SlideShare a Scribd company logo
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
DOI : 10.14810/ecij.2015.4104 27
A QOS BASED LOAD BALANCED SWITCH
Vishnu Prasath Badri narayanan, Manigandan S K
Veltech Hightech Dr.RR and Dr.SR Engineering college,India
ABSTRACT
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build
with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in
the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting
the 100% throughput result. There comes at some additional cost and needs costly online scheduling
algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two
stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and
two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve
100% throughput results. Theoretical analysis and simulation results shows that using these algorithms,
achieve all the possible outcome results in the switch.
KEYWORDS: Load balancing, Throughput, Mis-sequencing.
1. INTRODUCTION
The simple architecture with the load balancing scheme perform with interesting two
different stage switch fabric to eliminate the mis sequencing problems and kept packets of the
same flow to the destination path in the order of load balanced two stage switch fabric. The two
stage load balancing switch is more scalable than the any other switch in the network architecture.
Hardly load balanced switch got some problem with that, on sending and receiving the data in
wired or wireless networks[8], the major problem with that is mis sequencing problems has arised
to loss of data packets or mis matched data formats. Somehow in earlier they are tired to clear
those problems with the algorithms named, Full frame first algorithm to get mis sequencing
problems and they put the centralized schedular to achieve the 100% throughput results[4][2] in
their data packets.Oftenly they got the perfect data packets arrival in destination, but the problem
with that methodology is the quality of data is reduced to lower. And manually they they need
costly online scheduling algorithms to rectify the mis matching of data and need more complex
schedular to achieve the 100% throughput result of outcome data.
We introduce in this paper to rectify the mis sequencing problems[1] and avoid the costly
online scheduling algorithms, we use Round robin scheduling algorithms(RRS) to rectify the mis
matching of data packets in the tcp applications and two maximum weight matching algorithms
namely, Longest queue first(LOQ) and Oldest cell first(OCF) to achieve 100% throughput result
for all independent arrival packets.[11]These algorithms are used to eliminate the complex
schedular and needs of online costly scheduling algorithm to schedule the data packets in the
destination node. The another approach of this proposed is to get the high quality of data packets
in destination node which is the data which is send by sender, the receiver also got the same
quality of data[9] without defragmentation and reduction of quality. We observed that in the
algorithms and methodolgy of using those above like, RRS, LOQ and OCF, not only to solve mis
sequencing problems and also get quality of data packets service of the same aaplication[10]. Yet
we are consider more algorithm to get the quality of data packets. Our idea is to just keep packets
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
28
of the same flow in order in the source node to destination node without being interrupted in the
load balancing two stage architecture. Early measurement results in load balancing shows that the
number of packets flows can be extremely large or small, rendering per flow queuing
infeasible[12].
The intraflow packet interval from the analysis of traffic traces, the authors of load
balancing switch observed that most of the intraflow packets intravals are more than tens of
microseconds. To make the implementations of the RRS algorithm are dynamically shared among
active node of the neighbour node of the source packets.By investigating the distribution of the
data packets in the round robin method it is partically distribute the data packets the each and
every packets and send the sequential fashion to every node to reach the destination node
properly and without delay of data packets in the load balanced switch. And the high performance
routing algorithm is detected to data packets are in the 100% throughput and achieve the actual
quality of data[10][2] what the sender sends and how the receiver receiver receives.
This paper is organized as follows. In Section II we propose the architecture of load
balancing switch with the round robin algorithm how the data packets are seperated partially and
interchanging the date between the intermediate nodes and solve those mis matching of data
packets.
1.1. SWITCH ARCHITECTURE
In fig1 shows the two stages load balanced switch architecture with the round robin
scheduling algorithm. In this, switch consists of two different stages, one is get the external
output and perform with round robin algorithm and gives internal input to second switch fabric
and that second stage perform with high performance algorithm and gives external outputs to
destination port [3].
The key components of RRS algorithm are the snod (starting node of the round robin)
and the intermediate nodes (n1, n2, n3,… nN) N denotes number of intermediate nodes, and
important and finally the temporary storage of data buffers. And the second stage with LQF and
OCF algorithms to give the external outputs with 100% throughput results decrease the waiting
time.
Fig1: Architecture of load balancing switch
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
29
1.2. ROUND ROBIN SCHEDULING ALGORITHM
Round robin scheduling is used to network schedulers in network computing. It is used to
apply to scheduling problems in network architecture. It is similar to first in first out scheduling
algorithm. Load balancing is a method to distribute workload on the multiple computers through
network nodes or links to achieve the optimal utilization or maximize the throughput of data and
minimize the overall response time. Load balancing is used for avoiding too much for overloading
the resources in the traffic between the multiple servers. This algorithm is to minimize the total
waiting time data packets in the temporary buffers to the destination. In this scheduling technique
that utilize the principle of time slices of the data packets and partially it is used to divide the packets
into equal slices and spend the equal time of data retrieval in the expected time interval.
1.2.1. RRS ALGORITHM:
Round_robin_scheduling_load_balancing()
{
Initialize hash_map with no entries;
While
Do
{
Data center packet queue requests;
Data center packet request the beginning of the queue;
If(hash_map has VOQ to the current requesting user && VOQ allocation status==READY)
{
The VOQ is reallocated to user request;
}
Else
{
Allocate a VOQ to user request using Round robin scheduling algorithm;
}
}
}
The round robin scheduling algorithm for increasing the speed consists of following steps:
1. The scheduler maintains a queue of ready processes and a list of blocked and swapped
out data packets.
2. The process control block of newly created packets is added to end of ready queue
3. The process control block of terminating packets is removed from scheduling data’s.
4. When a running data packet finishes its time slices, it is moved to end of queue and to the
temporary data packets.
5. A time slice is an amount of time that each packet spends on the node of the round robin
algorithm.
6. The unfinished packets will be returned to the tail of the starting node and return to the
robin later.
7. When a packet is swapped out it process control block is removed else it performs
another round until that packet is fully finished.
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
30
2. ELIMINATING THE MIS-SEQUENCING
In this section, we investigated the intra-flow interval and how it reduces the mis-sequencing
problems. As mentioned in the introduction, the intra flow packets are arriving to the destination
without mis matched of data. With the help of round robin scheduling algorithm we can done it.
The external inputs are stored in the VOQ (virtual output queues) and it sends to the first stage
switch fabric. That switch splits the data into equal and unequal data packets and sends the
internal inputs to the starting node (snod) of the round robin scheduling algorithm. The snod
sends the data to the neighbor node like n1, after send to n2 and vice versa. When the data packet
is send the nearest node to the temporary storage buffers that packets registered the top place
named D1 and next packet is registered in d2 and vice versa. This is clearly described in the fig2
mentioned below.
After completing all the data packets in the RRS algorithm the data packets are partially stored in
sequential fashion in the data buffers. Now all the equal and unequal data packets are arranged in
the proper manner how the original appeared.
Fig2: Round robin scheduling algorithm
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
31
3. ACHIEVING 100% THROUGHPUT
In this paper we consider two maximum weight matching algorithms, Longest Queue
first (LQF) and Oldest Cell First (OCF).
The one of the most scheduling policies to obtained 100% throughput in most wireless or
wired networks is Longest Queue First scheduling algorithm. The well known policy and
achieved that finds a maximal scheduling in a sequential manner is called the Longest Queue
First scheduling policy. Its scheduling makes decisions based on queue length information as it
starts with empty schedule, then it adds the link with the largest queue length to the schedule,
then it links the largest queue length to the scheduling remaining links. The LQF scheduling
algorithm is good performance of a variety of network, it is majorly used to optimizing a
throughput results in the data packets. There has been many related recent works that investigated
the performance of this algorithm under different interference models. The LQF considers the
queue occupancy by signing a weight wi,j (n) = Li,j(n). Queues with larger occupancy will be
assigned a larger weight and are thus more likely to be served [11].Thus LQF results in 100%
throughput, However LQF can lead to the permanent starvation of a nonempty queue. To
understand how this happens, consider a 2 x 2 switch with Li,j(0) = 1 for all i,j and λ = 1. In the
first timeslot, an arrival will occur at Q1,1 and so Q1,2 will remain unserved. In fact, because of
the continuous arrivals to Q1,1, Q1,2 will remain unserved indefinitely.
Our second algorithm, OCF, overcomes this problem by considering the waiting times of
cells at the head of each virtual queue. Unlike OCF algorithm does not empty or starve any
queue, each and every unserved cell get older and become old enough to be served. OCF
considers the time of waiting by assigning a weight wi,j(n)=Wi,j(n). Cells that have been waiting
the longest time will be assigned a larger weight and are thus more likely to be server. It is clear
that no queues will be starved of service indefinitely; if a cell is not served. Its time of waiting
will increase, eventually, it will increasing of weight to a value that ensures that it is served. The
stability of OCF algorithm is queue vector whose elements can contains all the queue occupancies
as the state of an input queued switch. We prove the stability of their waiting time and shows the
stability of the waiting time implies the queue occupancy
In the Appendix, we prove and theorem of these two maximal scheduling algorithms is
all uniform and non-uniform .independent arrival processes of data packets to maximize the
100% throughput.
4. COMPARISON RESULTS
Fig3: Comparison Results
0
50
100
150
200
50kbps 70kbps 90kbps 1.2Mbps
Throughput
increasing
existing result
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
32
In fig3 the comparison results for achieving the 100% throughput results in the data packets and
increasing the quality of the data has shown between the existing systems with Round robin
scheduling algorithm. Theoretical analysis and the simulation results shows that the reduction of
the mis matching of data packets and to achieving the 100% throughput results.
5. SIMULATION RESULTS
Fig4: Reduction of mismatching packets
The above fig4 shows the simulation results in the mis matching of data packets in the tcp
applications. In 2007 the mis sequencing problem is occur very widely. Later some of the authors
are tired to reduce the problem. With the help of QoS based load balanced switch it reduces the
minimum of 10% of data packets mis matching. It is an important that this is theoretical and
simulation results that maximize weight matching algorithms that we purpose in this paper.
Furthermore in future it should be noted that aim of this paper is to finding the better algorithm
that achieve 100% throughput for effort best in traffic.
6. CONCLUSION
Over the last few years, there have many results show the condition under two stage load
balancing to eliminate the mis sequencing of data packets hinders the tcp applications and achieve
the 100% throughput results of data packets. The two stage load balancing switch was introduced
by Chang achieves a 100% throughput results as well as bound delay between it and an output
queued load balanced switch.
In this simplest form of the two stage load balanced switch that occurs mis sequencing packets,
hence motivating the work presented in this paper. The Round robin scheduling algorithm
prevents the missequencing problem in the switch with the help of temporary storage of data
buffers and using the two maximum weight matching algorithms LQF and OCF to achieve the
100% throughput results for all independent arrival packets. The effect of packet segmentation
requires further research and will be part of our future endeavor
7. REFERENCES
[1] Hong Cheng, Yaohui Jin, Yu Gao, YingDi Yu, Weisheng HU, “Per-flow Re-Sequencing In Load
Balanced Switches By Using Dynamic Mailbox Sharing”, communications, 2008. ICC ’08.IEEE
international conference on May 2008.
[2] IssacKeslassy and N.McKeown, “Maintaining packet order in two stage switches”, in Proc, IEEE
INFOCOM, New York, NY, USA, Jun. 2002, vol.2.pp.1032-1041.
[3] C.-S Chang, D.-S. Lee, and Y.-S. Jou, “Load balanced Birkhoff-von Neumann switches, part I: One
stage buffering”, Comput. Commun., vol. 25, pp. 611-622, 2002.
0%
20%
40%
60%
80%
2007 2009 2013 2015
Reduction of
mismatching
Packets
Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015
33
[4] I. Keslassy, S.-T. Chuang, K. Yu, D. Miller, M. Horowitz, and O. S.NickMcKeown, “Scaling
Internet routers using optics,” in Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, Aug. 2003, pp.
189–200
[5] B. Hu and K. Yeung, “Feedbackbased scheduling for load-balancedtwo-stage switches,” IEEE/ACM
Trans. Netw., vol. 18, no. 4, pp.1077–1090, Aug. 2010.
[6] Nick McKeown,AdisakMekkittikul,VenkatAnantharam,and Jean Walrand, “Achieving 100%
Throughput in an input-queued switch”, IEEE transactions on communications, vol. 47, no. 8,
August 1999.
[7] Yan Cai, Xiaolin Wang, Weibo Gong, Don Towsley, “ A Study on the performance of a three stage
load balancing switches”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1,
FEBRUARY 2014
[8] Pai-Hsiang Hsiao, Adon Hwang, H.T. Kung, and Dario Vlah,” Load-Balancing Routing for Wireless
Access Networks”, Proc. IEEE Infocom 2001, pp. 986-995.
[9] T.Anderson, S.Owicki, J.Saxes and C.Thacker, “High speed switch scheduling for local area
networks”, ACM Transaction on Computer systems, Vol.11, pp.319-352, 1993
[10] J.G. Dai and B. Prabhakar, “The throughput of dataswitches with and without speedup,” Proc. of the
IEEEINFOCOM, Vol. 2, pp. 556-564, Tel Aviv, Israel, March2000.
[11] Nick McKeown, VenkatAnantharam,AdisakMekkittikul,Jean Walrand, “Achieving 100%
Throughputin an Input-Queued Switch”, IEEE Transactions On Communications, Vol. 47, NO. 8,
AUGUST 1999.
[12] C.S. Chang, D.S. Lee, and C.Y. Yue, “Providing guaranteed rate services in the load balanced
Birkhoff-von Neumann switches,” Proceedings of IEEE INFOCOM, 2003
8. APPENDIX
THE LQF ALGORITHM
Theorem: The LQF maximum weight matching algorithm is stable for all admissible arrival
processes[11].
Proof: In summary, we show that for an M x N switch scheduled using this algorithm, there is a -ve
expected one-step drift in the sum of the squares. In mathematically we say
E[ LT
(n + 1)L(n + 1) - LT
(n)L(n)|L(n) ] ≤ -ԑ ||L(n)|| + k
Where k > 0, ԑ > 0.
THE OCF ALGORITHM
Theorem: The OCF maximum weight matching algorithm is stable for all admissible arrival
processes[11].
Proof: The proof consists of two steps. First, we done the stability of the waiting time. Then, we prove
that the stability of the waiting time implies the stability of queue occupy, which proves above.
Likely to the LQF proof, we give that for an M x N switch scheduled using the OCF algorithm.
E[WT
(n+1)TW(n+1)-WT
(n)TW(n)|W(n)]≤- ԑ||W(n)||+K
Where K > 0, ԑ> 0 and T is a positive definite matrix.

More Related Content

What's hot

Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
IUA
 
Ruengsakulrach_ECTI2015
Ruengsakulrach_ECTI2015Ruengsakulrach_ECTI2015
Ruengsakulrach_ECTI2015
Natchaphon Ruengsakulrach
 
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
cscpconf
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
APNIC
 
On the modeling of
On the modeling ofOn the modeling of
On the modeling of
csandit
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
CSCJournals
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
IJERD Editor
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
IJCNCJournal
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Dynamic MPLS with Feedback
Dynamic MPLS with FeedbackDynamic MPLS with Feedback
Dynamic MPLS with Feedback
IJCSEA Journal
 
10
1010
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
IDES Editor
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
Nexgen Technology
 
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Areej Qasrawi
 
A018120105
A018120105A018120105
A018120105
IOSR Journals
 

What's hot (18)

Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
Ruengsakulrach_ECTI2015
Ruengsakulrach_ECTI2015Ruengsakulrach_ECTI2015
Ruengsakulrach_ECTI2015
 
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
On the modeling of
On the modeling ofOn the modeling of
On the modeling of
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Dynamic MPLS with Feedback
Dynamic MPLS with FeedbackDynamic MPLS with Feedback
Dynamic MPLS with Feedback
 
10
1010
10
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
 
A018120105
A018120105A018120105
A018120105
 

Similar to A QOS BASED LOAD BALANCED SWITCH

Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
csandit
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
IJECEIAES
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
Mumbai Academisc
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
IJMER
 
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGADesign and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
IJERA Editor
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
IOSR Journals
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
Alexander Decker
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
International Journal of Power Electronics and Drive Systems
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
ijwmn
 
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam DesignDesign A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
ijtsrd
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
IOSR Journals
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
IJERA Editor
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
IJRAT
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
Zac Darcy
 

Similar to A QOS BASED LOAD BALANCED SWITCH (20)

Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGADesign and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGA
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
A Novel Approach in Scheduling Of the Real- Time Tasks In Heterogeneous Multi...
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam DesignDesign A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
 

More from ecij

NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
ADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGESADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGES
ecij
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELPREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
ecij
 
4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020) 4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020)
ecij
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
ecij
 
Ecij cfp
Ecij cfpEcij cfp
Ecij cfp
ecij
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
ecij
 
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
ecij
 
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
ecij
 
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
ecij
 
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
ecij
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
ecij
 

More from ecij (20)

NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
NEW Current Issue - CALL FOR PAPERS - Electrical and Computer Engineering An ...
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
ADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGESADOPTING MEASURES TO REDUCE POWER OUTAGES
ADOPTING MEASURES TO REDUCE POWER OUTAGES
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGELPREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
PREPARATION OF POROUS AND RECYCLABLE PVA-TIO2HYBRID HYDROGEL
 
4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)4th International Conference on Electrical Engineering (ELEC 2020)
4th International Conference on Electrical Engineering (ELEC 2020)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020) 4th International Conference on Bioscience & Engineering (BIEN 2020)
4th International Conference on Bioscience & Engineering (BIEN 2020)
 
Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)Electrical & Computer Engineering: An International Journal (ECIJ)
Electrical & Computer Engineering: An International Journal (ECIJ)
 
Ecij cfp
Ecij cfpEcij cfp
Ecij cfp
 
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
GRID SIDE CONVERTER CONTROL IN DFIG BASED WIND SYSTEM USING ENHANCED HYSTERES...
 
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
UNION OF GRAVITATIONAL AND ELECTROMAGNETIC FIELDS ON THE BASIS OF NONTRADITIO...
 
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
USING MACHINE LEARNING TO BUILD A SEMI-INTELLIGENT BOT
 
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
MODELING AND SIMULATION OF SOLAR PHOTOVOLTAIC APPLICATION BASED MULTILEVEL IN...
 
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
Investigation of Interleaved Boost Converter with Voltage multiplier for PV w...
 
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMSA COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
A COMPARISON BETWEEN SWARM INTELLIGENCE ALGORITHMS FOR ROUTING PROBLEMS
 

Recently uploaded

Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Recently uploaded (20)

Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

A QOS BASED LOAD BALANCED SWITCH

  • 1. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 DOI : 10.14810/ecij.2015.4104 27 A QOS BASED LOAD BALANCED SWITCH Vishnu Prasath Badri narayanan, Manigandan S K Veltech Hightech Dr.RR and Dr.SR Engineering college,India ABSTRACT The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch. KEYWORDS: Load balancing, Throughput, Mis-sequencing. 1. INTRODUCTION The simple architecture with the load balancing scheme perform with interesting two different stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow to the destination path in the order of load balanced two stage switch fabric. The two stage load balancing switch is more scalable than the any other switch in the network architecture. Hardly load balanced switch got some problem with that, on sending and receiving the data in wired or wireless networks[8], the major problem with that is mis sequencing problems has arised to loss of data packets or mis matched data formats. Somehow in earlier they are tired to clear those problems with the algorithms named, Full frame first algorithm to get mis sequencing problems and they put the centralized schedular to achieve the 100% throughput results[4][2] in their data packets.Oftenly they got the perfect data packets arrival in destination, but the problem with that methodology is the quality of data is reduced to lower. And manually they they need costly online scheduling algorithms to rectify the mis matching of data and need more complex schedular to achieve the 100% throughput result of outcome data. We introduce in this paper to rectify the mis sequencing problems[1] and avoid the costly online scheduling algorithms, we use Round robin scheduling algorithms(RRS) to rectify the mis matching of data packets in the tcp applications and two maximum weight matching algorithms namely, Longest queue first(LOQ) and Oldest cell first(OCF) to achieve 100% throughput result for all independent arrival packets.[11]These algorithms are used to eliminate the complex schedular and needs of online costly scheduling algorithm to schedule the data packets in the destination node. The another approach of this proposed is to get the high quality of data packets in destination node which is the data which is send by sender, the receiver also got the same quality of data[9] without defragmentation and reduction of quality. We observed that in the algorithms and methodolgy of using those above like, RRS, LOQ and OCF, not only to solve mis sequencing problems and also get quality of data packets service of the same aaplication[10]. Yet we are consider more algorithm to get the quality of data packets. Our idea is to just keep packets
  • 2. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 28 of the same flow in order in the source node to destination node without being interrupted in the load balancing two stage architecture. Early measurement results in load balancing shows that the number of packets flows can be extremely large or small, rendering per flow queuing infeasible[12]. The intraflow packet interval from the analysis of traffic traces, the authors of load balancing switch observed that most of the intraflow packets intravals are more than tens of microseconds. To make the implementations of the RRS algorithm are dynamically shared among active node of the neighbour node of the source packets.By investigating the distribution of the data packets in the round robin method it is partically distribute the data packets the each and every packets and send the sequential fashion to every node to reach the destination node properly and without delay of data packets in the load balanced switch. And the high performance routing algorithm is detected to data packets are in the 100% throughput and achieve the actual quality of data[10][2] what the sender sends and how the receiver receiver receives. This paper is organized as follows. In Section II we propose the architecture of load balancing switch with the round robin algorithm how the data packets are seperated partially and interchanging the date between the intermediate nodes and solve those mis matching of data packets. 1.1. SWITCH ARCHITECTURE In fig1 shows the two stages load balanced switch architecture with the round robin scheduling algorithm. In this, switch consists of two different stages, one is get the external output and perform with round robin algorithm and gives internal input to second switch fabric and that second stage perform with high performance algorithm and gives external outputs to destination port [3]. The key components of RRS algorithm are the snod (starting node of the round robin) and the intermediate nodes (n1, n2, n3,… nN) N denotes number of intermediate nodes, and important and finally the temporary storage of data buffers. And the second stage with LQF and OCF algorithms to give the external outputs with 100% throughput results decrease the waiting time. Fig1: Architecture of load balancing switch
  • 3. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 29 1.2. ROUND ROBIN SCHEDULING ALGORITHM Round robin scheduling is used to network schedulers in network computing. It is used to apply to scheduling problems in network architecture. It is similar to first in first out scheduling algorithm. Load balancing is a method to distribute workload on the multiple computers through network nodes or links to achieve the optimal utilization or maximize the throughput of data and minimize the overall response time. Load balancing is used for avoiding too much for overloading the resources in the traffic between the multiple servers. This algorithm is to minimize the total waiting time data packets in the temporary buffers to the destination. In this scheduling technique that utilize the principle of time slices of the data packets and partially it is used to divide the packets into equal slices and spend the equal time of data retrieval in the expected time interval. 1.2.1. RRS ALGORITHM: Round_robin_scheduling_load_balancing() { Initialize hash_map with no entries; While Do { Data center packet queue requests; Data center packet request the beginning of the queue; If(hash_map has VOQ to the current requesting user && VOQ allocation status==READY) { The VOQ is reallocated to user request; } Else { Allocate a VOQ to user request using Round robin scheduling algorithm; } } } The round robin scheduling algorithm for increasing the speed consists of following steps: 1. The scheduler maintains a queue of ready processes and a list of blocked and swapped out data packets. 2. The process control block of newly created packets is added to end of ready queue 3. The process control block of terminating packets is removed from scheduling data’s. 4. When a running data packet finishes its time slices, it is moved to end of queue and to the temporary data packets. 5. A time slice is an amount of time that each packet spends on the node of the round robin algorithm. 6. The unfinished packets will be returned to the tail of the starting node and return to the robin later. 7. When a packet is swapped out it process control block is removed else it performs another round until that packet is fully finished.
  • 4. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 30 2. ELIMINATING THE MIS-SEQUENCING In this section, we investigated the intra-flow interval and how it reduces the mis-sequencing problems. As mentioned in the introduction, the intra flow packets are arriving to the destination without mis matched of data. With the help of round robin scheduling algorithm we can done it. The external inputs are stored in the VOQ (virtual output queues) and it sends to the first stage switch fabric. That switch splits the data into equal and unequal data packets and sends the internal inputs to the starting node (snod) of the round robin scheduling algorithm. The snod sends the data to the neighbor node like n1, after send to n2 and vice versa. When the data packet is send the nearest node to the temporary storage buffers that packets registered the top place named D1 and next packet is registered in d2 and vice versa. This is clearly described in the fig2 mentioned below. After completing all the data packets in the RRS algorithm the data packets are partially stored in sequential fashion in the data buffers. Now all the equal and unequal data packets are arranged in the proper manner how the original appeared. Fig2: Round robin scheduling algorithm
  • 5. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 31 3. ACHIEVING 100% THROUGHPUT In this paper we consider two maximum weight matching algorithms, Longest Queue first (LQF) and Oldest Cell First (OCF). The one of the most scheduling policies to obtained 100% throughput in most wireless or wired networks is Longest Queue First scheduling algorithm. The well known policy and achieved that finds a maximal scheduling in a sequential manner is called the Longest Queue First scheduling policy. Its scheduling makes decisions based on queue length information as it starts with empty schedule, then it adds the link with the largest queue length to the schedule, then it links the largest queue length to the scheduling remaining links. The LQF scheduling algorithm is good performance of a variety of network, it is majorly used to optimizing a throughput results in the data packets. There has been many related recent works that investigated the performance of this algorithm under different interference models. The LQF considers the queue occupancy by signing a weight wi,j (n) = Li,j(n). Queues with larger occupancy will be assigned a larger weight and are thus more likely to be served [11].Thus LQF results in 100% throughput, However LQF can lead to the permanent starvation of a nonempty queue. To understand how this happens, consider a 2 x 2 switch with Li,j(0) = 1 for all i,j and λ = 1. In the first timeslot, an arrival will occur at Q1,1 and so Q1,2 will remain unserved. In fact, because of the continuous arrivals to Q1,1, Q1,2 will remain unserved indefinitely. Our second algorithm, OCF, overcomes this problem by considering the waiting times of cells at the head of each virtual queue. Unlike OCF algorithm does not empty or starve any queue, each and every unserved cell get older and become old enough to be served. OCF considers the time of waiting by assigning a weight wi,j(n)=Wi,j(n). Cells that have been waiting the longest time will be assigned a larger weight and are thus more likely to be server. It is clear that no queues will be starved of service indefinitely; if a cell is not served. Its time of waiting will increase, eventually, it will increasing of weight to a value that ensures that it is served. The stability of OCF algorithm is queue vector whose elements can contains all the queue occupancies as the state of an input queued switch. We prove the stability of their waiting time and shows the stability of the waiting time implies the queue occupancy In the Appendix, we prove and theorem of these two maximal scheduling algorithms is all uniform and non-uniform .independent arrival processes of data packets to maximize the 100% throughput. 4. COMPARISON RESULTS Fig3: Comparison Results 0 50 100 150 200 50kbps 70kbps 90kbps 1.2Mbps Throughput increasing existing result
  • 6. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 32 In fig3 the comparison results for achieving the 100% throughput results in the data packets and increasing the quality of the data has shown between the existing systems with Round robin scheduling algorithm. Theoretical analysis and the simulation results shows that the reduction of the mis matching of data packets and to achieving the 100% throughput results. 5. SIMULATION RESULTS Fig4: Reduction of mismatching packets The above fig4 shows the simulation results in the mis matching of data packets in the tcp applications. In 2007 the mis sequencing problem is occur very widely. Later some of the authors are tired to reduce the problem. With the help of QoS based load balanced switch it reduces the minimum of 10% of data packets mis matching. It is an important that this is theoretical and simulation results that maximize weight matching algorithms that we purpose in this paper. Furthermore in future it should be noted that aim of this paper is to finding the better algorithm that achieve 100% throughput for effort best in traffic. 6. CONCLUSION Over the last few years, there have many results show the condition under two stage load balancing to eliminate the mis sequencing of data packets hinders the tcp applications and achieve the 100% throughput results of data packets. The two stage load balancing switch was introduced by Chang achieves a 100% throughput results as well as bound delay between it and an output queued load balanced switch. In this simplest form of the two stage load balanced switch that occurs mis sequencing packets, hence motivating the work presented in this paper. The Round robin scheduling algorithm prevents the missequencing problem in the switch with the help of temporary storage of data buffers and using the two maximum weight matching algorithms LQF and OCF to achieve the 100% throughput results for all independent arrival packets. The effect of packet segmentation requires further research and will be part of our future endeavor 7. REFERENCES [1] Hong Cheng, Yaohui Jin, Yu Gao, YingDi Yu, Weisheng HU, “Per-flow Re-Sequencing In Load Balanced Switches By Using Dynamic Mailbox Sharing”, communications, 2008. ICC ’08.IEEE international conference on May 2008. [2] IssacKeslassy and N.McKeown, “Maintaining packet order in two stage switches”, in Proc, IEEE INFOCOM, New York, NY, USA, Jun. 2002, vol.2.pp.1032-1041. [3] C.-S Chang, D.-S. Lee, and Y.-S. Jou, “Load balanced Birkhoff-von Neumann switches, part I: One stage buffering”, Comput. Commun., vol. 25, pp. 611-622, 2002. 0% 20% 40% 60% 80% 2007 2009 2013 2015 Reduction of mismatching Packets
  • 7. Electrical & Computer Engineering: An International Journal (ECIJ) Volume 4, Number 1, March 2015 33 [4] I. Keslassy, S.-T. Chuang, K. Yu, D. Miller, M. Horowitz, and O. S.NickMcKeown, “Scaling Internet routers using optics,” in Proc. ACM SIGCOMM 2003, Karlsruhe, Germany, Aug. 2003, pp. 189–200 [5] B. Hu and K. Yeung, “Feedbackbased scheduling for load-balancedtwo-stage switches,” IEEE/ACM Trans. Netw., vol. 18, no. 4, pp.1077–1090, Aug. 2010. [6] Nick McKeown,AdisakMekkittikul,VenkatAnantharam,and Jean Walrand, “Achieving 100% Throughput in an input-queued switch”, IEEE transactions on communications, vol. 47, no. 8, August 1999. [7] Yan Cai, Xiaolin Wang, Weibo Gong, Don Towsley, “ A Study on the performance of a three stage load balancing switches”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014 [8] Pai-Hsiang Hsiao, Adon Hwang, H.T. Kung, and Dario Vlah,” Load-Balancing Routing for Wireless Access Networks”, Proc. IEEE Infocom 2001, pp. 986-995. [9] T.Anderson, S.Owicki, J.Saxes and C.Thacker, “High speed switch scheduling for local area networks”, ACM Transaction on Computer systems, Vol.11, pp.319-352, 1993 [10] J.G. Dai and B. Prabhakar, “The throughput of dataswitches with and without speedup,” Proc. of the IEEEINFOCOM, Vol. 2, pp. 556-564, Tel Aviv, Israel, March2000. [11] Nick McKeown, VenkatAnantharam,AdisakMekkittikul,Jean Walrand, “Achieving 100% Throughputin an Input-Queued Switch”, IEEE Transactions On Communications, Vol. 47, NO. 8, AUGUST 1999. [12] C.S. Chang, D.S. Lee, and C.Y. Yue, “Providing guaranteed rate services in the load balanced Birkhoff-von Neumann switches,” Proceedings of IEEE INFOCOM, 2003 8. APPENDIX THE LQF ALGORITHM Theorem: The LQF maximum weight matching algorithm is stable for all admissible arrival processes[11]. Proof: In summary, we show that for an M x N switch scheduled using this algorithm, there is a -ve expected one-step drift in the sum of the squares. In mathematically we say E[ LT (n + 1)L(n + 1) - LT (n)L(n)|L(n) ] ≤ -ԑ ||L(n)|| + k Where k > 0, ԑ > 0. THE OCF ALGORITHM Theorem: The OCF maximum weight matching algorithm is stable for all admissible arrival processes[11]. Proof: The proof consists of two steps. First, we done the stability of the waiting time. Then, we prove that the stability of the waiting time implies the stability of queue occupy, which proves above. Likely to the LQF proof, we give that for an M x N switch scheduled using the OCF algorithm. E[WT (n+1)TW(n+1)-WT (n)TW(n)|W(n)]≤- ԑ||W(n)||+K Where K > 0, ԑ> 0 and T is a positive definite matrix.