The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
UCLA CS219 Course Project Report (Prof. George Varghese)
StateKeeper: Generalizing Reachability
Today there are many tools that are built using formal methods to
verify networks. The majority of these tools check network specifi-
cations and configurations to identify only a limited class of failures
such as Reachability, Forwarding Loops and Slicing. They don’t take
into account the rate-limiting rules that affect the throughput of the
system and also link delays. Both of these quantities are responsible
for the Quality of Service (QoS). We believe that without a decent
throughput and affordable delay, a network is pretty much in a
dead state even if it passes the tests for reachability, forwarding
detection, and other such failure classes. We developed StateKeeper,
a tool based on ideas from Atomic Predicates Verifier. StateKeeper
keeps track of both network performance and network reachability.
In our experiments, we factor in link delay and throughput as our
performance metrics. StateKeeper will allow network operators
to verify Quality of Service at each port along a route by showing
information about the state of each step.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ijwmn
The most important standard in wireless local area networks is IEEE 802.11. This is why much of the
research work for the enhancement of wireless network is usually based on the behavior of IEEE 802.11
protocol. However, some of the ways in which IEEE 802.11 medium access control layer behaves is still
unreliable to guarantee quality of service. For instance, medium access control layer packet delay, jitter
and packet loss rate still remain a challenge. The main objective of this research is to propose an
accurate estimation of the medium access control layer packet delay distribution for IEEE 802.11. This
estimation considers the differences between busy probability and collision probability. These differences
are employed to achieve a more accurate estimation. Finally, the proposed model and simulation are
implemented and validated - using MATLAB program for the purpose of simulation, and Maple program
to undertake the calculation of the equations.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
The document proposes a new routing protocol called Sector Tree-Based Clustering for Energy Efficient Routing Protocol (STB-EE) for wireless sensor networks. STB-EE partitions the sensor field into dynamic sectors to balance the number of nodes per cluster. Within each sector, STB-EE constructs a minimum spanning tree to connect nodes and reduce long-distance communication. STB-EE selects cluster heads based on remaining energy and distance to the base station. Simulation results show STB-EE can improve network lifespan by about 15-16% compared to other protocols.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
UCLA CS219 Course Project Report (Prof. George Varghese)
StateKeeper: Generalizing Reachability
Today there are many tools that are built using formal methods to
verify networks. The majority of these tools check network specifi-
cations and configurations to identify only a limited class of failures
such as Reachability, Forwarding Loops and Slicing. They don’t take
into account the rate-limiting rules that affect the throughput of the
system and also link delays. Both of these quantities are responsible
for the Quality of Service (QoS). We believe that without a decent
throughput and affordable delay, a network is pretty much in a
dead state even if it passes the tests for reachability, forwarding
detection, and other such failure classes. We developed StateKeeper,
a tool based on ideas from Atomic Predicates Verifier. StateKeeper
keeps track of both network performance and network reachability.
In our experiments, we factor in link delay and throughput as our
performance metrics. StateKeeper will allow network operators
to verify Quality of Service at each port along a route by showing
information about the state of each step.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
ESTIMATION OF MEDIUM ACCESS CONTROL LAYER PACKET DELAY DISTRIBUTION FOR IEEE ...ijwmn
The most important standard in wireless local area networks is IEEE 802.11. This is why much of the
research work for the enhancement of wireless network is usually based on the behavior of IEEE 802.11
protocol. However, some of the ways in which IEEE 802.11 medium access control layer behaves is still
unreliable to guarantee quality of service. For instance, medium access control layer packet delay, jitter
and packet loss rate still remain a challenge. The main objective of this research is to propose an
accurate estimation of the medium access control layer packet delay distribution for IEEE 802.11. This
estimation considers the differences between busy probability and collision probability. These differences
are employed to achieve a more accurate estimation. Finally, the proposed model and simulation are
implemented and validated - using MATLAB program for the purpose of simulation, and Maple program
to undertake the calculation of the equations.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
The document proposes a new routing protocol called Sector Tree-Based Clustering for Energy Efficient Routing Protocol (STB-EE) for wireless sensor networks. STB-EE partitions the sensor field into dynamic sectors to balance the number of nodes per cluster. Within each sector, STB-EE constructs a minimum spanning tree to connect nodes and reduce long-distance communication. STB-EE selects cluster heads based on remaining energy and distance to the base station. Simulation results show STB-EE can improve network lifespan by about 15-16% compared to other protocols.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
This document summarizes a research paper that analyzes the transmission time of IPTV multicast service in SDN/OpenFlow environments. It proposes using Dijkstra's and Prim's algorithms in an OpenFlow controller to calculate efficient routing for IPTV multicast traffic. The paper describes implementing the algorithms in a POX controller and emulating the network in Mininet. It then compares the transmission times between an IPTV server and clients when using each algorithm for routing. The results show that Dijkstra's algorithm generally provides shorter transmission times than Prim's algorithm due to calculating routes with fewer hops. However, Prim's algorithm has faster route calculation times on average.
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
This document summarizes a research paper that proposes using unsupervised machine learning clustering techniques rather than thresholds to detect heavy hitter (HH) flows in a network. It describes collecting network flow data and analyzing it using algorithms like K-means and Gaussian mixtures to group flows. This identified multiple clusters rather than just two groups (elephants and mice). Further clustering an ambiguous zone revealed patterns that could better classify HH flows without relying on thresholds. The clustering results were then passed to an SDN controller to mark flows and take appropriate actions like re-routing.
OpenFlow is one of the most commonly used protocols for communication between the
controller and the forwarding element in a software defined network (SDN). A model based on
M/M/1 queues is proposed in [1] to capture the communication between the forwarding element
and the controller. Albeit the model provides useful insight, it is accurate only for the case when
the probability of expecting a new flow is small.
Secondly, it is not straight forward to extend the model in [1] to more than one forwarding
element in the data plane. In this work we propose a model which addresses both these
challenges. The model is based on Jackson assumption but with corrections tailored to the
OpenFlow based SDN network. Performance analysis using the proposed model indicates that
the model is accurate even for the case when the probability of new flow is quite large. Further
we show by a toy example that the model can be extended to more than one node in the data plane.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
This paper presents a very new version of LEACH protocol, called as modified LEACH (MOD_LEACH), which focuses more on reducing the energy consumption within the Wireless Sensor Network. We evaluate both LEACH and LEACH-C through extensive simulation using NS-2.35 and the results shows that MOD_LEACH performs better and more energy efficiency than LEACH protocol
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch routers (LSRs) uses Label Distribution Protocol (LDP) or RSVP (Resource reservation Protocol) for label allocation and Label table for packet forwarding . Dynamic protocol is implemented which carries a Updates packets for the details of Label Switch Paths, along with this feedback mechanism is also introduced which find the shortest path among MPLS network and also feedback is provided which also help to overcome congestion, this feedback mechanism is on a
hop by hop basis rather than end to end thus providing a more reliable and much faster and congestion
free path for the packets .
This document provides a survey of different void handling techniques that are suitable for vehicular ad hoc networks (VANETs). It begins with an introduction to geographic routing and the void problem in networks. Then it describes six categories of void handling techniques: planar graph based, face routing based, restricted direction based, hierarchical based, trajectory based, and cluster based. For each category, it briefly explains one or two representative techniques. Finally, it provides a comparative survey of the techniques based on important performance features.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Areej Qasrawi
This document proposes methods for extracting traffic features and using DBSCAN clustering to detect abnormal network behaviors. It extracts four traffic features related to IP addresses, ports, packet types and sizes to capture characteristics. DBSCAN clustering is applied to the feature vectors, classifying traffic into core clusters and isolated points. The isolated points likely represent abnormal behaviors and are analyzed for detection. Experimental results on test network traffic demonstrate the methods can effectively identify abnormal clusters, like those generated by a DDoS attack. The performance is better than alternative K-means clustering which cannot distinguish abnormal behavior clusters as clearly.
The document evaluates a tightly coupled router architecture for network-on-chip (NoC) using different routing mechanisms. It proposes a hybrid router design that uses virtual cut-through (VCT), wormhole (WH), and XY routing algorithms together with dynamic priority round robin scheduling. The experimental results show that this approach can reduce latency by 75% and energy consumption by 31.5% under heavy traffic loads compared to traditional designs. It also improves latency by 20% and energy savings of 25% across different buffer depths.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
Effective Router Assisted Congestion Control for SDN IJECEIAES
This document proposes a new congestion control method called PACEC (Path Associativity Centralized Congestion Control) that works within the Software Defined Networking (SDN) framework. PACEC aims to overcome weaknesses of traditional Router Assisted Congestion Control (RACC) methods by utilizing global network information available in SDN. It calculates an aggregate rate for the entire data path rather than individual links. The controller collects switch utilization data and uses it to determine the path rate (Rp), updating it each control period. Simulation results show PACEC achieves better efficiency and fairness than TCP and RCP.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
This document proposes a speculative transmission scheme to reduce latency in input-queued centrally-scheduled cell switches for high-performance computing. The scheme allows cells to proceed without waiting for a grant under certain conditions, significantly reducing average control-path latency. Using this model, performance measures like mean delay and successful speculative transmission rate are derived. Results show latency can be almost entirely eliminated between request and response for loads up to 50%. Simulations confirm the analytical results.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
This document summarizes a research paper that analyzes the transmission time of IPTV multicast service in SDN/OpenFlow environments. It proposes using Dijkstra's and Prim's algorithms in an OpenFlow controller to calculate efficient routing for IPTV multicast traffic. The paper describes implementing the algorithms in a POX controller and emulating the network in Mininet. It then compares the transmission times between an IPTV server and clients when using each algorithm for routing. The results show that Dijkstra's algorithm generally provides shorter transmission times than Prim's algorithm due to calculating routes with fewer hops. However, Prim's algorithm has faster route calculation times on average.
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Clustering-based Analysis for Heavy-Hitter Flow DetectionAPNIC
This document summarizes a research paper that proposes using unsupervised machine learning clustering techniques rather than thresholds to detect heavy hitter (HH) flows in a network. It describes collecting network flow data and analyzing it using algorithms like K-means and Gaussian mixtures to group flows. This identified multiple clusters rather than just two groups (elephants and mice). Further clustering an ambiguous zone revealed patterns that could better classify HH flows without relying on thresholds. The clustering results were then passed to an SDN controller to mark flows and take appropriate actions like re-routing.
OpenFlow is one of the most commonly used protocols for communication between the
controller and the forwarding element in a software defined network (SDN). A model based on
M/M/1 queues is proposed in [1] to capture the communication between the forwarding element
and the controller. Albeit the model provides useful insight, it is accurate only for the case when
the probability of expecting a new flow is small.
Secondly, it is not straight forward to extend the model in [1] to more than one forwarding
element in the data plane. In this work we propose a model which addresses both these
challenges. The model is based on Jackson assumption but with corrections tailored to the
OpenFlow based SDN network. Performance analysis using the proposed model indicates that
the model is accurate even for the case when the probability of new flow is quite large. Further
we show by a toy example that the model can be extended to more than one node in the data plane.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
This paper presents a very new version of LEACH protocol, called as modified LEACH (MOD_LEACH), which focuses more on reducing the energy consumption within the Wireless Sensor Network. We evaluate both LEACH and LEACH-C through extensive simulation using NS-2.35 and the results shows that MOD_LEACH performs better and more energy efficiency than LEACH protocol
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
1) Computer networks allow computers to communicate and share resources by connecting them through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between computers on a network, both sides must agree on protocols which are sets of rules that govern data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination by choosing appropriate paths through routers. It provides connectionless and connection-oriented services to the transport layer above it.
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch routers (LSRs) uses Label Distribution Protocol (LDP) or RSVP (Resource reservation Protocol) for label allocation and Label table for packet forwarding . Dynamic protocol is implemented which carries a Updates packets for the details of Label Switch Paths, along with this feedback mechanism is also introduced which find the shortest path among MPLS network and also feedback is provided which also help to overcome congestion, this feedback mechanism is on a
hop by hop basis rather than end to end thus providing a more reliable and much faster and congestion
free path for the packets .
This document provides a survey of different void handling techniques that are suitable for vehicular ad hoc networks (VANETs). It begins with an introduction to geographic routing and the void problem in networks. Then it describes six categories of void handling techniques: planar graph based, face routing based, restricted direction based, hierarchical based, trajectory based, and cluster based. For each category, it briefly explains one or two representative techniques. Finally, it provides a comparative survey of the techniques based on important performance features.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Areej Qasrawi
This document proposes methods for extracting traffic features and using DBSCAN clustering to detect abnormal network behaviors. It extracts four traffic features related to IP addresses, ports, packet types and sizes to capture characteristics. DBSCAN clustering is applied to the feature vectors, classifying traffic into core clusters and isolated points. The isolated points likely represent abnormal behaviors and are analyzed for detection. Experimental results on test network traffic demonstrate the methods can effectively identify abnormal clusters, like those generated by a DDoS attack. The performance is better than alternative K-means clustering which cannot distinguish abnormal behavior clusters as clearly.
The document evaluates a tightly coupled router architecture for network-on-chip (NoC) using different routing mechanisms. It proposes a hybrid router design that uses virtual cut-through (VCT), wormhole (WH), and XY routing algorithms together with dynamic priority round robin scheduling. The experimental results show that this approach can reduce latency by 75% and energy consumption by 31.5% under heavy traffic loads compared to traditional designs. It also improves latency by 20% and energy savings of 25% across different buffer depths.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
Effective Router Assisted Congestion Control for SDN IJECEIAES
This document proposes a new congestion control method called PACEC (Path Associativity Centralized Congestion Control) that works within the Software Defined Networking (SDN) framework. PACEC aims to overcome weaknesses of traditional Router Assisted Congestion Control (RACC) methods by utilizing global network information available in SDN. It calculates an aggregate rate for the entire data path rather than individual links. The controller collects switch utilization data and uses it to determine the path rate (Rp), updating it each control period. Simulation results show PACEC achieves better efficiency and fairness than TCP and RCP.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
This document proposes a speculative transmission scheme to reduce latency in input-queued centrally-scheduled cell switches for high-performance computing. The scheme allows cells to proceed without waiting for a grant under certain conditions, significantly reducing average control-path latency. Using this model, performance measures like mean delay and successful speculative transmission rate are derived. Results show latency can be almost entirely eliminated between request and response for loads up to 50%. Simulations confirm the analytical results.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGAIJERA Editor
This document proposes a new reliable dynamic network-on-chip (NoC) based on a modified XY routing algorithm and error detection mechanism. The proposed NoC uses a mesh structure of routers that can detect routing errors to enable adaptive routing. It includes packet error detection and correction. The error detection mechanism allows the NoC to accurately localize error sources to maintain throughput and network load. The modified XY routing algorithm is combined with a scheduler to route packets and avoid collisions in the proposed packet switched NoC implemented on an FPGA. Simulation results show that the proposed method efficiently transfers data between nodes with lower latency and higher throughput compared to contention-based networks.
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
This document presents a novel approach for scheduling real-time tasks in a heterogeneous multicore processor using fuzzy logic techniques for micro-grid power management. It proposes using two fuzzy logic-based scheduling algorithms: 1) Assign priority to tasks based on their execution time and deadline. 2) Assign higher priority tasks to the high-performance core for execution and lower priority tasks to the low-performance cores. The goal is to increase throughput, improve CPU utilization, and reduce overall power consumption for micro-grid systems. The algorithms were evaluated using test cases with different task parameters in MATLAB, which showed improvements in performance and power reduction.
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
This document summarizes a research study that used the ns-3 network simulator to analyze the performance of two routing protocols - Optimized Link State Routing (OLSR) and Adhoc On-demand Distance Vector (AODV) - in a wireless ad hoc network under different conditions. The study varied parameters like packet size, number of nodes, and hello interval (the frequency at which routing information is broadcast) and measured metrics like throughput, delay, jitter, packet delivery ratio, packet loss, and congestion window. The results showed how the performance of the two protocols was impacted by changes to these parameters. The goal was to better understand congestion control and avoidance in wireless ad hoc networks through simulation.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
This document summarizes a research paper that proposes a distributed flow-based access scheme for slotted-time protocols in ad-hoc wireless networks. The scheme aims to provide proportional fairness between end-to-end flows while constraining buffer overflow probabilities at each node. It formulates the problem as a nonlinear program and presents a distributed dual approach with low computational overhead. Simulation results support that the proposed scheme converges to the unique global optimum and satisfies fairness and quality of service objectives.
Design A Congestion Aware Routing Algorithm for Synchronous Cam Designijtsrd
The effect of process variation (PV) on delay is a major reason to decay the performance in advanced technologies. The performance of front routing algorithms is determined with or without PV for different traffic patterns. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. PV decreases the saturation throughput and increases the average message delay. Adaptive routing algorithm should be manipulated with the PV. A novel PV delay and congestion aware routing (PDCR) algorithm is presented for asynchronous network-on-chip (NOC) design. The routing algorithm performs various adaptive routing algorithms in the average delay and saturation throughput for different traffic patterns. A low-power content-addressable memory (CAM) by a new algorithm is proposed for associativity between the input tag and the corresponding address of the output data. The proposed architecture is depends on a recently developed sparse clustered network by utilizing binary connections that on-average eliminates most of the parallel comparisons performed during a search. P. Mounica | R. Umamaheswari | R. Madhavi | R. Nischala | N. Ramesh Babu"Design A Congestion Aware Routing Algorithm for Synchronous Cam Design" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11547.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11547/design-a-congestion-aware-routing-algorithm-for-synchronous-cam-design/p-mounica
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
This document analyzes the performance of the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks in terms of cache updating. It proposes a distributed cache updating algorithm to proactively disseminate link failure information to nodes with cached routes containing the broken link. Simulation results show that the modified DSR protocol with distributed cache updating has higher packet delivery ratio and throughput, while generating lower normalized routing overhead compared to the standard DSR protocol. The distributed cache updating approach helps remove stale routes from caches faster and improves the performance of the on-demand DSR protocol for highly mobile ad hoc networks.
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed open access journal calling for papers on topics related to electrical and computer engineering, including communications, control systems, integrated circuits, power systems, and signal processing. Authors are invited to submit original papers by August 7, 2021 via the journal's online submission system, with notification of acceptance by September 7 and final manuscripts due by September 15 for publication dates determined by the Editor-in-Chief.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed, open access journal that addresses the impacts and challenges of Electrical and Computer Engineering. The journal documents practical and theoretical results which make a fundamental contribution for the development Electrical and Computer Engineering.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed,
open access journal that address the impacts and challenges of Electrical and Computer
Engineering. The journal documents practical and theoretical results which make a fundamental
contribution for the development Electrical and Computer Engineering.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed,
open access journal that address the impacts and challenges of Electrical and Computer
Engineering. The journal documents practical and theoretical results which make a fundamental
contribution for the development Electrical and Computer Engineering.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed,
open access journal that address the impacts and challenges of Electrical and Computer
Engineering. The journal documents practical and theoretical results which make a fundamental
contribution for the development Electrical and Computer Engineering
This work investigates and evaluates the electric energy interruptions to the residential sector resulting from severe power outages. The study results show that this sector will suffer tangible and intangible losses should these outages occur during specific times, seasons, and for prolonged durations. To reduce these power outages and hence mitigate their adverse consequences, the study proposes practical measures that
can be adopted without compromising the consumers’ needs, satisfaction, and convenience.
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...ecij
The standard grid codes suggested, that the wind generators should stay in connected and reliable active and reactive power should be provided during uncertainties. This paper presents an independent control of Grid Side Converter (GSC) for a doubly fed induction generator (DFIG). A novel GSC controller has
been designed by incorporating a new Enhanced hysteresis comparator (EHC) that utilizes the hysteresis band to produce the suitable switching signal to the GSC to get enhanced controllability during grid unbalance. The EHC produces higher duty-ratio linearity and larger fundamental GSC currents with
lesser harmonics. Thus achieve fast transient response for GSC. All these features are confirmed through
time domain simulation on a 15 KW DFIG Wind Energy Conversion System (WECS).
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed,
open access journal that address the impacts and challenges of Electrical and Computer
Engineering. The journal documents practical and theoretical results which make a fundamental
contribution for the development Electrical and Computer Engineering.
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELecij
Nano TiO2, one of the most effective photocatalysts, has extensive usein fields such as air purification,
sweage treatment, water spitting, reduction of CO2, and solar cells. Nowadays, the most promising method to
recycle nano TiO2during the photocatalysis is to immobilize TiO2onto matrix, such as polyvinyl alcohol
(PVA). However, due to the slow water permeability of PVA after cross-linking, the pollutants could not
contact with nano TiO2photocatalyst in time. To overcome this problem, we dispersed calcium carbonate
particles into a PVA-TiO2 mixture and then filmed the glass. PVA-TiO2-CaCO3 films were obtained by
drying. Through thermal treatment, we obtained the cross-linked PVA-TiO2-CaCO3 films. Finally, the
calcium carbonate in the film was dissolved by hydrochloric acid, and the porous PVA-TiO2 composite
photocatalyst was obtained. The results show the addition of CaCO3 has no obvious effect on PVA
cross-linking and that a large number of cavities have been generated on the surface and inside of porous
PVA-TiO2 hybrid hydrogel film. The size of the holes is about 5-15μm, which is consistent with that of
CaCO3.The photocatalytic rate constant of porous PVA-TiO2 hybrid hydrogel film is 2.49 times higher than
that of nonporous PVA-TiO2 hybrid hydrogel film.
4th International Conference on Electrical Engineering (ELEC 2020)ecij
4th International Conference on Electrical Engineering (ELEC 2020)aims to bring together researchers and practitioners from academia and industry to focus on recent systems and techniques in the broad field of Electrical Engineering. Original research papers, state-of-the-art reviews are invited for publication in all areas of Electrical Engineering.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed, open access journal that addresses practical and theoretical results in electrical and computer engineering. Topics of interest include communications, control systems, integrated circuits, power systems, and signal processing. Authors are invited to submit original papers by July 25, 2020 for peer-review and potential publication in September 2020.
4th International Conference on Bioscience & Engineering (BIEN 2020) ecij
The 4th International Conference on Bioscience & Engineering (BIEN 2020) will be held November 28-29, 2020 in Dubai, UAE. The conference will bring together researchers and practitioners from academia and industry to share knowledge on advances in bioscience and engineering. Authors are invited to submit original research papers and reviews by July 26, 2020 on topics including bioengineering, biochemistry, bioinformatics, biomedicine, and more. Selected papers will be published in conference proceedings and special issues of related journals.
Electrical & Computer Engineering: An International Journal (ECIJ)ecij
Scope & Topics
Electrical & Computer Engineering: An International Journal (ECIJ) is a peer-reviewed, open access journal that addresses the impacts and challenges of Electrical and Computer Engineering. The journal documents practical and theoretical results which make a fundamental contribution for the development Electrical and Computer Engineering.
Electrical & Computer Engineering: An International Journal (ECIJ)
ISSN: 2201-5957
https://wireilla.com/engg/ecij/index.html
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ecijjournal@wireilla.com .
Important Dates
•Submission Deadline: March 28, 2020
Contact US
Here's where you can reach us: ecijjournal@wireilla.com
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...ecij
The document presents a novel control strategy using an Enhanced Hysteresis Controller (EHC) for the Grid Side Converter (GSC) of a DFIG-based wind energy system. The EHC improves upon standard hysteresis control by incorporating the DC link voltage as an input to the integrator, allowing for higher duty ratio linearity, larger fundamental GSC currents with less harmonics. Simulation results on a 15kW DFIG system show the EHC provides fast transient response for the GSC and regulates the DC link voltage with smooth GSC currents and power during grid disturbances like voltage dips. Comparisons to a system without GSC control show significant reductions in oscillations through use of the proposed EHC strategy.
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...ecij
The traditional principle of solving the problem of combining the gravitational and electromagnetic fields is associated with the movement of the transformation of parameters from the electromagnetic to the gravitational field on the basis of Maxwell and Lorentz equations. The proposed non-traditional principle
is associated with the movement of the transformation of parameters from the gravitational to the electromagnetic field, which simplifies the process. Nave principle solving this task by using special physical quantities found by M. Planck in 1900: - Planck’s length, time and mass), the uniqueness of which is that they are obtained on the basis of 3 fundamental physical constants: the velocity c of light in vacuum, the Planck’s constant h and the gravitational constant G, which reduces them to the fundamentals of the Universe. Strict physical regularities were obtained for the based on intercommunication of 3-th
fundamental physical constants c, h and G, that allow to single out wave characteristic νG from G which is identified with the frequency of gravitational field. On this base other wave and substance parameters were strictly defined and their numerical values obtained. It was proved that gravitational field with the given wave parameters can be unified only with electromagnetic field having the same wave parameters that’s why it is possible only on Plank’s level of world creation. The solution of given problems is substantiated by well-known physical laws and conformities and not contradiction to modern knowledge about of material world and the Universe on the whole. It is actual for development of physics and other branches of science and technique.
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT ecij
Nowadays, real-time systems and intelligent systems offer more and more control interface based on voice recognition or human language recognition. Robots and drones will soon be mainly controlled by voice. Other robots will integrate bots to interact with their users, this can be useful both in industry and entertainment. At first, researchers were digging on the side of "ontology reasoning". Given all the technical constraints brought by the treatment of ontologies, an interesting solution has emerged in last years: the construction of a model based on machine learning to connect a human language to a knowledge
base (based for example on RDF). We present in this paper our contribution to build a bot that could be used on real-time systems and drones/robots, using recent machine learning technologies.
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...ecij
As the solar market is blooming and forecasted to continue this trend in the coming years. The efficiency and reliability of PV based system has always been a contention among researchers. Therefore, multilevel inverters are gaining more assiduity as it has multitude of benefits. It offers high power capability along with low output harmonics. The main disadvantage of MLI is its complexity and requirement of large
number of power devices and passive components. This paper presents a topology that achieves 37.5% reduction in number of passive components and power devices for five-level inverter. This topology is basically based on H-bridge with bi-directional auxiliary switch. This paper includes a stand-alone PV system in which designing and simulation of Boost converter connected with multilevel inverter for ac load is presented. Perturb and observe MPPT algorithm has been implemented to extract maximum power. The premier objective is to obtain Voltage with less harmonic distortion economically. Multicarrier Sinusoidal
PWM techniques have been implemented and analysed for modulation scheme. The Proposed system is simulated n MATLAB/Simulink platform.
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...ecij
This paper depicts the significance of Interleaved Boost Converter (IBC) with diode-capacitor multiplierwith PV as the input source. Maximum Power Point Tracking (MPPT) was used to obtain maximum power from the PV system. In this, interleaving topology is used to reduce the input current ripple, output voltage ripple, power loss and to suppress the ripple in battery current in the case of Plugin Hybrid Electric Vehicle (PHEV). Moreover, voltage multiplier cells are added in the IBC configuration to reduce the narrow turn-off periods. Two MPPT techniques are compared in this paper: i) Perturb and Observe (P&O) algorithm ii) Fuzzy Logic . The two algorithms are simulated using MATLAB and the comparison of performance parameters like the ripple is done and the results are verified.
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSecij
Travelling salesman problem (TSP) is a most popular combinatorial routing problem, belongs to the class of NP-hard problems. Many approacheshave been proposed for TSP.Among them, swarm intelligence (SI) algorithms can effectively achieve optimal tours with the minimum lengths and attempt to avoid trapping in local minima points. The transcendence of each SI is depended on the nature of the problem. In our studies, there has been yet no any article, which had compared the performance of SI algorithms for TSP perfectly. In this paper,four common SI algorithms are used to solve TSP, in order to compare the performance of SI algorithms for the TSP problem. These algorithms include genetic algorithm, particle swarm optimization, ant colony optimization, and artificial bee colony. For each SI, the various parameters and operators were tested, and the best values were selected for it. Experiments oversome benchmarks fromTSPLIBshow that
artificial bee colony algorithm is the best one among the fourSI-basedmethods to solverouting problems like TSP.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
DOI : 10.14810/ecij.2015.4104 27
A QOS BASED LOAD BALANCED SWITCH
Vishnu Prasath Badri narayanan, Manigandan S K
Veltech Hightech Dr.RR and Dr.SR Engineering college,India
ABSTRACT
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build
with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in
the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting
the 100% throughput result. There comes at some additional cost and needs costly online scheduling
algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two
stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and
two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve
100% throughput results. Theoretical analysis and simulation results shows that using these algorithms,
achieve all the possible outcome results in the switch.
KEYWORDS: Load balancing, Throughput, Mis-sequencing.
1. INTRODUCTION
The simple architecture with the load balancing scheme perform with interesting two
different stage switch fabric to eliminate the mis sequencing problems and kept packets of the
same flow to the destination path in the order of load balanced two stage switch fabric. The two
stage load balancing switch is more scalable than the any other switch in the network architecture.
Hardly load balanced switch got some problem with that, on sending and receiving the data in
wired or wireless networks[8], the major problem with that is mis sequencing problems has arised
to loss of data packets or mis matched data formats. Somehow in earlier they are tired to clear
those problems with the algorithms named, Full frame first algorithm to get mis sequencing
problems and they put the centralized schedular to achieve the 100% throughput results[4][2] in
their data packets.Oftenly they got the perfect data packets arrival in destination, but the problem
with that methodology is the quality of data is reduced to lower. And manually they they need
costly online scheduling algorithms to rectify the mis matching of data and need more complex
schedular to achieve the 100% throughput result of outcome data.
We introduce in this paper to rectify the mis sequencing problems[1] and avoid the costly
online scheduling algorithms, we use Round robin scheduling algorithms(RRS) to rectify the mis
matching of data packets in the tcp applications and two maximum weight matching algorithms
namely, Longest queue first(LOQ) and Oldest cell first(OCF) to achieve 100% throughput result
for all independent arrival packets.[11]These algorithms are used to eliminate the complex
schedular and needs of online costly scheduling algorithm to schedule the data packets in the
destination node. The another approach of this proposed is to get the high quality of data packets
in destination node which is the data which is send by sender, the receiver also got the same
quality of data[9] without defragmentation and reduction of quality. We observed that in the
algorithms and methodolgy of using those above like, RRS, LOQ and OCF, not only to solve mis
sequencing problems and also get quality of data packets service of the same aaplication[10]. Yet
we are consider more algorithm to get the quality of data packets. Our idea is to just keep packets
2. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
28
of the same flow in order in the source node to destination node without being interrupted in the
load balancing two stage architecture. Early measurement results in load balancing shows that the
number of packets flows can be extremely large or small, rendering per flow queuing
infeasible[12].
The intraflow packet interval from the analysis of traffic traces, the authors of load
balancing switch observed that most of the intraflow packets intravals are more than tens of
microseconds. To make the implementations of the RRS algorithm are dynamically shared among
active node of the neighbour node of the source packets.By investigating the distribution of the
data packets in the round robin method it is partically distribute the data packets the each and
every packets and send the sequential fashion to every node to reach the destination node
properly and without delay of data packets in the load balanced switch. And the high performance
routing algorithm is detected to data packets are in the 100% throughput and achieve the actual
quality of data[10][2] what the sender sends and how the receiver receiver receives.
This paper is organized as follows. In Section II we propose the architecture of load
balancing switch with the round robin algorithm how the data packets are seperated partially and
interchanging the date between the intermediate nodes and solve those mis matching of data
packets.
1.1. SWITCH ARCHITECTURE
In fig1 shows the two stages load balanced switch architecture with the round robin
scheduling algorithm. In this, switch consists of two different stages, one is get the external
output and perform with round robin algorithm and gives internal input to second switch fabric
and that second stage perform with high performance algorithm and gives external outputs to
destination port [3].
The key components of RRS algorithm are the snod (starting node of the round robin)
and the intermediate nodes (n1, n2, n3,… nN) N denotes number of intermediate nodes, and
important and finally the temporary storage of data buffers. And the second stage with LQF and
OCF algorithms to give the external outputs with 100% throughput results decrease the waiting
time.
Fig1: Architecture of load balancing switch
3. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
29
1.2. ROUND ROBIN SCHEDULING ALGORITHM
Round robin scheduling is used to network schedulers in network computing. It is used to
apply to scheduling problems in network architecture. It is similar to first in first out scheduling
algorithm. Load balancing is a method to distribute workload on the multiple computers through
network nodes or links to achieve the optimal utilization or maximize the throughput of data and
minimize the overall response time. Load balancing is used for avoiding too much for overloading
the resources in the traffic between the multiple servers. This algorithm is to minimize the total
waiting time data packets in the temporary buffers to the destination. In this scheduling technique
that utilize the principle of time slices of the data packets and partially it is used to divide the packets
into equal slices and spend the equal time of data retrieval in the expected time interval.
1.2.1. RRS ALGORITHM:
Round_robin_scheduling_load_balancing()
{
Initialize hash_map with no entries;
While
Do
{
Data center packet queue requests;
Data center packet request the beginning of the queue;
If(hash_map has VOQ to the current requesting user && VOQ allocation status==READY)
{
The VOQ is reallocated to user request;
}
Else
{
Allocate a VOQ to user request using Round robin scheduling algorithm;
}
}
}
The round robin scheduling algorithm for increasing the speed consists of following steps:
1. The scheduler maintains a queue of ready processes and a list of blocked and swapped
out data packets.
2. The process control block of newly created packets is added to end of ready queue
3. The process control block of terminating packets is removed from scheduling data’s.
4. When a running data packet finishes its time slices, it is moved to end of queue and to the
temporary data packets.
5. A time slice is an amount of time that each packet spends on the node of the round robin
algorithm.
6. The unfinished packets will be returned to the tail of the starting node and return to the
robin later.
7. When a packet is swapped out it process control block is removed else it performs
another round until that packet is fully finished.
4. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
30
2. ELIMINATING THE MIS-SEQUENCING
In this section, we investigated the intra-flow interval and how it reduces the mis-sequencing
problems. As mentioned in the introduction, the intra flow packets are arriving to the destination
without mis matched of data. With the help of round robin scheduling algorithm we can done it.
The external inputs are stored in the VOQ (virtual output queues) and it sends to the first stage
switch fabric. That switch splits the data into equal and unequal data packets and sends the
internal inputs to the starting node (snod) of the round robin scheduling algorithm. The snod
sends the data to the neighbor node like n1, after send to n2 and vice versa. When the data packet
is send the nearest node to the temporary storage buffers that packets registered the top place
named D1 and next packet is registered in d2 and vice versa. This is clearly described in the fig2
mentioned below.
After completing all the data packets in the RRS algorithm the data packets are partially stored in
sequential fashion in the data buffers. Now all the equal and unequal data packets are arranged in
the proper manner how the original appeared.
Fig2: Round robin scheduling algorithm
5. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
31
3. ACHIEVING 100% THROUGHPUT
In this paper we consider two maximum weight matching algorithms, Longest Queue
first (LQF) and Oldest Cell First (OCF).
The one of the most scheduling policies to obtained 100% throughput in most wireless or
wired networks is Longest Queue First scheduling algorithm. The well known policy and
achieved that finds a maximal scheduling in a sequential manner is called the Longest Queue
First scheduling policy. Its scheduling makes decisions based on queue length information as it
starts with empty schedule, then it adds the link with the largest queue length to the schedule,
then it links the largest queue length to the scheduling remaining links. The LQF scheduling
algorithm is good performance of a variety of network, it is majorly used to optimizing a
throughput results in the data packets. There has been many related recent works that investigated
the performance of this algorithm under different interference models. The LQF considers the
queue occupancy by signing a weight wi,j (n) = Li,j(n). Queues with larger occupancy will be
assigned a larger weight and are thus more likely to be served [11].Thus LQF results in 100%
throughput, However LQF can lead to the permanent starvation of a nonempty queue. To
understand how this happens, consider a 2 x 2 switch with Li,j(0) = 1 for all i,j and λ = 1. In the
first timeslot, an arrival will occur at Q1,1 and so Q1,2 will remain unserved. In fact, because of
the continuous arrivals to Q1,1, Q1,2 will remain unserved indefinitely.
Our second algorithm, OCF, overcomes this problem by considering the waiting times of
cells at the head of each virtual queue. Unlike OCF algorithm does not empty or starve any
queue, each and every unserved cell get older and become old enough to be served. OCF
considers the time of waiting by assigning a weight wi,j(n)=Wi,j(n). Cells that have been waiting
the longest time will be assigned a larger weight and are thus more likely to be server. It is clear
that no queues will be starved of service indefinitely; if a cell is not served. Its time of waiting
will increase, eventually, it will increasing of weight to a value that ensures that it is served. The
stability of OCF algorithm is queue vector whose elements can contains all the queue occupancies
as the state of an input queued switch. We prove the stability of their waiting time and shows the
stability of the waiting time implies the queue occupancy
In the Appendix, we prove and theorem of these two maximal scheduling algorithms is
all uniform and non-uniform .independent arrival processes of data packets to maximize the
100% throughput.
4. COMPARISON RESULTS
Fig3: Comparison Results
0
50
100
150
200
50kbps 70kbps 90kbps 1.2Mbps
Throughput
increasing
existing result
6. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
32
In fig3 the comparison results for achieving the 100% throughput results in the data packets and
increasing the quality of the data has shown between the existing systems with Round robin
scheduling algorithm. Theoretical analysis and the simulation results shows that the reduction of
the mis matching of data packets and to achieving the 100% throughput results.
5. SIMULATION RESULTS
Fig4: Reduction of mismatching packets
The above fig4 shows the simulation results in the mis matching of data packets in the tcp
applications. In 2007 the mis sequencing problem is occur very widely. Later some of the authors
are tired to reduce the problem. With the help of QoS based load balanced switch it reduces the
minimum of 10% of data packets mis matching. It is an important that this is theoretical and
simulation results that maximize weight matching algorithms that we purpose in this paper.
Furthermore in future it should be noted that aim of this paper is to finding the better algorithm
that achieve 100% throughput for effort best in traffic.
6. CONCLUSION
Over the last few years, there have many results show the condition under two stage load
balancing to eliminate the mis sequencing of data packets hinders the tcp applications and achieve
the 100% throughput results of data packets. The two stage load balancing switch was introduced
by Chang achieves a 100% throughput results as well as bound delay between it and an output
queued load balanced switch.
In this simplest form of the two stage load balanced switch that occurs mis sequencing packets,
hence motivating the work presented in this paper. The Round robin scheduling algorithm
prevents the missequencing problem in the switch with the help of temporary storage of data
buffers and using the two maximum weight matching algorithms LQF and OCF to achieve the
100% throughput results for all independent arrival packets. The effect of packet segmentation
requires further research and will be part of our future endeavor
7. REFERENCES
[1] Hong Cheng, Yaohui Jin, Yu Gao, YingDi Yu, Weisheng HU, “Per-flow Re-Sequencing In Load
Balanced Switches By Using Dynamic Mailbox Sharing”, communications, 2008. ICC ’08.IEEE
international conference on May 2008.
[2] IssacKeslassy and N.McKeown, “Maintaining packet order in two stage switches”, in Proc, IEEE
INFOCOM, New York, NY, USA, Jun. 2002, vol.2.pp.1032-1041.
[3] C.-S Chang, D.-S. Lee, and Y.-S. Jou, “Load balanced Birkhoff-von Neumann switches, part I: One
stage buffering”, Comput. Commun., vol. 25, pp. 611-622, 2002.
0%
20%
40%
60%
80%
2007 2009 2013 2015
Reduction of
mismatching
Packets
7. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
33
[4] I. Keslassy, S.-T. Chuang, K. Yu, D. Miller, M. Horowitz, and O. S.NickMcKeown, “Scaling
Internet routers using optics,” in Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, Aug. 2003, pp.
189–200
[5] B. Hu and K. Yeung, “Feedbackbased scheduling for load-balancedtwo-stage switches,” IEEE/ACM
Trans. Netw., vol. 18, no. 4, pp.1077–1090, Aug. 2010.
[6] Nick McKeown,AdisakMekkittikul,VenkatAnantharam,and Jean Walrand, “Achieving 100%
Throughput in an input-queued switch”, IEEE transactions on communications, vol. 47, no. 8,
August 1999.
[7] Yan Cai, Xiaolin Wang, Weibo Gong, Don Towsley, “ A Study on the performance of a three stage
load balancing switches”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1,
FEBRUARY 2014
[8] Pai-Hsiang Hsiao, Adon Hwang, H.T. Kung, and Dario Vlah,” Load-Balancing Routing for Wireless
Access Networks”, Proc. IEEE Infocom 2001, pp. 986-995.
[9] T.Anderson, S.Owicki, J.Saxes and C.Thacker, “High speed switch scheduling for local area
networks”, ACM Transaction on Computer systems, Vol.11, pp.319-352, 1993
[10] J.G. Dai and B. Prabhakar, “The throughput of dataswitches with and without speedup,” Proc. of the
IEEEINFOCOM, Vol. 2, pp. 556-564, Tel Aviv, Israel, March2000.
[11] Nick McKeown, VenkatAnantharam,AdisakMekkittikul,Jean Walrand, “Achieving 100%
Throughputin an Input-Queued Switch”, IEEE Transactions On Communications, Vol. 47, NO. 8,
AUGUST 1999.
[12] C.S. Chang, D.S. Lee, and C.Y. Yue, “Providing guaranteed rate services in the load balanced
Birkhoff-von Neumann switches,” Proceedings of IEEE INFOCOM, 2003
8. APPENDIX
THE LQF ALGORITHM
Theorem: The LQF maximum weight matching algorithm is stable for all admissible arrival
processes[11].
Proof: In summary, we show that for an M x N switch scheduled using this algorithm, there is a -ve
expected one-step drift in the sum of the squares. In mathematically we say
E[ LT
(n + 1)L(n + 1) - LT
(n)L(n)|L(n) ] ≤ -ԑ ||L(n)|| + k
Where k > 0, ԑ > 0.
THE OCF ALGORITHM
Theorem: The OCF maximum weight matching algorithm is stable for all admissible arrival
processes[11].
Proof: The proof consists of two steps. First, we done the stability of the waiting time. Then, we prove
that the stability of the waiting time implies the stability of queue occupy, which proves above.
Likely to the LQF proof, we give that for an M x N switch scheduled using the OCF algorithm.
E[WT
(n+1)TW(n+1)-WT
(n)TW(n)|W(n)]≤- ԑ||W(n)||+K
Where K > 0, ԑ> 0 and T is a positive definite matrix.