SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 86 | P a g e
Packet Reordering Using Congestion Control Algorithm Based on
Data frame Weightage
S. Balaji#1
, C. Monisha#2
1
AssociateProfessor
2
PG Scholor,
#
Department of ComputerScience and Engineering, Anna University-Chennai,SCAD College of Engineering
and Technology, cheranmahadevi, Tamilnadu, India.
ABSTRACT
In network application the data frame is transferred as sub-divided packets which are interdependent. Because of
this inter-packet dependencies problems like buffer overflow, degradation of packets may occur in existing
application. In this paper packet reordering has been done through Round Trip Delay Time(RTT) technology
based on congestion control algorithm & weight based priority algorithm. It has been observed this technology
has achieved considerable success to reduce the time delay and also to avoid degradation of packets. It also
addressed the problem of buffer management of multiple data streams traffic.
Key Words: Interpacket dependencies, RTT, reordering.
I. INTRODUCTION
In majority network application the data
frames are splitted into a small sized packets erfore
transmission. The data is useful only after receiving
of all packets. Degradation of some packets leads to
wastage of whole data. From this is understood that
the multistreams has interdependent packet structure.
This dependency structure depends on encoding used.
Normally re-transmission of losed data packets
found in higher level protocol. But dependency
structure in MPEG video is so strong that delay of
retransmitted packets affects real time traffic.Because
of these inter-packet dependency problems, like
buffer overflow, loss and degradation of packet
usually occurs in existing applications. An usual
approach to deal the packet loss problem is to empty
encoding schemes which provide considerable
improvement in the performance. However this
common approach has its own limitations in same
network application.
The prime causes for the packet loss is due
to congestion.we consider the problem of buffer
management of multiple data streams traffic. In this
paper packet re-ordering has been done through
Round Trip Delay Time (RTT. This technology
based on congestion control algorithm and weightage
based priority algorithm. These algorithms are
guaranteed to give good output, in any traffic pattern.
In this paper we studied packet discard policies in
depth. Our model is suitable to various traffic
encoding schemes that has more inter dependency
structure.
BASE STATION:
A base station is what links mobile phones
to a wireless carrier’s network. Base station provides
local coverage for a wireless network.
1. WSN Info: A wireless sensor network(WSN)
consists of spatially distributed autonomous
sensors to monitor physical or environmental
conditions such as temperature, pressure, sounds,
etc. And to cooperatively pass their data through
the network to a main location.
2. Packet Node: It is a important part in a packet
switching network. The main function of packet
node are transmitting and receiving of data
packets. Data switches and equipment's are
integral part of packet node.
3. Queue Buffer perform
4. Individual Queue Perform
5. Transmission Comparison
MOBILE NODE:
Mobile node is any device having internet
connection and having the character of changing
location frequently. Usually Mobile phones, handheld
and laptop computer are belongs to this kind. Router
also comes in this category. As mobile node moves
from one place to another place, it changes from one
network to another network. Maintaining continuous
internet connection needs special support mechanism.
In traditional routing procedures each mobile node
havesame IP Address. But in standard routing
procedure, each and every time a mobile user have to
change the IP Address whenever the node changes
from one network to another. Mobile Node has three
important parts.
RESEARCH ARTICLE OPEN ACCESS
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 87 | P a g e
1. Mobile Channel
2. Mobile Signal
3. transcoding
Among these, transcoding plays important
role in conversion of one encoding to other encoding.
It convert analog to analog and digital to digital
directly. Transcoding is useful to convert the
unsupported file format to supported one.
II. EXISTING SYSTEM
In this work most related to the problems of
buffer management in video traffic has been
studied.Like MPEG video streaming, most of these
data streams has high dependency structure and
specific encoding schemes. Due to congestion in data
streaming buffer overflow occurs. Because of this
overflow existing encoding scheme dropped some
data packets in the receiving end. So most of the
previous works analyzed on which data packets
should be dropped to receive less damage on the
output.
Because of loss of some packets, whole data
set become unusefull. In the buffer management
policy of Ramanathanetalthe frame is dropped when
many packets are dropped. In that they suggest latest
frame first rule for discard the packets.In many other
works priority based discard policies have been
studied. In that the packets are discriminated based
on importance. Normally less important packets are
dropped which would not affect the good put. The
model proposed by kesselmanetal has no stream
structure which underlies the arrival traffic. In this
work they considered restricted arrival pattern. Buffer
management in FIFO scheduling regime follows
Queuing discipline. Time delay and re-ordering
constrained environment happened due to congestion
in this method.
III. III.PROBLEM DEFINITION
In a network application, the problem of
ensuring the arrival of entire frame at receiving end is
crucial. Because of congestion, buffer overflow and
degradation of packets occurred. An usual approach
to handle the packet loss problems in to empty
encoding schemes. In the existing encoding schemes
even though it achieved some performance
improvement, it has some limitations. It is more
costly due to increased traffic. In the regime of FIFO,
also more time delay and re-ordering constrained
environment have occurred.
The main problem of existing buffer
management is low level of good put to the
throughput. Throughput is defined as amount of data
transmitted as data packets. Good put is defined as
amount of data received as data packets in receiving
end. In a good buffer management practices good put
is almost equal to the throughput. But due to the over
congestion loss of data packets reduces the effective
good put.In account of all issues discussed the
proposed system considered packet re-ordering based
on congestion control algorithm and weightage
priority algorithm.
In network application the data frame is
transferred as sub-divided packets which are
interdependent. Because of this inter-packet
dependencies problems like buffer overflow,
degradation of packets may occur in existing
application. In this paper packet reordering has been
done through Round Trip Delay Time(RTT)
technology based on congestion control algorithm &
weight based priority algorithm . It has been
observed that technology has achieved success to
reduce the time delay and also to avoid degradation
of packets. Addressed the problem of managing
buffer overflows for traffic consisting of multiple
streams, with interpacket dependencies. And
provided guidelines for thedesign of such algorithms,
and analyzed. Provided guarantees on its
performance under any traffic conditions by proving
it has a bounded competitive ratio.
IV. PRPOSED SYSTEM
In the existing methodology, only one
packet has been sent at a time. Once the packet got
received next packet starts to retransmit. But this
proposed system randomly initial frame from every
packet started too sent at a time.This will reduce the
overall delay.The main objective of this paper is to
reduce the overflow in the buffer.The input video has
been splitted into framesOnce the frames has been
delivered to receiver it can be reordered.
Congestion control:
Congestion control controls the traffic by
regulating the entry into the telecommunication
network. To avoid congestion collapse congestion
control algorithm attempts to prevent the over usage
of intermediates node and networks process and link
capabilities. It also avoids to take resource reducing
steps like reducing the packet sending rate.In this
framework Lagrange multiplies Ῥᶩ loss of
probability or delay in the link ᶩ because of
queuing.A prime limitation theory is that it assumes.
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 88 | P a g e
Fig 1: Architecture
PROPOSED ALGORITHM
Theory of congestion control
Theory of congestion control was proposed
by Frank Kelly in which be applied two theories
namely Microeconomic theory and convex
optimization theory. In which to explains how
individual packets control their own rates and also
concludes that these individual packets interact with
each other and achieve the optimum rate in network
wide allocation. The mathematical
expression for optimal rate allocation is as follows.
Let be the rate of flow , be the capacity of
link , and be 1 if flow uses link and 0
otherwise. Let , and be the corresponding
vectors and matrix. Let be an increasing,
strictly concave function, called the utility, which
measures how much benefit a user obtains by
transmitting at rate . The optimal rate allocation
then satisfies
such that
In this problem the Lagrange dual unlinks.
The unlinked flow behaves in different rate based on
price of the network in its own way. After unlinks of
Lagrange dual each link attract a constraint because
of this a Lagrange multiplies has raised.
Congestion control turned into distributed
optimization algorithm to solve the above constraint.
The framework of this model is followed in many
present congestion control algorithm.In this
framework Lagrange multiplies Ῥᶩ loss of
probability or delay in the link ᶩ because of queuing.
Even though many optimal allocation rates are
possible. Max-min rate allocation and Kelly's
proportional fair allocation are the dominant
examples. A prime limitation theory is that it
assumes. Burs tines caused by the sliding of window
flow control also causes different flow rate. So it
observes different loss or time delay in a given link.
Kinds of congestion control algorithms
Algorithms are classified by different ways.
By the type and amount of feedback received from
the network: Loss; delay; single-bit or multi-bit
explicit signals.By incremental deploy ability on the
current Internet: Only sender needs modification;
sender and receiver need modification; only router
needs modification; receiver, sender, and routers
need modification.By the aspect of performance it
aims to improve: high bandwidth-delay product
networks;lossy links; fairness; advantage to short
flows; variable-rate links
Achieving RTT
A first-come-first-served policy (drop tail)
can yield TCP connections with large RTT to
starvation since packet belonging to connections with
small RTT can monopolize the buffer space. To
promote RTT fairness among TCP connections, the
RDQM divides the buffer space among the flows
proportionally to their RTT. Initially, the RTT is
taken as that experienced by the SYN TCP segment.
After that, the RTT value is measured during
connection lifetime. For every packet the BS receives
from the wired network, it verifies whether or not the
number of enqueued packets of the same flow, curi,
exceeds the maximum number of allowed packets in
queue for that flow, maxi.
In case it exceeds, the packet is dropped,
otherwise it is enqueued. Such scheme corresponds to
a partial sharing scheme with thresholds defined
dynamically. RDQM tries to allocate buffer space to
accommodate the bandwidth-delay product of that
flow estimated as the product of the measured RTT
by the wireless link available bandwidth. Such policy
is based on the well-known principle for TCP New-
Reno that states that for a connection to fully utilize
the path between a sender and a receiver the buffer
space at a bottleneck link should be at least equal to
the bandwidth delay product between the sender and
the receiver.
Algorithms 1 to 3 present the details of this
approach. Algorithm 1 describes the procedures
implemented at the mobile node which essentially
inserts the measured RTT values into outgoing LL-
ACK packets. Algorithm 2 corresponds to
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 89 | P a g e
implemented at the BS which either accepts or
discards incoming packets. Algorithm 3 updates the
queue thresholds, i.e., curi, andmaxi. Algorithm 2 is
triggered by the arrival of TCP data packet
Algorithm 1: On LL-ACK packet transmission
at MN
1. If TCP data packet received
2. Encapsulate feedback info into outgoing LL-ACK
3. Send LL-ACK
4. Endif
Algorithm 2: On TCP DATA packet arrival at BS
1. Get Flow ID
2. If packet belongs to a new flow Then
3. Create new entry for incoming flow
4. Set Flow Packet Limit equal to MAXdef
5. Set Flow Packet Count equal to zero
6. Set Flow RTT equal to RTTdef
7. Else
8. If Flow Packet Count is greater than Flow Packet
Limit Then
9. Drop incoming packet
10. Else
11. Increase Flow Packet Count by one
12. Accept packet
13. Endif
14. Endif
Algorithm 3: On LL-ACK packet arrival at BS
1.Get Flow ID
2. If Flow RTT is greater that zero Then
3. Set RTT Sum equal to zero
4. ForEach Flow Do
5. Increase RTT Sum by Flow RTT
6. Endfor
7. ForEach Flow Do
8. Set Flow Weight to Flow RTT / RTT Sum
9. Set Flow Packet Limit to max between Flow
Weight andbuffersize
10. Endfor
11. Endif
V. PERFORMANCE EVALUVATIONS
In this section, it is concentrated on
describing about MRTT values. wegenerated
maximum number of RTT valuesfor every
transmissions. It reports about the packet
transmission time for every RTT values.
Fig 2:Comparision of MRTT Value
The packets containing video is transmitted
from source to destination.Fore every packet RTT
values and MRTT values are compared for every
number of packet transmissions.
Fig 3: Comparison of RTT Vs MRTT
VI. CONCLUSION AND FUTURE
WORK:
The main function of the network layer is
routing packets from source to destination. The
traffic traversing the network has inter-packet
dependencies due to application-level encoding
schemes. The proposed scheme has addressed the
problem of managing buffer overflows for traffic
consisting of multiple streams, with inter-packet
dependencies. The algorithms proposed in this paper
derives the guidelines to increase the performance of
Buffer management.
To increase the merits of the work, it is
planned to investigate the following issues in our
future research:
In future work encryption and compression
method will be applied this will lead to reduce the
packet size. Main intention of this method is to avoid
the congestion and flooding.
0
1
2
3
4
1 4 7 10 13 16 19 22 25 28 31
MRTTValue
No Of Transmission
Comparison Of MRTT Value
MRTT1
MRTT2
MRTT3
0
0.5
1
1.5
2
2.5
3
1 4 7 10 13 16 19 22 25 28 31
RTT/MRTTValue
No of Transmission
Comparision Of RTT Vs MRTT
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 90 | P a g e
REFERENCES
[1] Gabrielscalosub, peter marbach, jorg
Liebeherrr, IEEE trans’ Buffer management
for Aggregated streaming data with packet
dependencies” IEEE trans. Parallel and
distributed system vol.24.
[2] A. Albanese, J. Blo¨mer, J. Edmonds, M.
Luby, and M. Sudan, “Priority Encoding
Transmission,” IEEE Trans. Information
Theory, vol. 42, no. 6, pp. 1737-1744, 1996.
[3] A. Borodin and R. El-Yaniv, Online
Computation and Competitive
Analysis.Cambridge Univ. Press, 1998.
[4] A. Fiat, Y. Mansour, and U. Nadav,
“Competitive Queue Management for
Latency Sensitive Packets,” Proc. 19th Ann.
ACM-SIAM Symp.Discrete Algorithms
(SODA), pp. 228-237, 2009.
[5] A. Kesselman and Y. Mansour, “QoS-
Competitive Video Buffering,”Computing
and Informatics, vol. 21, no. 6, pp. 1001-
1018, 2002.
[6] A. Kesselman, B. Patt-Shamir, and G.
Scalosub, “Competitive Buffer Management
with Packet Dependencies,” Proc. IEEE 23rd
Int’l Symp. Parallel and Distributed
Processing (IPDPS), 2009.
[7] A. Mehaoua, R. Boutaba, Y. Rasheed, and
A. Leon-Garcia, “An Integrated Framework
for Efficient Transport of Real-Time MPEG
Video over ATM Best Effort Service,” Real-
Time Imaging, vol. 7, no. 3, pp. 287-300,
2001.
[8] A. Romanow and S. Floyd, “Dynamics of
TCP Traffic over ATM Networks,” IEEE J.
Selected Areas in Comm., vol. 13, no. 4, pp.
633- 641, 1995.
[9] A. Ziviani, J.F. de Rezende, O.C.M.B.
Duarte, and S. Fdida, “Improving the
Delivery Quality of MPEG Video Streams
by Using Differentiated Services,” Proc.
Second European Conf. Universal
Multiservice Networks (ECUMN), pp. 107-
115, 2002.
[10] B. Girod, M. Kalman, Y.J. Liang, and R.
Zhang, “Advances in Channel-Adaptive
Video Streaming,” Wireless Comm. and
Mobile Computing, vol. 2, no. 6, pp. 573-
584, 2002
[11] B.L. Nelson and I. Gerhardt, “On Capturing
Dependence in Point Processes: Matching
Moments and Other Techniques,” 2010.
[12] D.E. Wrege, E.W. Knightly, H. Zhang, and
J. Liebeherr, “Deterministic Delay Bounds
for VBR Video in Packet-Switching
Networks: Fundamental Limits and Practical
Trade-Offs,” IEEE/ ACM Trans.
Networking, vol. 4, no. 3, pp. 352-362,
1996.
[13] D.D. Sleator and R.E. Tarjan, “Amortized
Efficiency of List Update and Paging
Rules,” Comm. the ACM, vol. 28, no. 2, pp.
202-208, 1985.
[14] E. Gu¨ rses, G.B. Akar, and N. Akar, “A
Simple and Effective Mechanism for Stored
Video Streaming with TCP Transport and
Server-Side Adaptive Frame Discard,”
Computer Networks, vol. 48, no. 4, pp. 489-
501, 2005.
[15] E.W. Knightly and N.B. Shroff, “Admission
Control for Statistical QoS: Theory and
Practice,” IEEE Network, vol. 13, no. 2, pp.
20-29, 1999.
[16] F. Li and Z. Zhang, “Scheduling Weighted
Packets with Deadlines over a Fading
Channel,” Proc. IEEE 43rd Ann. Conf.
Information Sciences and Systems (CISS),
pp. 717-712, 2009.448 IEEE
TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 24, NO.
3, MARCH 2013
[17] iSuppli Market Intelligence,
http://www.isuppli.com/, 2009.
[18] I.F. Akyildiz, T. Melodiaa, and K.R.
Chowdhurya, “A Survey on Wireless
Multimedia Sensor Networks,” Computer
Networks, vol. 51, no. 4, pp. 921-960, 2007.
[19] J.M. Boyce and R.D. Gaglianello, “Packet
Loss Effects on MPEG Video Sent over the
Public Internet,” Proc. ACM Sixth Int’l
Conf. Multimedia, pp. 181-190, 1998.
[20] K.-H. Liu, X. Ling, X.S. Shen, and J.W.
Mark, “Performance Analysis of Prioritized
MAC in UWB WPAN with Bursty
Multimedia Traffic,” IEEE Trans. Vehicular
Technology, vol. 56,no. 4, pp. 2462-2473,
2008.
[21] M.H. Goldwasser, “A Survey of Buffer
Management Policies for Packet Switches,”
ACM SIGACT News, vol. 41, no. 1, pp.
100-128, 2010.
C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91
www.ijera.com 91 | P a g e
S. Balaji, M.E, (Phd), MISTE is currently
working as a Head of The Department,dept of CSE in
SCAD College of engineering and Technology,
Tirunelveli His research interests are Wireless
networks Mobile Computing, Network Security,
Wireless Sensor Networks, Cloud Computing .He has
presented many papers in National and International
conferences in Network security, Mobile Computing,
wireless network security, and Cloud Computing.
And also his methodology of teaching about TCP &
UDP is hosted on Wipro Mission 10x portal. He is a
life time member of ISTE.
C. Monisha. Currently doing ME
Computer science in SCAD College of engineeringng
and technology, Cheranmahadevivi, Tirunelveli
district. She has completed her undergraduate B.Tech
Information on Technology in Infant jesus college of
engineering, Tuticorin in 2012.

Contenu connexe

Tendances

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
 
Performance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsPerformance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsijcnesiir
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
CrosslayertermpaperB.T.L.I.T
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2Aws Ali
 

Tendances (18)

AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
 
05688207
0568820705688207
05688207
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
 
Performance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANsPerformance Evaluation using STP Across Layer 2 VLANs
Performance Evaluation using STP Across Layer 2 VLANs
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
Crosslayertermpaper
CrosslayertermpaperCrosslayertermpaper
Crosslayertermpaper
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
 

En vedette (20)

R43019698
R43019698R43019698
R43019698
 
W4301117121
W4301117121W4301117121
W4301117121
 
J41035862
J41035862J41035862
J41035862
 
N41038288
N41038288N41038288
N41038288
 
B41030620
B41030620B41030620
B41030620
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
S4103115122
S4103115122S4103115122
S4103115122
 
W4103136140
W4103136140W4103136140
W4103136140
 
N41049093
N41049093N41049093
N41049093
 
T4103123127
T4103123127T4103123127
T4103123127
 
P410498102
P410498102P410498102
P410498102
 
Q4103103110
Q4103103110Q4103103110
Q4103103110
 
Z4103148155
Z4103148155Z4103148155
Z4103148155
 
Bc4103338340
Bc4103338340Bc4103338340
Bc4103338340
 
Ad4103173176
Ad4103173176Ad4103173176
Ad4103173176
 
Aw4103303306
Aw4103303306Aw4103303306
Aw4103303306
 
An4103230235
An4103230235An4103230235
An4103230235
 
Aa4101160164
Aa4101160164Aa4101160164
Aa4101160164
 
Jf3616031606
Jf3616031606Jf3616031606
Jf3616031606
 
Modelo projeto
Modelo projetoModelo projeto
Modelo projeto
 

Similaire à P43018691

Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET Journal
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...IOSR Journals
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksIJMER
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNpaperpublications3
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...IJERA Editor
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system designnody111
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 

Similaire à P43018691 (20)

Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
I1102014953
I1102014953I1102014953
I1102014953
 
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc NetworksIRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
IRJET - A Review on Congestion Control Methods in Mobile Adhoc Networks
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...Analysis of service-oriented traffic classification with imperfect traffic cl...
Analysis of service-oriented traffic classification with imperfect traffic cl...
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSN
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
 
End to-end arguments in system design
End to-end arguments in system designEnd to-end arguments in system design
End to-end arguments in system design
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 

Dernier

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

P43018691

  • 1. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 86 | P a g e Packet Reordering Using Congestion Control Algorithm Based on Data frame Weightage S. Balaji#1 , C. Monisha#2 1 AssociateProfessor 2 PG Scholor, # Department of ComputerScience and Engineering, Anna University-Chennai,SCAD College of Engineering and Technology, cheranmahadevi, Tamilnadu, India. ABSTRACT In network application the data frame is transferred as sub-divided packets which are interdependent. Because of this inter-packet dependencies problems like buffer overflow, degradation of packets may occur in existing application. In this paper packet reordering has been done through Round Trip Delay Time(RTT) technology based on congestion control algorithm & weight based priority algorithm. It has been observed this technology has achieved considerable success to reduce the time delay and also to avoid degradation of packets. It also addressed the problem of buffer management of multiple data streams traffic. Key Words: Interpacket dependencies, RTT, reordering. I. INTRODUCTION In majority network application the data frames are splitted into a small sized packets erfore transmission. The data is useful only after receiving of all packets. Degradation of some packets leads to wastage of whole data. From this is understood that the multistreams has interdependent packet structure. This dependency structure depends on encoding used. Normally re-transmission of losed data packets found in higher level protocol. But dependency structure in MPEG video is so strong that delay of retransmitted packets affects real time traffic.Because of these inter-packet dependency problems, like buffer overflow, loss and degradation of packet usually occurs in existing applications. An usual approach to deal the packet loss problem is to empty encoding schemes which provide considerable improvement in the performance. However this common approach has its own limitations in same network application. The prime causes for the packet loss is due to congestion.we consider the problem of buffer management of multiple data streams traffic. In this paper packet re-ordering has been done through Round Trip Delay Time (RTT. This technology based on congestion control algorithm and weightage based priority algorithm. These algorithms are guaranteed to give good output, in any traffic pattern. In this paper we studied packet discard policies in depth. Our model is suitable to various traffic encoding schemes that has more inter dependency structure. BASE STATION: A base station is what links mobile phones to a wireless carrier’s network. Base station provides local coverage for a wireless network. 1. WSN Info: A wireless sensor network(WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure, sounds, etc. And to cooperatively pass their data through the network to a main location. 2. Packet Node: It is a important part in a packet switching network. The main function of packet node are transmitting and receiving of data packets. Data switches and equipment's are integral part of packet node. 3. Queue Buffer perform 4. Individual Queue Perform 5. Transmission Comparison MOBILE NODE: Mobile node is any device having internet connection and having the character of changing location frequently. Usually Mobile phones, handheld and laptop computer are belongs to this kind. Router also comes in this category. As mobile node moves from one place to another place, it changes from one network to another network. Maintaining continuous internet connection needs special support mechanism. In traditional routing procedures each mobile node havesame IP Address. But in standard routing procedure, each and every time a mobile user have to change the IP Address whenever the node changes from one network to another. Mobile Node has three important parts. RESEARCH ARTICLE OPEN ACCESS
  • 2. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 87 | P a g e 1. Mobile Channel 2. Mobile Signal 3. transcoding Among these, transcoding plays important role in conversion of one encoding to other encoding. It convert analog to analog and digital to digital directly. Transcoding is useful to convert the unsupported file format to supported one. II. EXISTING SYSTEM In this work most related to the problems of buffer management in video traffic has been studied.Like MPEG video streaming, most of these data streams has high dependency structure and specific encoding schemes. Due to congestion in data streaming buffer overflow occurs. Because of this overflow existing encoding scheme dropped some data packets in the receiving end. So most of the previous works analyzed on which data packets should be dropped to receive less damage on the output. Because of loss of some packets, whole data set become unusefull. In the buffer management policy of Ramanathanetalthe frame is dropped when many packets are dropped. In that they suggest latest frame first rule for discard the packets.In many other works priority based discard policies have been studied. In that the packets are discriminated based on importance. Normally less important packets are dropped which would not affect the good put. The model proposed by kesselmanetal has no stream structure which underlies the arrival traffic. In this work they considered restricted arrival pattern. Buffer management in FIFO scheduling regime follows Queuing discipline. Time delay and re-ordering constrained environment happened due to congestion in this method. III. III.PROBLEM DEFINITION In a network application, the problem of ensuring the arrival of entire frame at receiving end is crucial. Because of congestion, buffer overflow and degradation of packets occurred. An usual approach to handle the packet loss problems in to empty encoding schemes. In the existing encoding schemes even though it achieved some performance improvement, it has some limitations. It is more costly due to increased traffic. In the regime of FIFO, also more time delay and re-ordering constrained environment have occurred. The main problem of existing buffer management is low level of good put to the throughput. Throughput is defined as amount of data transmitted as data packets. Good put is defined as amount of data received as data packets in receiving end. In a good buffer management practices good put is almost equal to the throughput. But due to the over congestion loss of data packets reduces the effective good put.In account of all issues discussed the proposed system considered packet re-ordering based on congestion control algorithm and weightage priority algorithm. In network application the data frame is transferred as sub-divided packets which are interdependent. Because of this inter-packet dependencies problems like buffer overflow, degradation of packets may occur in existing application. In this paper packet reordering has been done through Round Trip Delay Time(RTT) technology based on congestion control algorithm & weight based priority algorithm . It has been observed that technology has achieved success to reduce the time delay and also to avoid degradation of packets. Addressed the problem of managing buffer overflows for traffic consisting of multiple streams, with interpacket dependencies. And provided guidelines for thedesign of such algorithms, and analyzed. Provided guarantees on its performance under any traffic conditions by proving it has a bounded competitive ratio. IV. PRPOSED SYSTEM In the existing methodology, only one packet has been sent at a time. Once the packet got received next packet starts to retransmit. But this proposed system randomly initial frame from every packet started too sent at a time.This will reduce the overall delay.The main objective of this paper is to reduce the overflow in the buffer.The input video has been splitted into framesOnce the frames has been delivered to receiver it can be reordered. Congestion control: Congestion control controls the traffic by regulating the entry into the telecommunication network. To avoid congestion collapse congestion control algorithm attempts to prevent the over usage of intermediates node and networks process and link capabilities. It also avoids to take resource reducing steps like reducing the packet sending rate.In this framework Lagrange multiplies Ῥᶩ loss of probability or delay in the link ᶩ because of queuing.A prime limitation theory is that it assumes.
  • 3. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 88 | P a g e Fig 1: Architecture PROPOSED ALGORITHM Theory of congestion control Theory of congestion control was proposed by Frank Kelly in which be applied two theories namely Microeconomic theory and convex optimization theory. In which to explains how individual packets control their own rates and also concludes that these individual packets interact with each other and achieve the optimum rate in network wide allocation. The mathematical expression for optimal rate allocation is as follows. Let be the rate of flow , be the capacity of link , and be 1 if flow uses link and 0 otherwise. Let , and be the corresponding vectors and matrix. Let be an increasing, strictly concave function, called the utility, which measures how much benefit a user obtains by transmitting at rate . The optimal rate allocation then satisfies such that In this problem the Lagrange dual unlinks. The unlinked flow behaves in different rate based on price of the network in its own way. After unlinks of Lagrange dual each link attract a constraint because of this a Lagrange multiplies has raised. Congestion control turned into distributed optimization algorithm to solve the above constraint. The framework of this model is followed in many present congestion control algorithm.In this framework Lagrange multiplies Ῥᶩ loss of probability or delay in the link ᶩ because of queuing. Even though many optimal allocation rates are possible. Max-min rate allocation and Kelly's proportional fair allocation are the dominant examples. A prime limitation theory is that it assumes. Burs tines caused by the sliding of window flow control also causes different flow rate. So it observes different loss or time delay in a given link. Kinds of congestion control algorithms Algorithms are classified by different ways. By the type and amount of feedback received from the network: Loss; delay; single-bit or multi-bit explicit signals.By incremental deploy ability on the current Internet: Only sender needs modification; sender and receiver need modification; only router needs modification; receiver, sender, and routers need modification.By the aspect of performance it aims to improve: high bandwidth-delay product networks;lossy links; fairness; advantage to short flows; variable-rate links Achieving RTT A first-come-first-served policy (drop tail) can yield TCP connections with large RTT to starvation since packet belonging to connections with small RTT can monopolize the buffer space. To promote RTT fairness among TCP connections, the RDQM divides the buffer space among the flows proportionally to their RTT. Initially, the RTT is taken as that experienced by the SYN TCP segment. After that, the RTT value is measured during connection lifetime. For every packet the BS receives from the wired network, it verifies whether or not the number of enqueued packets of the same flow, curi, exceeds the maximum number of allowed packets in queue for that flow, maxi. In case it exceeds, the packet is dropped, otherwise it is enqueued. Such scheme corresponds to a partial sharing scheme with thresholds defined dynamically. RDQM tries to allocate buffer space to accommodate the bandwidth-delay product of that flow estimated as the product of the measured RTT by the wireless link available bandwidth. Such policy is based on the well-known principle for TCP New- Reno that states that for a connection to fully utilize the path between a sender and a receiver the buffer space at a bottleneck link should be at least equal to the bandwidth delay product between the sender and the receiver. Algorithms 1 to 3 present the details of this approach. Algorithm 1 describes the procedures implemented at the mobile node which essentially inserts the measured RTT values into outgoing LL- ACK packets. Algorithm 2 corresponds to
  • 4. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 89 | P a g e implemented at the BS which either accepts or discards incoming packets. Algorithm 3 updates the queue thresholds, i.e., curi, andmaxi. Algorithm 2 is triggered by the arrival of TCP data packet Algorithm 1: On LL-ACK packet transmission at MN 1. If TCP data packet received 2. Encapsulate feedback info into outgoing LL-ACK 3. Send LL-ACK 4. Endif Algorithm 2: On TCP DATA packet arrival at BS 1. Get Flow ID 2. If packet belongs to a new flow Then 3. Create new entry for incoming flow 4. Set Flow Packet Limit equal to MAXdef 5. Set Flow Packet Count equal to zero 6. Set Flow RTT equal to RTTdef 7. Else 8. If Flow Packet Count is greater than Flow Packet Limit Then 9. Drop incoming packet 10. Else 11. Increase Flow Packet Count by one 12. Accept packet 13. Endif 14. Endif Algorithm 3: On LL-ACK packet arrival at BS 1.Get Flow ID 2. If Flow RTT is greater that zero Then 3. Set RTT Sum equal to zero 4. ForEach Flow Do 5. Increase RTT Sum by Flow RTT 6. Endfor 7. ForEach Flow Do 8. Set Flow Weight to Flow RTT / RTT Sum 9. Set Flow Packet Limit to max between Flow Weight andbuffersize 10. Endfor 11. Endif V. PERFORMANCE EVALUVATIONS In this section, it is concentrated on describing about MRTT values. wegenerated maximum number of RTT valuesfor every transmissions. It reports about the packet transmission time for every RTT values. Fig 2:Comparision of MRTT Value The packets containing video is transmitted from source to destination.Fore every packet RTT values and MRTT values are compared for every number of packet transmissions. Fig 3: Comparison of RTT Vs MRTT VI. CONCLUSION AND FUTURE WORK: The main function of the network layer is routing packets from source to destination. The traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. The proposed scheme has addressed the problem of managing buffer overflows for traffic consisting of multiple streams, with inter-packet dependencies. The algorithms proposed in this paper derives the guidelines to increase the performance of Buffer management. To increase the merits of the work, it is planned to investigate the following issues in our future research: In future work encryption and compression method will be applied this will lead to reduce the packet size. Main intention of this method is to avoid the congestion and flooding. 0 1 2 3 4 1 4 7 10 13 16 19 22 25 28 31 MRTTValue No Of Transmission Comparison Of MRTT Value MRTT1 MRTT2 MRTT3 0 0.5 1 1.5 2 2.5 3 1 4 7 10 13 16 19 22 25 28 31 RTT/MRTTValue No of Transmission Comparision Of RTT Vs MRTT
  • 5. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 90 | P a g e REFERENCES [1] Gabrielscalosub, peter marbach, jorg Liebeherrr, IEEE trans’ Buffer management for Aggregated streaming data with packet dependencies” IEEE trans. Parallel and distributed system vol.24. [2] A. Albanese, J. Blo¨mer, J. Edmonds, M. Luby, and M. Sudan, “Priority Encoding Transmission,” IEEE Trans. Information Theory, vol. 42, no. 6, pp. 1737-1744, 1996. [3] A. Borodin and R. El-Yaniv, Online Computation and Competitive Analysis.Cambridge Univ. Press, 1998. [4] A. Fiat, Y. Mansour, and U. Nadav, “Competitive Queue Management for Latency Sensitive Packets,” Proc. 19th Ann. ACM-SIAM Symp.Discrete Algorithms (SODA), pp. 228-237, 2009. [5] A. Kesselman and Y. Mansour, “QoS- Competitive Video Buffering,”Computing and Informatics, vol. 21, no. 6, pp. 1001- 1018, 2002. [6] A. Kesselman, B. Patt-Shamir, and G. Scalosub, “Competitive Buffer Management with Packet Dependencies,” Proc. IEEE 23rd Int’l Symp. Parallel and Distributed Processing (IPDPS), 2009. [7] A. Mehaoua, R. Boutaba, Y. Rasheed, and A. Leon-Garcia, “An Integrated Framework for Efficient Transport of Real-Time MPEG Video over ATM Best Effort Service,” Real- Time Imaging, vol. 7, no. 3, pp. 287-300, 2001. [8] A. Romanow and S. Floyd, “Dynamics of TCP Traffic over ATM Networks,” IEEE J. Selected Areas in Comm., vol. 13, no. 4, pp. 633- 641, 1995. [9] A. Ziviani, J.F. de Rezende, O.C.M.B. Duarte, and S. Fdida, “Improving the Delivery Quality of MPEG Video Streams by Using Differentiated Services,” Proc. Second European Conf. Universal Multiservice Networks (ECUMN), pp. 107- 115, 2002. [10] B. Girod, M. Kalman, Y.J. Liang, and R. Zhang, “Advances in Channel-Adaptive Video Streaming,” Wireless Comm. and Mobile Computing, vol. 2, no. 6, pp. 573- 584, 2002 [11] B.L. Nelson and I. Gerhardt, “On Capturing Dependence in Point Processes: Matching Moments and Other Techniques,” 2010. [12] D.E. Wrege, E.W. Knightly, H. Zhang, and J. Liebeherr, “Deterministic Delay Bounds for VBR Video in Packet-Switching Networks: Fundamental Limits and Practical Trade-Offs,” IEEE/ ACM Trans. Networking, vol. 4, no. 3, pp. 352-362, 1996. [13] D.D. Sleator and R.E. Tarjan, “Amortized Efficiency of List Update and Paging Rules,” Comm. the ACM, vol. 28, no. 2, pp. 202-208, 1985. [14] E. Gu¨ rses, G.B. Akar, and N. Akar, “A Simple and Effective Mechanism for Stored Video Streaming with TCP Transport and Server-Side Adaptive Frame Discard,” Computer Networks, vol. 48, no. 4, pp. 489- 501, 2005. [15] E.W. Knightly and N.B. Shroff, “Admission Control for Statistical QoS: Theory and Practice,” IEEE Network, vol. 13, no. 2, pp. 20-29, 1999. [16] F. Li and Z. Zhang, “Scheduling Weighted Packets with Deadlines over a Fading Channel,” Proc. IEEE 43rd Ann. Conf. Information Sciences and Systems (CISS), pp. 717-712, 2009.448 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 3, MARCH 2013 [17] iSuppli Market Intelligence, http://www.isuppli.com/, 2009. [18] I.F. Akyildiz, T. Melodiaa, and K.R. Chowdhurya, “A Survey on Wireless Multimedia Sensor Networks,” Computer Networks, vol. 51, no. 4, pp. 921-960, 2007. [19] J.M. Boyce and R.D. Gaglianello, “Packet Loss Effects on MPEG Video Sent over the Public Internet,” Proc. ACM Sixth Int’l Conf. Multimedia, pp. 181-190, 1998. [20] K.-H. Liu, X. Ling, X.S. Shen, and J.W. Mark, “Performance Analysis of Prioritized MAC in UWB WPAN with Bursty Multimedia Traffic,” IEEE Trans. Vehicular Technology, vol. 56,no. 4, pp. 2462-2473, 2008. [21] M.H. Goldwasser, “A Survey of Buffer Management Policies for Packet Switches,” ACM SIGACT News, vol. 41, no. 1, pp. 100-128, 2010.
  • 6. C. Monisha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.86-91 www.ijera.com 91 | P a g e S. Balaji, M.E, (Phd), MISTE is currently working as a Head of The Department,dept of CSE in SCAD College of engineering and Technology, Tirunelveli His research interests are Wireless networks Mobile Computing, Network Security, Wireless Sensor Networks, Cloud Computing .He has presented many papers in National and International conferences in Network security, Mobile Computing, wireless network security, and Cloud Computing. And also his methodology of teaching about TCP & UDP is hosted on Wipro Mission 10x portal. He is a life time member of ISTE. C. Monisha. Currently doing ME Computer science in SCAD College of engineeringng and technology, Cheranmahadevivi, Tirunelveli district. She has completed her undergraduate B.Tech Information on Technology in Infant jesus college of engineering, Tuticorin in 2012.