The document proposes a hierarchical routing framework and liquid-simulated algorithm for load balancing in wireless mesh networks. Key points:
- The framework forms clusters with wireless mesh routers (WMRs) as cluster heads and simplifies clustering procedures. It uses limited topology broadcasting to allow WMRs to choose best paths between adjacent clusters.
- The liquid-simulated algorithm aims to keep load balanced between WMRs by treating load as a liquid level and allowing flows between nodes to equalize levels across the network.
- The framework uses a proactive routing approach within this load balancing algorithm, with topology broadcasting constrained within clusters and adjacent clusters to reduce overhead.
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
This paper presents an optimal bandwidth allocation method for a networked control system (NCS) which includes time-driven sensor, event-driven controller and random channels. A hidden markov model (HMM) with a discretized state space is formulated for the random traffic to predict the network states using a suitable data window. Network bandwidth is allocated based on the predicted traffic state subject to bounds on the deterministic traffic that guarantee acceptable NCS performance and do not exceed hardware limitations. Bandwidth allocation uses minimization of unmet bandwidth demand. A stability condition is derived for a variable but bounded sampling period interval. Computer simulation results show the effect of varying the number of discrete states for the HMM and the window width on bandwidth allocation. The results compare favorably with a published approach based on fuzzy logic.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
This paper presents an optimal bandwidth allocation method for a networked control system (NCS) which includes time-driven sensor, event-driven controller and random channels. A hidden markov model (HMM) with a discretized state space is formulated for the random traffic to predict the network states using a suitable data window. Network bandwidth is allocated based on the predicted traffic state subject to bounds on the deterministic traffic that guarantee acceptable NCS performance and do not exceed hardware limitations. Bandwidth allocation uses minimization of unmet bandwidth demand. A stability condition is derived for a variable but bounded sampling period interval. Computer simulation results show the effect of varying the number of discrete states for the HMM and the window width on bandwidth allocation. The results compare favorably with a published approach based on fuzzy logic.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
In this paper, we propose a novel multi-hop cluster architecture for location service protocol in vehicular ad
hoc networks. The proposed scheme uses two parameters which are the connectivity between vehicles and the
vehicle mobility to select cluster head. The performance of the proposed scheme is the tradeoff between the
vehicle locations and the communication overheads. The proposed scheme is not only scalable but also
reliable and is able to achieve high load balancing with fast convergence. The cluster constructed by the
proposed scheme is more stable than exiting vehicular ad hoc network clustering schemes. Specifically, the
proposed scheme can increase the cluster-head lifetime up to 50%. The reason behind this achievement is
that the proposed scheme considers vehicle mobility in terms of average link expiration time while selecting
cluster-head.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
Actual network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable and efficient. Each routing protocol should support small as well as large
scale networks very efficiently. As the number of node increase, it increases the management functionality
of the network. Graph theoretic approach traditionally was applied to networks where nodes are static or
fixed. In this paper, we have applied the graph theoretic routing to MANET where nodes are mobile. Here,
we designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Each cluster supports a few nodes with a cluster head. The intracluster
connectivity amongst the nodes within the cluster is supported by multi-hop connectivity to ensure
handling mobility in such a way that no service disruption can occur. The inter-cluster connectivity is also
achieved by multi-hop connectivity. However, for inter-cluster communications, only cluster heads are
connected. This paper demonstrates graph theoretic approach produces an optimum multi-hop connectivity
path based on cumulative minimum degree that minimizes the contention and scheduling delay end-toend.
It is applied to both intra-cluster communications as well as inter-cluster communications. The
performance shows that having a multi-hop connectivity for intra-cluster communications is more power
efficient compared to broadcast of information with maximum power coverage. We also showed the total
number of required intermediate nodes in the transmission from source to destination. However, dynamic
behavior of the nodes requires greater understanding of the node degree and mobility at each instance of
time in order to maintain end-to-end QoS for multi-service provisioning. Our simulation results show that
the proposed graph theoretic routing approach will reduce the overall delay and improves the physical
layer data frame transmission.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not
guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
Routing is the major research issues in the Wireless Mesh Network (WMN). Ad-hoc networks routing protocols can be applied for WMN, but due to limited success & less efficiency there is need of more efficient routing protocols. In Infrastructure Wireless Mesh Routing Architecture (IWMRA) routing protocol, source node initiates a path establishing process whenever path breaks. This is not an ideal method in WMN where every nodes rather than source and destination in the path are motionless. One way of overcoming this is by initiating the local route repair by destination node. In this paper, we propose an active path updating procedure APULAR for quickly repair the broken path. Moreover, to improve throughput and to reduce the co-channel interference, we use multiple interface with multi channels. We are considering 4-hop as an interference range and will use fixed channel assignment within the mesh routers to reduce the inter flow interference. Our procedure is simulated in NS2 and compared with AODV – MI3 and APULAR-MI2, APULAR-MI3, APULAR-MI5. Simulation results show that our protocol performs better AODV in key performance metrics like packet delivery ratio, control overhead, average throughput and end-to-end delay.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...IJECEIAES
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
In this paper, we propose a novel multi-hop cluster architecture for location service protocol in vehicular ad
hoc networks. The proposed scheme uses two parameters which are the connectivity between vehicles and the
vehicle mobility to select cluster head. The performance of the proposed scheme is the tradeoff between the
vehicle locations and the communication overheads. The proposed scheme is not only scalable but also
reliable and is able to achieve high load balancing with fast convergence. The cluster constructed by the
proposed scheme is more stable than exiting vehicular ad hoc network clustering schemes. Specifically, the
proposed scheme can increase the cluster-head lifetime up to 50%. The reason behind this achievement is
that the proposed scheme considers vehicle mobility in terms of average link expiration time while selecting
cluster-head.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
Actual network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable and efficient. Each routing protocol should support small as well as large
scale networks very efficiently. As the number of node increase, it increases the management functionality
of the network. Graph theoretic approach traditionally was applied to networks where nodes are static or
fixed. In this paper, we have applied the graph theoretic routing to MANET where nodes are mobile. Here,
we designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Each cluster supports a few nodes with a cluster head. The intracluster
connectivity amongst the nodes within the cluster is supported by multi-hop connectivity to ensure
handling mobility in such a way that no service disruption can occur. The inter-cluster connectivity is also
achieved by multi-hop connectivity. However, for inter-cluster communications, only cluster heads are
connected. This paper demonstrates graph theoretic approach produces an optimum multi-hop connectivity
path based on cumulative minimum degree that minimizes the contention and scheduling delay end-toend.
It is applied to both intra-cluster communications as well as inter-cluster communications. The
performance shows that having a multi-hop connectivity for intra-cluster communications is more power
efficient compared to broadcast of information with maximum power coverage. We also showed the total
number of required intermediate nodes in the transmission from source to destination. However, dynamic
behavior of the nodes requires greater understanding of the node degree and mobility at each instance of
time in order to maintain end-to-end QoS for multi-service provisioning. Our simulation results show that
the proposed graph theoretic routing approach will reduce the overall delay and improves the physical
layer data frame transmission.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not
guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
Battlefield theater applications require supporting large number of nodes. It can facilitate many multi-hop
paths between each source and destination pairs. For scalability, it is critical that for supporting network
centric applications with large set of nodes require hierarchical approach to designing networks. In this
research we consider using Mobile Ad Hoc Network (MANET) with multiple clusters. Each cluster
supports a few nodes with a cluster head. The intra-cluster connectivity amongst the nodes within the
cluster is supported by multi-hop connectivity to ensure handling mobility in such a way that no service
disruption can occur. The inter-cluster connectivity is also achieved by multi-hop connectivity. However,
for inter-cluster communications, only cluster heads are connected. The selection of intra-cluster
communications and inter-cluster communications allow scalability of the network to support multiservices
applications end-to-end with a desired Quality of Service (QoS). This paper proposes graph
theoretic approach to establish efficient connection between a source and a destination within each cluster
in intra-cluster network and between clusters in inter-cluster network. Graph theoretic approach
traditionally was applied networks where nodes are static or fixed. In this paper, we have applied the
graph theoretic routing to MANET where nodes are mobile. One of the important challenges in MANET is
to support an efficient routing algorithm for multi-hop communications across many nodes which are
dynamic in nature. However, dynamic behavior of the nodes requires greater understanding of the node
degree and mobility at each instance of time in order to maintain end-to-end QoS for multi-service
provisioning. This paper demonstrates graph theoretic approach produces an optimum multi-hop
connectivity path based on cumulative minimum degree that minimizes the contention and scheduling
delay end-to-end. It is applied to both intra-cluster communications as well as inter-cluster
communications. The performance shows that having a multi-hop connectivity for intra-cluster
communications is more power efficient compared to broadcast of information with maximum power
coverage. Each cluster performs similarly and the algorithm is also used for inter-cluster communications.
Our simulation results show that the proposed graph theoretic routing approach will reduce the overall
delay and improves the physical layer data frame transmission.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
Routing is the major research issues in the Wireless Mesh Network (WMN). Ad-hoc networks routing protocols can be applied for WMN, but due to limited success & less efficiency there is need of more efficient routing protocols. In Infrastructure Wireless Mesh Routing Architecture (IWMRA) routing protocol, source node initiates a path establishing process whenever path breaks. This is not an ideal method in WMN where every nodes rather than source and destination in the path are motionless. One way of overcoming this is by initiating the local route repair by destination node. In this paper, we propose an active path updating procedure APULAR for quickly repair the broken path. Moreover, to improve throughput and to reduce the co-channel interference, we use multiple interface with multi channels. We are considering 4-hop as an interference range and will use fixed channel assignment within the mesh routers to reduce the inter flow interference. Our procedure is simulated in NS2 and compared with AODV – MI3 and APULAR-MI2, APULAR-MI3, APULAR-MI5. Simulation results show that our protocol performs better AODV in key performance metrics like packet delivery ratio, control overhead, average throughput and end-to-end delay.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...IJECEIAES
Wireless Mesh Networks (WMN) consists of wireless stations that are connected with each other in a semi-static configuration. Depending on the configuration of a WMN, different paths between nodes offer different levels of efficiency. One areas of research with regard to WMN is cost minimization. A Modified Binary Particle Swarm Optimization (MBPSO) approach was used to optimize cost. However, minimized cost does not guarantee network performance. This paper thus, modified the minimization function to take into consideration the distance between the different nodes so as to enable better performance while maintaining cost balance. The results were positive with the PDR showing an approximate increase of 17.83% whereas the E2E delay saw an approximate decrease of 8.33%.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKScscpconf
Mobile ad hoc network is a collection of wireless mobile nodes, which are connected over a wireless medium. There is no pre-existing communication infrastructure (no access points, no
base stations) and the nodes can freely move and self-organize into a network topology. Such a network can contain two or more nodes. Hence, balancing the load in an Ad hoc network is
important because the nodes have limited communication resources such as bandwidth, buffer space and battery power. This paper presents a new approach to load balancing based on
residual energy of nodes for distribute the traffic evenly among the network nodes. We are exploiting the multipath routing protocol AOMDV, which defines link-disjoint paths between the
source and the destination in every route discovery. We add the energy metric for load balancing (ELB-AOMDV). The performance is compared between ELB-AOMDV and LBAOMDV.
A New Paradigm for Load Balancing in WMNsCSCJournals
In this paper, we address the problem of load balancing in Wireless Mesh Networks. We consider a Cluster Based Wireless Mesh Architecture in which the WMN is divided into clusters that could minimize the updating overhead during topology change due to mobility of mesh nodes or congestion of load on a cluster. Each cluster contains a gateway that has complete knowledge about group memberships and link state information in the cluster. The gateway is often elected in the cluster formation process. We consider load of gateways and try to reduce it. As a matter of fact when a gateway undertakes to be an interface for connecting nodes of a wireless mesh network to other networks or internet, there would be some problems such as congestion and bottleneck, so we introduce a new paradigm for these problems. For solving bottleneck we use clustering to reduce load of gateways and after that by use of dividing cluster we prevent from bottleneck on gateways. We study how to detect congestion on a gateway and how can reduce loads of it that preventing from bottleneck on gateway and therefore increasing throughput of network to encountering many loads. So we propose an algorithm to detect bottleneck and remedies for load balancing in Wireless Mesh Networks. We also use Ns2-Emultion for implementing and testing the framework. Some qualitative results are provided to prove the correctness and the advantages of our framework.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Wireless mesh networks offer high bandwidth Internet access for mobile users anywhere and at any time.
It is an emerging technology that uses wireless multi-hop networking to provide a cost-efficient way for
community or enterprise users to have broadband Internet access and share network resource. In this paper,
we have tried to give a comparative analysis of various Gateway Placement approaches which can be
helpful in understanding which approach will be useful in which situation.
Hierarchical Genetic Algorithm For Dynamic Channel Units Allocation in TD-CDM...ijwmn
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
Similar to Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm (20)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
1. 1
Load balancing In Wireless Mesh Networks Using liquid
–Simulated Algorithm
Eshetu Gusare Desisa Shaik Janbhasha
College of Computing and Informatics College of Computing and Informatics
Department of Computer science Department of Computer science
harmeekoo2011@gmail.com afreen.jbasha@gmail.Com
Assosa University, Assosa , Ethiopia. Assosa University, Assosa, Ethiopia.
Abstract
There are many routing approaches have been borrowed from mobile ad hoc network to achieve
routing solutions in wireless mesh network. WMN was developed for reliable data communication
and load balancing. AODV provides loop-free routes even while repairing broken links. On this
paper, we propose a hierarchical routing framework which is adapted to a wireless mesh network
(WMN) environment and ensures the most critical issue in the wireless network: load-balancing. We
simplify clusters formation and maintenance procedure, propose limited topology broadcasting
mechanism allowing WMC to choose the best path to a WMC in adjacent cluster, and connect to a
number nearby WMR. Basing on that routing framework we propose a liquid-simulated algorithm to
keep load-balances between WMRs.
Keywords: Routing protocol; Load balancing; Wireless Mesh Network; algorithm
1. Introduction
There are three types of wireless mesh network
(WMN) architecture [1]:
Infrastructure/backbone, Client WMNs, and
Hybrid WMNs. A client WMN is simply a
Mobile ad-hoc network (Manet).
Infrastructure/backbone WMN is composed of
conventional wireless nodes connected through
wireless mesh routers. With many well-known
downsides, these two architectures will soon be
replaced by the hybrid WMN architecture. In
this architecture, there are two distinct layers
(Fig.1), they are: an ad hoc network which is
composed of wireless mesh clients (WMC) and
WMRs, with backbone connection between
WMRs. WMN has distinct constraint between
two types of nodes: WMRs and WMCs. WMCs
have limited power resources and may be
mobile. WMRs have minimum mobility and do
not have strict constraint on power. For now,
the term WMN in this paper will refer to
Hybrid WMN. By nature of the hierarchical
architecture, hierarchical routing is particularly
worthy for this network. Hierarchical routing in
wireless network is well researched by many
papers and is concluded by [5]. To use this
routing protocol, only a few points should be
considered. Because of limited constraints,
WMR should be a cluster-head (CH), and so
clustering algorithm could be simplified to an
algorithm that allows WMC to choose a WMR
with minimal cost as its CH. Obviously,
hierarchical routing implemented in this
network must be much more reliable than one
in Manet. However, more things have to be
done in order to address some underlying
problems.
2. 2
Fig 1: Wireless Mesh Network-Hybrid
Architecture.
Using a normal approach for hierarchical
routing presented above, traffic generated at
any WMC will always be routed to WMR (as
CH) and then go to a destination even if they
are adjacent clusters and routing packets
through WMC to the destination may be better.
For example in Fig.2, when we need to route
packets from node 8 to 3, directed route from
nodes 8 to 7 to 3 may be better than the route
over CHs j and i. To solve this problem, we can
have two approaches, proactive and reactive. In
reactive approach, let source node ask cluster
gateway or CH to know which way, through
cluster gateway (CG) or through CH, should be
better. In proactive approach, source node
should know proactively all WMC that should
be directly reached. To do this, the source node
can simply broadcast its link-states to all nodes
in its entire adjacent cluster. For example, node
9 will broadcast its link-states to all nodes in
cluster j. But, this is a trivial solution. Because
only part of adjacent cluster j needs to know
the links state of 9, the rest won’t need it. They
will use the backbone link over CH, for
example, in the case of node 4.
Also, in wireless network being limited
bandwidth, load balancing is always a problem.
Especially in WMN when a WMR have to
serve a number of different connection from
WMCs concurrently. This issue in Manet has
been investigated by many papers. But mainly,
the problem is not solved in WMN. Load-
balancing in WMN becomes much more
complicated in comparison with Manet in terms
ofarchitecture layers of network and the large
number of nodes in network. We have to deal
with load-balancing in Client Tier (CT), Router
Tier (RT) and controlling load that imposed by
WMCs to each WMR. Because WMR is the
most sensitive node in the network, in this
paper, we will concentrate on problems of
controlling load from WMC to WMR to
balance traffic among WMRs.
Fig 2:Example of two adjacent clusters
We consider WMR and the set of WMCs
around it as a cluster. Each WMC can belong
to a number of WMR; these WMCs will create
an overlapped area between clusters. By
deciding which WMC belongs to which
cluster, we can adjust the traffic of the
overlapped cluster and thus keep load-balance
between WMR. A solution to load-balancing
uses an on-line algorithm presented in [6].
Online algorithm is a fast and low-cost
algorithm but it only solves problems through
local point of view and there is no guarantee on
the global optimization result. In this research,
basing on the idea of algorithm in [13], [14],
we develop a liquid simulated algorithm to
obtain a global optimal solution: WMC in
overlapping areas is adjusted such that the
whole network can reach directly to an optimal
distribution of WMC. To support for the load-
balancing algorithm, we choose a proactive
3. 3
approach for the routing problems declared
above. Since WMR is CH, a simple procedure
for cluster formation and maintenance and a
limited topology broadcasting method is
proposed to reduce unnecessary broadcasting.
2. Related Work
Hierarchical routing is known as a precious
routing method in Manet because of ability to
solve scalability problem. Many instance of
this routing mechanism are presented in [2]. [3]
investigated in control overhead in hierarchal
routing. Beside, it also gives us an overall view
and main characteristics of this mechanism.
Developed from idea of using hierarchical
mechanism, [3] and [4] proposeshierarchical
routing protocols for WMN. In [3], network is
organized into zone around WMR and use
proactive method in both cluster and between
CH. Traffics is routed over the backbone, even
between two neighbors-clusters. In [4], authors
studied network scenario with cluster size is 1-
hop and they proposed two type of routing
mechanism: using lower tier – cluster member
tier and using backbone tier.
They use reactive approach at both lower tier
and higher tier. Location Service to manage
mobility is not used. Usually, there are two
approaches to Load-balancing in Manet,
routing metric approach and flow control
approach. In routing metric approach, for
example [8], a new routing metric is proposed
to avoid heavy load path. In flow control
approach, load-balancing problem is
formulated as a flow control problem with
objective function is maximization throughput
[7]. By jointing scheduling and routing, author
provides a nice result on load balancing in
backhaul network: load of nodes are the same if
they have the same distance to the base station.
Besides, in [6], author investigated load-
balancing for channel assignment problems and
modeled it as an online problem for temporary
tasks with unrelated processors. Channels will
be assigned to the most available base-station.
Authors in [13] and [14] consider load at a
nodes in the network as liquid level. Liquid can
flow from high level node to low level nod.
When liquid stop flowing, that mean there is no
difference of liquid level between nodes, load-
balance state is made. A simple algorithm is
also proposed in [14] to solve this problem.
3. Implementation
1. Topology Broadcasting
Topology control proposed in this paper
strictly follows framework presented in [5].
Only the changed parts are present in this
paper. Topology broadcasting in WMN
includes two parts: topology broadcasting at
CT and topology broadcasting at RT. At RT,
with limited mobility of the WMRs, topology
is rarely changed, packet control overhead for
maintenance topology of WMRs is low.
Proactive routing protocol [2] for ad hoc
network should be used here. They are
Wireless Routing Protocol [9] or Destination-
Sequenced Distance Vector Routing [10]. At
CT, things seem to be more complicated. At
first, we look at the main idea behind this
topology broadcasting procedure. Assume that
we have two adjacent cluster presented in
Fig.3. Broadcasting link state to adjacent
cluster’s members permits cluster member
chose the best way to the destination node not
always have to use backbone links.
Fig 3: Path between two WMC
4. 4
From point of view of node n, path pnm is
efficient only
When
Thus, we can have two constraints on
broadcasting:
Link state of a Ci will be broadcasted
within its cluster ƒ
Equation (1) will limit topology
broadcasting of Ci to its adjacent
clusters.
Implementation of proposal routing protocol
uses Linkstates broadcasting technique and
Dijkstra’s shortest path algorithm. Above
constraints are done by adding more
information in the broadcasting packet, routing
tables and several simple checking steps. Each
WMR will hold two tables, cluster member
table called ClTb and a table for topology
control at RT called RTTb. RTTb is updated by
using a proactive protocol as mentioned earlier.
ClTb is update when a WMC requests to joint
the cluster. At CT, each WMC will also hold
two tables, WMC table called WCTb and
WMR table called WRTb. WRTb contains two
valid shortest paths to WMRs. WCTb contains
all valid path from that WMC other WMC
within its cluster and adjacent cluster.
Topology broadcasting in this routing protocol
including two phase: Cluster formation, when
all table are empty, and cluster maintenance.
a. Cluster formation
CH-Claim packet is broadcasted from each
WMR to its neighbor WMCs. CH-Claim
packet of Ri contains {idi, Di, Seq}. Di is
distance from WMC to the WMR. Seq is
identification of the claim packet.
A WMC receives a CH-Claim packet it should
do as follows
Update distance Di according to the
cost of the link it receives the packet.
Record packet in to its memory and
forward the updated packet.
After timeout to, check the memory to
getsmallest but larger than the primal
one and also satisfies kshort condition.
b. Limited Topology Broadcasting
Link state now will be broadcasted by all
member of a cluster. Overlapped WMC will
hold topology of both of overlapped clusters.
Topology is hold in WCTb. Overlapped WMC
Cg on the border of cluster when receives a
link state update from a cluster will send packet
P to all its neighbors on the other cluster. In
that, idr is cluster id, idi is WMC id.
P is sent by building a border-casting tree [11].
At a WMC Cn in the cluster of Cm, Cn also
update the packet P and do little bit different
with normal behavior of border-casting: it
follows border-cast only when (1) is satisfied.
Otherwise, itdrops the packet. At any node
satisfies (1), WCTb is updated. P’ is updated
respecting to the current path length to the
changed node mi mg += pppgi .
Fig 4: Example of topology broadcasting and
overlapped clusters.
Figure 4 gives an example of topology
covering by proposed mechanism with 2-short.
Nodes in gray are covered by link state
broadcasting of node 8. This example present
all principal of the routing protocol.
5. 5
c. Complexity
Complexity of the topology broadcasting at CT
is the same as hierarchical routing with two
layers, at RT is the same as proactive routing in
Manet. Table 1 shows complexity of the
routing protocols. K is maximum number of
node in a cluster. I is routing update interval. D
is maximum radius of clusters.
Any WMC can reach WMCs in adjacent
cluster on a shortest path with proactive
method. Overhead of link state updated is
minimize by eliminate update to unnecessary
nodes.
2. Load-balancing in WMN:
The total load Φi at cluster Zi includes traffic
from other WMR R Φi and traffic C Φi from
WMC withinZi: Φ+Φ=Φ CR .
If we assume that condition for output flow of all Ri in
the network is the same, load-balancing problem will
be: Minimize max{ Φ−Φ ji } with Z, Z ji∈∀ V (2) To
adjust traffic Φ , we can adjust both of two components.
In
this paper, we let R Φi as it is and just
concentrate on adjusting C Φi to solve
problems (2). We approach C Φi from the
traffic generated by each cluster, not from
traffic of a separate WMC. Traffic of
overlapped areas is controlled to get adapted
to available capacity of WMRs.
4. Experimental Results
We apply the algorithm to find the optimal
solution of a network with three overlapped
clusters given in Table 3. The Fig.8 shows
that, traffic of clusters reach the most balance
state.
Fig 5: Traffic at clusters while applying algorithm
6. 6
5. Conclusion
In this paper, we proposed a hierarchical
routing framework basing on the well-known
hierarchical routing frameworks. It includes a
simple cluster formation procedure and limited
topology broadcasting mechanism. That
routing framework allows any WMC to choose
the best path to another WMC in adjacent
cluster and it also creates up overlapped
clusters for load-balancing control. Basing on
overlapped clusters, we proposed a liquid-
simulated algorithm to control load-balancing
of WMR by distributing traffic generated from
overlapped appropriately to WMR. The fact we
still have many further problems after this
paper. The liquid-simulated algorithm proposed
in this paper gives us a nice result. But
coverage speed and complexity of algorithm,
some of the most important property of
network algorithm, are not studied yet. Model
(2) may not capture entirely load-balancing
problem in WMR. Some assumptions may not
exist in the real network. They are assumptions
on output condition of flows from WMR,
traffic generation rate of WMC in overlapped
areas. To make the model more available in
practice, the future work must deal with a
general case, without the assumptions.
Distributed Computing archive Volume 63 ,
Issue 2 (February 2003) Special issue on
Routing in mobile and wireless ad hoc
networks Pages: 110 - 122 Year of Publication:
2003 ISSN:0743-7315
[4] Tsung-Chuan Huang, Chun-Kai Liao,
Chyi-Ren Dow ”Zone-based hierarchical
routing in two-tier backbone ad hoc networks",
Networks, ICON 2004 Proceedings, 12th IEEE
International Conference on 16- 19 Nov. 2004,
On page(s) 650- 654 vol.2 ISSN: 1531-2216
[5] John Sucec, Ivan Marsic, “Hierarchical
Routing Overhead in Mobile Ad Hoc
Networks” IEEE Transactions on Mobile
Computing, Vol.3 No. 1, January-March 2004
[6] P. Crescenzi, G. Gambosiand P. Penna,
“On-line algorithms for the channel assignment
problem in cellular networks,”Discrete Applied
Mathematics, Vol. 137, no. 3, pp. 237–266,
March 2004.
[7] Viswanathan, H.; Mukherjee, S.,
“Throughput-range tradeoff of wireless mesh
backhaul networks” IEEE Selected Areas in
Communications Journal, Volume 24, Issue 3,
March 2006 Page(s):593 – 602
6. References
[1] Akyildiz, I.F., Wang, X. and Wang, W.,
``Wireless Mesh Networks: A Survey,''
Computer Networks Journal (Elsevier), March
2005.
[2] Changling Liu, JörgKaiser,“A Survey of
Mobile Ad Hoc network Routing Protocols”
Technique report, University of Magdeburg,
http://www.minema.di.fc.ul.pt/papers.html
[3] KaixinXu, Xiaoyan Hong, Mario Gerla
"Landmark routing in ad hoc networks with
mobile backbones" Journal of Parallel and
Jae-Hwan Chang; Tassiulas, L.; “Maximum
lifetime routing in wireless sensor networks”
Networking, IEEE/ACM Transactions on
Volume 12, Issue 4, Aug. 2004 Page(s):609 –
619
[8] Murthy, S. and J.J. Garcia-Luna-Aceves,
“An Efficient Routing Protocol for Wireless
Networks” ACM Mobile Networks and App.
J., Special Issue on Routing in Mobile
Communication Networks, Oct. 1996, pp. 183-
97.