SlideShare a Scribd company logo
1 of 5
Download to read offline
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 3 (June 2013), PP 37-41
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
37
 Topology Control across Mps Using Flow Slice in Wireless
Networks
1,
Gagana. K , 2
,Asha1,
M.Tech student, Dept. of CSE, Dr.AIT, Bangalore.
2
,Associate Professor, Dept of CSE, Dr.AIT, Bangalore.
ABSTRACT: Topology control is adjusting the network topology according to some criteria. The criteria can
be scalability, network efficiency and much more. In order to have an efficient network, the packets in the
network should be load balanced. In this paper a novel scheme is developed which balances the load on a finer
granularity. Flow slice scheme ensures uniform load sharing, intra flow packet ordering and minimum
hardware complexity. The theoretical analysis in this paper is also validated through discrete event simulations.
KEYWORDS: Load Balancing, traffic measurement, switching theory.
I. INTRODUCTION
Wireless network refers to the technology that enables two or more computers to communicate using
standard network protocols without network cabling. Multipath switching systems (MPS) are intensively used in
state-of-the-art core routers to provide terabit or even peta bit switching capacity. One of the most intractable
issues in designing MPS is how to load balance traffic across its multiple path while not disturbing the intra flow
packet orders. Topology control is a technique used in distributed computing to alter the underlying network in
order to reduce the cost. Topology control is consumed mostly by the wireless networks research community.
The main aim of topology control in this domain is load balancing.There are several packet based solutions used
in this regard. But all of them suffer from one or the other problem. In this paper we have used the concept of
flow slice. The flow slice scheme achieves these three objectives simultaneously.
Uniform load sharing :Traffic dispatched to each path should be uniform. Specifically in MPS, traffic destined
for each output should be spread evenly to avoid output contention, minimize average packet delay and
maximize the throughput.
Intra flow packet ordering : Packets in the same flow should depart MPS as their arrival orders. This ordering
is essential since out of order packets will degrade the performance of higher level protocols. For any two
packets P1 and P2 in the same flow with arrival time T(P1), T(P2) and departure time D(P1), D(P2) the formula
below should be guaranteed:
D(P1) < D(P2) if T(P1) < T(P2).
Low Timing and hardware complexity: The load balancing and additional re sequencing mechanisms at MPS
should work fast enough to match the line rate, and should introduce limited hardware complexity. MPS is most
likely to hold hundreds of external ports operating at ultra high speed. To provide such scalability, the
timing/hardware complexity of O(1) is necessary.
The rest of this paper is organized as follows: Section II summarizes related work. Section III defines flow
slice and proposes our load balancing scheme. Section IV explains the implementation of flow slice scheme.
Section V presents the results of our work. Finally the conclusion of paper is in section VI.
II. RELATED WORK
A basic timestamp-based re sequencer was proposed by Turner [1] to deal with the cell out-of-order
issue, when cells within a virtual circuit are allowed to take different paths in ATM switching systems. In each
scheduling, the re sequencer implements a smart contention resolution mechanism to select the oldest cell and
then compares its age with a predefined threshold equal to the system delay upper bound. If the selected cell
exceeds this age threshold, it will be sent without disturbing cell orders since all previously arrived cells have
left the system. Henrion improved the timestamp-based re sequencer by introducing time-wheel-like hardware
[2] which does not need to compare cells’ timestamps at output. It maintains an array of D pointer lists, where D
is larger than delay upper bound at system measured by timeslots. Each pointer at the list stores location of a cell
waiting for re sequencing. At timeslot t, the pointer list at slot t modulo D is linked to
Topology Control Across MPS Using Flow…
38
the tail of the output cell list and removed from the array. After that, pointers of arrival cells at timeslot t
are linked together and stored in this empty slot (t modulo D) of the array. This approach delays every cell by
fixed D timeslots with O(1) complexity and strictly guarantees cell orders. Fixed threshold timestamp-based re
sequencers work well for ATM switching systems where traffic is well defined and cell delay is moderate.
However, in transition to an IP network, traffic becomes rather busty, introducing a higher age threshold on
these re sequencers and equalizing cell delay to undesirable level. To cope with the traffic in the worst case,
Turner proposed an adaptive re sequencer [3] that dynamically adjusts threshold according to a real-time delay
bound. Trace-driven simulations show that the re sequencer performs well better than the fixed threshold one.
Another kind of re sequencer uses sequence number instead of timestamp. Cells with the same priority from one
input to one output are numbered sequentially at their arrivals. At the output, an expected sequence number is
maintained for all the packets in the same flow. Only the cells with an expected sequence can be sent after
reaching output, thus preserving cell order. Predefined path scheduling protocol known by both input and
output, such as Round- Robin (RR), can be employed to avoid attaching a sequence number to each cell. Re
sequencers using VIQ [4], [5], [6] can be categorized in this class. However, to recover from cell loss, more
complicated mechanisms should be introduced, such as re sequencers developed by Chiussi et al. [7] in
designing Switched Connection Inverse Multiplexing for ATM (SCIMA) and the solution named Rank [8],
which maintains k-1 fields in each cell header to deal with cell loss. However, Rank is not scalable for MPS
having more than a hundred internal paths.
III. FLOW SLICE
A flow slice is a sequence of packets in a flow, where every intra flow interval between two consecutive
packets is greater than or equal to a slicing threshold Ф. Flow slices can be seen as mini flows created by cutting
off every intra flow interval larger than Ф. Flow slice scheme can be described as follows.The flow slice scheme
is applied to all the nodes other than the source node. When the source node receives the data it first identifies
all the possible paths to reach the destination. Out of all the possible paths identified it only identifies such path
which does not have shared link. Depending on the number of paths without shared link the data at the source
will be divided and sent across those selected paths.Once each node receives the data it slices the data. The data
sliced depends upon the bandwidth of the node and the slicing threshold value. At each node, the sliced data is
kept within itself and the remaining data is sent to its neighbor. The same process is repeated until the data is
reached to the destination. At the destination only some part of the data is reached. The remaining data which is
present at each node as a result of slicing will reach the destination through buffering concept. The advantages
of flow slice are:
1. It is immune to packet loss, while other solutions like the VIQ re sequencer require additional loss detection
mechanisms.
Figure 1: General design of flow slice concept
2. It maintains a hash table to record active flow-slice context, a redirection mechanism can be added to provide
robustness to system failure. When some switching path stops working, the load balancer can simply redirect all
the active flow slices going to this path at their next packet arrivals, still by FS.
3. It natively supports multicast. Multicast flows are treated in the same manner as unicast flows and still
preserve packet orders.
4. N-FS supports load balancing across uneven switching paths by applying weighted round robin.
Topology Control Across MPS Using Flow…
39
IV. IMPLEMENTATION
We have implemented this flow slice concept for a wireless network using NS 2 simulator. The
topology used is as shown in the figure. However it can be changed to any topology. Initially the network will
identify all its neighbor nodes using Euclidian distance. Once the neighbor nodes have been identified the nodes
within a particular network will keep sending hello messages to its neighbor node. This hello message indicates
that the node is active in the network. Suppose consider node 0 wants to send the 100TB of data to node 10.
Initially the source node 0 will identify the multiple paths which do not have any shared link. In the example
given below the paths are 0-1-3-6-10 and 0-2-4-7-10. Next the source will divide the data into parts depending
on the number of paths. Here the data is divided into 50TB each at each path. Node 1 receives 50TB of data. It
slices according to its bandwidth and the slicing threshold. Suppose if the threshold value is 5 TB then the data
will be sliced greater than the 5 TB with respect to the bandwidth. Remaining data will be sent to the next
neighboring node. Same thing repeats at the paths chosen and until part of data reaches destination. Once the
destination has received part of its data then the remaining data can be easily transferred to the destination. The
remaining data will be buffered at each node and the destination would have got all the information about how
much data is present in each node. Finally the destination receives all the data.
Figure 2: Flow slice implementation for the above topology
V. RESULTS
The concept of flow slice is being used in the wireless network for data delivery. Network simulator is used for
simulation. The simulation results for the above topology is explained below.
Figure 3: Variation in Energy
Initially all the nodes will be given certain amount of energy in order to make the transaction. In this experiment
each node is given a energy of 100 joules. As the transaction takes place the energy gets down which is depicted
in figure 3.
Topology Control Across MPS Using Flow…
40
Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their
destination. Packet loss can be caused by a number of factors including signal degradation over the network
medium due to multi-path fading, packet drop because of channel congestion
Figure 4: Packet Drop
corrupted packets rejected in-transit, faulty networking hardware, faulty network drivers. Figure 4 shows that at
the initial time and end time of transaction there is no packet drop. Somewhere in the middle some packets have
been dropped and gradually the packet drop has decreased.
Figure 5: Packet delivery ratio
The ratio of the number of delivered data packet to the destination is called packet delivery ratio. This illustrates
the level of delivered data to the destination. The greater value of packet delivery ratio means the better
performance of the protocol. In figure 5 we can see that the packet delivery ratio is 1 most of the time.
Figure 6: Throughput
As shown in the above figure through put is increasing indicating good signs in the delivery of data.
Topology Control Across MPS Using Flow…
41
VI. CONCLUSION AND FUTURE WORK
Compared to the other approaches used for preventing the mis sequencing of packets flow slice scheme
is better as it ensures uniform load sharing, intra flow packet ordering and low timing and hardware complexity.
Here there is no need of using an additional re sequencing buffer at the output, hence reducing the hardware
complexity We have proven FS to be effective under strictly admissible traffic, but it is also important to know
how it behaves under extreme traffic. Our simulations with busty real traces shed some light on this issue and
suggest that it still work well. Actually, if only the slicing threshold is larger than the delay variation bound at
all switching paths, packet order will be undisturbed. Under busty input traffic, the delay at all switching paths
may increase synchronously, leaving its delay variation bound nearly unchanged. The FS scheme is validated in
switches without class-based queues. As QoS provisioning is also critical in switch designs, one of our future
works will be studying FS performance under QoS conditions.
REFERENCES
[1] J.S. Turner, “Resequencing Cells in an ATM Switch,” Technical Report WUCS-91-21, Feb. 1991.
[2] M. Henrion, “Resequencing System for a Switching Node,” US Patent, 5,127,000, June 1992.
[3] J.S. Turner, “Resilient Cell Resequencing in Terabit Routers,” Technical Report WUCS-03-48, June 2003.
[4] A. Aslam and K. Christensen, “Parallel Packet Switching Using Multiplexors with Virtual Input Queues,” Proc. Ann. IEEE Conf.
Local Computer Networks (LCN), pp. 270-277, 2002.
[5] C.S. Chang, D.S. Lee, and Y.S. Jou, “Load Balanced Birkhoff-von Neumann Switch, Part II: Multi-Stage Buffering,” Computer
Comm., vol. 25, pp. 623-634, 2002.
[6] I. Keslassy and N. Mckeown, “Maintaining Packet Order in Two- Stage Switches,” Proc. IEEE INFOCOM, pp. 1032-1041,
2002.
[7] F.M. Chiussi, D.A. Khotimsky, and S. Krishnan, “Generalized
Inverse Multiplexing of Switched ATM Connections,” Proc. IEEE Conf. Global Comm. (GLOBECOM), pp. 3134-3140, 1998.
[8] D.A. Khotimsky, “A Packet Resequencing Protocol for Fault-
Tolerant Multipath Transmission with Non-Uniform Traffic
Splitting,” Proc. IEEE Conf. Global Comm. (GLOBECOM), pp. 1283-1289, 1999.
[10] C. S. Chang, D. S. Lee, and Y. S. Jou, "Load Balanced Birkhoff-von Neumann Switches, Part I: One-Stage Buffering", Computer
Communications, vol. 25, 2002.
[11] I. Keslassy, N. McKeown, "Maintaining packet order in two stage switches," Proceedings of the IEEE Infocom, June 2002.
[12] C. S. Chang, D. S. Lee, and C. Y. Yue, "Providing Guaranteed Rate Services in the Load Balanced Birkhoff-von Neumann
Switches", IEEE INFOCOM, San Francisco, March 2003.
[13] Lei Shi, Bin Liu, Changhua Sun, Zhengyu Yin, “Load Balancing Multipath Switching System With Flow Slice,” IEEE Trans.
Computers, vol.61, no.3, March 2012
[14] Vitesse Intelligent Switch Fabrics, http://www.vitesse.com, 2011.
[15] J. Bennett, C. Partridge, and N. Shectman, “Packet Reordering Is Not Pathological Network Behavior,” IEEE/ACM Trans.
Networking, vol. 7, no. 6, pp. 789-798, Dec. 1999.

More Related Content

What's hot

Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network LayerKrishna Nanda
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routingMd. Mashiur Rahman
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedtingH K
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
Transport Layer
Transport LayerTransport Layer
Transport LayerAmin Omi
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes ineSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621IJRAT
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 

What's hot (20)

Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network Layer
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Ip protocol tedting
Ip protocol tedtingIp protocol tedting
Ip protocol tedting
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
A018120105
A018120105A018120105
A018120105
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
550 537-546
550 537-546550 537-546
550 537-546
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 

Similar to Research Inventy : International Journal of Engineering and Science

A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONijdms
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
A QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHA QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHecij
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 

Similar to Research Inventy : International Journal of Engineering and Science (20)

A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATIONSCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
SCALING DISTRIBUTED DATABASE JOINS BY DECOUPLING COMPUTATION AND COMMUNICATION
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
A QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCHA QOS BASED LOAD BALANCED SWITCH
A QOS BASED LOAD BALANCED SWITCH
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 

More from inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineinventy
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluationinventy
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezerinventy
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsinventy
 

More from inventy (20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 3 (June 2013), PP 37-41 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 37  Topology Control across Mps Using Flow Slice in Wireless Networks 1, Gagana. K , 2 ,Asha1, M.Tech student, Dept. of CSE, Dr.AIT, Bangalore. 2 ,Associate Professor, Dept of CSE, Dr.AIT, Bangalore. ABSTRACT: Topology control is adjusting the network topology according to some criteria. The criteria can be scalability, network efficiency and much more. In order to have an efficient network, the packets in the network should be load balanced. In this paper a novel scheme is developed which balances the load on a finer granularity. Flow slice scheme ensures uniform load sharing, intra flow packet ordering and minimum hardware complexity. The theoretical analysis in this paper is also validated through discrete event simulations. KEYWORDS: Load Balancing, traffic measurement, switching theory. I. INTRODUCTION Wireless network refers to the technology that enables two or more computers to communicate using standard network protocols without network cabling. Multipath switching systems (MPS) are intensively used in state-of-the-art core routers to provide terabit or even peta bit switching capacity. One of the most intractable issues in designing MPS is how to load balance traffic across its multiple path while not disturbing the intra flow packet orders. Topology control is a technique used in distributed computing to alter the underlying network in order to reduce the cost. Topology control is consumed mostly by the wireless networks research community. The main aim of topology control in this domain is load balancing.There are several packet based solutions used in this regard. But all of them suffer from one or the other problem. In this paper we have used the concept of flow slice. The flow slice scheme achieves these three objectives simultaneously. Uniform load sharing :Traffic dispatched to each path should be uniform. Specifically in MPS, traffic destined for each output should be spread evenly to avoid output contention, minimize average packet delay and maximize the throughput. Intra flow packet ordering : Packets in the same flow should depart MPS as their arrival orders. This ordering is essential since out of order packets will degrade the performance of higher level protocols. For any two packets P1 and P2 in the same flow with arrival time T(P1), T(P2) and departure time D(P1), D(P2) the formula below should be guaranteed: D(P1) < D(P2) if T(P1) < T(P2). Low Timing and hardware complexity: The load balancing and additional re sequencing mechanisms at MPS should work fast enough to match the line rate, and should introduce limited hardware complexity. MPS is most likely to hold hundreds of external ports operating at ultra high speed. To provide such scalability, the timing/hardware complexity of O(1) is necessary. The rest of this paper is organized as follows: Section II summarizes related work. Section III defines flow slice and proposes our load balancing scheme. Section IV explains the implementation of flow slice scheme. Section V presents the results of our work. Finally the conclusion of paper is in section VI. II. RELATED WORK A basic timestamp-based re sequencer was proposed by Turner [1] to deal with the cell out-of-order issue, when cells within a virtual circuit are allowed to take different paths in ATM switching systems. In each scheduling, the re sequencer implements a smart contention resolution mechanism to select the oldest cell and then compares its age with a predefined threshold equal to the system delay upper bound. If the selected cell exceeds this age threshold, it will be sent without disturbing cell orders since all previously arrived cells have left the system. Henrion improved the timestamp-based re sequencer by introducing time-wheel-like hardware [2] which does not need to compare cells’ timestamps at output. It maintains an array of D pointer lists, where D is larger than delay upper bound at system measured by timeslots. Each pointer at the list stores location of a cell waiting for re sequencing. At timeslot t, the pointer list at slot t modulo D is linked to
  • 2. Topology Control Across MPS Using Flow… 38 the tail of the output cell list and removed from the array. After that, pointers of arrival cells at timeslot t are linked together and stored in this empty slot (t modulo D) of the array. This approach delays every cell by fixed D timeslots with O(1) complexity and strictly guarantees cell orders. Fixed threshold timestamp-based re sequencers work well for ATM switching systems where traffic is well defined and cell delay is moderate. However, in transition to an IP network, traffic becomes rather busty, introducing a higher age threshold on these re sequencers and equalizing cell delay to undesirable level. To cope with the traffic in the worst case, Turner proposed an adaptive re sequencer [3] that dynamically adjusts threshold according to a real-time delay bound. Trace-driven simulations show that the re sequencer performs well better than the fixed threshold one. Another kind of re sequencer uses sequence number instead of timestamp. Cells with the same priority from one input to one output are numbered sequentially at their arrivals. At the output, an expected sequence number is maintained for all the packets in the same flow. Only the cells with an expected sequence can be sent after reaching output, thus preserving cell order. Predefined path scheduling protocol known by both input and output, such as Round- Robin (RR), can be employed to avoid attaching a sequence number to each cell. Re sequencers using VIQ [4], [5], [6] can be categorized in this class. However, to recover from cell loss, more complicated mechanisms should be introduced, such as re sequencers developed by Chiussi et al. [7] in designing Switched Connection Inverse Multiplexing for ATM (SCIMA) and the solution named Rank [8], which maintains k-1 fields in each cell header to deal with cell loss. However, Rank is not scalable for MPS having more than a hundred internal paths. III. FLOW SLICE A flow slice is a sequence of packets in a flow, where every intra flow interval between two consecutive packets is greater than or equal to a slicing threshold Ф. Flow slices can be seen as mini flows created by cutting off every intra flow interval larger than Ф. Flow slice scheme can be described as follows.The flow slice scheme is applied to all the nodes other than the source node. When the source node receives the data it first identifies all the possible paths to reach the destination. Out of all the possible paths identified it only identifies such path which does not have shared link. Depending on the number of paths without shared link the data at the source will be divided and sent across those selected paths.Once each node receives the data it slices the data. The data sliced depends upon the bandwidth of the node and the slicing threshold value. At each node, the sliced data is kept within itself and the remaining data is sent to its neighbor. The same process is repeated until the data is reached to the destination. At the destination only some part of the data is reached. The remaining data which is present at each node as a result of slicing will reach the destination through buffering concept. The advantages of flow slice are: 1. It is immune to packet loss, while other solutions like the VIQ re sequencer require additional loss detection mechanisms. Figure 1: General design of flow slice concept 2. It maintains a hash table to record active flow-slice context, a redirection mechanism can be added to provide robustness to system failure. When some switching path stops working, the load balancer can simply redirect all the active flow slices going to this path at their next packet arrivals, still by FS. 3. It natively supports multicast. Multicast flows are treated in the same manner as unicast flows and still preserve packet orders. 4. N-FS supports load balancing across uneven switching paths by applying weighted round robin.
  • 3. Topology Control Across MPS Using Flow… 39 IV. IMPLEMENTATION We have implemented this flow slice concept for a wireless network using NS 2 simulator. The topology used is as shown in the figure. However it can be changed to any topology. Initially the network will identify all its neighbor nodes using Euclidian distance. Once the neighbor nodes have been identified the nodes within a particular network will keep sending hello messages to its neighbor node. This hello message indicates that the node is active in the network. Suppose consider node 0 wants to send the 100TB of data to node 10. Initially the source node 0 will identify the multiple paths which do not have any shared link. In the example given below the paths are 0-1-3-6-10 and 0-2-4-7-10. Next the source will divide the data into parts depending on the number of paths. Here the data is divided into 50TB each at each path. Node 1 receives 50TB of data. It slices according to its bandwidth and the slicing threshold. Suppose if the threshold value is 5 TB then the data will be sliced greater than the 5 TB with respect to the bandwidth. Remaining data will be sent to the next neighboring node. Same thing repeats at the paths chosen and until part of data reaches destination. Once the destination has received part of its data then the remaining data can be easily transferred to the destination. The remaining data will be buffered at each node and the destination would have got all the information about how much data is present in each node. Finally the destination receives all the data. Figure 2: Flow slice implementation for the above topology V. RESULTS The concept of flow slice is being used in the wireless network for data delivery. Network simulator is used for simulation. The simulation results for the above topology is explained below. Figure 3: Variation in Energy Initially all the nodes will be given certain amount of energy in order to make the transaction. In this experiment each node is given a energy of 100 joules. As the transaction takes place the energy gets down which is depicted in figure 3.
  • 4. Topology Control Across MPS Using Flow… 40 Packet loss occurs when one or more packets of data travelling across a computer network fail to reach their destination. Packet loss can be caused by a number of factors including signal degradation over the network medium due to multi-path fading, packet drop because of channel congestion Figure 4: Packet Drop corrupted packets rejected in-transit, faulty networking hardware, faulty network drivers. Figure 4 shows that at the initial time and end time of transaction there is no packet drop. Somewhere in the middle some packets have been dropped and gradually the packet drop has decreased. Figure 5: Packet delivery ratio The ratio of the number of delivered data packet to the destination is called packet delivery ratio. This illustrates the level of delivered data to the destination. The greater value of packet delivery ratio means the better performance of the protocol. In figure 5 we can see that the packet delivery ratio is 1 most of the time. Figure 6: Throughput As shown in the above figure through put is increasing indicating good signs in the delivery of data.
  • 5. Topology Control Across MPS Using Flow… 41 VI. CONCLUSION AND FUTURE WORK Compared to the other approaches used for preventing the mis sequencing of packets flow slice scheme is better as it ensures uniform load sharing, intra flow packet ordering and low timing and hardware complexity. Here there is no need of using an additional re sequencing buffer at the output, hence reducing the hardware complexity We have proven FS to be effective under strictly admissible traffic, but it is also important to know how it behaves under extreme traffic. Our simulations with busty real traces shed some light on this issue and suggest that it still work well. Actually, if only the slicing threshold is larger than the delay variation bound at all switching paths, packet order will be undisturbed. Under busty input traffic, the delay at all switching paths may increase synchronously, leaving its delay variation bound nearly unchanged. The FS scheme is validated in switches without class-based queues. As QoS provisioning is also critical in switch designs, one of our future works will be studying FS performance under QoS conditions. REFERENCES [1] J.S. Turner, “Resequencing Cells in an ATM Switch,” Technical Report WUCS-91-21, Feb. 1991. [2] M. Henrion, “Resequencing System for a Switching Node,” US Patent, 5,127,000, June 1992. [3] J.S. Turner, “Resilient Cell Resequencing in Terabit Routers,” Technical Report WUCS-03-48, June 2003. [4] A. Aslam and K. Christensen, “Parallel Packet Switching Using Multiplexors with Virtual Input Queues,” Proc. Ann. IEEE Conf. Local Computer Networks (LCN), pp. 270-277, 2002. [5] C.S. Chang, D.S. Lee, and Y.S. Jou, “Load Balanced Birkhoff-von Neumann Switch, Part II: Multi-Stage Buffering,” Computer Comm., vol. 25, pp. 623-634, 2002. [6] I. Keslassy and N. Mckeown, “Maintaining Packet Order in Two- Stage Switches,” Proc. IEEE INFOCOM, pp. 1032-1041, 2002. [7] F.M. Chiussi, D.A. Khotimsky, and S. Krishnan, “Generalized Inverse Multiplexing of Switched ATM Connections,” Proc. IEEE Conf. Global Comm. (GLOBECOM), pp. 3134-3140, 1998. [8] D.A. Khotimsky, “A Packet Resequencing Protocol for Fault- Tolerant Multipath Transmission with Non-Uniform Traffic Splitting,” Proc. IEEE Conf. Global Comm. (GLOBECOM), pp. 1283-1289, 1999. [10] C. S. Chang, D. S. Lee, and Y. S. Jou, "Load Balanced Birkhoff-von Neumann Switches, Part I: One-Stage Buffering", Computer Communications, vol. 25, 2002. [11] I. Keslassy, N. McKeown, "Maintaining packet order in two stage switches," Proceedings of the IEEE Infocom, June 2002. [12] C. S. Chang, D. S. Lee, and C. Y. Yue, "Providing Guaranteed Rate Services in the Load Balanced Birkhoff-von Neumann Switches", IEEE INFOCOM, San Francisco, March 2003. [13] Lei Shi, Bin Liu, Changhua Sun, Zhengyu Yin, “Load Balancing Multipath Switching System With Flow Slice,” IEEE Trans. Computers, vol.61, no.3, March 2012 [14] Vitesse Intelligent Switch Fabrics, http://www.vitesse.com, 2011. [15] J. Bennett, C. Partridge, and N. Shectman, “Packet Reordering Is Not Pathological Network Behavior,” IEEE/ACM Trans. Networking, vol. 7, no. 6, pp. 789-798, Dec. 1999.