Академический Документы
Профессиональный Документы
Культура Документы
Project?
The Art of Protocol Design
( The Art of Artcle Series )
Step - 1
Choose a network simulator.
Glomosim
Commercial Simulators OM N EST
OP N ET
Step-2
Select two or more protocols or network algorithms of the same
functionality.
1
Compare them based on the data which is produced
by the simulator.
T CP
U DP
Transport Layer Protocols
SCT P
RT P
DSDV
DSR
Ad Hoc Network Routing Protocols
AODV
OLSR
Plot the results in the form of graphs, and the results can be reported as a
mini project.
Step-3
Consider only one protocol model or algorithm.
Learn simulator in depth and also how to make a model?
Perform simulation and gather huge amount of data.
Choose metrics which are related to your protocol or algorithm and
keep them for the future use.
Some common metrics are.
EED = Pr - Pg (1)
2
2 Normalized Routing Load(Minimize it- Your
Goal)
Normalized Routing Load(NRL) is defined as the ratio of control packets to
data packets, and it characterizes the protocol overhead to send data from a
source node to its respective destination.
Normalized Routing Load can be expressed as.
Pc
N RL = (2)
Pd
Where
Pc Number of Control Packets
Pr Number of Data Packets
4 Packet Loss
(Think Yourselves..............-Your Goal) .
P acketLoss = P r P s (4)
Where
Pr Total Number of Packets Received.
Ps Total Number of Packets Sent.
3
Variation in delay (Jitter) is occurred when different delays are experienced by
packets related to the same flow.
6 Throughput(Maximize It)
The network throughput is referred to as the average number of bits received
by destination nodes in one second.
8 TB
T hroughput = (6)
T LBR T F BS
Where
TB Total Number of Bytes
TFBS Time at First Bit Sent
TLBR Time at Last Bit Received
Note- It can be more than links data rate.
Step-4
This step is very critical.
4
M any Concepts Are Aired F rom Real Lif e
Real Lif e Concepts In Computing And In Computer N etworks
So, F irst T ry It.
Greedy Example(s) OSP F, OLSR and Spanning P rotocols.
Dynamic P rogramming Example(s) RIP, DSDV, AODV, DSR, DY M O.
Genetic In Research Domain.
Algorithms
Approximation
In Research Domain.
Convex N etwork Resource U tilization.
Combinatorial Optimization Better Combination of N etwork Components.
Queue Example(s) QoS and Congestion Control P rotocols U se It.
Data Structures Hash T able Example(s) Distributed Hash T able(DT H)
Is U sed By P eer T o P eer N etwork P rotocols.
Back Of f Algorithm U ses It T o Avoid Collisions.
P robability Concepts DSR P rotocol U ses It T o P revent Broadcast Storm.
Security Algorithms U ses It T o F ind Out P robability Of Attacks.
Numerical Method
Artificial Intelligence
:: Important ::
To modify protocol read research papers, theses and master level research projects.
To see flow chart of algorithms see proposed algorithms chapters of theses.
Step-5
Compare modified algorithm with unmodified algorithm.