Enhancement of qos in multihop wireless networks by delivering cbr using lb algorithm

eSAT Journals
eSAT JournalseSAT Journals

Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.

IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 392
ENHANCEMENT OF QOS IN MULTIHOP WIRELESS NETWORKS BY
DELIVERING CBR USING LB ALGORITHM
Mohan Santhosh Kumar.G1
, Sebastin Christhu Raj. A2
, Arivubrakan.P3
1
PG Scholar, Dept of CSE, SJCET, Thanjavur, India
2
PG Scholar, Dept of CSE, SJCET, Thanjavur, India
3
Assistant Professor, Dept of CSE, SJCET, Thanjavur, India
Abstract
One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The
two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its
own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one
hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay
performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated
difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the
timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when
loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of
square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the
transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of
the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose
The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The
proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It
reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way.
Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
In cellular, WLAN, The communication involves the last link
between the base station and end system. Whereas in Multihop
wireless networks having one or more intermediate nodes
along the path that receive and forwarding packets via wireless
links It can able to extend the coverage of the network and
improve the connectivity. In Multi hop Wireless Networks, The
Joint Congestion Control and Scheduling Algorithm based
problems has been deeply investigated in the literature [1].
Frequently, the non reducing and utility concave function with
each user is associated and a cross layer utility maximization
problem is regulated, To enhance the use of total system that
the scheduling algorithm supported the corresponding rate
vector. One suitable advantageous settlement of this problem is
max-weight back pressure scheduling algorithm combined with
congestion control module at the source [2]. In a
telecommunication channel, through the integration of various
mechanisms at various design layers, Information flow is
achieved with supporting the information transfer based on the
needs of applications. Particularly in wireless networks, In
order to support the information transfer the unfairness way of
interaction at different layers is evolved.
Fig 1: Multihop wireless network
The issues that are found when extending the progress of
general resource allocation for multi hop wireless networks.
[2], In the loosely coupled cross layer, the clean state
optimization problem to multi hop resource allocations results
normally. The algorithm congest to map the different layers,
(transport, network and MAC/PHY) coupled through the lots
of information passed with protocol stack.[3], The most
important challenge in designing a wireless network,
distributed Scheduling algorithms is needed so that it can
efficiently share the bandwidth properly. Nowadays few
algorithms allow a node to interact a single node at a time.[4],
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 393
The Distributed wireless scheduling algorithm that can
guarantees to attain the fixed fraction of the region without
modifying the size of the network. The parameter clearly
handles the exchange between the control overhead and
throughput performance of the scheduler. Most of the
algorithms in an effort to increase the scheduling performance
without considering the control overheads This is a clear
problem that in view of designing wireless resource usage.
Particularly for large networks using unaccounted portion of
resources for control signals. The algorithm performs well and
used for the remaining portion of the data transmissions.[5]
The cross layer approach having better performance bounds
when compared to layered approach, because it does not
modeling the rate control and scheduling together. However, it
requires prior knowledge of the capacity region in order to
Choose such a rate region. On the other hand, the cross layered
approach to rate control can allocate the data rates without
requiring previous accurate knowledge of the capacity region.
It means the network jointly optimizes both the user data rates
and resource allocation of the underlying layers.
Our proposed algorithm not only achieves the provable
throughput guarantee but also leads to explicit upper bounds of
the end to end delay of every flow. When compared with
existing works deals with scheduling algorithm, in addition to
joint congestion control and scheduling algorithm, The leaky
bucket algorithm can able to guarantees the bandwidth by
delivering packets with a constant flow regardless of the
incoming packets in a busty manner.
2. RELATED WORK
The number of physical and access layer parameters are
controlled and combined with the functions of higher layers
such as transport, routing.[1]. Moreover, the specific layer
associated with state information becomes available beyond
another layer as certain functions can uses that information.
Generally, The functions of the physical and access layer
includes power control; and allocation of channels. After that it
performs the selection of frequency and carrier in OFDM
(Orthogonal Frequency Division Multiplexing) in spread
spectrum, The spreading of codes and adjustments of rates are
performed as well as allocation of the time slots can also
achieved in TDMA Systems. Additional choices of the wireless
network designs may include the modulation and the coding
rate. These above parameters are based on the quality of the
channel and desired rates. In order to the interference property
of the wireless node, it cannot be independently viewed. So
presenting the model to hold the cross layer interaction from
physical layer to transport layer in wireless networks, it allows
traffic forwarding nodes, including datagrams and virtual
circuits. The link transmission rates are determined by
transmission rate function C(I,S)
µ (t) = C (I(t),S(t))
Here, S(t) represents the network topology state with time slot
t. I(t) represents the link control action taken by the network
with time slot t.
Optimization based approaches has already been used in
resource allocation problems in communication networks [2].
Internet congestion control can be treated as the distributed
aspect of optimization to enhance the system performance.
Such kinds of approaches were resulted in briefly having the
knowledge of TCP. Particularly, the wireless network is multi
access shared medium where the users interfere with each other
and the capacity also time varying due to mobility, multipath.
This causes interdependencies across users and the network. So
declaring clean state optimization resource allocation for
multihop wireless networks. Instead of temporal unfairness,
here considering the other forms of QoS
 Fairness in utility: Each user receives a fraction of
the total utility value.
 Minimum data rate requirement: Each user receives
the data rates of bits per second.
 Proportional Fairness: The objective is to achieve
the proportional fair.
The routing and link activation policy attained here guarantee
to stabilize the network. [3] (i.e giving maximum throughput).
This is Particularly relevant in wireless networks where
distributed algorithm are used for comparisons. Based on these
observations, a proposed distributed framework that repeatedly
determines the accurate solutions to maximum weight
matching problems and combines the sequential solutions. As
discussed before [3], the merge operation does not need to
select the preferable matching. The framework involves the
two different phases. The first phase contains the solution of
the maximal matching problem is obtained. The second phase
involves comparing and merging the successive accurate
solutions. Here proposing three alternatives to required
information for comparison. First approach is based on the
information collected from the local components of the
network. Second approach is based on the Gossip algorithm
[3], investigate the value by random manner in order to
compute the old and new solution. The advantage of the
algorithm is it does not need any infrastructure. Third approach
deals with the estimation of old and new solutions distributedly
calculating the minimum values of random exponentially
variables.[4]. The task of wireless scheduling is the concurrent
presence of two characteristics. Interference based
transmissions, and the need of real time distributed
implementation. For any scheduling algorithm, the interference
based effects results in maximum values of the data rates. In
practice, the need for distributed implementation dynamically
leads to overhead. As mentioned above, for data transmissions,
the power and bandwidth resources are used as the same time.
Instead of be wasted of control signals.
The cross layer control problem consists of two elements. First
is to determine the users that which imposing the data into the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 394
network. [5] Second is to determine the when and at what rate
each link can decide to transmit the data over the network. [6]
Different wireless networks especially having the different
constraints of interference. Bluetooth networks can satisfy the
sharing model of exclusive node. Whereas, IEEE 802.11
having the limited amount of frequencies and they do not allow
the same frequency in the two hop networtks. [7] Each and
every node having the locally unique frequency. When
multiple transmissions occur, if they never have a common
node, it can proceed with interference. The link maintains the
matching which are active at any time. Here presenting a two
tier approach that attains the maximum fairness for multihop
networks. First steps involves the sharing the bandwidth of
each node for each session at its path, and releases packets for
transmissions. Second step schedules the transmission of the
released packets.
3. METHODOLOGY
3.1 The Joint Congestion Control
In this algorithm, whenever the packet arrives at a heavy traffic
router, the packet is fetched at random manner from the FIFO
based buffer with the arrived packets are compared. Both of the
packets are dropped if they arrive at the same flow. Otherwise,
the randomly chosen packets are kept aside and newly arriving
packets are collected and put into the buffer depends on the
congestion level. It is really a simple and good algorithm that
does not require any special data structure. This algorithm does
not deliver good performance when the large number of flows
compared with its buffer space.
3.2 Scheduling Algorithm
This is the enhanced version of distributed scheduling
algorithm with low complexity. Here, each time slot having an
initial scheduling property. And it is further divided into n mini
slots. Each link has to be scheduled and selected according to
the scheduling slot as mentioned above.
Fig 2: Operation of scheduling algorithm.
The selected links are transmits the packets by rest of the time
slots. Each link randomly selects a mini time slots and
transmitting packets. When the timer associated in the slot got
invalidated, the link already received the same packet as before
from the neighbor. It makes the transmission interference,
occurring of collisions, and finally results in transmission
failure.
3.3 Leaky Bucket Algorithm
The algorithm is the most promising method for the prevention
of congestion control in networks. For QoS support, the
algorithm maintains the dynamic token generation at intervals.
The information may be network lost, resource became useless
etc, the input traffic must be controlled at the appropriate level
of buffer occupancy.
Fig 3: Leaky Bucket
In other words, the threshold l on the buffer for the indication
of congestion The arrivals are controlled based on the queue
length exceeds the threshold. The arrival cells are
accommodated by the buffer.
Fig 4: Leaky Bucket Implementation
In order to the arrival, the incoming packets are stored into the
buffer. The counter is incremented by the credit generator and
transfers each packet from the buffer when decrements it exits.
To prevent simultaneous departures from different connections
to the output line, there is a output FIFO queue is maintained.
These are the below steps that leaky bucket algorithm is
performed.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 395
Step 1: When host injects a packet that is thrown in to the
bucket.
Step 2: The bucket leaks at a constant rate (i.e), the network
transmits constant delivery of packets.
Step 3: Busty traffic is converted into uniform traffic by the
leaky bucket.
Step 4: In real time, the bucket having finite queue so that it
can delivers finite rate.
4. SYSTEM IMPLEMENTATION
4.1 System Model
The wireless node has to be created by a graph, V is the vertex,
E is the edge, TL denotes the total number of links, each link
consists of transmitter node X(l) and receiver node Y(l). two
nodes are one hop neighbors if they have a common link. Two
links e one hop neighbor if they have a common node. Assume
that a time slotted wireless system, the packet transmission
occurs within time slots of unit length, here l denotes the link
capacity. Interference of two links each other takes place, if
they cannot transmit data at same time slot.
4.2 Joint Congestion Control
It operates on the basis of observing the rate of injection of new
packets into the networks and returning rate of
acknowledgements by other end. Declaring the congestion
window as cnwd. When establishing a new connection with a
host on another network. Initialization of congestion window
segment is 1. Typically by other end segment size is announced
as default (536 or 512). each time the congestion window is
increased when receiving the acknowledgements, so that the
sender can transmits minimum of the congestion window.
MaxWindow :: min(CongestionWindow, AdvertisedWindow)
EffectiveWindow = MaxWindow – (LastByteSent -
LastByteAcked)
4.3 Scheduling Algorithm
The representation of Scheduling algorithm is the modification
of Distributed scheduling algorithm. Each time slot consist of
initial scheduling slots and it is further divided in to n mini
slots. The links has to be selected and scheduled according to
the time slots. And the selected links are transmitted the
packets during rest of the time slots.
4.4 Cross Layer Control
It is fully waterfall oriented concept of the OSI communication
model between the boundary layers. The approach conduct
survey dynamically through the boundaries of the layer for
enabling the compensation. In OSI model enforces the tight
boundaries between the layers. Within a given layer, the data is
tightly kept. Whereas, the cross layer approach allows that
removing such tight boundaries and promotes communication
between layers by allowing one layer to access the another
layer data for information exchange and enables interaction.
Fixed allocation of resources may results in mismatch
operations of networks. Automatic repeat request (ARQ)
scheme used at the MAC layer in optimizing tradeoffs and
achieving maximum throughput.
4.5 Performance Analysis
Generally, evaluating the performance is entirely based on the
Scheduling algorithm. The improvement of the algorithm is
allowing each link if it has to involve packet transmission. The
average delay of our algorithm deals with increases linearly
with the hop count.
The output of the simulation variables has been considered in
the simulator is Packet delivery ratio : The number of packets
received at destination on data packets sent by source. Protocol
overhead : it is calculated by sending number of HELLO
Protocols. Average energy consumption : it deals with wastage
energy while maintenance of routing and discovery. It
considers the energy consumption during transmission and
reception of data and control packets. Average node residual
energy : considering the lifetime of the network so that it can
used to evaluate the remaining energy of the node.
5. SIMULATION RESULTS
5.1 Simulation Parameters
5.2 Throughput
It defines the number of packets arriving at the destination per
second. The following graphs show the throughput provided by
the two different algorithms with CBR connection with
comparing the different number of nodes. The conducted
simulation which results in existing work with 60 nodes at a
throughput of 2.35Mbps, whereas, the proposed algorithm
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 396
delivers a better throughput 5.67Mbps by delivering the data
transmission in a Constant bit rate at 60 nodes.
Fig 5: Throughput
5.3 Packet Loss
The Packet loss is defined using the metric that Size of the
Packet with respect to the occurring of loss. In the existing
work, the loss could not be controlled by initiating whatever
the size of the packet, the loss occurred at a extreme high,
whereas, the proposed algorithm which reduces the loss by
delivering the data in the Constant bit rate and retransmission
of the entire packets also been avoided. One of the notable
thing is the loss increasing as well as the packet size also
incremented. When compared the previous work the proposed
algorithm achieves 68% of the existing works deals with 92%.
Fig 6: Packet Loss
5.4 End to End Delay
End to End Delay is defined as the input parameters based on
the simulation time that which the process is simulated. By
conducting these types of simulations the results would be
more effective than the expectations what we have planned
earlier, When comparing the existing algorithms it has been
maintained upto the extreme of 82% and that has been reduced
by the proposed algorithm in the way of 48% in 1.5mSec.
Fig 7: End to End Delay
5.5 Packet Delivery Ratio
The term Packet Delivery Ratio is calculated on the basis of
simulation time during the number of Packets had been
received from the number of packets has been sent. As
mentioned earlier for the corresponding parameters involved in
the above simulation. In the existing works narrate the ratio
that achieving the 93%. In turn the Proposed algorithm
achieves the precise ratio of 99.6% even though it across the 60
niodes the rate has been maintained.
Fig 8: Packet Delivery Ratio
6. CONCLUSIONS
The transmission range as a system parameter affects the
overall energy consumption of multihop wireless networks.
The performance of these two algorithms shows some
differences by varying transmission range and simulation time.
From our experimental analysis we conclude that leaky bucket
algorithm delivering maximum throughput, high packet
delivery ratio, loss of packet is less and end to end delay is low
compared to the existing joint congestion control and
scheduling algorithm. We compare the two algorithms in the
analyzed scenario, we found that overall performance of leaky
bucket is better than existing algorithms at 120m range. The
performance enhanced in higher transmission range. Our
results can be used to determine the proper radio transmission
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 397
range for the leaky bucket algorithm which guarantees the
bandwidth by delivering the packets at a constant bit rate
regardless of the arrival rate. The proposed leaky bucket
algorithm that allows multihop wireless networks without
degrading a system performance
REFERENCES
[1] L. Georgiadis, M. J. Neely, and L. Tassiulas, “Resource
allocation and cross-layer control in wireless
networks,” Found. Trends Netw., vol. 1, no. 1, pp. 1–
144, 2006.
[2] X. Lin, N. B. Shroff, and R. Srikant, “A tutorial on
cross-layer optimization in wireless networks,” IEEE J.
Sel. Areas Commun., vol. 24,no. 8, pp. 1452–1463,
Aug. 2006.
[3] E. Modiano, D. Shah, and G. Zussman, “Maximizing
throughput in wireless networks via gossiping,” in
Proc. ACM SIGMETRICS, 2006, pp. 27–38.
[4] S. Sanghavi, L. Bui, and R. Srikant, “Distributed link
scheduling with constant overhead,” in Proc. ACM
SIGMETRICS, 2007, pp. 313–324.
[5] X. Lin and N. B. Shroff, “The impact of imperfect
scheduling on cross-layer congestion control in
wireless networks,” IEEE/ACM Trans. Netw.,vol. 14,
no. 2, pp. 302–315, Apr. 2006.
[6] P. Chaporkar, K. Kar, and S. Sarkar, “Throughput
guarantees through maximal scheduling in wireless
networks,” IEEE Trans. Inf. Theory, vol. 54, no. 2, pp.
572–594, Feb. 2008.
[7] S. Sarkar and L. Tassiulas, “End-to-end bandwidth
guarantees through fair local spectrum share in wireless
ad-hoc networks,” in Proc. IEEE CDC, Maui, HI, Dec.
2003, vol. 1, pp. 564–569
[8] A. Gupta, X. Lin, and R. Srikant, “Low-complexity
distributed scheduling algorithms for wireless
networks,” IEEE/ACM Trans. Netw., vol.17, no. 6, pp.
1846–1859, Dec. 2009.
[9] L. Bui, R. Srikant, and A. L. Stolyar, “Novel
architectures and algorithms for delay reduction in
back-pressure scheduling and routing,”in Proc. IEEE
INFOCOM Mini-Conf., 2009, pp. 2936–2940.
[10] P.-K. Huang and X. Lin, “The end-to-end delay
performance of a class of wireless scheduling
algorithms,” in Proc. Allerton Conf. Commun.,Control,
Comput., 2010, pp. 951–952.
[11] L. Huang and M. J. Neely, “Delay reduction via
Lagrange multipliers in stochastic network
optimization,” in Proc. WiOpt, 2009, pp. 1–10.
[12] M. J. Neely, “Delay-based network utility
maximization,” in Proc.IEEE INFOCOM, 2010, pp. 1–
9.
[13] M.J.Neely, “Delay analysis for maximal scheduling in
wireless networks with bursty traffic,” in Proc. IEEE
INFOCOM, 2008, pp. 6–10.
[14] L. B. Le, K. Jagannathan, and E. Modiano, “Delay
analysis of maximum weight scheduling in wireless ad
hoc networks,” in Proc. IEEE CISS, Baltimore, MD,
Mar. 2009, pp. 389–394.
[15] G. R. Gupta and N. B. Shroff, “Delay analysis for
multi-hop wireless networks,” in Proc. IEEE
INFOCOM, 2009, pp. 2356–2364.
[16] L. Huang and M. J. Neely, “Delay efficient scheduling
via redundant constraints in multihop networks,” in
Proc. WiOpt, 2010, pp. 142–151.
[17] L. B. Le, E. Modiano, and N. B. Shroff, “Optimal
control of wireless networks with finite buffers,” in
Proc. IEEE INFOCOM, 2010, pp. 1–9.
[18] P. Jayachandran and M. Andrews, “Minimizing end-to-
end delay in wireless networks using a coordinated
EDF schedule,” in Proc. IEEE INFOCOM, 2010, pp.
1–9.
BIOGRAPHIES
G.Mohan Santhosh Kumar received the
B.Tech degree in the stream of Information
Technology from Prist university, Thanjavur,
In 2012. And Pursuing Master of Engineering
in the stream of Computer Science and
Engineering from St.Joseph’s College of Engineering and
Technology (Batch 2012-2014), Thanjavur. He has Presented
Research papers in National & International Conferences.
Also published papers in International Journals. His Field of
interest includes Computer Networks, Database Management
Systems.
Sebastin Christhu Raj A received the M.Sc
degree in CS stream at Bharathidasan
University in 2010. And pursuing M.E degree
in CSE stream at St.Joseph’s College of Engg
& tech, Thanjavur. He worked as a
Production Engineer in OKAY SOFT & Devolepers Pvt.Ltd.
Area of Interest is Mobile Computing, Power Management
Systems.
P.Arivubrakan received the B.E degree in
CSE stream from Saranathan College of
Engineering, Thiruchirapalli in 2010. And
Done her M.E. Degree in Pervasive
Computing Technologies from Anna
University of Technology, Thiruchirapalli in
2012. She is Working as a Assistant Professor in St.Joseph
College of Engg & Tech, Thanjavur. She has Presented
Research Papers in National & International Confereces. Also
published Papers in International Journals. Her Research area
Includes System Software, Principles of Compiler Design,
Unix Internals and Design and Analysis of Algorithm.

Recomendados

Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks por
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
166 vistas8 diapositivas
Efficient Load Balancing Routing in Wireless Mesh Networks por
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
422 vistas5 diapositivas
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ... por
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Eswar Publications
100 vistas8 diapositivas
Newton-raphson method to solve systems of non-linear equations in VANET perfo... por
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
14 vistas7 diapositivas
A scalable and power efficient solution for routing in mobile ad hoc network ... por
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
325 vistas13 diapositivas
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network por
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
745 vistas11 diapositivas

Más contenido relacionado

La actualidad más candente

EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS por
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
33 vistas8 diapositivas
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN por
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
53 vistas7 diapositivas
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A... por
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
53 vistas9 diapositivas
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs) por
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
197 vistas6 diapositivas
An efficient vertical handoff mechanism for future mobile network por
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
475 vistas5 diapositivas
A novel routing technique for mobile ad hoc networks (manet) por
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
602 vistas15 diapositivas

La actualidad más candente(17)

EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS por cscpconf
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
cscpconf33 vistas
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN por paperpublications3
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
paperpublications353 vistas
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs) por Narendra Singh Yadav
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
An efficient vertical handoff mechanism for future mobile network por Basil John
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
Basil John475 vistas
A novel routing technique for mobile ad hoc networks (manet) por ijngnjournal
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal602 vistas
Destination Aware APU Strategy for Geographic Routing in MANET por Editor IJCATR
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR269 vistas
Energy efficient neighbour selection for flat wireless sensor networks por csandit
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
csandit298 vistas
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T... por IJCNCJournal
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
IJCNCJournal34 vistas
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG... por IJCNCJournal
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
IJCNCJournal58 vistas
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer por Eswar Publications
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Eswar Publications78 vistas
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows... por Eswar Publications
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Eswar Publications63 vistas
A New Paradigm for Load Balancing in WMNs por CSCJournals
A New Paradigm for Load Balancing in WMNsA New Paradigm for Load Balancing in WMNs
A New Paradigm for Load Balancing in WMNs
CSCJournals168 vistas
Traffic-aware adaptive server load balancing for softwaredefined networks por IJECEIAES
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
IJECEIAES6 vistas

Destacado

An efficient, secure deduplication data storing in cloud storage environment por
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
134 vistas4 diapositivas
Design of multi bit multi-phase vco-based adc por
Design of multi bit multi-phase vco-based adcDesign of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adceSAT Journals
97 vistas4 diapositivas
Image compression using negative format por
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Journals
241 vistas4 diapositivas
Experimental study of the forces above and under the vibration insulators of ... por
Experimental study of the forces above and under the vibration insulators of ...Experimental study of the forces above and under the vibration insulators of ...
Experimental study of the forces above and under the vibration insulators of ...eSAT Journals
84 vistas6 diapositivas
Optimisation of earth quake response of tall building by using different fram... por
Optimisation of earth quake response of tall building by using different fram...Optimisation of earth quake response of tall building by using different fram...
Optimisation of earth quake response of tall building by using different fram...eSAT Journals
185 vistas7 diapositivas
Design, construction and performance evaluation of an electric powered egg in... por
Design, construction and performance evaluation of an electric powered egg in...Design, construction and performance evaluation of an electric powered egg in...
Design, construction and performance evaluation of an electric powered egg in...eSAT Journals
1.5K vistas6 diapositivas

Destacado(17)

An efficient, secure deduplication data storing in cloud storage environment por eSAT Journals
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals134 vistas
Design of multi bit multi-phase vco-based adc por eSAT Journals
Design of multi bit multi-phase vco-based adcDesign of multi bit multi-phase vco-based adc
Design of multi bit multi-phase vco-based adc
eSAT Journals97 vistas
Image compression using negative format por eSAT Journals
Image compression using negative formatImage compression using negative format
Image compression using negative format
eSAT Journals241 vistas
Experimental study of the forces above and under the vibration insulators of ... por eSAT Journals
Experimental study of the forces above and under the vibration insulators of ...Experimental study of the forces above and under the vibration insulators of ...
Experimental study of the forces above and under the vibration insulators of ...
eSAT Journals84 vistas
Optimisation of earth quake response of tall building by using different fram... por eSAT Journals
Optimisation of earth quake response of tall building by using different fram...Optimisation of earth quake response of tall building by using different fram...
Optimisation of earth quake response of tall building by using different fram...
eSAT Journals185 vistas
Design, construction and performance evaluation of an electric powered egg in... por eSAT Journals
Design, construction and performance evaluation of an electric powered egg in...Design, construction and performance evaluation of an electric powered egg in...
Design, construction and performance evaluation of an electric powered egg in...
eSAT Journals1.5K vistas
A web application detecting dos attack using mca and tam por eSAT Journals
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
eSAT Journals77 vistas
Open newton cotes quadrature with midpoint derivative for integration of al... por eSAT Journals
Open newton   cotes quadrature with midpoint derivative for integration of al...Open newton   cotes quadrature with midpoint derivative for integration of al...
Open newton cotes quadrature with midpoint derivative for integration of al...
eSAT Journals327 vistas
Design of v slotted microstrip patch antenna for yielding improved gain bandw... por eSAT Journals
Design of v slotted microstrip patch antenna for yielding improved gain bandw...Design of v slotted microstrip patch antenna for yielding improved gain bandw...
Design of v slotted microstrip patch antenna for yielding improved gain bandw...
eSAT Journals144 vistas
An algorithm for design of brick lining for irrigation channels por eSAT Journals
An algorithm for design of brick lining for irrigation channelsAn algorithm for design of brick lining for irrigation channels
An algorithm for design of brick lining for irrigation channels
eSAT Journals135 vistas
Cost effective and efficient industrial tank cleaning process por eSAT Journals
Cost effective and efficient industrial tank cleaning processCost effective and efficient industrial tank cleaning process
Cost effective and efficient industrial tank cleaning process
eSAT Journals161 vistas
Analysis and design of steel dome using software por eSAT Journals
Analysis and design of steel dome using softwareAnalysis and design of steel dome using software
Analysis and design of steel dome using software
eSAT Journals1K vistas
Font type identification of hindi printed document por eSAT Journals
Font type identification of hindi printed documentFont type identification of hindi printed document
Font type identification of hindi printed document
eSAT Journals230 vistas
Bit error rate analysis of wimax physical layer under sui and awgn channel mo... por eSAT Journals
Bit error rate analysis of wimax physical layer under sui and awgn channel mo...Bit error rate analysis of wimax physical layer under sui and awgn channel mo...
Bit error rate analysis of wimax physical layer under sui and awgn channel mo...
eSAT Journals451 vistas
Microstrip low pass filter designs using defected ground structure por eSAT Journals
Microstrip low pass filter designs using defected ground structureMicrostrip low pass filter designs using defected ground structure
Microstrip low pass filter designs using defected ground structure
eSAT Journals732 vistas
Audio descriptive analysis of singer and musical instrument identification in... por eSAT Journals
Audio descriptive analysis of singer and musical instrument identification in...Audio descriptive analysis of singer and musical instrument identification in...
Audio descriptive analysis of singer and musical instrument identification in...
eSAT Journals355 vistas
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air... por eSAT Journals
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
Analysis of fuel consumption and oxides of nitrogen using oxygen enriched air...
eSAT Journals90 vistas

Similar a Enhancement of qos in multihop wireless networks by delivering cbr using lb algorithm

M1802037781 por
M1802037781M1802037781
M1802037781IOSR Journals
153 vistas5 diapositivas
A smart clustering based approach to por
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
176 vistas14 diapositivas
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies por
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
550 vistas7 diapositivas
A survey on congestion control mechanisms por
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
235 vistas6 diapositivas
IRJET-A Survey on congestion control with TCP network por
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
33 vistas7 diapositivas
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK por
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
86 vistas10 diapositivas

Similar a Enhancement of qos in multihop wireless networks by delivering cbr using lb algorithm(20)

A smart clustering based approach to por IJCNCJournal
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
IJCNCJournal176 vistas
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies por IOSR Journals
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals550 vistas
IRJET-A Survey on congestion control with TCP network por IRJET Journal
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
IRJET Journal33 vistas
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK por cscpconf
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
cscpconf86 vistas
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS... por csandit
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
csandit32 vistas
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net... por Waqas Tariq
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Waqas Tariq288 vistas
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N... por IRJET Journal
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
IRJET Journal3 vistas
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me... por IRJET Journal
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
IRJET Journal23 vistas
Iisrt arunkumar b (networks) por IISRT
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
IISRT390 vistas
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE... por cscpconf
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
cscpconf46 vistas
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks por IJCNCJournal
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
IJCNCJournal301 vistas
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET por ijcncs
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
ijcncs833 vistas

Más de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements por
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
1.5K vistas4 diapositivas
Material management in construction – a case study por
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
1K vistas4 diapositivas
Managing drought short term strategies in semi arid regions a case study por
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
701 vistas7 diapositivas
Life cycle cost analysis of overlay for an urban road in bangalore por
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
859 vistas7 diapositivas
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials por
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
616 vistas5 diapositivas
Laboratory investigation of expansive soil stabilized with natural inorganic ... por
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
456 vistas4 diapositivas

Más de eSAT Journals(20)

Mechanical properties of hybrid fiber reinforced concrete for pavements por eSAT Journals
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals1.5K vistas
Material management in construction – a case study por eSAT Journals
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals1K vistas
Managing drought short term strategies in semi arid regions a case study por eSAT Journals
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals701 vistas
Life cycle cost analysis of overlay for an urban road in bangalore por eSAT Journals
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals859 vistas
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials por eSAT Journals
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals616 vistas
Laboratory investigation of expansive soil stabilized with natural inorganic ... por eSAT Journals
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals456 vistas
Influence of reinforcement on the behavior of hollow concrete block masonry p... por eSAT Journals
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals402 vistas
Influence of compaction energy on soil stabilized with chemical stabilizer por eSAT Journals
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals252 vistas
Geographical information system (gis) for water resources management por eSAT Journals
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals371 vistas
Forest type mapping of bidar forest division, karnataka using geoinformatics ... por eSAT Journals
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals162 vistas
Factors influencing compressive strength of geopolymer concrete por eSAT Journals
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals174 vistas
Experimental investigation on circular hollow steel columns in filled with li... por eSAT Journals
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals268 vistas
Experimental behavior of circular hsscfrc filled steel tubular columns under ... por eSAT Journals
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals233 vistas
Evaluation of punching shear in flat slabs por eSAT Journals
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals421 vistas
Evaluation of performance of intake tower dam for recent earthquake in india por eSAT Journals
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals149 vistas
Evaluation of operational efficiency of urban road network using travel time ... por eSAT Journals
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals756 vistas
Estimation of surface runoff in nallur amanikere watershed using scs cn method por eSAT Journals
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals335 vistas
Estimation of morphometric parameters and runoff using rs & gis techniques por eSAT Journals
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals154 vistas
Effect of variation of plastic hinge length on the results of non linear anal... por eSAT Journals
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals152 vistas
Effect of use of recycled materials on indirect tensile strength of asphalt c... por eSAT Journals
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals939 vistas

Último

Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...AltinKaradagli
9 vistas16 diapositivas
What is Unit Testing por
What is Unit TestingWhat is Unit Testing
What is Unit TestingSadaaki Emura
23 vistas25 diapositivas
Machine learning in drug supply chain management during disease outbreaks: a ... por
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...IJECEIAES
12 vistas17 diapositivas
Generative AI Models & Their Applications por
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their ApplicationsSN
6 vistas1 diapositiva
Saikat Chakraborty Java Oracle Certificate.pdf por
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdfSaikatChakraborty787148
15 vistas1 diapositiva
Machine Element II Course outline.pdf por
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdfodatadese1
8 vistas2 diapositivas

Último(20)

Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli9 vistas
Machine learning in drug supply chain management during disease outbreaks: a ... por IJECEIAES
Machine learning in drug supply chain management during disease outbreaks: a ...Machine learning in drug supply chain management during disease outbreaks: a ...
Machine learning in drug supply chain management during disease outbreaks: a ...
IJECEIAES12 vistas
Generative AI Models & Their Applications por SN
Generative AI Models & Their ApplicationsGenerative AI Models & Their Applications
Generative AI Models & Their Applications
SN6 vistas
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese18 vistas
Quality Manual Chaity Group.pdf por Mizan Rahman
Quality Manual Chaity Group.pdfQuality Manual Chaity Group.pdf
Quality Manual Chaity Group.pdf
Mizan Rahman5 vistas
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa... por ijseajournal
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
Taking out the Trash (And the Recyclables]: RFID and the Handling of Municipa...
ijseajournal5 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon17 vistas
Control Systems Feedback.pdf por LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming55 vistas
zincalume water storage tank design.pdf por 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 vistas
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome17 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 vistas
NEW SUPPLIERS SUPPLIES (copie).pdf por georgesradjou
NEW SUPPLIERS SUPPLIES (copie).pdfNEW SUPPLIERS SUPPLIES (copie).pdf
NEW SUPPLIERS SUPPLIES (copie).pdf
georgesradjou15 vistas

Enhancement of qos in multihop wireless networks by delivering cbr using lb algorithm

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 392 ENHANCEMENT OF QOS IN MULTIHOP WIRELESS NETWORKS BY DELIVERING CBR USING LB ALGORITHM Mohan Santhosh Kumar.G1 , Sebastin Christhu Raj. A2 , Arivubrakan.P3 1 PG Scholar, Dept of CSE, SJCET, Thanjavur, India 2 PG Scholar, Dept of CSE, SJCET, Thanjavur, India 3 Assistant Professor, Dept of CSE, SJCET, Thanjavur, India Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput. ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In cellular, WLAN, The communication involves the last link between the base station and end system. Whereas in Multihop wireless networks having one or more intermediate nodes along the path that receive and forwarding packets via wireless links It can able to extend the coverage of the network and improve the connectivity. In Multi hop Wireless Networks, The Joint Congestion Control and Scheduling Algorithm based problems has been deeply investigated in the literature [1]. Frequently, the non reducing and utility concave function with each user is associated and a cross layer utility maximization problem is regulated, To enhance the use of total system that the scheduling algorithm supported the corresponding rate vector. One suitable advantageous settlement of this problem is max-weight back pressure scheduling algorithm combined with congestion control module at the source [2]. In a telecommunication channel, through the integration of various mechanisms at various design layers, Information flow is achieved with supporting the information transfer based on the needs of applications. Particularly in wireless networks, In order to support the information transfer the unfairness way of interaction at different layers is evolved. Fig 1: Multihop wireless network The issues that are found when extending the progress of general resource allocation for multi hop wireless networks. [2], In the loosely coupled cross layer, the clean state optimization problem to multi hop resource allocations results normally. The algorithm congest to map the different layers, (transport, network and MAC/PHY) coupled through the lots of information passed with protocol stack.[3], The most important challenge in designing a wireless network, distributed Scheduling algorithms is needed so that it can efficiently share the bandwidth properly. Nowadays few algorithms allow a node to interact a single node at a time.[4],
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 393 The Distributed wireless scheduling algorithm that can guarantees to attain the fixed fraction of the region without modifying the size of the network. The parameter clearly handles the exchange between the control overhead and throughput performance of the scheduler. Most of the algorithms in an effort to increase the scheduling performance without considering the control overheads This is a clear problem that in view of designing wireless resource usage. Particularly for large networks using unaccounted portion of resources for control signals. The algorithm performs well and used for the remaining portion of the data transmissions.[5] The cross layer approach having better performance bounds when compared to layered approach, because it does not modeling the rate control and scheduling together. However, it requires prior knowledge of the capacity region in order to Choose such a rate region. On the other hand, the cross layered approach to rate control can allocate the data rates without requiring previous accurate knowledge of the capacity region. It means the network jointly optimizes both the user data rates and resource allocation of the underlying layers. Our proposed algorithm not only achieves the provable throughput guarantee but also leads to explicit upper bounds of the end to end delay of every flow. When compared with existing works deals with scheduling algorithm, in addition to joint congestion control and scheduling algorithm, The leaky bucket algorithm can able to guarantees the bandwidth by delivering packets with a constant flow regardless of the incoming packets in a busty manner. 2. RELATED WORK The number of physical and access layer parameters are controlled and combined with the functions of higher layers such as transport, routing.[1]. Moreover, the specific layer associated with state information becomes available beyond another layer as certain functions can uses that information. Generally, The functions of the physical and access layer includes power control; and allocation of channels. After that it performs the selection of frequency and carrier in OFDM (Orthogonal Frequency Division Multiplexing) in spread spectrum, The spreading of codes and adjustments of rates are performed as well as allocation of the time slots can also achieved in TDMA Systems. Additional choices of the wireless network designs may include the modulation and the coding rate. These above parameters are based on the quality of the channel and desired rates. In order to the interference property of the wireless node, it cannot be independently viewed. So presenting the model to hold the cross layer interaction from physical layer to transport layer in wireless networks, it allows traffic forwarding nodes, including datagrams and virtual circuits. The link transmission rates are determined by transmission rate function C(I,S) µ (t) = C (I(t),S(t)) Here, S(t) represents the network topology state with time slot t. I(t) represents the link control action taken by the network with time slot t. Optimization based approaches has already been used in resource allocation problems in communication networks [2]. Internet congestion control can be treated as the distributed aspect of optimization to enhance the system performance. Such kinds of approaches were resulted in briefly having the knowledge of TCP. Particularly, the wireless network is multi access shared medium where the users interfere with each other and the capacity also time varying due to mobility, multipath. This causes interdependencies across users and the network. So declaring clean state optimization resource allocation for multihop wireless networks. Instead of temporal unfairness, here considering the other forms of QoS  Fairness in utility: Each user receives a fraction of the total utility value.  Minimum data rate requirement: Each user receives the data rates of bits per second.  Proportional Fairness: The objective is to achieve the proportional fair. The routing and link activation policy attained here guarantee to stabilize the network. [3] (i.e giving maximum throughput). This is Particularly relevant in wireless networks where distributed algorithm are used for comparisons. Based on these observations, a proposed distributed framework that repeatedly determines the accurate solutions to maximum weight matching problems and combines the sequential solutions. As discussed before [3], the merge operation does not need to select the preferable matching. The framework involves the two different phases. The first phase contains the solution of the maximal matching problem is obtained. The second phase involves comparing and merging the successive accurate solutions. Here proposing three alternatives to required information for comparison. First approach is based on the information collected from the local components of the network. Second approach is based on the Gossip algorithm [3], investigate the value by random manner in order to compute the old and new solution. The advantage of the algorithm is it does not need any infrastructure. Third approach deals with the estimation of old and new solutions distributedly calculating the minimum values of random exponentially variables.[4]. The task of wireless scheduling is the concurrent presence of two characteristics. Interference based transmissions, and the need of real time distributed implementation. For any scheduling algorithm, the interference based effects results in maximum values of the data rates. In practice, the need for distributed implementation dynamically leads to overhead. As mentioned above, for data transmissions, the power and bandwidth resources are used as the same time. Instead of be wasted of control signals. The cross layer control problem consists of two elements. First is to determine the users that which imposing the data into the
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 394 network. [5] Second is to determine the when and at what rate each link can decide to transmit the data over the network. [6] Different wireless networks especially having the different constraints of interference. Bluetooth networks can satisfy the sharing model of exclusive node. Whereas, IEEE 802.11 having the limited amount of frequencies and they do not allow the same frequency in the two hop networtks. [7] Each and every node having the locally unique frequency. When multiple transmissions occur, if they never have a common node, it can proceed with interference. The link maintains the matching which are active at any time. Here presenting a two tier approach that attains the maximum fairness for multihop networks. First steps involves the sharing the bandwidth of each node for each session at its path, and releases packets for transmissions. Second step schedules the transmission of the released packets. 3. METHODOLOGY 3.1 The Joint Congestion Control In this algorithm, whenever the packet arrives at a heavy traffic router, the packet is fetched at random manner from the FIFO based buffer with the arrived packets are compared. Both of the packets are dropped if they arrive at the same flow. Otherwise, the randomly chosen packets are kept aside and newly arriving packets are collected and put into the buffer depends on the congestion level. It is really a simple and good algorithm that does not require any special data structure. This algorithm does not deliver good performance when the large number of flows compared with its buffer space. 3.2 Scheduling Algorithm This is the enhanced version of distributed scheduling algorithm with low complexity. Here, each time slot having an initial scheduling property. And it is further divided into n mini slots. Each link has to be scheduled and selected according to the scheduling slot as mentioned above. Fig 2: Operation of scheduling algorithm. The selected links are transmits the packets by rest of the time slots. Each link randomly selects a mini time slots and transmitting packets. When the timer associated in the slot got invalidated, the link already received the same packet as before from the neighbor. It makes the transmission interference, occurring of collisions, and finally results in transmission failure. 3.3 Leaky Bucket Algorithm The algorithm is the most promising method for the prevention of congestion control in networks. For QoS support, the algorithm maintains the dynamic token generation at intervals. The information may be network lost, resource became useless etc, the input traffic must be controlled at the appropriate level of buffer occupancy. Fig 3: Leaky Bucket In other words, the threshold l on the buffer for the indication of congestion The arrivals are controlled based on the queue length exceeds the threshold. The arrival cells are accommodated by the buffer. Fig 4: Leaky Bucket Implementation In order to the arrival, the incoming packets are stored into the buffer. The counter is incremented by the credit generator and transfers each packet from the buffer when decrements it exits. To prevent simultaneous departures from different connections to the output line, there is a output FIFO queue is maintained. These are the below steps that leaky bucket algorithm is performed.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 395 Step 1: When host injects a packet that is thrown in to the bucket. Step 2: The bucket leaks at a constant rate (i.e), the network transmits constant delivery of packets. Step 3: Busty traffic is converted into uniform traffic by the leaky bucket. Step 4: In real time, the bucket having finite queue so that it can delivers finite rate. 4. SYSTEM IMPLEMENTATION 4.1 System Model The wireless node has to be created by a graph, V is the vertex, E is the edge, TL denotes the total number of links, each link consists of transmitter node X(l) and receiver node Y(l). two nodes are one hop neighbors if they have a common link. Two links e one hop neighbor if they have a common node. Assume that a time slotted wireless system, the packet transmission occurs within time slots of unit length, here l denotes the link capacity. Interference of two links each other takes place, if they cannot transmit data at same time slot. 4.2 Joint Congestion Control It operates on the basis of observing the rate of injection of new packets into the networks and returning rate of acknowledgements by other end. Declaring the congestion window as cnwd. When establishing a new connection with a host on another network. Initialization of congestion window segment is 1. Typically by other end segment size is announced as default (536 or 512). each time the congestion window is increased when receiving the acknowledgements, so that the sender can transmits minimum of the congestion window. MaxWindow :: min(CongestionWindow, AdvertisedWindow) EffectiveWindow = MaxWindow – (LastByteSent - LastByteAcked) 4.3 Scheduling Algorithm The representation of Scheduling algorithm is the modification of Distributed scheduling algorithm. Each time slot consist of initial scheduling slots and it is further divided in to n mini slots. The links has to be selected and scheduled according to the time slots. And the selected links are transmitted the packets during rest of the time slots. 4.4 Cross Layer Control It is fully waterfall oriented concept of the OSI communication model between the boundary layers. The approach conduct survey dynamically through the boundaries of the layer for enabling the compensation. In OSI model enforces the tight boundaries between the layers. Within a given layer, the data is tightly kept. Whereas, the cross layer approach allows that removing such tight boundaries and promotes communication between layers by allowing one layer to access the another layer data for information exchange and enables interaction. Fixed allocation of resources may results in mismatch operations of networks. Automatic repeat request (ARQ) scheme used at the MAC layer in optimizing tradeoffs and achieving maximum throughput. 4.5 Performance Analysis Generally, evaluating the performance is entirely based on the Scheduling algorithm. The improvement of the algorithm is allowing each link if it has to involve packet transmission. The average delay of our algorithm deals with increases linearly with the hop count. The output of the simulation variables has been considered in the simulator is Packet delivery ratio : The number of packets received at destination on data packets sent by source. Protocol overhead : it is calculated by sending number of HELLO Protocols. Average energy consumption : it deals with wastage energy while maintenance of routing and discovery. It considers the energy consumption during transmission and reception of data and control packets. Average node residual energy : considering the lifetime of the network so that it can used to evaluate the remaining energy of the node. 5. SIMULATION RESULTS 5.1 Simulation Parameters 5.2 Throughput It defines the number of packets arriving at the destination per second. The following graphs show the throughput provided by the two different algorithms with CBR connection with comparing the different number of nodes. The conducted simulation which results in existing work with 60 nodes at a throughput of 2.35Mbps, whereas, the proposed algorithm
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 396 delivers a better throughput 5.67Mbps by delivering the data transmission in a Constant bit rate at 60 nodes. Fig 5: Throughput 5.3 Packet Loss The Packet loss is defined using the metric that Size of the Packet with respect to the occurring of loss. In the existing work, the loss could not be controlled by initiating whatever the size of the packet, the loss occurred at a extreme high, whereas, the proposed algorithm which reduces the loss by delivering the data in the Constant bit rate and retransmission of the entire packets also been avoided. One of the notable thing is the loss increasing as well as the packet size also incremented. When compared the previous work the proposed algorithm achieves 68% of the existing works deals with 92%. Fig 6: Packet Loss 5.4 End to End Delay End to End Delay is defined as the input parameters based on the simulation time that which the process is simulated. By conducting these types of simulations the results would be more effective than the expectations what we have planned earlier, When comparing the existing algorithms it has been maintained upto the extreme of 82% and that has been reduced by the proposed algorithm in the way of 48% in 1.5mSec. Fig 7: End to End Delay 5.5 Packet Delivery Ratio The term Packet Delivery Ratio is calculated on the basis of simulation time during the number of Packets had been received from the number of packets has been sent. As mentioned earlier for the corresponding parameters involved in the above simulation. In the existing works narrate the ratio that achieving the 93%. In turn the Proposed algorithm achieves the precise ratio of 99.6% even though it across the 60 niodes the rate has been maintained. Fig 8: Packet Delivery Ratio 6. CONCLUSIONS The transmission range as a system parameter affects the overall energy consumption of multihop wireless networks. The performance of these two algorithms shows some differences by varying transmission range and simulation time. From our experimental analysis we conclude that leaky bucket algorithm delivering maximum throughput, high packet delivery ratio, loss of packet is less and end to end delay is low compared to the existing joint congestion control and scheduling algorithm. We compare the two algorithms in the analyzed scenario, we found that overall performance of leaky bucket is better than existing algorithms at 120m range. The performance enhanced in higher transmission range. Our results can be used to determine the proper radio transmission
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 397 range for the leaky bucket algorithm which guarantees the bandwidth by delivering the packets at a constant bit rate regardless of the arrival rate. The proposed leaky bucket algorithm that allows multihop wireless networks without degrading a system performance REFERENCES [1] L. Georgiadis, M. J. Neely, and L. Tassiulas, “Resource allocation and cross-layer control in wireless networks,” Found. Trends Netw., vol. 1, no. 1, pp. 1– 144, 2006. [2] X. Lin, N. B. Shroff, and R. Srikant, “A tutorial on cross-layer optimization in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24,no. 8, pp. 1452–1463, Aug. 2006. [3] E. Modiano, D. Shah, and G. Zussman, “Maximizing throughput in wireless networks via gossiping,” in Proc. ACM SIGMETRICS, 2006, pp. 27–38. [4] S. Sanghavi, L. Bui, and R. Srikant, “Distributed link scheduling with constant overhead,” in Proc. ACM SIGMETRICS, 2007, pp. 313–324. [5] X. Lin and N. B. Shroff, “The impact of imperfect scheduling on cross-layer congestion control in wireless networks,” IEEE/ACM Trans. Netw.,vol. 14, no. 2, pp. 302–315, Apr. 2006. [6] P. Chaporkar, K. Kar, and S. Sarkar, “Throughput guarantees through maximal scheduling in wireless networks,” IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 572–594, Feb. 2008. [7] S. Sarkar and L. Tassiulas, “End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks,” in Proc. IEEE CDC, Maui, HI, Dec. 2003, vol. 1, pp. 564–569 [8] A. Gupta, X. Lin, and R. Srikant, “Low-complexity distributed scheduling algorithms for wireless networks,” IEEE/ACM Trans. Netw., vol.17, no. 6, pp. 1846–1859, Dec. 2009. [9] L. Bui, R. Srikant, and A. L. Stolyar, “Novel architectures and algorithms for delay reduction in back-pressure scheduling and routing,”in Proc. IEEE INFOCOM Mini-Conf., 2009, pp. 2936–2940. [10] P.-K. Huang and X. Lin, “The end-to-end delay performance of a class of wireless scheduling algorithms,” in Proc. Allerton Conf. Commun.,Control, Comput., 2010, pp. 951–952. [11] L. Huang and M. J. Neely, “Delay reduction via Lagrange multipliers in stochastic network optimization,” in Proc. WiOpt, 2009, pp. 1–10. [12] M. J. Neely, “Delay-based network utility maximization,” in Proc.IEEE INFOCOM, 2010, pp. 1– 9. [13] M.J.Neely, “Delay analysis for maximal scheduling in wireless networks with bursty traffic,” in Proc. IEEE INFOCOM, 2008, pp. 6–10. [14] L. B. Le, K. Jagannathan, and E. Modiano, “Delay analysis of maximum weight scheduling in wireless ad hoc networks,” in Proc. IEEE CISS, Baltimore, MD, Mar. 2009, pp. 389–394. [15] G. R. Gupta and N. B. Shroff, “Delay analysis for multi-hop wireless networks,” in Proc. IEEE INFOCOM, 2009, pp. 2356–2364. [16] L. Huang and M. J. Neely, “Delay efficient scheduling via redundant constraints in multihop networks,” in Proc. WiOpt, 2010, pp. 142–151. [17] L. B. Le, E. Modiano, and N. B. Shroff, “Optimal control of wireless networks with finite buffers,” in Proc. IEEE INFOCOM, 2010, pp. 1–9. [18] P. Jayachandran and M. Andrews, “Minimizing end-to- end delay in wireless networks using a coordinated EDF schedule,” in Proc. IEEE INFOCOM, 2010, pp. 1–9. BIOGRAPHIES G.Mohan Santhosh Kumar received the B.Tech degree in the stream of Information Technology from Prist university, Thanjavur, In 2012. And Pursuing Master of Engineering in the stream of Computer Science and Engineering from St.Joseph’s College of Engineering and Technology (Batch 2012-2014), Thanjavur. He has Presented Research papers in National & International Conferences. Also published papers in International Journals. His Field of interest includes Computer Networks, Database Management Systems. Sebastin Christhu Raj A received the M.Sc degree in CS stream at Bharathidasan University in 2010. And pursuing M.E degree in CSE stream at St.Joseph’s College of Engg & tech, Thanjavur. He worked as a Production Engineer in OKAY SOFT & Devolepers Pvt.Ltd. Area of Interest is Mobile Computing, Power Management Systems. P.Arivubrakan received the B.E degree in CSE stream from Saranathan College of Engineering, Thiruchirapalli in 2010. And Done her M.E. Degree in Pervasive Computing Technologies from Anna University of Technology, Thiruchirapalli in 2012. She is Working as a Assistant Professor in St.Joseph College of Engg & Tech, Thanjavur. She has Presented Research Papers in National & International Confereces. Also published Papers in International Journals. Her Research area Includes System Software, Principles of Compiler Design, Unix Internals and Design and Analysis of Algorithm.