SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Hop-by-Hop Routing in Wireless Mesh 
Networks with Bandwidth Guarantees 
Abstract 
Wireless Mesh Network (WMN) has become an important edge network to provide Internet 
access to remote areas and wireless connections in a metropolitan scale. In this paper, we study 
the problem of identifying the maximum available bandwidth path, a fundamental issue in 
supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known 
bottleneck metric in wired networks, is neither concave nor additive in wireless networks. 
We propose a new path weight which captures the available path bandwidth information. We 
formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the 
consistency and loop-freeness requirements. The consistency property guarantees that each node 
makes a proper packet forwarding decision, so that a data packet does traverse over the intended 
path. Our extensive simulation experiments also show that our proposed path weight outperforms 
existing path metrics in identifying high-throughput paths. 
Existing System: 
Wireless Mesh Network has become an important edge network to provide Internet access to 
remote areas and wireless connections in a metropolitan scale. We study the problem of 
identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service 
in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric 
in wired networks, is neither concave nor additive in wireless networks. 
Seeking the path with the maximum available bandwidth is one of the fundamental issues for 
supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the 
maximum additional rate a flow can push before saturating its path. 
Disadvantages:
 Identifying the maximum available bandwidth path from a source to destination. 
Proposed System: 
We propose a new path weight that captures the concept of available bandwidth. We give 
the mechanism to compare two paths based on the new path weight. We formally prove 
that the proposed path weight is left-isotonic. 
We describe how to construct the routing table and distance table, and we develop a hop-by- 
hop packet forwarding scheme. We formally prove that our routing protocol satisfies 
the optimality and consistency requirements. 
Finally, we implement our routing protocol based on the DSDV protocol in the NS2 
simulator. The extensive simulation experiments demonstrate that our routing protocol 
outperforms the existing routing protocols for finding the maximum available bandwidth 
paths. 
Advantages: 
Our routing protocol satisfies the optimality and consistency requirements. 
Finds the maximum available bandwidth paths. 
INTRODUCTION 
Awireless mesh network (WMN) consists of a large number of wireless nodes. The nodes form a 
wireless overlay to cover the service area while a few nodes are wired to the Internet. As part of 
the Internet, WMN has to support diversified multimedia applications for its users. It is essential 
to provide efficient Quality-of-Service (QoS) support in this kind of networks. Seeking the path 
with the maximum available bandwidth is one of the fundamental issues for supporting QoS in 
the wireless mesh networks. The available path bandwidth is defined as the maximum additional 
rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a 
path is no greater than the available bandwidth of this path, accepting the new traffic will not 
violate the bandwidth guaranteed of the existing flows. This paper focuses on the problem of 
identifying the maximum available bandwidth path from a source to a destination, which is also 
called the Maximum Bandwidth Problem (MBP). MBP is a subproblem of the Bandwidth- 
Constrained Routing Problem (BCRP), the problem of identifying a path with at least a given 
amount of available bandwidth. In the literatures, maximum available bandwidth path is also 
called widest path.
Finding the widest path between the source and the destination in wireless networks is very 
challenging due to the wireless transmission interference. Generally speaking, there are two 
types of interference: interflow interference and intraflow interference. Interflow interference 
refers to the situation that the resource available for a flow is affected by the presence of other 
flows. In other words, the interflow interference affects the amount of residual channel resources 
on each link that can be allocated for a new flow. The work gives how to estimate the available 
bandwidth (residual channel resources) of each link. It means that if the link has to carry another 
1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can 
be at most the available bandwidth of the link. On the other hand, intraflow interference refers to 
the scenario where when a data packet is being transmitted on a link along a path, some link 
along the path has to remain idle to avoid conflict. Intraflow interference complicates the process 
of developing hop-by-hop routing protocol for finding widest paths. Considering intraflow 
interference, the works present a formula to compute the available bandwidth of a path with the 
knowledge of the available bandwidth on individual links of the path. Unfortunately, finding 
widest path in a hop-by-hop manner is still not solved. 
The unique structure of the path bandwidth computation formula introduces two challenges 
described below: 
1. Some nodes may not find the widest path if only the available bandwidth is used as the routing 
metric. 
2. Even though a source identifies a widest path to a destination, intermediate nodes on the 
widest path may not make a consistent packet forwarding decisions by using the traditional 
destination-based hop-by-hop packet forwarding mechanism. 
Modules: 
Path Selection 
We would like to develop a distance-vector based mechanism. In the traditional distance-vector 
mechanism, a node only has to advertise the information of its own best path to its neighbors. 
Each neighbor can then identify its own best path. If a node only advertises the widest path from 
its own perspective, its neighbors may not be able to find the widest path. In order to assure that 
the widest path from each node to a destination can be identified, a trivial way is to advertise all 
the possible paths to a destination. This is definitely too expensive. On the other hand, as long as 
we advertise every path which is a subpath of a widest path (e.g., <v; a; b; c; d> is a subpath of
the widest path of <s; v; a; b; c; d>), we allow every node to identify its own widest path. Thus, 
to reduce the overhead, we should not advertise those paths that would not be a subpath of any 
widest path. 
Isotonic Path Weight 
We introduce our new isotonic path weight, while the next section describes how we use the path 
weight to construct routing tables. The isotonicity property of a path weight is the necessary and 
sufficient condition for developing a routing protocol satisfying the optimality and consistency 
requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better than p2 by 
comparing their weights. If the path weight used is left-isotonic, given any path p0 from a node v 
to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is not leftisotonic. 
Table Construction and Optimality 
The isotonicity property of the proposed path weight allows us to develop a routing protocol that 
can identify the maximum bandwidth path from each node to each destination. In particular, it 
tells us whether a path is worthwhile to be advertised, meaning whether a path is a potential 
subpath of a widest path. In our routing protocol, if a node finds a new nondominated path, it 
will advertise this path information to its neighbors. We call the packet carrying the path 
information the route packet. Based on the information contained in a route packet, each node 
knows the information about the first four hops of a path identified. 
Each node keeps two tables: distance table and routing table. Node s puts all the nondominated 
paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found 
by s itself in its routing table. 
Packet Forwarding and Consistency 
In a traditional hop-by-hop routing protocol, a packet carries the destination of the packet, and 
when a node receives a packet, it looks up the next hop by the destination only. In our 
mechanism, apart from the destination, a packet also carries a Routing Field which specifies the 
next four hops the packet should traverse. When a node receives this packet, it identifies the path 
based on the information in the Routing Field. It updates the Routing Field and sends it to the 
next hop. In our packet forwarding mechanism, each intermediate node determines the fourth 
next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism 
still requires each intermediate node to make route decision based on its routing table. Besides, 
only the information of the first few hops of a path is kept in the routing table in each node and
the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a 
hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme. 
Route Update 
After the network accepts a new flow or releases an existing connection, the local available 
bandwidth of each node will change, and thus the widest path from a source to a destination may 
be different. When the change of the local available bandwidth of a node is larger than a 
threshold (say 10 percent), the node will advertise the new information to its neighbors. After 
receiving the new bandwidth information, the available bandwidth of a path to a destination may 
be changed. Although the node is static, the network state information changes very often. 
Therefore, our routing protocol applies the route update mechanism in DSDV . Based on DSDV, 
each routing entry is tagged with a sequence number which is originated by the destination, so 
that nodes can quickly distinguish stale routes from the new ones. Each node periodically 
transmits updates and transmits updates immediately when significant new route information is 
available. Given two route entries from a source to a destination, the source always selects the 
one the larger sequence number, which is newer, to be kept in the routing table. Only if two 
entries have the same sequence number, our path comparison is used to determine which path 
should be kept. Due to the delay of the route update propagation, it is possible that route 
information kept in some nodes is inconsistent. For instance, the widest path kept in the routing 
table may not be the widest anymore. Routing loops may occur as well. The situations are 
referred as inconsistency due to transient route updates, which is different from the definition 
used in. In and this paper, we consider whether packets can be routed on the computed widest 
path when the routing tables are stable. How to avoid loops when routing tables change is an 
important but difficult problem, and is outside the scope of this paper. We refer readers to [29] 
for the techniques to reduce route update inconsistencies in the distance-vector protocol which 
can be applied in our mechanism as well. 
System Requirements: 
SOFTWARE Requirements
 PLATFORM : JDK 1.5 
 TOOL : Java Swing 
 DATABASES : SQL Server 
HARDARE Requirements 
 PROCESSOR : PENTIUM IV 2.6 GHz 
 RAM : 512 MB DD RAM 
 MONITOR : 15” COLOR 
 HARD DISK : 40 GB 
 KEYBOARD : STANDARD 102 KEYS 
 MOUSE : 3 BUTTON 
REFERENCES 
[1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multihop Wireless 
Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. 
[2] T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying High Throughput Paths in 
802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols 
(ICNP ’07), pp. 21-30, Oct. 2007. 
[3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem 
in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 
4-14, Jan. 2008. 
[4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in 
Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. 
[5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” 
IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. 
[6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel 
Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, 
Apr. 2009.
[7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless 
Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. 
[29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector 
Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994. 
CONCLUSION 
In this paper, we studied the maximum available bandwidth path problem, which is a 
fundamental issue to support quality-of-service in wireless mesh networks. The main 
contribution of our work is a new left-isotonic path weight which captures the available path 
bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to 
develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol 
satisfies the optimality and consistency requirements. Based on the available path bandwidth 
information, a source can immediately determine some infeasible connection requests with the 
high bandwidth requirement. We tested the performance of our protocol under different 
scenarios.

More Related Content

What's hot

Eb34777780
Eb34777780Eb34777780
Eb34777780
IJERA Editor
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
IJCNCJournal
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
IJTET Journal
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
Editor IJARCET
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
ijsrd.com
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
Prof Ansari
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
IJCNCJournal
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
Acel-Omeran
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
IJCNCJournal
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
Alexander Decker
 
E010322531
E010322531E010322531
E010322531
IOSR Journals
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
iosrjce
 

What's hot (18)

Eb34777780
Eb34777780Eb34777780
Eb34777780
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
E010322531
E010322531E010322531
E010322531
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 

Similar to 2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh networks with bandwidth guarantees

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
IJERA Editor
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
JPINFOTECH JAYAPRAKASH
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
ijwmn
 
D017252327
D017252327D017252327
D017252327
IOSR Journals
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
IMPULSE_TECHNOLOGY
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
IJERA Editor
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
IOSR Journals
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
iosrjce
 
I017616468
I017616468I017616468
I017616468
IOSR Journals
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
ijafrc
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
graphhoc
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
E-Lins Technology Co. Ltd.
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 

Similar to 2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh networks with bandwidth guarantees (20)

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
Performance Comparison of Link, Node and Zone Disjoint Multi-Path Routing Str...
 
D017252327
D017252327D017252327
D017252327
 
Polynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypathPolynomial time algorithms for multirate anypath
Polynomial time algorithms for multirate anypath
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
Inspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight ConnectivityInspecting Vanet for Determined Ways with Watertight Connectivity
Inspecting Vanet for Determined Ways with Watertight Connectivity
 
I017616468
I017616468I017616468
I017616468
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKSSURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
SURVEY AND TAXONOMY OF UNICAST ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 

More from IEEEFINALSEMSTUDENTSPROJECTS

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
IEEEFINALSEMSTUDENTSPROJECTS
 

More from IEEEFINALSEMSTUDENTSPROJECTS (20)

2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
2014 IEEE DOTNET NETWORKING PROJECT Secure data-retrieval-for-decentralized-d...
 
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
2014 IEEE DOTNET NETWORKING PROJECT Qos aware geographic opportunistic routin...
 
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
2014 IEEE DOTNET NETWORKING PROJECT Pricing under constraints_in_access_netwo...
 
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
 
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
2014 IEEE DOTNET NETWORKING PROJECT Leveraging social networks for p2 p conte...
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
 
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
 

Recently uploaded

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
amsjournal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 

Recently uploaded (20)

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 

2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh networks with bandwidth guarantees

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. We propose a new path weight which captures the available path bandwidth information. We formally prove that our hop-by-hop routing protocol based on the new path weight satisfies the consistency and loop-freeness requirements. The consistency property guarantees that each node makes a proper packet forwarding decision, so that a data packet does traverse over the intended path. Our extensive simulation experiments also show that our proposed path weight outperforms existing path metrics in identifying high-throughput paths. Existing System: Wireless Mesh Network has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. We study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired networks, is neither concave nor additive in wireless networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Disadvantages:
  • 2.  Identifying the maximum available bandwidth path from a source to destination. Proposed System: We propose a new path weight that captures the concept of available bandwidth. We give the mechanism to compare two paths based on the new path weight. We formally prove that the proposed path weight is left-isotonic. We describe how to construct the routing table and distance table, and we develop a hop-by- hop packet forwarding scheme. We formally prove that our routing protocol satisfies the optimality and consistency requirements. Finally, we implement our routing protocol based on the DSDV protocol in the NS2 simulator. The extensive simulation experiments demonstrate that our routing protocol outperforms the existing routing protocols for finding the maximum available bandwidth paths. Advantages: Our routing protocol satisfies the optimality and consistency requirements. Finds the maximum available bandwidth paths. INTRODUCTION Awireless mesh network (WMN) consists of a large number of wireless nodes. The nodes form a wireless overlay to cover the service area while a few nodes are wired to the Internet. As part of the Internet, WMN has to support diversified multimedia applications for its users. It is essential to provide efficient Quality-of-Service (QoS) support in this kind of networks. Seeking the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the wireless mesh networks. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a path is no greater than the available bandwidth of this path, accepting the new traffic will not violate the bandwidth guaranteed of the existing flows. This paper focuses on the problem of identifying the maximum available bandwidth path from a source to a destination, which is also called the Maximum Bandwidth Problem (MBP). MBP is a subproblem of the Bandwidth- Constrained Routing Problem (BCRP), the problem of identifying a path with at least a given amount of available bandwidth. In the literatures, maximum available bandwidth path is also called widest path.
  • 3. Finding the widest path between the source and the destination in wireless networks is very challenging due to the wireless transmission interference. Generally speaking, there are two types of interference: interflow interference and intraflow interference. Interflow interference refers to the situation that the resource available for a flow is affected by the presence of other flows. In other words, the interflow interference affects the amount of residual channel resources on each link that can be allocated for a new flow. The work gives how to estimate the available bandwidth (residual channel resources) of each link. It means that if the link has to carry another 1-hop flow without violating the bandwidth guarantees of existing flows, the rate of this flow can be at most the available bandwidth of the link. On the other hand, intraflow interference refers to the scenario where when a data packet is being transmitted on a link along a path, some link along the path has to remain idle to avoid conflict. Intraflow interference complicates the process of developing hop-by-hop routing protocol for finding widest paths. Considering intraflow interference, the works present a formula to compute the available bandwidth of a path with the knowledge of the available bandwidth on individual links of the path. Unfortunately, finding widest path in a hop-by-hop manner is still not solved. The unique structure of the path bandwidth computation formula introduces two challenges described below: 1. Some nodes may not find the widest path if only the available bandwidth is used as the routing metric. 2. Even though a source identifies a widest path to a destination, intermediate nodes on the widest path may not make a consistent packet forwarding decisions by using the traditional destination-based hop-by-hop packet forwarding mechanism. Modules: Path Selection We would like to develop a distance-vector based mechanism. In the traditional distance-vector mechanism, a node only has to advertise the information of its own best path to its neighbors. Each neighbor can then identify its own best path. If a node only advertises the widest path from its own perspective, its neighbors may not be able to find the widest path. In order to assure that the widest path from each node to a destination can be identified, a trivial way is to advertise all the possible paths to a destination. This is definitely too expensive. On the other hand, as long as we advertise every path which is a subpath of a widest path (e.g., <v; a; b; c; d> is a subpath of
  • 4. the widest path of <s; v; a; b; c; d>), we allow every node to identify its own widest path. Thus, to reduce the overhead, we should not advertise those paths that would not be a subpath of any widest path. Isotonic Path Weight We introduce our new isotonic path weight, while the next section describes how we use the path weight to construct routing tables. The isotonicity property of a path weight is the necessary and sufficient condition for developing a routing protocol satisfying the optimality and consistency requirements. Given two paths p1 and p2 from a node s to d, assume that p1 is better than p2 by comparing their weights. If the path weight used is left-isotonic, given any path p0 from a node v to s, p0 p1 must be better than p0 p2. Available bandwidth of a path alone is not leftisotonic. Table Construction and Optimality The isotonicity property of the proposed path weight allows us to develop a routing protocol that can identify the maximum bandwidth path from each node to each destination. In particular, it tells us whether a path is worthwhile to be advertised, meaning whether a path is a potential subpath of a widest path. In our routing protocol, if a node finds a new nondominated path, it will advertise this path information to its neighbors. We call the packet carrying the path information the route packet. Based on the information contained in a route packet, each node knows the information about the first four hops of a path identified. Each node keeps two tables: distance table and routing table. Node s puts all the nondominated paths advertised by its neighbors in its distance table. It keeps all the nondominated paths found by s itself in its routing table. Packet Forwarding and Consistency In a traditional hop-by-hop routing protocol, a packet carries the destination of the packet, and when a node receives a packet, it looks up the next hop by the destination only. In our mechanism, apart from the destination, a packet also carries a Routing Field which specifies the next four hops the packet should traverse. When a node receives this packet, it identifies the path based on the information in the Routing Field. It updates the Routing Field and sends it to the next hop. In our packet forwarding mechanism, each intermediate node determines the fourth next hop but not the next hop as in the traditional mechanism. Our packet forwarding mechanism still requires each intermediate node to make route decision based on its routing table. Besides, only the information of the first few hops of a path is kept in the routing table in each node and
  • 5. the routing field in a packet. Therefore, our mechanism possesses the same characteristics of a hop-by-hop packet routing mechanism, and is a distributed packet forwarding scheme. Route Update After the network accepts a new flow or releases an existing connection, the local available bandwidth of each node will change, and thus the widest path from a source to a destination may be different. When the change of the local available bandwidth of a node is larger than a threshold (say 10 percent), the node will advertise the new information to its neighbors. After receiving the new bandwidth information, the available bandwidth of a path to a destination may be changed. Although the node is static, the network state information changes very often. Therefore, our routing protocol applies the route update mechanism in DSDV . Based on DSDV, each routing entry is tagged with a sequence number which is originated by the destination, so that nodes can quickly distinguish stale routes from the new ones. Each node periodically transmits updates and transmits updates immediately when significant new route information is available. Given two route entries from a source to a destination, the source always selects the one the larger sequence number, which is newer, to be kept in the routing table. Only if two entries have the same sequence number, our path comparison is used to determine which path should be kept. Due to the delay of the route update propagation, it is possible that route information kept in some nodes is inconsistent. For instance, the widest path kept in the routing table may not be the widest anymore. Routing loops may occur as well. The situations are referred as inconsistency due to transient route updates, which is different from the definition used in. In and this paper, we consider whether packets can be routed on the computed widest path when the routing tables are stable. How to avoid loops when routing tables change is an important but difficult problem, and is outside the scope of this paper. We refer readers to [29] for the techniques to reduce route update inconsistencies in the distance-vector protocol which can be applied in our mechanism as well. System Requirements: SOFTWARE Requirements
  • 6.  PLATFORM : JDK 1.5  TOOL : Java Swing  DATABASES : SQL Server HARDARE Requirements  PROCESSOR : PENTIUM IV 2.6 GHz  RAM : 512 MB DD RAM  MONITOR : 15” COLOR  HARD DISK : 40 GB  KEYBOARD : STANDARD 102 KEYS  MOUSE : 3 BUTTON REFERENCES [1] Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multihop Wireless Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. [2] T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying High Throughput Paths in 802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’07), pp. 21-30, Oct. 2007. [3] C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 4-14, Jan. 2008. [4] J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. [5] Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. [6] H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, Apr. 2009.
  • 7. [7] Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. [29] C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proc. ACM SIGCOMM, pp. 234-244, Aug. 1994. CONCLUSION In this paper, we studied the maximum available bandwidth path problem, which is a fundamental issue to support quality-of-service in wireless mesh networks. The main contribution of our work is a new left-isotonic path weight which captures the available path bandwidth information. The left-isotonicity property of our proposed path weight facilitates us to develop a proactive hop-by-hop routing protocol, and we formally proved that our protocol satisfies the optimality and consistency requirements. Based on the available path bandwidth information, a source can immediately determine some infeasible connection requests with the high bandwidth requirement. We tested the performance of our protocol under different scenarios.