In Optical Burst Switched networks, each light path carry huge amount of traffic, path failures may damage the user application. Hence fault-tolerance becomes an important issue on these networks. Blocking probability is a key index of quality of service in Optical Burst Switched (OBS) network. The Erlang formula has been used extensively in the traffic engineering of optical communication to calculate the blocking probability. The paper revisits burst contention resolution problems in OBS networks. When the network is overloaded, no contention resolution scheme would effectively avoid the collision and cause blocking. It is important to first decide, a good routing algorithm and then to choose a wavelength assignment scheme. In this paper we have developed two algorithms, Fault Tolerant Optimized Blocking Algorithm (FTOBA) and Fault Tolerant Least Congestion Algorithm (FTLCA) and then compare the performance of these algorithms on the basis of blocking probability. These algorithms are based upon the congestion on path in OBS network and based on the simulation results, we shows that the reliable and fault tolerant routing algorithms reduces the blocking probability.
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK ijiert bestjournal
There are number of routing protocols proposed for the data transmission in WSN. Initially single path routing schemes with number of variations are proposed. Sti ll there were some drawbacks in single path routing . Single path routing was unable to provide the reliability and h igh throughput. Also security level was not conside red while routing. Recently,to remove the drawbacks of the s ingle path routing new routing technique is propose d called as multipath routing. In this paper we discussed the different multipath routing protocols with number of variants. Initiall y multipath routing was proposed for the purpose of guaranteed delivery of packet to sink in case of link or node failure. There are other protocols which are proposed for the reli ability,energy saving,security and high throughpu t. Some multipath routing protocols have discussed the load balancing and security during packet transmission.
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
Blocking probability has been one of the key performance to solve Routing and Wavelength Assignment problem (RWA) indexes in the design of wavelength-routed all-optical WDM networks. To evaluate blocking probability different analytical model are introduced.
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK ijiert bestjournal
There are number of routing protocols proposed for the data transmission in WSN. Initially single path routing schemes with number of variations are proposed. Sti ll there were some drawbacks in single path routing . Single path routing was unable to provide the reliability and h igh throughput. Also security level was not conside red while routing. Recently,to remove the drawbacks of the s ingle path routing new routing technique is propose d called as multipath routing. In this paper we discussed the different multipath routing protocols with number of variants. Initiall y multipath routing was proposed for the purpose of guaranteed delivery of packet to sink in case of link or node failure. There are other protocols which are proposed for the reli ability,energy saving,security and high throughpu t. Some multipath routing protocols have discussed the load balancing and security during packet transmission.
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
Blocking probability has been one of the key performance to solve Routing and Wavelength Assignment problem (RWA) indexes in the design of wavelength-routed all-optical WDM networks. To evaluate blocking probability different analytical model are introduced.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with
each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation
and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive &
hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the
Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed
simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed &
battery consumption. It has been observed that RIP has better network lifetime than other
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Modeling and Simulation of Wavelength-Routed optical Networksijceronline
All-optical Wavelength Division Multiplexing (WDM) networks providing extremely large bandwidths are among the most promising solutions to the increasing need for high-speed data transport. A lightpath has a specific route and one or more wavelengths through which the information is routed from the source to the destination node. In wavelength-routed optical networks, data are transmitted solely in the optical domain along lightpaths from source to destination without being converted into the electronic form and each lightpath is allowed to use the same wavelength on all the links along its path. This restriction is known as the wavelength continuity constraint. And it leads to an issue called as blocking in networks. Optical wavelength conversion with suitable Routing and wavelength assignment (RWA) can increase the performance and capacity of optical networks by eliminating this restriction and relaxing the wavelength continuity constraint. In this research, we analyze the problem of placing a limited number of wavelength converters in a mesh network using Weighted Maximum Segment Length (WMSL) converter placement algorithm. It employs Least-Loaded Routing and First-Fit (LLR-FF) RWA algorithm. It is tested on varying number of nodes in network and its respective blocking probabilities are calculated. The proposed algorithm provides the minimum blocking probability on optimal wavelength converters placement.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Abstract : As the network size increases the probability of congestion occurrence at nodes increases. This is because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses. In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing (IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput and packet delivery fraction. Keywords- DSDV, Hybrid protocol, AODV, IAODV, MANET
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such Networks are frequently limited by the network split due to either energy depletion or node mobility of the mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric system of measurement used to select the paths takes into account the stability of the nodes and the equivalent links.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
Positioning techniques have been a common objective since the early development of wireless networks. However, current positioning methods in cellular networks, for instance, are still primarily focused on the use of the Global Navigation Satellite System (GNSS), which has several limitations, like high power drainage and failure in indoor scenarios. This study introduces a novel approach employing standard LTE signaling in order to provide high accuracy positioning estimation. The proposed technique is designed in analogy to the human sound localization system, eliminating the need of having information from three spatially diverse Base Stations (BSs). This is inspired by the perfect human 3D sound localization with two ears. A field study is carried out in a dense urban city to verify the accuracy of the proposed technique, with more than 20 thousand measurement samples collected. The achieved positioning accuracy is meeting the latest Federal Communications Commission (FCC) requirements in the planner dimension.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with
each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation
and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive &
hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the
Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed
simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed &
battery consumption. It has been observed that RIP has better network lifetime than other
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
There are number of cluster based routing algorithms in mobile ad hoc networks. Since ad hoc networks are not accompanied by fixed access points, efficient routing is a must for such networks. Clustering approach is applied in mobile ad hoc network because clusters are more easily manageable and are more viable. It consists of segregating the given network into several reasonable clusters by using a clustering algorithm. By performing clustering we elect a worthy node from the cluster as the cluster head in such a way that we strive to reduce the management overheads and thus increasing the efficiency of routing. As for the fact that nodes in mobile ad hoc network have frequent host change and frequent topology change routing plays an important role for maintenance and backup mechanism to stabilize network performance. This paper aims to review the previous research papers and provide a survey on the various cluster based routing protocols in mobile ad hoc network. This paper presents analytical study of cluster based routing algorithms from literature. Index Terms— Ad- hoc networks, Cluster head, Clustering, Protocol, Route selection.
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Modeling and Simulation of Wavelength-Routed optical Networksijceronline
All-optical Wavelength Division Multiplexing (WDM) networks providing extremely large bandwidths are among the most promising solutions to the increasing need for high-speed data transport. A lightpath has a specific route and one or more wavelengths through which the information is routed from the source to the destination node. In wavelength-routed optical networks, data are transmitted solely in the optical domain along lightpaths from source to destination without being converted into the electronic form and each lightpath is allowed to use the same wavelength on all the links along its path. This restriction is known as the wavelength continuity constraint. And it leads to an issue called as blocking in networks. Optical wavelength conversion with suitable Routing and wavelength assignment (RWA) can increase the performance and capacity of optical networks by eliminating this restriction and relaxing the wavelength continuity constraint. In this research, we analyze the problem of placing a limited number of wavelength converters in a mesh network using Weighted Maximum Segment Length (WMSL) converter placement algorithm. It employs Least-Loaded Routing and First-Fit (LLR-FF) RWA algorithm. It is tested on varying number of nodes in network and its respective blocking probabilities are calculated. The proposed algorithm provides the minimum blocking probability on optimal wavelength converters placement.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Abstract : As the network size increases the probability of congestion occurrence at nodes increases. This is because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses. In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing (IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput and packet delivery fraction. Keywords- DSDV, Hybrid protocol, AODV, IAODV, MANET
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such Networks are frequently limited by the network split due to either energy depletion or node mobility of the mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric system of measurement used to select the paths takes into account the stability of the nodes and the equivalent links.
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...sipij
In this paper, we present a detailed study of Minimum Reconfiguration Probability Routing (MRPR) algorithm, and its performance evaluation in comparison with Adaptive unconstrained routing (AUR) and Least Loaded routing (LLR) algorithms. We have minimized the effects of failures on link and router failure in the network under changing load conditions, we assess the probability of service and number of light path failures due to link or route failure on Wavelength Interchange(WI) network. The computation complexity is reduced by using Kalman Filter(KF) techniques. The minimum reconfiguration probability
routing (MRPR) algorithm selects most reliable routes and assign wavelengths to connections in a manner that utilizes the light path(LP) established efficiently considering all possible requests.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
A comparative study in wireless sensor networksijwmn
Sensor networks consist of a large number of small, low-powered wireless nodes with limited computation,
communication, and sensing abilities, in a battery-powered sensor network, energy and communication
bandwidth are a precious resources. Thus, there is a need to adapt the networking process to match the
application in order to minimize the resources consumed and extend the life of the network. In this paper,
we introduce a comparative study in different routing algorithms that propose vital solutions to the most
important issues that should be taken into account when designing wireless network which are reliability,
lifetime, communication bandwidth, transmission rand, and finally the limited energy issue, so we will
introduce their algorithms and discuss how did they propose to solve such of these challenges and finally
we will do some evaluation to each approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Multipath Fault Tolerant Routing Protocol in MANET pijans
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically
exchange data among themselves without the reliance on a fixed base station or a wired backbone network
and it the makes the routing a crucial issue to the design of the MANET. Multiple path routing protocols
are shown to be performance-effective alternatives over single-path routing for ad hoc networks and it
represents a promising routing method for wireless mobile ad hoc networks. Multi-path routing achieves
load balancing and is more resilient to route failures..In this paper we propose an energy efficient
multipath fault tolerant routing protocol to improve the reliability of data routing in Mobile ad hoc
networks. The proposed RFTA is a multi objective routing protocol that meets diverse application
requirements by considering the changing conditions of the network. The efficiency of the proposed
protocol has been evaluated on different scenarios and there has been a noticeable improvement in the
packet delivery ratio and also in the reduction of end-to-end delay comparing to SMR,SMS and MDSR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Similar to Fault Tolerant Congestion based Algorithms in OBS Network (20)
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Fault Tolerant Congestion based Algorithms in OBS Network
1. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
350International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
Fault Tolerant Congestion Based Algorithms in OBS Network
Hardeep Singh hardeep_saini17@yahoo.co.in
Research Scholar (ECE), Singhania University,
Jhunjhunu, Rajasthan-333515, INDIA
Dr. Jai Prakash ecedinesh@rediffmail.com
Professor in Department of Applied Physics,
Indo Global College of Engineering,
Mohali, Punjab-140109, INDIA
Dinesh Arora ecedinesh@rediffmail.com
Swami Devi Dyal Institute of Engineering & Technology,
Barwala, Haryana-134009, INDIA
Dr.Amit Wason wasonamit13@gmail.com
Professor in Department of ECE,
Rayat & Bahra Institute of Engineering & Bio-Technology,
Mohali, Punjab-140104, INDIA
Abstract
In Optical Burst Switched networks, each light path carry huge amount of traffic, path failures may
damage the user application. Hence fault-tolerance becomes an important issue on these networks.
Blocking probability is a key index of quality of service in Optical Burst Switched (OBS) network. The
Erlang formula has been used extensively in the traffic engineering of optical communication to calculate
the blocking probability. The paper revisits burst contention resolution problems in OBS networks. When
the network is overloaded, no contention resolution scheme would effectively avoid the collision and
cause blocking. It is important to first decide, a good routing algorithm and then to choose a wavelength
assignment scheme. In this paper we have developed two algorithms, Fault Tolerant Optimized Blocking
Algorithm (FTOBA) and Fault Tolerant Least Congestion Algorithm (FTLCA) and then compare the
performance of these algorithms on the basis of blocking probability. These algorithms are based upon
the congestion on path in OBS network and based on the simulation results, we shows that the reliable
and fault tolerant routing algorithms reduces the blocking probability.
Keywords: Optical Burst Switching Network; Congestion; Contention Resolution; Blocking Probability;
Erlang Formula.
1. INTRODUCTION
Optical Burst Switching (OBS) is a technique to support bursty traffic over wavelength-Division-
Multiplexed (WDM) networks [1].WDM offers the capability to handle the increasing demand of network
traffic [2].Today up to several T bits/sec traffic can be carried by the optical link over long distance. With
the introduction of WDM in optical communication, the discrepancy between optical transmission capacity
and electronic switching capability increases [3].An OBS network is a collection of interconnected OBS
nodes. An ingress OBS node assembles packets from local access network, for example, Internet
Protocol (IP) packets, into burst and sends out a corresponding control packets (CP) for each data burst.
The optical networks have the capacity to carry terra bytes of data per second through each node. The
edge routers feed data into these networks. The basic diagram for WDM and network nodes is shown in
Figure1.The data is typically carried over 10 Gbps wavelength channels. Once a channel is setup
between source and destination, it can only carry packet traffic between selected source-destination
pairs.
2. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
351International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
FIGURE 1: A wavelength-routed optical WDM network with lightpath connections
2. ROUTING STRATEGIES
A number of routing strategies have been proposed for OBS networks by researchers. These strategies
can be classified as alternative, multi-path or single –path routing strategies. In general, a routing
algorithm can be classified as static or adaptive. A static routing algorithm is one in which the routing
procedure does not vary with time. But adaptive routing algorithms use network state information at the
time of connection establishment [4]. Fixed routing is widely used static routing technique in which every
s-d pair is assigned a single path. A call is blocked if its associated path is not available. In alternative
routing each s-d pair is assigned a set of paths. In alternative routing, when the burst contention occurs,
deflective mechanisms react to it and re-routes a blocked burst from the primary to alternative route.
Alternative routing in OBS network can be either adaptive or non-adaptive. In adaptive alternative routing,
a strategy is proactive calculation of alternative paths as well as their dynamic selection. The calculation
of alternative paths can be performed in an optimized way. In non-adaptive both primary and alternative
routing paths are fixed (static) and in most cases calculated with Dijkstra algorithm. A number of
alternative paths can be given from a node to the destination. The aim of multi-path routing strategies is
to distributing the traffic over a number of routing paths in order to reduce the network congestion. The
path selection can be either according to a given probability or according to congestion on each path we
can also say according to path congestion rank. Both adaptive (dynamic) or non-adaptive (static)
strategies are considered for single path routing in OBS networks.
3. FAULT TOLERANT ALGORITHMS IN WDM/OBS NETWORKS
The ability of network to with-stand failures is called as fault-tolerance. The failures in OBS networks can
be classified into two categories i.e. wavelength level and fiber level failures [5].The wavelength level
failure impacts the quality of transmission of each individual lightpath and fiber level failure affect all the
light-paths on an individual fiber. The fault tolerance schemes can be classified into path protection and
path restoration. In path protection, backup resources are reserved during connection setup and primary
and backup paths are computed before a failure occurs. In path restoration, the source and destination
nodes of each connection traversing the failed link participate in distributed dynamically discover an end-
to-end backup route. If no routes are available for broken connection, the connection is dropped.
Random Packet Assembly Admission Control (RPAAC) algorithm is a traffic engineering mechanism
which monitors the network congestion and proactively drops incoming packets at ingress nodes before
they may actually become harmful to the network [6].This algorithm is performed via adjusting the value
of the packet selection probability, which regulates the size of bursts and percentage of proactively
dropped traffic, on attempts to prevent or optimize network congestion. Reliable and fault tolerant routing
(RFTR) algorithm was proposed by G. Ramesh et al [5].In order to establish the primary path, this
algorithm uses the concept of load balancing. For source-destination pairs, finding a route of light paths
for the network with least congestion is called as load balancing. The traffic is routed over the lightly
loaded links. Algorithm for solving the Dynamic Routing and Wavelength Assignment (DRWA) problem in
3. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
352International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
wavelength routed optical networks was proposed by D.Bisbal et al [7].This algorithm provides the low
call blocking probability and also employ very short computation time. The blocking performance of
DRWA algorithm is measured in terms of the mean call blocking probability. A review of DRWA algorithm
can be found in Zang et al. [8].In response to source – destination connection request, a route is chosen
from pre-calculated set, and then a wavelength is assigned to it following a wavelength assignment
policy. If the selected route cannot be established on any wavelength, a new route is selected. If none of
the routes in the set has an available wavelength, then call is blocked. Assigning wavelength to different
paths in a manner that minimizes the number of wavelengths used under the wavelength-continuity
constraint. There are various types of wavelength assignment heuristics that attempt to reduce the
blocking probability i.e. First-Fit, Random, Least-Used, Most-Used, Min-Product, Least-Loaded [9], Max-
Sum, Relative Capacity Loss, Wavelength Reservation and Protecting Threshold. Zing et al [8],
introduced a new wavelength assignment algorithm called Distributed Relative Capacity Loss (DRCL),
which is based on Relative Capacity Loss (RCL).They compared the performance of DRCL with RCL
(with fixed routing) and FF (with fixed and adaptive routing) in terms of blocking probability and concluded
that it perform better than FF (with adaptive routing) in the reasonable region.
Z. Jing et al [1] investigated a novel fault-tolerant node architecture using a resilient buffer(R-buffer).In
their model buffer is attached for each outgoing link. The outgoing data burst will be tapped and stored in
a buffer for short period of time (Ts) such that the bursts are expected to reach the other end of link if no
failure is detected on this link during Ts. In case of link failure, burst stored in the buffer will be sent out via
the backup routes. The data stored in buffer will be discarded after time period Ts so that the space of the
buffer can be reused for future use. M. Ahmed et al [4] present adaptive routing i.e. Adaptive
Unconstrained Routing (AUR) and wavelength assignment and evaluate their performance on the basis
of blocking probability. Unconstrained routing scheme consider all paths between the s-d pairs. This is
accomplished by executing a dynamic shortest path algorithm with link cost obtained from network state
information at the time of connection request. This scheme is called AUR. They examined the
performance of AUR in conjunction with different wavelength assignment schemes i.e. Random, Least-
Used (SPREAD) and Most-Used (PACK) on the basis of blocking probability as a function of load per
s-d pair. The Most-Used scheme has best performance, followed by Random and then by Least-Used. A
new class of alternate routing was also proposed by H.Hiroaki et al [10] to achieve better performance of
the network with different numbers of hop counts. Normally, the connection with shorter hop counts is
likely accepted while the one with more hops encounters more call blocking. In optical network without
wavelength conversion, the performance is degraded as the number of hop counts is increased [11].In
alternate routing method with limited trunk reservation [10],connections with more hops are provided
more alternate routed in proportion to the number of hop counts.
L. Kungmeng et al [2] also investigated on class of adaptive routing called Dynamic Wavelength Routing
(DWR), in which wavelength converters are not used in the optical network. They introduced two
algorithms: Least Congestion with Least Nodal-degree Routing (LCLNR) and Dynamic Two-end
Wavelength Routing (DTWR) algorithms. Their objective is to maximize the wavelength utilization and
reduce the blocking probability in the optical network. In their algorithms a route is determined by
calculating their cost or weight function. In LCLNR algorithm, avoid routing dynamic traffic through
congested links, thus reducing blocking probability. They concluded that number of connected calls by
LCLNR algorithm is slightly decreased when the traffic load is increased. But in DTWR, number of call
connected is increased with higher traffic load. Their results show that DWR does not increase the
blocking probability when DTWR selects longer routes. X.Masip-Bruin et al [9] proposed a routing scheme
in which the routes are determined based upon the twin criteria of minimizing the number of hops and
balancing the network load, resulting in the reduction of both network congestion and blocking probability.
Their proposed Minimum Coincidence Routing (MCR) algorithm was based on either the hop length or
wavelength availability. The MCR algorithm exploits the concept of minimum coincidence between paths
to balance the traffic load, thereby reducing the network congestion. This algorithm computes the end-to-
end paths by considering the routes that have fewest shared links and minimum hops. The research on
optimization of blocking probability on OBS networks was also done by Z.Rosberg et al [12].They
introduced a reduced load fixed point approximation model to evaluate blocking probability. Also they
compare the route blocking probabilities using Just-Enough-Time (JET), Segmentation, Least Remaining
Hop-count (LRHF) and Most Traversed Hop-count (MTHF) policies. In MTHF, bursts that have traversed
4. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
353International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
the most number of hops have the highest priority. MTHF improves the blocking probabilities of long
routes provided that their prefixes do not collide or equal priority routes. LRHF has an effect similar to
MTHF, but on short routes. So LRHF and MTHF priority can be used for service differentiation between
long and short routes.
3. PROPOSED FAULT TOLERANT ALGORITHMS
In this paper we propose two algorithms Fault Tolerant Optimized Blocking Algorithm (FTOBA) and Fault
Tolerant Least Congestion Algorithm (FTLCA). The objective of our algorithms is to minimize blocking
probability. Our analytical models are designed under the following assumptions:
• A call connection request of s-d pair is based on a Poisson distribution with arrival rate ƞ. The
average service holding time is exponentially distributed with mean 1/µ. The offered congestion
(Erlangs) per node is .
• Each station has array of transmitters and receivers, where is the wavelength carried by the
fiber.
• The optical network is set of nodes interconnected by single-fiber links.
• Each fiber-link is bi-directional and each link has wavelength channel.
• No Queueing of connection request. If a connection is blocked, it immediately discarded.
• Link loads are independent.
• We have assumed dynamic path allocation in this paper.
To calculate the blocking probability we will use the Erlang-b formula as in equation (1). The Erlang
formula has been used extensively in the traffic engineering of optical communication. Erlang is defined
as dimensionless unit of traffic intensity. It is dependent on observation time. The maximum that a facility
can be in use is 100% of the time. If the observation time is 10 minutes, and facility is in use for the full
time, then that is 1 Erlang.
(1)
Where is the Blocking Probability for C congestion and wavelength.
Fault Tolerant Least Congestion algorithm (FTLCA):
The FTLCA algorithm is basically on congestion on paths between the s-d pairs. The blocking probability
mostly occurs due unbalancing of congestion on paths between s-d paths. First algorithm selects the s-d
pair, and then calculates the number of available paths between the selected s-d pair. After the
calculation of number of available paths, checking of congestion on each path will be done. Then
algorithm sorts the values of congestion in increasing order. Normally we assume that the path with
minimum congestion will offer least blocking probability. On this criterion algorithm selects the first path in
order of congestion. After the selection of path, the checking of path for fault that leads to blocking
probability. If fault exits then select the second path in order of congestion, otherwise call will be
established on selected path.
Fault Tolerant Optimized Blocking Algorithm (FTOBA):
Similar to FTLCA, the FTOBA is also congestion based but in this algorithm blocking probability on each
will be calculated. First algorithm selects the s-d pair, and then calculates the number of available paths
between the selected s-d pair. After the calculation of number of available paths, checking of congestion
on each path will be done. After calculating the blocking probability for each path, arrange the paths in
increasing order of blocking probability. The first path will be selected in order of blocking probabilities.
Then algorithm checks the call which is blocked or not, because least blocking, does not mean that there
is no fault when we chose the path with least blocking probability at the time of call establishment the call
may be blocked due to any fault. If call is blocked then select the next path in the order of blocking
probability. If call not blocked then, call is established.
5. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
354International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
Then flow chart shown in Figure 2 and Figure 3 more illustrate the mechanism of FTOBA and FTLCA
algorithms.
FIGURE 2: Fault Tolerant Optimized Blocking FIGURE3: Fault Tolerant Least Congestion
Algorithm (FTOBA) Algorithm (FTLCA)
6. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
355International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
1 2 3 4 5 6 7 8 9 10
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 100 Erlang's
FTOBA
FTLCA
4. RESULTS AND DISCUSSION
The simulation is carried out on simulation software MATLAB 7.5 of Mathwork. Both the algorithms i.e.
FTOBA and FTLCA are compared depending upon wavelengths, congestion and number of paths. We
have fixed the value of paths P=25 and congestion in Erlangs, number of wavelengths is varied. The
dynamic path allocation has been adopted for these algorithms. Due to dynamic routing algorithm the
congestion on every path will be in random at different time of call establishment.
FIGURE 4: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for Congestion of 100
Erlangs and Wavelengths is 10
FIGURE 5: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for
Congestion of 100 Erlangs and Wavelengths is 10
1 2 3 4 5 6 7 8 9 10
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 100 Erlang's
FTOBA
FTLCA
7. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
356International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
1 2 3 4 5 6 7 8 9 10
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 120 Erlang's
FTOBA
FTLCA
FIGURE 6: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for
Congestion of 120 Erlangs and Wavelengths is 10
1 2 3 4 5 6 7 8 9 10
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 150 Erlang's
FTOBA
FTLCA
FIGURE 7: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for
Congestion of 150 Erlangs and Wavelengths is 10
8. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
357International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
0 5 10 15 20 25 30
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 100 Erlang's
FTOBA
FTLCA
FIGURE 8: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for
Congestion of 100 Erlangs and Wavelengths is 30
0 5 10 15 20 25 30 35 40 45 50
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of Wavelengths
BlockingProbability
Blocking Probability for congestion of 100 Erlang's
FTOBA
FTLCA
FIGURE 9: Comparison of FTOBA & FTLCA algorithms on the basis of Blocking Probability for
Congestion of 100 Erlangs and Wavelengths is 50
9. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
358International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
The effect of random value of congestion on each path while using FTOBA and FTLCA algorithms is
shown in Figure 4 and Figure 5.The Blocking probability is different for same number of wavelength in
both the algorithms. But the effect of dynamic routing or random value of congestion is more in FTLCA
algorithm as compared to FTOBA algorithm. The blocking probability with FTLCA algorithm is almost zero
for ‘7’ number of available wavelength and it remains zero for up to ‘10’ number of wavelengths as shown
in Figure 4.But in FTOBA blocking probability is lies between 80%-90% for these number of wavelengths.
The blocking probability is decreased with increase in number of wavelengths in both the algorithms. The
Figure 4 & Figure 5 shows the performance of both the algorithms when congestion in Erlangs on each
path is 100 and there are ‘10’ number of wavelengths.
Next we increase the maximum value of limit congestion on each path i.e. 120,150 Erlangs and number
of wavelength as ‘10’, results are shown in Figure 6 and Figure 7 respectively. It is observed that the
increase in congestion does not affect the FTOBA algorithm. The blocking probability is nearly same as is
in the case when maximum congestion on each path is 100 Erlangs. But in FTLCA algorithm the blocking
probability is increased with increase in congestion. If we can limit the maximum value of congestion to a
particular value than these algorithms are very effective.
In second part, we limit the maximum value of congestion 100 Erlangs and increased the number of
wavelengths to 30 and 50 as shown in Figure 8 and Figure 9 respectively. With the increase in number of
wavelengths the blocking probability decreases. As shown in Figure 9, for FTLCA the blocking probability
is zero at ‘10’ number of wavelengths and it remains zero up to ‘50’ number of wavelengths. Similarly in
FTOBA algorithm the blocking probability decreases with the increase in number of wavelengths. The
blocking probability is 20% at ‘50’ number of wavelength when maximum congestion on each path is 100
Erlangs.
5. CONCLUSION
In this paper, we have presented fault tolerant algorithms for the routing in optical network. We conclude
that the performance of FTLCA is better than the FTOBA routing algorithm in optimizing the blocking
probability to setup lightpath in network. It has been observed that the value of blocking probability is
reduced with the increase in number of wavelengths. These algorithms are better than conventional
algorithms as complexity of these algorithms is very less. Also these algorithms can be implemented in
on-line path allocation process. If we can limit the maximum value of congestion to a particular value
than these algorithms are very effective. Results have been proved that these algorithms can be used
effectively in faulty OBS networks to yield better results.
6. REFERENCES
[1]. J.Zhang, L.Song and B.Mukherjee, “A Fault-Tolerant OBS Node Architecture with Resilient
Buffers”, Optical Communication (ECOC) 33rd European Conference and Exhibition, 978-3-
8007-3042-1, Sep.2007.
[2]. L.Kungmeng, D.Habibi, Q.V.Phung and H.N.Nguyen, “Dynamic Wavelength Routing in all-Optical
Mesh Network”, Asia-Pacific Conference on Communication, Perth, Western Australia,177-182.0-
7803-9132-2/05, IEEE 2005.
[3]. A.Goel, V.J.Gond, R.K.Sethi and A.K.Singh, “Performance Analysis of Continuous wavelength
optical Burst switching networks”, International Journal of Engineering, Vol.3, No.6, 609-621.
[4]. A.Mokhtar and M.Azizoglu, “Adaptive Wavelength Routing in All-Optical Networks”, IEEE/ACM
Transactions on Networking, Vol.6, No.2, 197-206, April 1998.
[5]. G.Ramesh and S.S.Vadivelu, “A Reliable and Fault-Tolerant Routing for Optical WDM Networks”,
International Journal of Computer science and Information Security, Vol.6, No.2, 48-54, 2009.
10. Hardeep Singh, Dr.Jai Prakash, Dinesh Arora & Dr.Amit Wason
359International Journal of Engineering (IJE), Volume (5) : Issue (5) : 2011
[6]. D.Callegati, F.Matera, T.Franzl and C.Munoz, “Report on Y2 activities and new integration
strategy-Building the future optical network in Europe”, FP7-ICT-216863/DEIS-
UNIBO/R/PU/D11.2, 2009.
[7]. D.Bisbal, I.D.Miguel, F.Gonzalez, J.Blas, J.C.aguado and M.Lopez, “Dynamic Routing and
wavelength Assignment in Optical Networks by Means of Genetic Algorithms”, Photonic network
Communication, Vol.7, No.1, 43-58, 2004.
[8]. H.Zang, J.P.Jue and B.Mukherjee, “A Review of Routing and wavelength assignment approaches
for wavelength-routed optical WDM networks”, Optical Network magazine/SPIE, 47-60, Jan.2000.
[9]. X.Masip-Bruin, M.German, A.Castro, E.Marin-Tordera, R.Serral-Gracia and E.grampin, “The
Minimum coincidence routing approach in wavelength-routed optical WDM networks”, 978-1-
4244-4550-9/09, IEEE 2009.
[10]. H.Harai, M.Murata and H.Miyahara, “Performance of Alternate Routing methods in All-optical
switching networks”, 0-8186-7780-5/97, IEEE-1997.
[11]. M.Kovacevic and A.Acampora, “Benefits of Wavelength Translation in All-Optical clear- channel
Networks”, IEEE Journal on selected areas in communications, Vol.14, No.5, 868-880,
Jun.1996.
[12]. Z.Rosberg, H.L.Vu, M.Zukerman and J.White, “Blocking Probabilities of optical burst switching
networks based on reduced load fixed point approximations”, 0-7803-7753-2/03, IEEE-2003.