad Hoc Networks[1]. The current
routing protocols of Ad Hoc networks proposed by IETF are all suitable to a certain network
environment, to our knowledge, there is no a protocol itself has QoS mechanism [2]. In a mobile
environment, the changing of queue is quite different from those in static conditions.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
14
The cheapest and most common approach to achieve Qos is scheduling mechanisms and packet
discarding policies. A queue scheduling discipline manages the allocation of network resources
among different traffic flows by selecting the next packet to be processed. Also when packets
arrive faster than that they can be processed, arriving packets are dropped and thus controlling the
congestion in the network can be influenced. By assigning different weights to various flows in
the traffic, proper selection of the packet to be processed can be done. Furthermore, it can reduce
the impact of ill-behaved flows on other flows especially when having a mixture of real-time and
non-real-time traffic. The queuing disciplines considered in this paper are: First-In-First-Out
(FIFO), Priority Queueing (PQ) and WFQ. We also scrutinize the effect of two dropping policies,
drop-tail and random-early drop (RED) [7], on their performance.
The remainder of the paper is organized as follows. In the next section, we review related work
and briefly discuss the operational aspects of the selected queue scheduling disciplines with some
comments on their performance in section 3. We describe the simulation model and traffic
scenarios with the simulation results in Section 4. Finally, we conclude our paper and summarize
results in Section 5.
2. RELATED WORK
Shensheng Tang and Wei Li [3] discussed about an analytical traffic (Markov) model and three
queue management schemes are developed for a heterogeneous multihop mobile ad hoc network
(MANET). Babak Abbasov[5] proposed a new active queue management algorithm based on
RED, called AHRED has been designed and compared with different AQM schemes. Peter
Marbach proposed a distributed scheduling and active queue management mechanism for
wireless ad hoc networks which is based on a random access scheduler. P. G. Kulkarni et al.
presented a proactive prediction based queue management scheme called PAQMAN [7] that
captures variations in the underlying traffic accurately and regulates the queue size around the
desirable operating point. PAQMAN harnesses the predictability in the underlying traffic by
applying the Recursive Least Squares (RLS) algorithm to estimate the average queue length for
the next prediction interval given the average queue length information of the past intervals.
Jamal N. AI-Karaki et al. propose a QoS routing protocol, called Quality Virtual Routing (QVR),
for heterogeneous [8] MANETs. QVR operates on a fixed virtual rectilinear architecture (called
virtual grid architecture) that is built on top of the physical topology which consists of a few, but
possibly more powerful, mobile nodes known as ClusterHeads (CHs) that are elected periodically
and discover multiple QoS routes on the virtual grid using an extended version of the Open
Shortest Path First (OSPF) routing protocol and an extended version of WFQ scheduling policy
that takes into account the wireless channel state. Liu Ping et al. proposed a mathematical model
to calculate the queue delay [10] for MANET, which has a better effect on improving the
multimedia stream with delay sensitive. Jianyong Chen et al. a new self-tuning RED [2] is
proposed to improve the performance of TCP-RED network.
Hesham N. Elmahdy et al. studied the effect of the packet size and the effect of random early
detection (RED) parameters [1] on the Two Rate Three Color Marker (trTCM) and Single Rate
Three Color Marker (srTCM). P. Kulkarni et al. presents a predictive queue management strategy
named PAQMAN that proactively manages the queue, is simple to implement and requires
negligible computational overhead (and hence uses the limited resources efficiently). Xinyu JIN
et al. implemented a novel minimum energy routing scheme based on the mobile node's energy
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
15
consumption [9] and the hierarchical node’s congestion levels, which is named RED based
Minimum Energy Routing (REDMER) scheme. S.Radha Rammohan et al. proposed an effective
architecture system [11] to provide a good Quality of Service in Mobile Ad hoc Network.
3. Proposed queue implementation in AEERG Protocol
In this protocol, the nodes can be in active mode with probability 1-p or sleep mode with
probability p which is fixed at the initial stage. We set a counter B to adapt the number of
neighbors to which a packet is forwarded. B represents the current number of neighbors at each
node which are kept in active state. The value of B is adaptively adjusted based on the packet
delivery ratio. This results in less energy consumption[12] and more reliability in the
communication networks. When a particular node is selected for the forwarding of packets from
different flows, congestion will occur. To ease the congestion and to increase the throughput,
different scheduling mechanisms are implemented and the results are discussed.
First-In-First-Out (FIFO) queuing is the most popular queue scheduling discipline that has been
widely analyzed in the literature. It also acts as a baseline measure for comparing the performance
of other queue scheduling disciplines. In FIFO queuing, all packets are placed in a single queue
and then processing will begin in the same order on which they arrived. Hence, the other name is
known as first come-first-serve (FCFS) queuing. Although it is simple to implement and has
predictable performance in behavior and comparatively low computational load on the system, it
has some serious drawbacks for wireless network traffic. It is not capable for providing
differentiated service and can not identify to isolate the effect of ill-behaved flow with other
flows. A heavy flow can consume the entire buffer space and causes all other flows to be denied
service until after the burst is serviced. This can result in increased delay, jitter and loss for the
other well-behaved flows traversing in the queue. To reduce the impact of ill-behaved sources,
other queue disciplines have been proposed to isolate traffic flows into separate queues. These
queues can be serviced according to some scheduling scheme. Among these are priority queuing,
fair queuing, and weighted fair queuing, weighted round robin or class-based queuing, and deficit
weighted round robin.
Priority Queuing (PQ) is a simple mechanism to provide differentiated services to different
packet flows. Packets of different flows are assigned a priority level according to their QoS
requirements. When packets reach at the link output, they are first separated into different
classifications, enqueued separately in different flows based on their priorities. Then, queues are
served in order. The highest priority queue is served first before serving lower priority queues.
Packets in the same priority class are serviced in a FIFO manner. As soon as highest-priority
packets are served, packets from the lower priority class are served. But if a higher-priority
packet arrives while serving a lower-priority packet, the server waits till to complete the service
of the current packet then goes back to serve the higher priority queue (non-preemptive PQ). The
limitation of PQ is that lower-priority flow packets may receive little attention when a higher-
priority class has a continuous stream of packets. This problem is known as starvation problem
[1]. Also it does not show fairness to all queues. The closed form analytical solution of a two-
class priority queue is given in [8].
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
16
Random early detection (RED): It is also known as random early discard or random early drop
and it is also an active queue management algorithm. It is used for a congestion avoidance
algorithm. This algorithm plays an important role by the way of not admitting full queues for
processing, reducing the packet delay and loss. It monitors the average queue size and average
number of dropped packets based on statistical probabilities. The RED is also known as a
threshold based queuing discipline. It statistically starts of dropping the packets from flows before
it reaches its threshold value. So it is considered a good queue for situations where the complexity
of per-session state tracking needed by fairness queuing is not affordable. Assume that each node
has a single buffer.
Let λn be the packet arrival rate to the buffer at node n;
Let Dn be the expected delay of a packet at node n;
Let Pn be the probability that a packet is dropped at node n due to a buffer overflow.
For the case of λ = N,
1
( )
N
X n
ïŹ ïŹ
= ∑ (1)
Let X(λ) be the network throughput under the network arrival rate λ. We list the schedulers with
the following property.
Property: For a single-cell wireless network consisting of nodes n = 1, ... , N, we assume that a
scheduler implements a distributed buffer with service rate Ό if the following conditions are true.
(a) The expected delay Dn is identical at all nodes, i.e. we have Dn = D, for values n = 1, ..., N.
(b) The packet-drop probability Pn is identical at all nodes, i.e.
we have Pn = P, for values n = 1, ...,N.
(c) The throughput X(λ) is a non-decreasing function in λ with
Lim X(λ) = Ό.
λ →∞
The above property states that a fair scheduler should serve packets as if the network traffic
shares a common buffer that is served at rate Ό, i.e. all packets entering the network should
experience the same expected delay and the same probability of being dropped.
For every packet arrival, the RED gateway calculates the weighted moving average queue size
(avg). It then compares the results with minimum (minth) and a following schema [5,6].
‱ When avg < minth the packet is dropped with probability one.
‱ When minth ≀ avg < maxth the packet is dropped with some probability.
‱ When maxth ≀ avg the packet is not dropped.
The value of the average queue size (avg) is computed as follows:
After each idle period the average queue size (avg) is additively decreased by a constant α > 0
and after each busy period the average queue size (avg) is additively increased by a constant ÎČ > 0.
Note that this rule follows the intuition that average queue size (avg) should be increased when
the channel is busy, and be decreased when the channel is idle.
It is well known that by employing FIFO, throughput is not as good as priority Queue which is
lesser than RED.
Weighted Fair Queuing (WFQ) :The idea of the Weighted Fair Queuing (WFQ) algorithm can
be easily explained as a combination of PQ and FQ algorithms. As in the FQ method, all queues
are served so that there is no bandwidth starvation, but some queues have more weight in a sense
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
17
that they receive more service. In other words, a weight is given to each queue to assign different
priorities to the queues. Packets are stored into the appropriate queue according to their
classification.
WFQ is an approximation of the Generalized Processor Sharing (GPS) system. The algorithm is
explained as follows. A finish time is assigned to each packet taking into account the link
bandwidth, the number of queues, the weight of queues and the packets length. Afterwards, the
scheduler serves the queue where the packet with the minimum finish time is stored. The finish
time is used to build the order in which the packet will be transmitted through the link.
WFQ is a complex algorithm requiring per service class state and iterative checking of all states
for each packet arrival and departure. Consequently, the WFQ presents scalability problems and
cannot be used in environments with high volume of traffic requiring many classes of service.
One possible application of WFQ is where the number of service classes is limited to a small
number, so that the computational load is limited.
4. PERFORMANCE EVALUATION
For queuing disciplines specification, we set the maximum queue size to be 500 packets. There
are three types of classes in all queues (except FIFO) whose queue buffer size increases from
highest priority to lowest one. For enabling RED, we used minimum and maximum threshold as
100 and 200 respectively while keeping the mark probability denominator (the fraction of packets
dropped when the average queue size is at maximum threshold) as 10. We set exponential weight
factor (used to calculate average queue size based on the previous average and current queue size)
to be 9. Finally for WFQ the different finish time of packets such as 30,75 and 135 and also
varying bandwidths such as 1, 1.25, 1.5 and 2 Mbps are allocated for flows.
4.1 SIMULATION PARAMETERS
NS2 is used to simulate the proposed algorithm. In our simulation, the channel capacity of mobile
hosts is set to the same value: 2 Mbps. For the MAC layer protocol the distributed coordination
function (DCF) of IEEE 802.11 (for wireless LANs) is used. It has the functionality to notify the
network layer about link breakage.
In the simulation, mobile nodes move in a 600 meter x 400 meter region for 50 seconds
simulation time. The number of mobile nodes is varied from 10-60. We assume each node
moves independently with the same average speed. All nodes have the same transmission range
of 250 meters. In our simulation, the speed is set as 20m/s. The simulated traffic is Constant Bit
Rate (CBR). The pause time of the mobile node is kept as 20-120 sec.
4.2. PERFORMANCE METRICS
The simulated values of Throughput and Packet delivery ratio with the increasing number of
nodes, Different size of packet and for varying Simulation Pause Time are plotted as shown in the
figures below.
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
18
4.2.1Throughput:
The successful number of packets received by the destination is termed by Throughput and it is
measured by bytes/sec. For varying number of nodes, Throughput is measured for different
queuing and the figure is plotted as in Fig.1.
Fig.1 Throughput Vs Number of Nodes
Fig.1 gives the Throughput of three queue scheduling mechanisms when the number of nodes is
increased. When the number of nodes is increased, number of flows will increase leads to many
number of packets. From the figure, we can see that if we employ FIFO, more number of packets
will drop due to fixed buffer size. By means of WFQ more throughput can be achieved.
4.2.2 Packet Delivery Ratio:
Packet delivery ratio is calculated by dividing the number of packets received by the destination
through the number of packets originated by the application layer of the source. It specifies the
packet loss rate, which limits the maximum throughput of the network. The better the delivery
ratio, the more complete and correct is the routing protocol. For different queuing disciplines,
Packet Delivery Ratio is computed with increasing number of nodes and the graph is plotted in
figure.2
Throughput for increasing number of nodes
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
30 40 50 60 80 100
Number of nodes
Number
of
Bytes/Sec
WFQ
RED
FIFO
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
19
Fig.2 Packet Delivery Ratio Vs Number of Nodes
Fig.3 gives the Packet Delivery Ratio of different queue scheduling mechanisms when the
number of packet data is increased. This figure helps us to study about the efficiency of the queue
scheduling mechanisms. This result is obtained for non-real time communications. When the
number of nodes is increased, number of flows will increase leads to generation of many number
of packets.
Fig.3 Packet Delivery Ratio Vs Varying Packet Data (bytes)
Packet Delivery Ratio Vs Number of nodes
0
10
20
30
40
50
60
70
80
20 30 40 50 60
Number of nodes
Packet
delivery
Ratio(%)
RED
WFQ
FIFO
Packet Delivery Ratio with Varying Packet Data
0
20
40
60
80
100
120
50 100 150 200 250 300 350 400 450 500
Packet Data (bytes)
Packet
Delivery
Ratio(%)
WFQ
RED
FIFO
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
20
Fig.4 Packet Delivery Ratio Vs Simulation Pause Time
Fig.4 gives the Packet Delivery Ratio of different queue scheduling mechanisms when the pause
time is increased. This figure helps us to study about the adaptive queue buffer size change
mechanisms. When the Simulation Pause Time is increased, number of free space in the buffer is
adaptively changed for RED. But WFQ gives more packets Delivery Ratio than any other queue.
5. CONCLUSION
In this study we presented a simulation-based performance evaluation and comparison of three
queuing techniques for different number of nodes, packet size and pause time for the impact of
using random-early drop as compared to drop-tail policy and weighted fair scheduling. The
simulation results show WFQ that outperforms other disciplines in terms of Throughput and
packet delivery ratio although RED are also very close to it for the considered node scenarios. We
also noticed that using RED has greatly improved all the performance measures especially with
FIFO. The reason is that RED monitors the average queue size and randomly drops packets when
congestion is detected. Further work is still required to change the type of traffic to examine these
queuing disciplines and to study the impact of different traffic scenarios and the use of traffic
shapers at the edges of the network.
REFERENCES:
1. Hesham N. Elmahdy and Mohamed H. N. Taha, “The Impact of Packet Size and Packet Dropping
Probability on Bit Loss of VoIP Networks” in ICGST-CNIR Journal, Volume 8, Issue 2, pp. 25-29,
January 2009.
2. Jianyong Chen, Cunying Hu, and Zhen Ji, “Self-Tuning Random Early Detection Algorithm to
Improve Performance of Network Transmission” in Mathematical Problems in Engineering journal
Volume 2011, Article ID 872347, 17 pages , doi:10.1155/2011/872347.
3. Shensheng Tang and Wei Li , “QoS Provisioning and Queue Management in Mobile Ad hoc
Networks” in Wireless Communications and Networking Conference, pp.400-405, April 2006.
Packet Delivery Ratio vs Pause Time
74
76
78
80
82
84
86
88
90
92
94
20 30 40 50 60
Pause Time(sec)
Packet
Delivery
Ratio(%)
RED
WFQ
FIFO
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012
21
4. Shujie Wei, Guangwei Bai , Hang Shen,“An Adaptive Queue Management Mechanism for Video
Streaming over Mobile Ad Hoc Networks” in WiCOM'09 Proceedings of the 5th International
Conference on Wireless communications, networking and mobile computing, October 2009.
5. Babak Abbasov, “AHRED: A Robust AQM algorithm for wireless Adhoc Networks” in International
Conference on Application of Information and Communication Technologies, PP.1-4, October 2009.
6. Peter Marbach, “Distributed Scheduling and Active Queue Management in Wireless Networks” in
INFOCOM 2007 :2321-2325.
7. P. G. Kulkarni, S. I. McClean, G. P. Parr, M. M. Black, “Proactive Predictive Queue Management for
improved QoS in IP Networks” in Proceedings of the International Conference on Networking,
International Conference on Systems and International Conference on Mobile Communications and
Learning Technologies, April 2006.
8. Jamal N. AI-Karaki, Ahmed E. Kamal, “Supporting Quality of Service In Mobile Ad hoc
Networks” in ACS/IEEE 2005 International Conference on Computer Systems and
Applications (AICCSA'05).
9. Liu Ping, Yuan Peiyan, “An Approach to Calculate Queue Delay in Mobile AdHoc
Networks” in International Conference of Information Science and Management Engineering,
August 2010.
10. Wenyu Cai, Xinyu Jin, Yu Zhang, Kangsheng Chen and Rui Wang, “ACO Based QoS
Routing Algorithm for Wireless Sensor Networks” in Ubiquitous Intelligence and Computing,
LNCS 2006.
11. S.Radha Rammohan and K.Rengarajan, “Study of Possible Packets Travelling Algorithm for
Effective Mobile Ad hoc Networks” in International Journal of Soft Computing, Volume.4, pp.
162-167, 2009.
12. S.Rajeswari ,Dr.Y.Venkataramani , “An Adaptive Energy Efficient and Reliable Gossip
Routing Protocol For Mobile Adhoc Networks” IJCTE, Volume-2, No.5, Oct 2010.

More Related Content

Similar to Congestion Control and QOS Improvement for AEERG protocol in MANET

Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKIJCNCJournal
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkEswar Publications
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646IJERA Editor
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONA MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONIJCNCJournal
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 

Similar to Congestion Control and QOS Improvement for AEERG protocol in MANET (20)

Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONA MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
R045059297
R045059297R045059297
R045059297
 

More from pijans

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 

More from pijans (20)

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Congestion Control and QOS Improvement for AEERG protocol in MANET

  • 1. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 DOI : 10.5121/ijans.2012.2102 13 Congestion Control and QOS Improvement for AEERG protocol in MANET S.Rajeswari1 , Dr.Y.Venkataramani2 1 Associate professor, Dept. of Electronics and Communication Engineering, Saranathan college of Engineering. rajee_ravi@sify.com 2 Principal, Saranathan college of Engineering, diracads@saranathan.ac.in. ABSTRACT QOS improvement has been a subject of intensive discussion. The research in the network field for congestion control is by means of scheduling packets from different traffic flows for processing at a specific node. When that particular node is selected for the transmission of all traffic flows since it has been chosen as an emerging node for the shortest path in the adaptive energy efficient algorithm, queue scheduling disciplines have been used to improve the quality of service. In this paper, we evaluate the performance of four queuing disciplines (FIFO, PQ, RED and WFQ) which is implemented in the AEERG protocol. This paper gives the NS-2 simulation results to compare their relative performance based on queuing delay, packet drop rate and end-to-end delay for the above queuing techniques. KEYWORDS: Ad hoc Networks, Queuing schedule, Drop-Tail, Priority, RED, WFQ. I. Introduction Ad Hoc network is a wireless, mobile, multi-hop self-organizing network, no infrastructure. The node’s mobile features of Ad Hoc network make the network topology change frequently. They are connected through wireless channel, there is no specific routing facilities, each node in the network also acts as a router, forwarding data packets for other nodes, there is also no naming service, directory services and other functions --- these features make the traditional wired networks Quality of Service policies no longer apply to mobile Ad Hoc Networks[1]. The current routing protocols of Ad Hoc networks proposed by IETF are all suitable to a certain network environment, to our knowledge, there is no a protocol itself has QoS mechanism [2]. In a mobile environment, the changing of queue is quite different from those in static conditions.
  • 2. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 14 The cheapest and most common approach to achieve Qos is scheduling mechanisms and packet discarding policies. A queue scheduling discipline manages the allocation of network resources among different traffic flows by selecting the next packet to be processed. Also when packets arrive faster than that they can be processed, arriving packets are dropped and thus controlling the congestion in the network can be influenced. By assigning different weights to various flows in the traffic, proper selection of the packet to be processed can be done. Furthermore, it can reduce the impact of ill-behaved flows on other flows especially when having a mixture of real-time and non-real-time traffic. The queuing disciplines considered in this paper are: First-In-First-Out (FIFO), Priority Queueing (PQ) and WFQ. We also scrutinize the effect of two dropping policies, drop-tail and random-early drop (RED) [7], on their performance. The remainder of the paper is organized as follows. In the next section, we review related work and briefly discuss the operational aspects of the selected queue scheduling disciplines with some comments on their performance in section 3. We describe the simulation model and traffic scenarios with the simulation results in Section 4. Finally, we conclude our paper and summarize results in Section 5. 2. RELATED WORK Shensheng Tang and Wei Li [3] discussed about an analytical traffic (Markov) model and three queue management schemes are developed for a heterogeneous multihop mobile ad hoc network (MANET). Babak Abbasov[5] proposed a new active queue management algorithm based on RED, called AHRED has been designed and compared with different AQM schemes. Peter Marbach proposed a distributed scheduling and active queue management mechanism for wireless ad hoc networks which is based on a random access scheduler. P. G. Kulkarni et al. presented a proactive prediction based queue management scheme called PAQMAN [7] that captures variations in the underlying traffic accurately and regulates the queue size around the desirable operating point. PAQMAN harnesses the predictability in the underlying traffic by applying the Recursive Least Squares (RLS) algorithm to estimate the average queue length for the next prediction interval given the average queue length information of the past intervals. Jamal N. AI-Karaki et al. propose a QoS routing protocol, called Quality Virtual Routing (QVR), for heterogeneous [8] MANETs. QVR operates on a fixed virtual rectilinear architecture (called virtual grid architecture) that is built on top of the physical topology which consists of a few, but possibly more powerful, mobile nodes known as ClusterHeads (CHs) that are elected periodically and discover multiple QoS routes on the virtual grid using an extended version of the Open Shortest Path First (OSPF) routing protocol and an extended version of WFQ scheduling policy that takes into account the wireless channel state. Liu Ping et al. proposed a mathematical model to calculate the queue delay [10] for MANET, which has a better effect on improving the multimedia stream with delay sensitive. Jianyong Chen et al. a new self-tuning RED [2] is proposed to improve the performance of TCP-RED network. Hesham N. Elmahdy et al. studied the effect of the packet size and the effect of random early detection (RED) parameters [1] on the Two Rate Three Color Marker (trTCM) and Single Rate Three Color Marker (srTCM). P. Kulkarni et al. presents a predictive queue management strategy named PAQMAN that proactively manages the queue, is simple to implement and requires negligible computational overhead (and hence uses the limited resources efficiently). Xinyu JIN et al. implemented a novel minimum energy routing scheme based on the mobile node's energy
  • 3. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 15 consumption [9] and the hierarchical node’s congestion levels, which is named RED based Minimum Energy Routing (REDMER) scheme. S.Radha Rammohan et al. proposed an effective architecture system [11] to provide a good Quality of Service in Mobile Ad hoc Network. 3. Proposed queue implementation in AEERG Protocol In this protocol, the nodes can be in active mode with probability 1-p or sleep mode with probability p which is fixed at the initial stage. We set a counter B to adapt the number of neighbors to which a packet is forwarded. B represents the current number of neighbors at each node which are kept in active state. The value of B is adaptively adjusted based on the packet delivery ratio. This results in less energy consumption[12] and more reliability in the communication networks. When a particular node is selected for the forwarding of packets from different flows, congestion will occur. To ease the congestion and to increase the throughput, different scheduling mechanisms are implemented and the results are discussed. First-In-First-Out (FIFO) queuing is the most popular queue scheduling discipline that has been widely analyzed in the literature. It also acts as a baseline measure for comparing the performance of other queue scheduling disciplines. In FIFO queuing, all packets are placed in a single queue and then processing will begin in the same order on which they arrived. Hence, the other name is known as first come-first-serve (FCFS) queuing. Although it is simple to implement and has predictable performance in behavior and comparatively low computational load on the system, it has some serious drawbacks for wireless network traffic. It is not capable for providing differentiated service and can not identify to isolate the effect of ill-behaved flow with other flows. A heavy flow can consume the entire buffer space and causes all other flows to be denied service until after the burst is serviced. This can result in increased delay, jitter and loss for the other well-behaved flows traversing in the queue. To reduce the impact of ill-behaved sources, other queue disciplines have been proposed to isolate traffic flows into separate queues. These queues can be serviced according to some scheduling scheme. Among these are priority queuing, fair queuing, and weighted fair queuing, weighted round robin or class-based queuing, and deficit weighted round robin. Priority Queuing (PQ) is a simple mechanism to provide differentiated services to different packet flows. Packets of different flows are assigned a priority level according to their QoS requirements. When packets reach at the link output, they are first separated into different classifications, enqueued separately in different flows based on their priorities. Then, queues are served in order. The highest priority queue is served first before serving lower priority queues. Packets in the same priority class are serviced in a FIFO manner. As soon as highest-priority packets are served, packets from the lower priority class are served. But if a higher-priority packet arrives while serving a lower-priority packet, the server waits till to complete the service of the current packet then goes back to serve the higher priority queue (non-preemptive PQ). The limitation of PQ is that lower-priority flow packets may receive little attention when a higher- priority class has a continuous stream of packets. This problem is known as starvation problem [1]. Also it does not show fairness to all queues. The closed form analytical solution of a two- class priority queue is given in [8].
  • 4. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 16 Random early detection (RED): It is also known as random early discard or random early drop and it is also an active queue management algorithm. It is used for a congestion avoidance algorithm. This algorithm plays an important role by the way of not admitting full queues for processing, reducing the packet delay and loss. It monitors the average queue size and average number of dropped packets based on statistical probabilities. The RED is also known as a threshold based queuing discipline. It statistically starts of dropping the packets from flows before it reaches its threshold value. So it is considered a good queue for situations where the complexity of per-session state tracking needed by fairness queuing is not affordable. Assume that each node has a single buffer. Let λn be the packet arrival rate to the buffer at node n; Let Dn be the expected delay of a packet at node n; Let Pn be the probability that a packet is dropped at node n due to a buffer overflow. For the case of λ = N, 1 ( ) N X n ïŹ ïŹ = ∑ (1) Let X(λ) be the network throughput under the network arrival rate λ. We list the schedulers with the following property. Property: For a single-cell wireless network consisting of nodes n = 1, ... , N, we assume that a scheduler implements a distributed buffer with service rate ÎŒ if the following conditions are true. (a) The expected delay Dn is identical at all nodes, i.e. we have Dn = D, for values n = 1, ..., N. (b) The packet-drop probability Pn is identical at all nodes, i.e. we have Pn = P, for values n = 1, ...,N. (c) The throughput X(λ) is a non-decreasing function in λ with Lim X(λ) = ÎŒ. λ →∞ The above property states that a fair scheduler should serve packets as if the network traffic shares a common buffer that is served at rate ÎŒ, i.e. all packets entering the network should experience the same expected delay and the same probability of being dropped. For every packet arrival, the RED gateway calculates the weighted moving average queue size (avg). It then compares the results with minimum (minth) and a following schema [5,6]. ‱ When avg < minth the packet is dropped with probability one. ‱ When minth ≀ avg < maxth the packet is dropped with some probability. ‱ When maxth ≀ avg the packet is not dropped. The value of the average queue size (avg) is computed as follows: After each idle period the average queue size (avg) is additively decreased by a constant α > 0 and after each busy period the average queue size (avg) is additively increased by a constant ÎČ > 0. Note that this rule follows the intuition that average queue size (avg) should be increased when the channel is busy, and be decreased when the channel is idle. It is well known that by employing FIFO, throughput is not as good as priority Queue which is lesser than RED. Weighted Fair Queuing (WFQ) :The idea of the Weighted Fair Queuing (WFQ) algorithm can be easily explained as a combination of PQ and FQ algorithms. As in the FQ method, all queues are served so that there is no bandwidth starvation, but some queues have more weight in a sense
  • 5. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 17 that they receive more service. In other words, a weight is given to each queue to assign different priorities to the queues. Packets are stored into the appropriate queue according to their classification. WFQ is an approximation of the Generalized Processor Sharing (GPS) system. The algorithm is explained as follows. A finish time is assigned to each packet taking into account the link bandwidth, the number of queues, the weight of queues and the packets length. Afterwards, the scheduler serves the queue where the packet with the minimum finish time is stored. The finish time is used to build the order in which the packet will be transmitted through the link. WFQ is a complex algorithm requiring per service class state and iterative checking of all states for each packet arrival and departure. Consequently, the WFQ presents scalability problems and cannot be used in environments with high volume of traffic requiring many classes of service. One possible application of WFQ is where the number of service classes is limited to a small number, so that the computational load is limited. 4. PERFORMANCE EVALUATION For queuing disciplines specification, we set the maximum queue size to be 500 packets. There are three types of classes in all queues (except FIFO) whose queue buffer size increases from highest priority to lowest one. For enabling RED, we used minimum and maximum threshold as 100 and 200 respectively while keeping the mark probability denominator (the fraction of packets dropped when the average queue size is at maximum threshold) as 10. We set exponential weight factor (used to calculate average queue size based on the previous average and current queue size) to be 9. Finally for WFQ the different finish time of packets such as 30,75 and 135 and also varying bandwidths such as 1, 1.25, 1.5 and 2 Mbps are allocated for flows. 4.1 SIMULATION PARAMETERS NS2 is used to simulate the proposed algorithm. In our simulation, the channel capacity of mobile hosts is set to the same value: 2 Mbps. For the MAC layer protocol the distributed coordination function (DCF) of IEEE 802.11 (for wireless LANs) is used. It has the functionality to notify the network layer about link breakage. In the simulation, mobile nodes move in a 600 meter x 400 meter region for 50 seconds simulation time. The number of mobile nodes is varied from 10-60. We assume each node moves independently with the same average speed. All nodes have the same transmission range of 250 meters. In our simulation, the speed is set as 20m/s. The simulated traffic is Constant Bit Rate (CBR). The pause time of the mobile node is kept as 20-120 sec. 4.2. PERFORMANCE METRICS The simulated values of Throughput and Packet delivery ratio with the increasing number of nodes, Different size of packet and for varying Simulation Pause Time are plotted as shown in the figures below.
  • 6. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 18 4.2.1Throughput: The successful number of packets received by the destination is termed by Throughput and it is measured by bytes/sec. For varying number of nodes, Throughput is measured for different queuing and the figure is plotted as in Fig.1. Fig.1 Throughput Vs Number of Nodes Fig.1 gives the Throughput of three queue scheduling mechanisms when the number of nodes is increased. When the number of nodes is increased, number of flows will increase leads to many number of packets. From the figure, we can see that if we employ FIFO, more number of packets will drop due to fixed buffer size. By means of WFQ more throughput can be achieved. 4.2.2 Packet Delivery Ratio: Packet delivery ratio is calculated by dividing the number of packets received by the destination through the number of packets originated by the application layer of the source. It specifies the packet loss rate, which limits the maximum throughput of the network. The better the delivery ratio, the more complete and correct is the routing protocol. For different queuing disciplines, Packet Delivery Ratio is computed with increasing number of nodes and the graph is plotted in figure.2 Throughput for increasing number of nodes 0 2000 4000 6000 8000 10000 12000 14000 16000 18000 30 40 50 60 80 100 Number of nodes Number of Bytes/Sec WFQ RED FIFO
  • 7. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 19 Fig.2 Packet Delivery Ratio Vs Number of Nodes Fig.3 gives the Packet Delivery Ratio of different queue scheduling mechanisms when the number of packet data is increased. This figure helps us to study about the efficiency of the queue scheduling mechanisms. This result is obtained for non-real time communications. When the number of nodes is increased, number of flows will increase leads to generation of many number of packets. Fig.3 Packet Delivery Ratio Vs Varying Packet Data (bytes) Packet Delivery Ratio Vs Number of nodes 0 10 20 30 40 50 60 70 80 20 30 40 50 60 Number of nodes Packet delivery Ratio(%) RED WFQ FIFO Packet Delivery Ratio with Varying Packet Data 0 20 40 60 80 100 120 50 100 150 200 250 300 350 400 450 500 Packet Data (bytes) Packet Delivery Ratio(%) WFQ RED FIFO
  • 8. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 20 Fig.4 Packet Delivery Ratio Vs Simulation Pause Time Fig.4 gives the Packet Delivery Ratio of different queue scheduling mechanisms when the pause time is increased. This figure helps us to study about the adaptive queue buffer size change mechanisms. When the Simulation Pause Time is increased, number of free space in the buffer is adaptively changed for RED. But WFQ gives more packets Delivery Ratio than any other queue. 5. CONCLUSION In this study we presented a simulation-based performance evaluation and comparison of three queuing techniques for different number of nodes, packet size and pause time for the impact of using random-early drop as compared to drop-tail policy and weighted fair scheduling. The simulation results show WFQ that outperforms other disciplines in terms of Throughput and packet delivery ratio although RED are also very close to it for the considered node scenarios. We also noticed that using RED has greatly improved all the performance measures especially with FIFO. The reason is that RED monitors the average queue size and randomly drops packets when congestion is detected. Further work is still required to change the type of traffic to examine these queuing disciplines and to study the impact of different traffic scenarios and the use of traffic shapers at the edges of the network. REFERENCES: 1. Hesham N. Elmahdy and Mohamed H. N. Taha, “The Impact of Packet Size and Packet Dropping Probability on Bit Loss of VoIP Networks” in ICGST-CNIR Journal, Volume 8, Issue 2, pp. 25-29, January 2009. 2. Jianyong Chen, Cunying Hu, and Zhen Ji, “Self-Tuning Random Early Detection Algorithm to Improve Performance of Network Transmission” in Mathematical Problems in Engineering journal Volume 2011, Article ID 872347, 17 pages , doi:10.1155/2011/872347. 3. Shensheng Tang and Wei Li , “QoS Provisioning and Queue Management in Mobile Ad hoc Networks” in Wireless Communications and Networking Conference, pp.400-405, April 2006. Packet Delivery Ratio vs Pause Time 74 76 78 80 82 84 86 88 90 92 94 20 30 40 50 60 Pause Time(sec) Packet Delivery Ratio(%) RED WFQ FIFO
  • 9. International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 1, January 2012 21 4. Shujie Wei, Guangwei Bai , Hang Shen,“An Adaptive Queue Management Mechanism for Video Streaming over Mobile Ad Hoc Networks” in WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, October 2009. 5. Babak Abbasov, “AHRED: A Robust AQM algorithm for wireless Adhoc Networks” in International Conference on Application of Information and Communication Technologies, PP.1-4, October 2009. 6. Peter Marbach, “Distributed Scheduling and Active Queue Management in Wireless Networks” in INFOCOM 2007 :2321-2325. 7. P. G. Kulkarni, S. I. McClean, G. P. Parr, M. M. Black, “Proactive Predictive Queue Management for improved QoS in IP Networks” in Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, April 2006. 8. Jamal N. AI-Karaki, Ahmed E. Kamal, “Supporting Quality of Service In Mobile Ad hoc Networks” in ACS/IEEE 2005 International Conference on Computer Systems and Applications (AICCSA'05). 9. Liu Ping, Yuan Peiyan, “An Approach to Calculate Queue Delay in Mobile AdHoc Networks” in International Conference of Information Science and Management Engineering, August 2010. 10. Wenyu Cai, Xinyu Jin, Yu Zhang, Kangsheng Chen and Rui Wang, “ACO Based QoS Routing Algorithm for Wireless Sensor Networks” in Ubiquitous Intelligence and Computing, LNCS 2006. 11. S.Radha Rammohan and K.Rengarajan, “Study of Possible Packets Travelling Algorithm for Effective Mobile Ad hoc Networks” in International Journal of Soft Computing, Volume.4, pp. 162-167, 2009. 12. S.Rajeswari ,Dr.Y.Venkataramani , “An Adaptive Energy Efficient and Reliable Gossip Routing Protocol For Mobile Adhoc Networks” IJCTE, Volume-2, No.5, Oct 2010.