SlideShare a Scribd company logo
1 of 29
QOS - ORIENTED ROUTING PROTOCOLS 
Presented by : 
S.Aakasham, ME-CSE 
PG Scholar (2013-2015) 
SVS COLLEGE OF ENGINEERING,CBE-109
Outline 
 Introduction of QoS 
 Literature survey 
 Objective 
 Algorithm 
 Advantages 
 Disadvantages 
 References 
2
Introduction Of QoS 
 To find a QoS path between source and destination, Which 
satisfies 
 The QoS requirements for each admitted connection and 
 Optimizes the use of network resources 
 Quality encompasses the data loss, latency, jitter, efficient 
use of network resources,.. 
 QoS mechanisms for unfairness: managing queuing 
behavior, shaping traffic, control admission, routing, … 
3
Challenges In QOS 
 Mobility 
 Dynamic changing topology 
 Bandwidth constrains 
 Energy constrains 
 Scalability 
4
Literature Survey 
 Himansha Sharma, Yogendra Kumar Jain, Geetika S. Pandey 
“QoS oriented reservation based routing mechanism for 
wireless” 
 Vida Lashkari B. O., Mehdi Dehghan “QoS-aware Multicast Ad 
hoc On-Demand Distance Vector Routing” 
5
1.QOS ORIENTED RESERVATION BASED 
ROUTING MECHANISM FOR WIRELESS 
 In this paper introduced QoS reservation mechanism for 
MANETs, allowing bandwidth allocation on a per flow basis 
 To select the highest possible transmission rate for exchanging 
data, independently for each neighbor 
 The paper analyzes the applicability of the proposed mechanism 
over both proactive and reactive routing protocols 
6
Reservation-Based Mechanism 
 First reserving the network path that has sufficient resources to 
satisfy the QoS requirements 
 Achieving global efficiency in resource utilization 
 It also naturally distributes the traffic more evenly among network 
nodes (i.e. load balancing) 
7
Algorithm 
 Available bandwidth 
 It can be defined as the maximum throughput with which we 
can transmit (between two nodes) without interrupt flows 
transmitted on the Ad Hoc network 
 It is required for admission control; QoS based routing, flow 
management and resources reservation 
8
Algorithm (Cont..) 
 The maximum available bandwidth quantity on a node can be 
defined by this function : 
 MAB(i) = BW(i) – x(i) – SUM(j) € Ni x(j) 
 x (i) = Used Bandwidth on the node i 
 x (j) = Used Bandwidth by the node j, neighbour of the node i 
 Node j = neighbour of node i 
 Ni = set of node i 
9
Algorithm (Cont..) 
 The available bandwidth is expressed by the following expression: 
 AB (i,j) = MIN { MAB(i), MAB(j)} 
 For a path p= (S, i, j…k, D) 
 S: Source 
 D: Destination 
 i, j…k the intermediate nodes 
10
Algorithm (Cont..) 
 Maximum Available Bandwidth guaranteed on the path is done by 
the formula : 
 MAB(p) = MIN { MAB(S, i) , MAB(i, j) , MAB(k, D)} 
11
Advantages 
 It is simple and very effective way of using the transmission rate 
12
Disadvantages 
 A reservation mechanism to free the existing reservation, when 
link is broken and set of connection loose 
13
2. QOS-AWARE MULTICAST AD HOC 
ON-DEMAND DISTANCE VECTOR ROUTING 
 In this paper introduced to improve the route discovery 
mechanism for QoS multicast routes 
 To perform accurate resource reservation, it developed a method 
for estimating the consumed bandwidth in multicast trees 
 In this paper introduce the QoS-MAODV protocol by using 
admission control and bandwidth reservation in each node 
14
Algorithm 
 QoS-MAODV protocol uses six different message types for 
creation of QoS multicast tree 
1. Route request (Rreq) 
2. Route reply (Rrep) 
3. Multicast activation (Mact) 
4. Group hello (Grph) 
5. Hello 
6. QoS-lost 
15
Algorithm (Cont..) 
 MAODV keeps a routing table 
1. Bandwidth reservation table 
 It includes multicast group address, Amount of reserved bandwidth, 
state of the reservation, time stamp, hop count from the source node, 
and IP address of the source node 
2. Neighbors table 
 It includes neighbor address, amount of reserved bandwidth in neighbor 
node, state of the reservation, amount of consumed bandwidth in 
neighbor, state of neighbor and time stamp 
16
Bandwidth Control 
 Bself (I) can be defined by the total reserved bandwidth of all 
existing flows at node I for all nodes J in the neighborhood of 
node : 
 Available bandwidth at node I can be given by : 
17
Bandwidth Control (Cont..) 
 Given the requested bandwidth Bmin, the bandwidth to be reserved 
for the flow j at node I is: 
 The consumed bandwidth for flow j on node I's channel can be 
given by: 
 Buplink (I)(j) is the reserved bandwidth for flow j on the upstream neighbor of 
node I, 
 Bdownlink (I)(j) is the bandwidth that the downstream neighbor of node I 
reserved for flow j 
18
Advantages 
 Minimum required bandwidth support 
 Decrease the end-to-end delay 
19
QOD ROUTING PROTOCOL FOR HWN 
 Usually, a hybrid network has widespread base stations 
 The data transmission in hybrid networks has two features: 
1. An AP can be a source or a destination to any mobile node 
 It allows a stream to have anycast transmission along multiple 
transmission paths to its destination through base stations 
2. The number of transmission hops between a mobile node and 
an AP is small 
 It enables a source node to connect to an AP through an intermediate 
node 
20
Network model of the HWM 
21
Algorithms 
 In this paper introduce the QoS-Oriented Distributed routing 
protocol(QOD) 
 This QOD protocol makes five contributions: 
 QoS-guaranteed neighbor selection algorithm 
 Distributed packet scheduling algorithm 
 Mobility-based segment resizing algorithm 
 Soft-deadline based forwarding scheduling algorithm 
 Data redundancy elimination based transmission 
22
Algorithm(cont..) 
 1.QoS-guaranteed neighbor selection algorithm 
 The algorithm selects qualified neighbors and deadline-driven scheduling 
mechanism to guarantee QoS routing 
 Get an allocation set A : 
 Uas(i)* Wi : available workload rate source node needs to distribute its 
packets to the Nq 
 Ai : workload rate allocation from source node to immediate node 
 Wg : the packet generating rate of the source node 
23
Algorithm(cont..) 
 2.Distributed packet scheduling algorithm 
 After qualified neighbors are identified, this algorithm schedules packet 
routing. It assigns earlier generated packets to forwarders with higher 
queuing delays, while assigns more recently generated packets to 
forwarders with lower queuing delays to reduce total transmission delay 
 Distributed queuing mechanism (e.g.: 3 packets distributed) 
24
Algorithm(cont..) 
 2.Distributed packet scheduling algorithm 
 The queuing time of a packet with priority x estimated by : 
 and : The transmission delay and arrival interval of a packet 
with the jth priority 
 : The number of packets arriving during the packet’s 
queuing time 
25
Algorithm(cont..) 
 3.Mobility-based segment resizing algorithm 
 The source node adaptively resizes each packet in its packet stream for each 
neighbor node according to the neighbor’s mobility 
 The mobility of a node increases, the size of a packet Sp sent from a node to 
its neighbor nodes i decreases as following : 
 γ : Scaling parameter an 
 υi : The relative mobility speed of the source node and intermediate node 
 =1 kb 
26
Algorithm(cont..) 
 4.Soft-deadline based forwarding scheduling algorithm 
 An intermediate node first forwards the packet with the least time 
allowed to wait before being packet forwarding 
 A forwarding node can use the least slack first (LSF) scheduling 
algorithm 
 The slack time of a packet p is defined as : 
 Dp : Deadline of packet p 
 t : The current time 
 c’ : The remaining packet transmission time of the packet 
27
Algorithm(cont..) 
 5.Data redundancy elimination based transmission 
 The APs and mobile nodes can overhead and cache packets 
 Use an end-to-end traffic redundancy elimination (TRE) algorithm 
eliminates the redundant data to improve the QoS of the packet transmission 
28
REFERENCES 
 Himansha Sharma, Yogendra Kumar Jain, Geetika S. Pandey 
“QoS oriented reservation based routing mechanism for wireless” 
Journal of Global Research in Computer Science ad-hoc 
networks” Volume 2, No. 12, December 2011 
 Vida Lashkari B. O., Mehdi Dehghan “QoS-aware Multicast Ad 
hoc On-Demand Distance Vector Routing” Proceedings of the 
World Congress on Engineering Vol 2WCE 2007 
29

More Related Content

What's hot

ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 

What's hot (15)

ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Last
LastLast
Last
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
23
2323
23
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 

Viewers also liked

english for chinese
english for chineseenglish for chinese
english for chineseChanel Rhona
 
Responsibilities and barriers
Responsibilities and barriersResponsibilities and barriers
Responsibilities and barriersrichard_nelson
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2AAKASH S
 
Daniel presentación
Daniel  presentación Daniel  presentación
Daniel presentación Daniel Robles
 
Developing the question
Developing the questionDeveloping the question
Developing the questionrichard_nelson
 
Глянец №26 (июль-август 2014)
Глянец №26 (июль-август 2014)Глянец №26 (июль-август 2014)
Глянец №26 (июль-август 2014)Nina Timina
 
Ringkasan Dialog ID-IGF (bahasa Indonesia)
Ringkasan Dialog ID-IGF (bahasa Indonesia)Ringkasan Dialog ID-IGF (bahasa Indonesia)
Ringkasan Dialog ID-IGF (bahasa Indonesia)ID-IGF
 
iPad integration handout
iPad integration handoutiPad integration handout
iPad integration handoutandrewupfold
 
10 things you should know before learning ruby or rails
10 things you should know before learning ruby or rails10 things you should know before learning ruby or rails
10 things you should know before learning ruby or railsRichardson Dackam
 
How to build a nuclear bomb - Frank Barnaby
How to build a nuclear bomb - Frank BarnabyHow to build a nuclear bomb - Frank Barnaby
How to build a nuclear bomb - Frank BarnabySystem32nemesis
 
Students' work/ environmntal issues
Students' work/ environmntal issuesStudents' work/ environmntal issues
Students' work/ environmntal issuesMaria Louvari
 
Modul Tata Kelola Internet
Modul Tata Kelola InternetModul Tata Kelola Internet
Modul Tata Kelola InternetID-IGF
 
Innovative FlexPak - Nexeo
Innovative FlexPak - NexeoInnovative FlexPak - Nexeo
Innovative FlexPak - NexeoClinton Johnson
 

Viewers also liked (18)

english for chinese
english for chineseenglish for chinese
english for chinese
 
Responsibilities and barriers
Responsibilities and barriersResponsibilities and barriers
Responsibilities and barriers
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
Daniel presentación
Daniel  presentación Daniel  presentación
Daniel presentación
 
Hack x Crack N.18
Hack x Crack N.18Hack x Crack N.18
Hack x Crack N.18
 
Hxc13
Hxc13Hxc13
Hxc13
 
Hxc7
Hxc7Hxc7
Hxc7
 
Developing the question
Developing the questionDeveloping the question
Developing the question
 
Глянец №26 (июль-август 2014)
Глянец №26 (июль-август 2014)Глянец №26 (июль-август 2014)
Глянец №26 (июль-август 2014)
 
Ringkasan Dialog ID-IGF (bahasa Indonesia)
Ringkasan Dialog ID-IGF (bahasa Indonesia)Ringkasan Dialog ID-IGF (bahasa Indonesia)
Ringkasan Dialog ID-IGF (bahasa Indonesia)
 
Hxc8
Hxc8Hxc8
Hxc8
 
iPad integration handout
iPad integration handoutiPad integration handout
iPad integration handout
 
10 things you should know before learning ruby or rails
10 things you should know before learning ruby or rails10 things you should know before learning ruby or rails
10 things you should know before learning ruby or rails
 
Hack x Crack N.17
Hack x Crack N.17Hack x Crack N.17
Hack x Crack N.17
 
How to build a nuclear bomb - Frank Barnaby
How to build a nuclear bomb - Frank BarnabyHow to build a nuclear bomb - Frank Barnaby
How to build a nuclear bomb - Frank Barnaby
 
Students' work/ environmntal issues
Students' work/ environmntal issuesStudents' work/ environmntal issues
Students' work/ environmntal issues
 
Modul Tata Kelola Internet
Modul Tata Kelola InternetModul Tata Kelola Internet
Modul Tata Kelola Internet
 
Innovative FlexPak - Nexeo
Innovative FlexPak - NexeoInnovative FlexPak - Nexeo
Innovative FlexPak - Nexeo
 

Similar to Qo s oriented distributed routing protocols : anna university 2nd review ppt

A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsIOSR Journals
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsCSEIJJournal
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
7117cseij01
7117cseij017117cseij01
7117cseij01cseij
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 

Similar to Qo s oriented distributed routing protocols : anna university 2nd review ppt (20)

A comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETsA comparative analysis on qos multicast routing protocols in MANETs
A comparative analysis on qos multicast routing protocols in MANETs
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
D017252327
D017252327D017252327
D017252327
 
J017515960
J017515960J017515960
J017515960
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETs
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
7117cseij01
7117cseij017117cseij01
7117cseij01
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 

More from AAKASH S

Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...AAKASH S
 
Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)AAKASH S
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAAKASH S
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notesAAKASH S
 
Capability Maturity Model Integration
Capability Maturity Model IntegrationCapability Maturity Model Integration
Capability Maturity Model IntegrationAAKASH S
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2AAKASH S
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2AAKASH S
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AAKASH S
 
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...AAKASH S
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review AAKASH S
 

More from AAKASH S (11)

Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
 
Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)Enhanced Adaptive ACKnowledgment (EAACK)
Enhanced Adaptive ACKnowledgment (EAACK)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
 
Capability Maturity Model Integration
Capability Maturity Model IntegrationCapability Maturity Model Integration
Capability Maturity Model Integration
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
Network simulator 2
Network simulator 2Network simulator 2
Network simulator 2
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replica...
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Qo s oriented distributed routing protocols : anna university 2nd review ppt

  • 1. QOS - ORIENTED ROUTING PROTOCOLS Presented by : S.Aakasham, ME-CSE PG Scholar (2013-2015) SVS COLLEGE OF ENGINEERING,CBE-109
  • 2. Outline  Introduction of QoS  Literature survey  Objective  Algorithm  Advantages  Disadvantages  References 2
  • 3. Introduction Of QoS  To find a QoS path between source and destination, Which satisfies  The QoS requirements for each admitted connection and  Optimizes the use of network resources  Quality encompasses the data loss, latency, jitter, efficient use of network resources,..  QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, … 3
  • 4. Challenges In QOS  Mobility  Dynamic changing topology  Bandwidth constrains  Energy constrains  Scalability 4
  • 5. Literature Survey  Himansha Sharma, Yogendra Kumar Jain, Geetika S. Pandey “QoS oriented reservation based routing mechanism for wireless”  Vida Lashkari B. O., Mehdi Dehghan “QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing” 5
  • 6. 1.QOS ORIENTED RESERVATION BASED ROUTING MECHANISM FOR WIRELESS  In this paper introduced QoS reservation mechanism for MANETs, allowing bandwidth allocation on a per flow basis  To select the highest possible transmission rate for exchanging data, independently for each neighbor  The paper analyzes the applicability of the proposed mechanism over both proactive and reactive routing protocols 6
  • 7. Reservation-Based Mechanism  First reserving the network path that has sufficient resources to satisfy the QoS requirements  Achieving global efficiency in resource utilization  It also naturally distributes the traffic more evenly among network nodes (i.e. load balancing) 7
  • 8. Algorithm  Available bandwidth  It can be defined as the maximum throughput with which we can transmit (between two nodes) without interrupt flows transmitted on the Ad Hoc network  It is required for admission control; QoS based routing, flow management and resources reservation 8
  • 9. Algorithm (Cont..)  The maximum available bandwidth quantity on a node can be defined by this function :  MAB(i) = BW(i) – x(i) – SUM(j) € Ni x(j)  x (i) = Used Bandwidth on the node i  x (j) = Used Bandwidth by the node j, neighbour of the node i  Node j = neighbour of node i  Ni = set of node i 9
  • 10. Algorithm (Cont..)  The available bandwidth is expressed by the following expression:  AB (i,j) = MIN { MAB(i), MAB(j)}  For a path p= (S, i, j…k, D)  S: Source  D: Destination  i, j…k the intermediate nodes 10
  • 11. Algorithm (Cont..)  Maximum Available Bandwidth guaranteed on the path is done by the formula :  MAB(p) = MIN { MAB(S, i) , MAB(i, j) , MAB(k, D)} 11
  • 12. Advantages  It is simple and very effective way of using the transmission rate 12
  • 13. Disadvantages  A reservation mechanism to free the existing reservation, when link is broken and set of connection loose 13
  • 14. 2. QOS-AWARE MULTICAST AD HOC ON-DEMAND DISTANCE VECTOR ROUTING  In this paper introduced to improve the route discovery mechanism for QoS multicast routes  To perform accurate resource reservation, it developed a method for estimating the consumed bandwidth in multicast trees  In this paper introduce the QoS-MAODV protocol by using admission control and bandwidth reservation in each node 14
  • 15. Algorithm  QoS-MAODV protocol uses six different message types for creation of QoS multicast tree 1. Route request (Rreq) 2. Route reply (Rrep) 3. Multicast activation (Mact) 4. Group hello (Grph) 5. Hello 6. QoS-lost 15
  • 16. Algorithm (Cont..)  MAODV keeps a routing table 1. Bandwidth reservation table  It includes multicast group address, Amount of reserved bandwidth, state of the reservation, time stamp, hop count from the source node, and IP address of the source node 2. Neighbors table  It includes neighbor address, amount of reserved bandwidth in neighbor node, state of the reservation, amount of consumed bandwidth in neighbor, state of neighbor and time stamp 16
  • 17. Bandwidth Control  Bself (I) can be defined by the total reserved bandwidth of all existing flows at node I for all nodes J in the neighborhood of node :  Available bandwidth at node I can be given by : 17
  • 18. Bandwidth Control (Cont..)  Given the requested bandwidth Bmin, the bandwidth to be reserved for the flow j at node I is:  The consumed bandwidth for flow j on node I's channel can be given by:  Buplink (I)(j) is the reserved bandwidth for flow j on the upstream neighbor of node I,  Bdownlink (I)(j) is the bandwidth that the downstream neighbor of node I reserved for flow j 18
  • 19. Advantages  Minimum required bandwidth support  Decrease the end-to-end delay 19
  • 20. QOD ROUTING PROTOCOL FOR HWN  Usually, a hybrid network has widespread base stations  The data transmission in hybrid networks has two features: 1. An AP can be a source or a destination to any mobile node  It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations 2. The number of transmission hops between a mobile node and an AP is small  It enables a source node to connect to an AP through an intermediate node 20
  • 21. Network model of the HWM 21
  • 22. Algorithms  In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)  This QOD protocol makes five contributions:  QoS-guaranteed neighbor selection algorithm  Distributed packet scheduling algorithm  Mobility-based segment resizing algorithm  Soft-deadline based forwarding scheduling algorithm  Data redundancy elimination based transmission 22
  • 23. Algorithm(cont..)  1.QoS-guaranteed neighbor selection algorithm  The algorithm selects qualified neighbors and deadline-driven scheduling mechanism to guarantee QoS routing  Get an allocation set A :  Uas(i)* Wi : available workload rate source node needs to distribute its packets to the Nq  Ai : workload rate allocation from source node to immediate node  Wg : the packet generating rate of the source node 23
  • 24. Algorithm(cont..)  2.Distributed packet scheduling algorithm  After qualified neighbors are identified, this algorithm schedules packet routing. It assigns earlier generated packets to forwarders with higher queuing delays, while assigns more recently generated packets to forwarders with lower queuing delays to reduce total transmission delay  Distributed queuing mechanism (e.g.: 3 packets distributed) 24
  • 25. Algorithm(cont..)  2.Distributed packet scheduling algorithm  The queuing time of a packet with priority x estimated by :  and : The transmission delay and arrival interval of a packet with the jth priority  : The number of packets arriving during the packet’s queuing time 25
  • 26. Algorithm(cont..)  3.Mobility-based segment resizing algorithm  The source node adaptively resizes each packet in its packet stream for each neighbor node according to the neighbor’s mobility  The mobility of a node increases, the size of a packet Sp sent from a node to its neighbor nodes i decreases as following :  γ : Scaling parameter an  υi : The relative mobility speed of the source node and intermediate node  =1 kb 26
  • 27. Algorithm(cont..)  4.Soft-deadline based forwarding scheduling algorithm  An intermediate node first forwards the packet with the least time allowed to wait before being packet forwarding  A forwarding node can use the least slack first (LSF) scheduling algorithm  The slack time of a packet p is defined as :  Dp : Deadline of packet p  t : The current time  c’ : The remaining packet transmission time of the packet 27
  • 28. Algorithm(cont..)  5.Data redundancy elimination based transmission  The APs and mobile nodes can overhead and cache packets  Use an end-to-end traffic redundancy elimination (TRE) algorithm eliminates the redundant data to improve the QoS of the packet transmission 28
  • 29. REFERENCES  Himansha Sharma, Yogendra Kumar Jain, Geetika S. Pandey “QoS oriented reservation based routing mechanism for wireless” Journal of Global Research in Computer Science ad-hoc networks” Volume 2, No. 12, December 2011  Vida Lashkari B. O., Mehdi Dehghan “QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing” Proceedings of the World Congress on Engineering Vol 2WCE 2007 29