The facilitation of inter-vehicular communication
by direct means or through fixed infrastructure devices like
roadside units enable Vehicular Ad hoc NETwork (VANET)
to be the predominant environment for the deployment of
Intelligent Transportation Systems (ITS).The vehicular
movements in VANET is governed by the incorporated
mobility model for achieving better data dissemination rate
as their mode of multicast routes-based parallel transmission
remains indispensable for sharing traffic related
information. The QoS parameters of multicast routing is to
be satisfied essentially on par with the base protocols, place
and time of application for compliance with the necessity in
robust data dissemination. Enhanced and Integrated Ant
Colony-Artificial Bee Colony oriented Multicast Routing
(EIAC-ABCMR) is formulated as a multicast tree
determination problem that imposes the satisfaction of
multi-constrained QoS by reducing cost, delay and jitter
with increased bandwidth for improving efficacy in data
transmission. The simulation experiments of EIAC-ABCMR
and its derived inferences confirm its importance in reducing
the number of multicast groups formed during data
communication which is about 36% predominant to the
compared baseline multicast routing techniques. The results
of EIAC-ABCMR also infers a better throughput, reduced
normalized load overhead and energy consumptions on par
with the benchmarked QoS constrained multicast routing
schemes under study.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
The facilitation of inter-vehicular communication
by direct means or through fixed infrastructure devices like
roadside units enable Vehicular Ad hoc NETwork (VANET)
to be the predominant environment for the deployment of
Intelligent Transportation Systems (ITS).The vehicular
movements in VANET is governed by the incorporated
mobility model for achieving better data dissemination rate
as their mode of multicast routes-based parallel transmission
remains indispensable for sharing traffic related
information. The QoS parameters of multicast routing is to
be satisfied essentially on par with the base protocols, place
and time of application for compliance with the necessity in
robust data dissemination. Enhanced and Integrated Ant
Colony-Artificial Bee Colony oriented Multicast Routing
(EIAC-ABCMR) is formulated as a multicast tree
determination problem that imposes the satisfaction of
multi-constrained QoS by reducing cost, delay and jitter
with increased bandwidth for improving efficacy in data
transmission. The simulation experiments of EIAC-ABCMR
and its derived inferences confirm its importance in reducing
the number of multicast groups formed during data
communication which is about 36% predominant to the
compared baseline multicast routing techniques. The results
of EIAC-ABCMR also infers a better throughput, reduced
normalized load overhead and energy consumptions on par
with the benchmarked QoS constrained multicast routing
schemes under study.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which are delay sensitive and energy hungry at the same time. Thus a smart packet forwarding technique addressing both the issues is thus the one looked for by any geographic routing protocol. In the present paper we have proposed a Fermat point based forwarding technique which reduces the delay experienced during packet delivery as well as the energy consumed for transmission and reception of data packets.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop technology increasing the coverage
of IEEE 802.11 Wireless Network and providing Internet access. In order to increase the mesh network
capacity, the WMN has evolved from single-radio single-channel architecture to Multi-Channel Multi-
Radios (MC-MR) architecture. In MC-MR the main challenge of the WMN is the channel assignment. In
this article, we propose a new channel assignment method based on channel diversity. This new method
named ODCAM (On Demand channel Assignment Method for channel diversity ) defines a channel
diversity mechanism used to select a new channel along the path between the source and the destination.
The best path between the source and the destination is provided by the HWMP (Hybrid Wireless Mesh
Protocol) protocol using MWCETT (Modified Weighted Cumulative Expected Transmission Time) an
extension of the WCETT metric. The simulation results show the ODCAM performance compared with an
hybrid approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
The delay-tolerant networks (DTN) are networks that support communication between nodes when
connectivity is intermittent, due to the difficulties encountered in this type of environment, such as node
mobility frequently changing network topology, this which does not allow to route messages directly
between the source and destination, the routing algorithms must consider mobility to increase the rate of
message delivery. In our previous work of Supp-Tran we examine that spray and wait router was not
showing good delivery probability in case of SPMBM mobility model and FIFO forwarding strategy
compared to our Supp-Tran strategy.
This paper compares the behavior of the FIFO strategy used by default with spray and wait routing
protocol and that of our Supp-Tran strategy under different type of mobility, to do that the most mobility
models used are chosen to show how mobility model affects the forwarding strategy using as performance
metric such as delivery probability, the number of dropped messages , buffer time average, the overhead
ratio and average number of hops.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join
the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols
which broadcasts control packets to discover routes to the destination nodes, generate a high number of
broadcast packets in a larger networks causing contention and collision. We propose an efficient route
discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique.
The simulation results show that the proposed probabilistic flooding decreases the number of control
packets floating in the network during route discovery phase, without lowering the success ratio of path
discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show
that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of Channel Side Information (CSI)-assisted cooperative amplify-andforward
(CAF) relay networks that employ both the node placement (i.e., relay position) based optimal
power allocation policy among collaborating nodes and adaptive M-ary quadrature amplitude modulation
(M-QAM)/ M-ary phase shift keying (M-PSK) techniques in generalized wireless fading environments. In
particular, we advocate a simple yet unified numerical approach based on the marginal moment generating
function (MGF) of the total received Signal to Noise Ratio (SNR) to derive analytical expressions for the
average bit error rate (ABER), mean achievable spectral efficiency, and outage probability performance
metrics. The proposed analytical framework is sufficiently general and flexible to characterize the
performance of adaptive-link CAF relay networks over a wide range of fading distributions (i.e., not
restricted to Rayleigh fading or independent identically distributed (i.i.d) Nakagami-m fading ) with
independent but non-identically distributed (i.n.d) fading statistics across the spatially distributed diversity
paths. Additionally, we further simplify the computational complexity, by employing the use of an
“approximate MGF expression” to compute the system performance metrics over the generalized fading
channel. Employing the above novel approach based on “approximate MGF” in conjunction derived
analytical frameworks allows us to simplify the computation complexity of achievable spectral efficiency as
well as ABER of CAF relay system in the generalized fading environments by simply replacing appropriate
single channel MGF which is readily available
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
In multiple wireless networks, large end-to-end delay and packet losses can decrease meaningfully the traffic flow goodput due to path irregularity and multiplicity. To report these problems, current methods are proposed by using management of queue and decision making process. Hence, this paper proposesa Harvest-Then-Transmit (HTT) Protocol which selects an energy efficient path based on multiple parameters i.e. energy, delay, transmission time and perform transmission of video to handle number of video packets. A multipath environment is establishing where a server performs transferring of video along the energy efficient path of wireless network. Simulation shows the proposed protocol improves the overall goodput up to 10%, increases packet delivery rate up to 12%, and reduces end-to-end delay up to 3%, compared to existing system.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
I can only help if the customer is willing to follow Citrix best practices. Citrix is “top-of-stack” and therefore agnostic of the underlying hypervisor. Most projects miss a key component regarding the primary purpose of using Citrix. This one mistake does result in failure if not immediately but 3-6 months after implementation.
Infrastructure-As-Code means that infrastructure should be treated as code – a really powerful concept. Server configuration, packages installed, relationships with other servers, etc. should be modeled with code to be automated and have a predictable outcome, removing manual steps prone to errors. That doesn’t sound bad, does it?
The goal is to automate all the infrastructure tasks programmatically. In an ideal world you should be able to start new servers, configure them, and, more importantly, be able to repeat it over and over again, in a reproducible way, automatically, by using tools and APIs.
Have you ever had to upgrade a server without knowing whether the upgrade was going to succeed or not for your application? Are the security updates going to affect your application? There are so many system factors that can indirectly cause a failure in your application, such as different kernel versions, distributions, or packages.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...cscpconf
We present a critical review and analysis of different categories of routing protocols for cognitive radio networks. We first classify the available solutions to two broad categories: those
based on full spectrum knowledge (typically used to establish performance benchmarks) and those based on local spectrum knowledge (used for real-time implementation). The full spectrum knowledge based routing solutions are analyzed from a graph-theoretic point of view, and we review the layered graph, edge coloring and conflict graph models. We classify the various local spectrum knowledge based routing protocols into the following five categories: Minimum power, Minimum delay, Maximum throughput, Geographic and Class-based routing. A total of 25 routing protocols proposed for cognitive radio networks have been reviewed. We discuss the working principle and analyze the pros and cons of the routing protocols. Finally, we propose an idea of a load balancing-based local spectrum knowledge-based routing protocol for cognitive radio ad hoc networks.
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
The delay-tolerant networks (DTN) are networks that support communication between nodes when
connectivity is intermittent, due to the difficulties encountered in this type of environment, such as node
mobility frequently changing network topology, this which does not allow to route messages directly
between the source and destination, the routing algorithms must consider mobility to increase the rate of
message delivery. In our previous work of Supp-Tran we examine that spray and wait router was not
showing good delivery probability in case of SPMBM mobility model and FIFO forwarding strategy
compared to our Supp-Tran strategy.
This paper compares the behavior of the FIFO strategy used by default with spray and wait routing
protocol and that of our Supp-Tran strategy under different type of mobility, to do that the most mobility
models used are chosen to show how mobility model affects the forwarding strategy using as performance
metric such as delivery probability, the number of dropped messages , buffer time average, the overhead
ratio and average number of hops.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
Transferring quantum information through theijngnjournal
Transmission of information in the form of qubits much faster than the speed of light is the important
aspects of quantum information theory. Quantum information processing exploits the quantum nature of
information that needs to be stored, encoded, transmit, receive and decode the information in the form of
qubits. Bosonic channels appear to be very attractive for the physical implementation of quantum
communication. This paper does the study of quantum channels and how best it can be implemented with
the existing infrastructure that is the classical communication. Multiple access to the quantum network is
the requirement where multiple users want to transmit their quantum information simultaneously without
interfering with each others.
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join
the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols
which broadcasts control packets to discover routes to the destination nodes, generate a high number of
broadcast packets in a larger networks causing contention and collision. We propose an efficient route
discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique.
The simulation results show that the proposed probabilistic flooding decreases the number of control
packets floating in the network during route discovery phase, without lowering the success ratio of path
discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show
that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of Channel Side Information (CSI)-assisted cooperative amplify-andforward
(CAF) relay networks that employ both the node placement (i.e., relay position) based optimal
power allocation policy among collaborating nodes and adaptive M-ary quadrature amplitude modulation
(M-QAM)/ M-ary phase shift keying (M-PSK) techniques in generalized wireless fading environments. In
particular, we advocate a simple yet unified numerical approach based on the marginal moment generating
function (MGF) of the total received Signal to Noise Ratio (SNR) to derive analytical expressions for the
average bit error rate (ABER), mean achievable spectral efficiency, and outage probability performance
metrics. The proposed analytical framework is sufficiently general and flexible to characterize the
performance of adaptive-link CAF relay networks over a wide range of fading distributions (i.e., not
restricted to Rayleigh fading or independent identically distributed (i.i.d) Nakagami-m fading ) with
independent but non-identically distributed (i.n.d) fading statistics across the spatially distributed diversity
paths. Additionally, we further simplify the computational complexity, by employing the use of an
“approximate MGF expression” to compute the system performance metrics over the generalized fading
channel. Employing the above novel approach based on “approximate MGF” in conjunction derived
analytical frameworks allows us to simplify the computation complexity of achievable spectral efficiency as
well as ABER of CAF relay system in the generalized fading environments by simply replacing appropriate
single channel MGF which is readily available
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
In multiple wireless networks, large end-to-end delay and packet losses can decrease meaningfully the traffic flow goodput due to path irregularity and multiplicity. To report these problems, current methods are proposed by using management of queue and decision making process. Hence, this paper proposesa Harvest-Then-Transmit (HTT) Protocol which selects an energy efficient path based on multiple parameters i.e. energy, delay, transmission time and perform transmission of video to handle number of video packets. A multipath environment is establishing where a server performs transferring of video along the energy efficient path of wireless network. Simulation shows the proposed protocol improves the overall goodput up to 10%, increases packet delivery rate up to 12%, and reduces end-to-end delay up to 3%, compared to existing system.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
I can only help if the customer is willing to follow Citrix best practices. Citrix is “top-of-stack” and therefore agnostic of the underlying hypervisor. Most projects miss a key component regarding the primary purpose of using Citrix. This one mistake does result in failure if not immediately but 3-6 months after implementation.
Infrastructure-As-Code means that infrastructure should be treated as code – a really powerful concept. Server configuration, packages installed, relationships with other servers, etc. should be modeled with code to be automated and have a predictable outcome, removing manual steps prone to errors. That doesn’t sound bad, does it?
The goal is to automate all the infrastructure tasks programmatically. In an ideal world you should be able to start new servers, configure them, and, more importantly, be able to repeat it over and over again, in a reproducible way, automatically, by using tools and APIs.
Have you ever had to upgrade a server without knowing whether the upgrade was going to succeed or not for your application? Are the security updates going to affect your application? There are so many system factors that can indirectly cause a failure in your application, such as different kernel versions, distributions, or packages.
Storage giants NetApp (NASDAQ:NTAP) and EMC (NYSE:EMC) are making efforts to shift away from the tag of pure “storage companies”. In its Q2 earnings call last year, NetApp management pointed out that they are more of a “data management” vendor and not just a storage hardware company. [1] This statement signaled the company’s intention to evolve from being predominantly a hardware manufacturer to an end-to-end storage solution provider. A similar trend was highlighted when NetApp announced its agreement with VMware (NYSE:VMW) to integrate its Clustered ONTAP Drive with VMware’s vCloud suite last year. [2]
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
In some networks, communications are sometimes interrupted and packet sending encounters many delays
due to lack of permanent connection between the nodes. Inter-vehicular and inter-satellite networks, which
are the so-called delay-tolerant networks, are an example to this type. This paper proposed a new routing
algorithm, which could increase efficiency of this kind of networks using predictability feature of bus
movement in a vehicular network. In this paper, bus routes were considered the backbone for vehicular
network and, knowing route of bus and destination of packets, the proposed algorithm, which was able to
use this information, was introduced. In addition, the proposed algorithm was simulated to prove its
efficiency and then it was compared with other algorithms in different conditions. The obtained results
indicated acceptable efficiency of the proposed algorithm.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
Mobile elements scheduling for periodic sensor applicationsijwmn
In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the depth of the multi-hop routing trees bounded by k. The path of the mobile element is designed to visit subset of the nodes (cache points). These cache points store other nodes data. To address this problem, we propose two heuristic-based solutions. Our solutions take into consideration the distribution of the nodes during the establishment of the tour. The results of our experiments indicate that our schemes significantly outperforms the best comparable scheme in the literature.
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. In fact, security plays a vital role in Wireless Ad hoc network. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current model Congestion Control conceptions, proposals, problems and solutions in Ad hoc for safety transportation. For this purpose, a total of 33 articles related to the security model in Congestion Control published between 2008 and 2013 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link and Science Direct). However, 18 articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main security threats and Error control, challenges for security, security requirement in Congestion Control in Wireless Ad hoc network (CCWAN) and future research within this scope.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
On minimizing data forwarding schedule in multi transmit receive wireless mes...redpel dot com
On minimizing data forwarding schedule in multi transmit receive wireless mesh network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Similar to Using Concurrent Multipath Transmission for Transport Virtualization (20)
When allegations against the Foxconn manufacturing plant—where Apple, Samsung, and Microsoft make large portions of their electronics—were first leveled in 2012, American consumers sure did seem angry. We were irate that their 1 million workers were grossly underpaid (or sometimes not paid at all), that 14-year-olds were making iPhones and Xboxes, and that the factory actually responded to people defenestrating themselves—seeking death rather than more work—by installing safety nets. As is so often the case, anger is all we could muster.
First and foremost, some perspective, although I feel this would benefit all IT Architects, my examples are based on personal experience from the better part of 16.5 years with 1.5 years consulting, 15 years as full time employee for GMAC FS / branded Ally FS / now Ocwen Financial, Dell/Perot. You’re more than welcome to review my biography/profile at www.linkedin.com/in/virtualos/ to validate if my opinion is worth the time. When I left GMAC FS, I was managing three teams and continued to wear the hat of Enterprise Architect and Citrix Architect.
If we don’t balance the human values that we care about with the compelling uses of big data, our society risks abandoning them for the sake of mere innovation or expediency.
Ben Torres/Bloomberg via Getty Images
These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
In a world where the Internet of Things (IoT) produces massive amounts of data from mobile devices, vehicular systems and environmental sensors, data scientist will be tasked with what to do with all of this information. We sat down with Cristian Borcea, PhD from the New Jersey Institute of Technology to discuss the IoT and Big Data applications.
insideBIGDATA: It seems we can’t turn on the television or read a newspaper without encountering the phrase, the “Internet of Things”. Aside from being a marketing term, what does this really mean?
Netgain is a healthcare IT provider
offering secure, reliable and
affordable solutions for complex
IT deployments, hosted electronic
medical records (EMR) and practice
management systems. The company
provides solutions to hundreds of
healthcare organizations across the
United States, often within terminal
server environments.
In response to the rising importance
of eHealth initiatives, the company
has developed a unique eHealth
Architecture, which offers a fully
integrated approach to healthcare
IT and open-platform solutions that
suit the specific needs of healthcare
organizations. Netgain’s IT
outsourcing and 24-hour helpdesk
eliminate the need for expensive
in-house hardware and support,
enabling healthcare organizations
to focus on caring for patients,
instead of worrying about IT concerns.
Printing is a basic business requirement. Yet many of us do not have the capability to print from anywhere using any device as situation demands. Many IT departments are still struggling with the complexities of printer driver management.
Meanwhile, virtualization and cloud computing, mobile work style and BOYD trends add more challenges to enterprise printing, and brings security and compliance issues to the top of the agenda for C-level executives. Print security is much more than protecting gigabytes in a sealed room. Consider the risks of security breaches and potential damages when a sensitive document is printed and left unattended on a shared printer in a public environment. Forward-thinking organizations must future-proof their printing environments to provide worry-free printing with security and compliance at reduced costs.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Using Concurrent Multipath Transmission for Transport Virtualization
1. Using Concurrent Multipath Transmission for
Transport Virtualization: Analyzing Path Selection
Thomas Zinner∗ , Kurt Tutschku† , Akihiro Nakao‡ , Phuoc Tran-Gia∗
∗ University
of Wuerzburg, Institute of Computer Science, Wuerzburg, Germany
eMail: [zinner|trangia]@informatik.uni-wuerzburg.de
† University
of Vienna, Professur "Future Communication",
Universitätsstrasse 10/T11, 1090 Wien, Austria. eMail: kurt.tutschku@univie.ac.at
‡ University
of Tokyo, Graduate School of Interdisciplinary Information Studies,
7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan. eMail: nakao@iii.u-tokyo.ac.jp
Abstract—The concept of Transport Virtualization (TV) enhances the capabilities of future networks. TV enables transport
mechanisms with arbitrary resource usage independent of the
underlying transport system. The simplest form of TV can be
achieved by collecting multiple transport resources (even from
different virtual networks or providers) and selecting the best
resources for exclusive or concurrent use. However, the selection
and application of concurrent paths is complex and its impact
on the transmission is non-intuitive. Path length diversity of
different concurrent paths inevitably introduces out-of-order
packet delivery. We present and discuss a mathematical model for
the analysis of the fundamental behavior and influence factors for
packet re-ordering in concurrent multipath transmissions. Our
model facilitates the understanding of path selection algorithms
for multipath transport virtualization.
I. I NTRODUCTION
Nowadays, data transport is achieved mainly by the Internet Protocol (IP). Its routing feature achieves a scalable
connection of local subnets and end systems. IP assumes
that the interconnecting nodes (i.e. the routers) and the actual
transport resources (i.e. the links) are stable and change only
in case of failures. The Future Internet will consist of interconnected subnets and interconnecting nodes too. However,
the availability of these resources is expected to be provided
for a certain lifetime and their capabilities are highly variable,
cf. [1]. Networks that are based on the model of temporal
leasing of variable resources are referred to as federated
networks, and technologies that enable the safe sharing of such
network resources are denoted as Network Virtualization (NV)
mechanisms.
A major task when creating federated networks for data
transport is the selection of resources. The selection has to
consider the temporal availability of the resources. Therefore,
a measurement-based scheme for selecting these resources is
needed. This mechanism should adapt the federated transport
network to the variable demand for resources as well as to the
currently available resources. Of course, the selection scheme
has to scale sufficiently so that it can be applied in large
networks.
The concept of Transport Virtualization (TV) enhances
the capabilities of future networks. TV can be considered
as an alternative mode of Network Virtualization [2]. While
NV typically facilitates the sharing of resources, TV creates
virtual resources (e.g. virtual links) based on the aggregation
of resources [2]. The simplest form of TV is achieved by
collecting multiple transport resources (even from different
virtual networks or providers) and selecting the best resources
for exclusive or concurrent use. The type of the resources used
for aggregation does not matter; they can be either of physical
or of virtual nature.
The use of concurrent multipath (CMP) transmissions will
bring exceptional advantages to networks, such as higher
throughput and increased resilience. However, CMP will introduce additional complexity which has to be understood.
First, CMP transmission will inevitably introduce out-of-order
packets due to different stochastic packet delay characteristics
on the paths. The re-ordering can be compensated by buffering
at the destination, possibly leading to increased end-to-end
delay but still being transparent to the transport protocol.
Second, the different stochastic delay processes on the paths
can amplify each other in their negative effects on out-oforder packets. Third, the strength and occurrences of such
combination effects are highly non-intuitive.
We study these effects by an analytical model, which is
able to calculate the re-sequencing buffer occupancy probability distribution. This model will be verified by eventbased simulations. Originally, the model was introduced for
the investigation of a many-to-one transmission scenario of
parallel downloads for streaming applications, [3], [4]. In the
context of TV, the model is used for a one-to-one transmission
over multiple paths. By using the analytical model, "what-if"
scenarios and path selection strategies can be easily evaluated.
The paper is structured as follows. First, Section II outlines the idea of TV. Section III discusses work related to
the suggested TV. In Section IV we present the analytical
model for the analysis of the re-sequencing buffer occupancy
probability. Section V provides comprehensive discussions
towards a path selection strategy based on the investigation
of the re-sequencing buffer occupancy probability distribution.
Section VI concludes with a brief summary.
2. Routing
Overlay
used
path
Fig. 1: Selection of one path out of several possible paths
II. T RANSPORT V IRTUALIZATION
The idea of Transport Virtualization constitutes an abstraction concept for data transport resources. In TV, an abstract
data transport resource is combined from one or more physical
or overlay data transport resources. Such a resource can be,
e.g., a leased line, a wave length path, an overlay link, or an IP
forwarding capability to a certain destination. The resources
can be used preclusive or concurrently.
A. Path Selection and Resource Pooling
First let us consider ordinary path selection. In this case, a
single path out of a set of candidate paths is selected. This
is case is depicted in Figure 1. The path characteristic has
a direct impact on reliability, security or on QoS parameters
between the start point and the end point of the transmission.
Therefore, a selection function has to exist which enables the
appropriate choice of the used path. For instance, the different
resources (i.e. paths) could be classified by the path delay.
Moreover, the concurrent usage of different paths might
have appealing advantages. The reliability of the end-toend connection is increased and even the overall throughput
might be higher if concurrent paths are used for the data
transmission. This is illustrated in Figure 2. In this example
two paths are pooled and appear as one virtual link. However,
there has to be a mechanism distributing the data among
the used paths and which is selecting the appropriate set of
concurrent paths. This feature will be discussed in Section
IV. The set of used paths can consist of paths offered by
different Internet or overlay providers. So the data transport
is not bounded to one of these providers any more. It is even
possible to choose the cheapest or fastest resources and pool
them together to a high capacity pipe. The pooling of resources
out of different networks is shown in Figure 3.
TV achieves the pooling by a mechanism that is placed
on nodes that have access to multiple paths or networks,
e.g. end hosts which are multi-homed or routers running
exterior gateway protocols. At the origin of the transmission,
the mechanism decides which resources, i.e. which paths, are
Routing
Overlay
O
l
pooled
resources
Fig. 2: Selection of a couple of paths out of several possible paths
Fig. 3: Selection of a couple of paths out of several possible paths from
different overlays
selected, whether they are used preclusive or concurrently, and
how the data is distributed among these paths. If necessary, the
split data is recombined at the destination to a consistent flow.
Due to the ability to choose between different transmission
options, TV achieves an independence from a specific physical
transport resource.
Even if one of the used resources fails, TV using CMP
may be able to continue partly the transmission service.
Other advantages of CMP transmissions are higher capacity
due to parallelism, avoiding head-of-the-line blocking, spatial
separation of control and data connections, differentiations
between traffic types, and leveraging multiple processors in
routers [5]. On the downside, CMP transmissions require
additional overhead and memory for leveraging packet reordering.
B. Availability of Concurrent Paths
A major concern for the applicability of TV is the availability of different transport resources. Recent investigations
of tier 1 topologies [6] reveal that multiple paths between
many destinations readily exist [7]. Moreover, measurements
in PlanetLab [8] revealed that up to 25% of certain Internet
routes may violate the triangle inequality. That means a shorter
delay can be experienced when another path through an
intermediate node is used.
C. Selection of Pooled Resources
An important question for TV is the selection of pooled
resources, i.e. the choice of a potential set of paths. Typically,
a good path in the set has a short transmission delay [9].
Thus, the mean packet delay on a path is an initial candidate as
selection criteria. However, the interaction between concurrent
paths is expected to be complex. Though, the selection has
to be based on a more detail path description. This will be
evaluated in Section V. For that we will use the packet delay
distribution on a path as a main characterization for the path
behavior.
III. R ELATED W ORK
Multipath transmission mechanisms have been suggested
for IP networks a while. The Stream Control Transmission
3. Protocol (SCTP) [10] enables multi-homing but doesn’t facilitate CMP transfer and its advantages. As seen in [11] typical
problems with packet reordering occur. While [11] proposed
to enhance SCTP such that it can react to packet reordering
this paper presents a mechanism to suppress reordering as far
as possible. As a result transport protocols like SCTP or TCP
do not have to be modified. The pTCP [12] and the Multi-Path
TCP [13] proposals exploit concurrent transmissions, however,
they focus on flow control and the coordination among flows.
Our work complements these studies since we are aiming at
the selection of paths.
Path selection is often investigated on network layer in
context of multipath routing, e.g. [14]. We amend these works
by considering the transmission mechanism on transport layer.
A major work, which addresses the network and transport layer concurrently, is the DaVinci architecture [15]. In
DaVinci, the paths are selected such that the creation of bottlenecks is avoided. The investigation in our paper goes beyond
the results presented in the DaVinci architecture. The DaVinci
proposal considers mainly the mean path delay. However,
we will see in Section V that this assumption might be not
sufficient. Our paper discusses the fundamental performance
issues in selecting paths according to their detailed statistical
characteristics.
Finally, three efforts of IETF working groups (WGs) should be mentioned. The Application-Layer Traffic Optimization
(ALTO) WG [16] aims at providing P2P CDNs with information to perform better-than-random initial peer selection.
This selection protocol might be extended to path selection.
The Low Extra Delay Background Transport (LEDBAT) WG
[17] investigates multi-path TCP connections in order to better
saturate bottlenecks. At last, Transport Area WG discusses
currently the combination of BGP and Multi-path TCP [18].
IV. M ECHANISMS AND P ERFORMANCE M ODELS
TV can be facilitated using one-hop source routing overlays
[19]. Such an overlay is implemented by the SORA architecture [9] where a striping mechanism is used.
Besides the striping of the data to different paths, the TV
mechanism is selecting the pool of concurrent paths. The
candidate paths for pooling might be provided either by a
path oracle (e.g., [20] for operator supported oracles) or by
the start point of the multi-path connection, if this start point
measures the paths by itself.
Next, we will outline the performance model for the suggested striping mechanism. We will start with the mechanism
and then detail the analytical model of the re-sequencing
buffer occupancy. We assume a quasi-stationary case for the
path selection for the model. This means the analytical model
computes steady state probabilities under the assumption that
a certain set of paths is currently used. However, the set
can be changed by the selection mechanism when a used
path degrades or becomes unavailable during operation. The
adaption of the used set of path is of particular interest in
federated networks since here the resources are only available
for a certain lifetime and are variable in their performance.
Data stream divided into segments
with m parts
p1,1
each overlay will offer a set si of parallel paths
(i = 1…v)
overlay 1
p1,s1
Assumption: use m
parallel paths on v
overlays
1
2
src
dst
m paths
m parts have
arrived
m
1
m-1
m
pv,1
m parts are sent in
parallel at time t
With k
v
overlay v
Pv,sv
Re-sequencing buffer
of size N
Reassemble data stream from
obtained parts
s paths
i 1 i
Fig. 4: Striping Mechanism
Since we are interested in a simple model which facilitates
path selection we assume a connectionless transmission between the end points. So the model can focus on the analysis
of different path delay distributions without the influence of
interfering control mechanisms like, e.g., the TCP control loop,
on the data transmission.
A. Striping Mechanism
Figure 4 shows a detailed model of the striping mechanism.
The data stream is divided at the source (src) into segments
which are split into m smaller parts. The parts are transmitted
in parallel on m different overlay paths. The destination (dst)
reassembles these parts. Due to different stochastically varying
delays on the paths, the parts can arrive at the destination outof-order. In the model we assume that the re-ordering of parts
can happen only between different paths while the order on a
path is maintained.
Part or packet re-ordering may have a severe impact on
the application performance. In order to level this behavior,
the destination maintains a finite re-sequencing buffer. A high
buffer occupancy stands for a high number of parts waiting
for other parts and implies unnecessary delay. Moreover, if the
buffer overflows, part loss will occur which leads either to data
loss or complex retransmission. In case of retransmissions, the
delay is increased even further, possibly leading to more part
loss and a corruption of the complete data transport. Therefore,
an important objective is to minimize the re-sequencing buffer
occupancy.
B. Analytical Model for Re-sequencing Buffer Occupancy
In literature initial analytical and approximative methods
exist for estimating the re-sequencing buffer occupancy in
case of multipath downloads or transmissions. We adopt the
analytical model [3] to our system and perform an analytical
performance evaluation upon it. The enhanced model enables
an appropriate parameter choice in case of a multitude of
possibilities.
The considered model assumes a continuous data stream
for the multipath transmissions over m concurrent paths. The
delay on the paths is described by discrete delay distributions
4. ∞
m
P (B = k, sn = i, δi = x). (1)
P (B = k) =
i=1 x=0
The right hand side of the equation denotes the buffer occupancy probability for each path transmitting the mvp and
each possible value for the time passed since the last packet
transmitted over this path was received. As discussed in [4],
this yields to :
P (B = k, sn = i, δi = x)
δj = (m − 1)x + 1 − i − k,
j=1,j=i
δj < x∀j < i, δj ≤ x∀j > i)
i−1
Pi (x)
=
Si,x,k
m
Pj (lj )
j=1
0.06
confidence intervals
of the simulation
Probability
0.04
0.03
0.02
0.01
uniform
gaussian
0
0
10
20
30
40
Pathdelay d (time units)
0.04
0.02
analysis
50
0
0
10
20
30
40
50
Re−sequencing buffer occupancy (packets)
(a) Used path delay distributions (b) Influence of the delay on the resequencing buffer occupancy
Fig. 5: Comparison of analysis and simulations
With this formula we can compute the re-sequencing buffer
occupancy in case of a transmission over m paths with equal
transmission rate.
V. T OWARDS PATH SELECTION F OR E ND P OINTS
Next, we discuss towards the design of path selection
strategies of end points, i.e. of end host and routers which
are capable to choose the set of paths used for the CMP
transmission. A major aim of such a selection strategy is to
minimize the negative effects of CMP transmission, i.e. the
re-ordering of parts due to over-taking among different paths.
This behavior results from different path delay distributions.
As outlined before the re-sequencing buffer occupancy
characterizes the negative effects and is chosen as the main
performance criteria for the presented CMP mechanism.
Two main scenarios are considered for the discussions of
the performance of the CMP mechanism: scenario a) has
two concurrent paths and scenario b) three concurrent paths.
Scenario a) is sufficient to show the impact of the type of
different packet delay distributions on the buffer occupancy.
However, the complexity of path selection can be addressed in
a "three concurrent paths" scenario. This scenario allows for
the discussion of more complex "what-if" settings required for
path selection.
Before discussing the detailed performance evaluation we
validate the correctness of the analytical model by comparison
with a separately implemented, event-based simulation of the
presented mechanism.
A. Validation of the Analytical Model
m
= P(
0.05
Probability
with a resolution of one time unit. We further consider
paths with equal capacity, and that the transmission rate on
each path is equal to one packet per time unit. The delay
for different paths are independent and may follow different
delay distributions. A detailed explanation of the mathematical
model can be found in [3], [4]. Here we only present the
central ideas and adopt them to the given mechanism. The
used model ensures that no packet re-ordering on a single
path can occur. That means that packets send over one path
can not overtake each other. To facilitate the explanation, the
following notations are used:
The packets transmitted at time 0 over path 1, 2, ..., m are
packets 1, 2, ..., m respectively. After transmitting the first m
packets, the packets are appointed to the sources in a roundrobin manner. Thus, at time t packets 1 + mt, 2 + mt, ..., m +
mt are transmitted. We further use the term minimum valued
packet (mvp), as introduced in [3], denoting the lowest indexed
packet at time t that has not arrived at the destination by time
t. For instance, if packets 1 through 5 arrived, but packet 6
did not, packet 6 is the mvp. Thus, the resequencing buffer
occupancy at time t is exactly the number of packets indexed
higher than the mvp that have arrived by time t and no packet
stored in the re-sequencing buffer was transmitted via the path
of the mvp, since packets transmitted on every path arrive in
transmission order. We denote the index of the path of the
mvp by sn and δX,t as the time passed since the last packet
received via path X was transmitted at time t. For brevity we
refer to δX,t as δX in the following. With this notation the
re-sequencing buffer occupancy can be computed as:
Pj (lj )
j=i+1
(2)
where Si,x,k defines the delay configuration on path before
the arrival of the mvp:
Si,x,k = {l1 , ..., li−1 , li+1 , ..., lm : l1 < x, ..., li−1 < x,
m
li+1 ≤ x, ..., lm ≤ x,
lj = (m − 1)x + 1 − i − k}.
j=1,j=i
The simulation model used for the validation was outlined
in [7]. The correct simulation of the packet delay on a single
path is not trivial when requiring that packets do not overtake
each other. Therefore, a special technique for deriving the
appropriate packet delay distribution, as proposed in Section
IV.D of [7], was applied.
We consider for the validation a CMP mechanism with
two concurrent paths and verify the analytical model in two
cases: a) the packet delay on both paths follow a Gaussian
distribution (with mean path delay μ = E[D = d] = 25 and
standard deviation σ = 10) and b) the packet delay on both
paths is uniform distributed (in the range of [0, . . . , 50]). The
delay distributions are shown in Figure 5a). Figure 5b) shows
the re-sequencing buffer occupancy probability P (B = k) for
the investigated scenarios computed by the analytical model
5. μ = 50
μ = 100
μ = 150
Probability P(B=k)
0.06
0.05
0.04
c = 1, ν ≈ 2
v
0.03
0.02
μ = 50
μ = 100
μ = 150
0.01
0
0
50
100
150
200
250
300
Re−sequencing buffer occupancy k (packets)
Fig. 6: Buffer occupancy probability P (B = k) for distributions with same
coefficient of variation and different skewness
and measured in the event-based simulation. The analytically
computed distributions are depicted by the solid lines and the
probability values obtained from simulations are given by a
statistical confidence intervals for a level of 99%.
Figure 5b) shows that there is a very close match of
the buffer probabilities obtained by simulation and by the
analytical model. Consequently, we consider the analytical
model as trustworthy and use it in the reminder of this study.
B. Impact of Type of Delay Distribution
Next, we focus our attention to the impact of the type of
delay distribution on the CMP performance. We investigate
a scenario with two paths for making the effects clearly
identifiable.
Probability distributions are typically described by type,
mean and coefficient of variation cv . The asymmetry of a
probability distribution is described by the skewness of the
distribution ν = μ3 /σ 3 , where μ3 is the third moment about
the mean and σ is the standard deviation. A negative skewness
denotes that most of the probability mass is located at values
higher than the mean value. In case of a positive skewness
the mass of the distribution is concentrated on vales smaller
than the mean. Thus, the right tail is longer indicating that
delay values higher than the mean are located in a greater
distance from it. For the investigations, we consider the delay
distributions for both paths to be of either negative-binomial
(nbin) type or of poisson type. The poisson distribution was
selected since it may reveal a symmetrical behavior and
inherits a strong relationship to a Normal distribution, which is
often used for the approximation of path delay in the Internet
[21]. The negative-binomial distribution was chosen because
of its asymmetry, i.e. a high skewness, while being able to
set the variance. We use for both distributions a coefficient of
variation of cv = 1 and mean values of μ = [50|100|150].
The Figure 6 depicts the buffer occupancy probability
P (B = k) for two concurrent paths. Of course, the mean
of the path delay has remarkable impact. However, although
the means and coefficient of variations are fixed to the same
values for both distributions, Figure 6 shows that the type of
distribution, presented also by different skewness values, leads
to very different buffer fillings. The buffer occupancy is much
lower and the performance better when poisson-like paths are
used. In consequence, distributions with a high asymmetry
should be avoided when selecting paths.
0.02
0.01
0
0
1
μ = 25, σ = 20,
ν = 1.55
Probability P(B ≤ k)
v
nbin
poisson
μ = 50, σ = 20,
ν = 0.75
100
200
Path delay d (time units)
300
0.8
case a)
0.6
0.4
0.2
case d)
case c)
case b)
0
0
50
100
150
200
250
Re−sequencing buffer occupancy k (packets)
(a) Used negative-binomial distri- (b) Impact of different path combibutions with equal standard devia- nations on the buffer occupancy for
tion and different mean values.
three paths
Fig. 7: Complexity of path selection
C. The Complexity of Path Selection
The complexity of path selection will be investigated by
a CMP setting applying three concurrent paths. The number
of three paths permits already the investigation of "what-if"
scenarios where two paths are already selected and a third
path will complement the other paths.
The used distributions for this setting are Negativ-binomial
distributions with mean μ = E[D] = [25|50], standard
deviation σ = 20 and skewness ν = [1.55|0.75]. It has to
be noted that the distribution with lower mean has a higher
skewness. The distributions are depicted in Figure 7a).
Naive Combination: First, we now consider four cases
of paths combinations: a) all three path delay distributions
have the same low mean delay μ = 25, b) all three delay
distributions have the same high mean μ = 50, c) two paths
have low mean delay μ = 25 and one a high mean μ = 50,
and d) one path has a low mean delay μ = 25 and two paths
have high mean of μ = 50. Figure 7b) shows the CDF of
the re-sequencing buffer occupancy for the four cases. The
figure reveals that case a) and b) have almost similar buffer
occupancy distributions. This indicates that the pure delay has
no impact on the buffer occupancy. The slight difference is the
result of the different skewness of the distributions, cf. [7].
For the cases c) and d) it is remarkable that case d) with two
high path delays performs better in terms of buffer occupancy
than case c). Intuitively more paths with lower delay should
result in a better performance, but this is obviously not true
as shown in case d).
Let us consider case c) in greater detail. Therefore, we
assume a single packet from the high delay path which is
much overdue. Until the arrival of this overdue packet, the
low delay paths can easily increase the occupancy of the resequencing buffer. Thus, the buffer is filled quickly by the
low delay paths. This example shows that the high delay
path becomes more dominant over low delays paths in terms
Mean re−sequencing buffer
occupancy E[B] (packets)
0.07
c = 1, ν ≈ 0.1
Probability P(D=d)
0.03
0.08
80 a) all path nbin; σ=20
60
40
b) all path nbin; σ=15
20 c) all path nbin or
normal; σ=10
0
30
40
50
60
70
Mean Delay of the third path (time units)
Fig. 8: Impact of the path characteristics of an arbitrary 3rd path on the mean
re-sequencing buffer occupancy
6. of buffer occupancy. The selection of the paths should level
the variation of the range of mean delays. Moreover, recent
measurement studies in Voice-over-IP systems confirm that a
constant high or low delay may have no significant impact on
the Quality of Experience of the application [22]. Thus it might
be better in CMP to choose a path with a higher mean delay
and lower delay variation in order to relieve the re-sequencing
buffer and avoid packet loss.
Influence of Mean Delay and Delay Variation: Now we
investigate the impact of the mean delay and of the delay
variation. In this setting we assume that two paths are already
selected. The selected paths are of negative-binomial type, one
with a low mean delay μ = 25 and one with a higher mean
delay of μ = 50. We consider three cases where these paths
have a standard deviation of σ = [10|15|20]. In case a), the
delay on the third path, which is completing the other two
paths, is distributed according to a Negativ-binomial distribution with σ = 20 and a mean in the range of [25, . . . , 75], in
case b)the delay distribution is also Negativ-binomial but with
σ = 15, and in case c) we use a Normal or a Negativ-binomial
distribution for all paths with low delay variance and σ = 10.
This case should compare the influence of the skewness, which
is much lower for the Gaussian distribution.
Figure 8 shows that the mean delay of the third path has
a significant impact on buffer occupancy. If the mean path
delay of the third path increases beyond the one with the
higher mean delay then the mean buffer occupancy increases
strongly. However, if the mean path delay of the third path
is between the other two means then even a minimum exists.
This effect is taking more shape when σ is low (case ba and
c). We also conclude that a high delay variance degrades the
CMP performance. Case c shows that the skewness has only
little impact on the mean re-sequencing buffer occupancy.
All-in-all, the above presented investigations show that a
path selection strategy should consider the second moment of
path delay. For a deeper analysis of the re-sequencing buffer
occupancy beyond a mean value analysis, the skewness might
have a significant impacts.
VI. C ONCLUSION
Our contribution is to present an analytical model for
concurrent multipath (CMP) transmissions for transport virtualization (TV). CMP transport has many appealing advantages
such as higher throughput and increased resilience. However,
its application increases also the complexity of the system.
In particular, the use of concurrent paths introduces inevitable
out-of-order packet delivery. This effect has to be leveled by
a re-sequencing buffer at the destination and careful selection
of paths. We discussed the impact of different path delay distributions on the re-sequencing buffer occupancy probability
distribution. Our model facilitates the understanding of path
selection algorithms for multiple-path TV. The obtained results
show that a path selection using the mean delay as sole criteria
is not sufficient. Further criteria like higher moments and even
the type of the delay distribution have to be considered. Since
the analytical model is rather simple it might be used as a first
step toward the on-line estimation of the quality of a certain
set of paths. Such an on-line estimation is of particular interest
in federated networks.
Further, future work should address the coordination of TV
and CMP mechanisms among different overlays. In addition,
the findings presented in this paper have to be validated by
real measurements. Another extension should be an analytical
approximation of the real end-to-end delay which is not yet
included in the presented model.
ACKNOWLEDGMENTS
The authors would like to thank Dirk Staehle and Tobias
Hoßfeld for the fruitful discussions and their support during
the course of this work. The sponsorship of this research by
the European FP7 Network of Excellence "Euro-NF" through
the Specific Joint Research Project "Multi-Next" is thankfully
acknowledged.
R EFERENCES
[1] Larry Peterson, Soner Sevinc, Jay Lepreau, Robert Ricci, John Wroclawski, Ted Gaber, and Stephen Schwab,
“Slice-Based Facility Architecture,” 2009, Information available at http://svn.planetlab.org/attachment/wiki/GeniWrapper/sfa.pdf.
[2] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia,
“Re-sequencing Buffer Occupancy of a Concurrent Multipath Transmission Mechanism for Transport System Virtualization,” in Proc. of
the 16. KiVS 2009, Kassel, Germany, Mar. 2009.
[3] Yoav Nebat and Moshe Sidi., “Resequencing Considerations in Parallel
Downloads,” in Proc. 21st Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM), 2002.
[4] Y. Nebat et al., “Parallel Downloads for Streaming Applications – a
Resequencing Analysis,” Performance Evaluation, vol. 63, no. 1, pp.
15–35, Jan. 2006.
[5] R. Penno, S. Raghunath, R. Woundy, V. Gurbani, and J. Touch,
“LEDBAT Practices and Recommendations draft-ietf-ledbat-practicesrecommendations-00.txt,” Mar. 2009.
[6] Michael Liljenstam, Jason Liu, and David Nichol, “Development of
an internet backbone topology for large-scale network simulation,” in
Proceedings of the 2003 Winter Simulation Conference, New Orleans,
December 2003.
[7] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia,
“Performance Evaluation of Packet Re-ordering on Concurrent Multipath Transmissions for Transport Virtualization,” to be published
in JCNDS Special Issue on: Network Virtualization - Concepts and
Performance Aspects, 2011.
[8] Suman Banerjee, Tomothy Griffin, and Marcelo Pias, “The Interdomain
Connectivity of PlanetLab Nodes,” in Proc. of the 5th Passive and Active
Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France.,
Apr. 2004.
[9] John Russell Lane and Akihiro Nakao, “Best-Effort Network Layer
Packet Reordering in Support of Multipath Overlay Packet Dispersion,”
in Proc. of Globecom08, New Orleans, LA., Nov./Dec. 2008.
[10] L. Ong and J. Yoakum, “RFC 3286: An Introduction to the Stream
Control Transmission Protocol (SCTP),” May 2002.
[11] Janardhan R. Iyengar, Paul D. Amer, and Randall Stewart, “Concurrent
Multipath Transfer using SCTP Multihoming over Independent End-toEnd Paths,” IEEE/ACM Trans. Netw., vol. 14, no. 5, pp. 951–964, 2006.
[12] Hung-Yun Hsieh and Raghupathy Sivakumar, “pTCP: An End-to-End
Transport Layer Protocol for Striped Connections,” in Proceedings of
the 10th IEEE International Conference on Network Protocols, Paris, France, Nov. 2002.
[13] Huaizhong Han, Srinivas Shakkottai, Student Member, C. V. Hollot,
R. Srikant, and Don Towsley, “Multi-Path TCP: A Joint Congestion
Control and Routing Scheme to Exploit Path Diversity in the Internet,”
IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1260–1271, Dec. 2006.
7. [14] Ivan Gojmerac, Peter Reichl, and LAsse Jansen, “Towards LowComplexity Internet Traffic Engineering: The Adaptive Multi-Path Algorithm,” Computer Networks, vol. 52, no. 15, pp. 2894–2907, Oct.
2008.
[15] Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford,
and Mung Chiang, “DaVinci: Dynamically Adaptive Virtual Networks
for a Customized Internet,” in Proc. 4th ACM International Conference
on emerging Networking EXperiments and Technologies (ACM CoNEXT
2008), Madrid, Spain, Dec. 2008.
[16] John Peterson, Vijay Gurbani, and Enrico Marocci, “Charter of the
Application-Layer Traffic Optimization (ALTO) Working Group,” Mar.
2009.
[17] Stanislav Shalunov and Murari Sridhavan, “Charter of the Low Extra
Delay Background Transport (LEDBAT) Working Group,” Mar. 2009.
[18] James Polk and Gorry Fairhurst, “Charter of the Transport Area Working
Group (TSVWG),” Mar. 2009.
[19] Krishna P. Gummadi and Harsh V. Madhyastha, “Improving the
reliability of internet paths with one-hop source routing,” in Proc.
OSDI’04, San Francisco, Ca., USA, Dec. 2004.
[20] Christian Scheideler Vinay Aggarwal, Anja Feldmann, “Can ISPs and
P2P Systems Co-operate for Improved Performance?,” ACM SIGCOMM
CCR, vol. 37, no. 3, Jul. 2007.
[21] Tamas Elteto and Sandor Molnar, “On the Distribution of Round-trip
Delays in TCP/IP Networks,” in Proceedings 26th Conference on Local
Computer Networks (LCN’99), Lowell, Oct. 1999.
[22] Tobias Hoßfeld, David Hock, Phuoc Tran-Gia, Kurt Tutschku, and
Markus Fiedler, “Testing the IQX Hypothesis for Exponential Interdependency between QoS and QoE of Voice Codecs iLBC and G.711,”
in 18th ITC Specialist Seminar on Quality of Experience, Karlskrona,
Sweden, May 2008.