Вы находитесь на странице: 1из 7

(IJCNS) International Journal of Computer and Network Security, 113

Vol. 2, No. 5, May 2010

A Novel Architecture for QoS Management in


MANET using Mobile Agent
A.K.Vatsa1 and Gaurav Kumar2
1
Assistant Professor
School of Computer Engineering and Information Technology, SHOBHIT UNIVERSITY,
NH-58, MODIPURAM, MEERUT, UTTAR PRADESH, INDIA.
avimanyou@rediffmail.com
2
Bachelor of Technology
School of Computer Engineering and Information Technology, SHOBHIT UNIVERSITY,
NH-58, MODIPURAM, MEERUT, UTTAR PRADESH, INDIA.
kumar.22.gaurav@gmail.com

interest in this field and researches to be carried out for


Abstract: The wide availability of mobile devices equipped with betterment of the network functioning.
infrastructure-free wireless communication capabilities together
with the technical possibility to form ad-hoc networks paved the 1.2 Mobile Agent
path for building highly dynamic communities of mobile users. Mobile agents are programs that can migrate from host to
In many performance oriented applications like co-operative host in a network [11], at times and to places of their own
information sharing, defense applications, disaster choosing where this is mandatory for the host to posses’
management, mission critical applications and commercial agent hosting capability. The agent code should not have to
production applications needs QoS, which is, no doubt, a critical be installed on every machine the agent could visit
issue. In this paper, we propose a novel architecture using
providing them platform independency [11]. Agents are able
hierarchical model to effectively manage the resources on and
to decide, based on their local knowledge, if, when and
attached with Mobile ad-hoc Network and provide robustness
with zero probability of fault. The dynamic clustering and the where to migrate in the network. The ability of mobile
criteria for cluster formation causes adaptability to various agents to replicate themselves into many copies that travel to
situations and enhancement of load bearing capacity as well as different points across the network sounds promising.
an effective co-operation between several nodes to bear the During migration, the agent’s local state variables [7] are
responsibilities. The main focus is to minimize the overhead transferred to the new host to continue computation there.
transmission in the network for which a new approach of co- Mobile agents are chosen for many applications, due to
operative routing is implemented. several reasons [8], viz. improvements in latency and
bandwidth of client-server applications and reducing
Keywords: MANET, QoS, Mobile Agent, Cluster, Cluster vulnerability to network disconnection.
Head, co-operative Routing, Hierarchical model, Dynamic
Clustering, Hybrid Approach and Host. 1.3 Quality of Service
QoS support in MANET’s is a challenging task and it is
1. Introduction required to have a better management over parameters like
minimum bandwidth; minimum delay, jitter guarantee, dis-
1.1 MANET
connectivity and denial of services and contract based
Mobile Ad hoc network [9], is infrastructure less, dynamic enforced service agreements. Although, MANET’s are used
multi-hop wireless network, where each node acts as a for a variety of applications, but, the commercial one’s
mobile router. They are equipped with a wireless transceiver mainly multimedia applications require a predefined Quality
and by a group of mobile hosts formed on a shared wireless of Service [1]. This QoS is in the form of an agreed upon
channel by virtue of their proximity to each other [10]. service level agreement [1]. QoS means a guarantee of some
Routing protocols should adapt to such dynamics and parameters and their threshold value. We know that
continue to maintain connection between the different applications have different requirements of
communicating nodes. As a consequence of mobility and resources. QoS roughly means providing the applications
disconnection of mobile hosts, the dynamics of wireless ad with enough network resources, so that they can function
hoc networks, causes a lot of problems to emerge in within acceptable performance limits. Since the
designing proper routing algorithms for effective requirements of resources vary, the value of QoS parameters
communication [11]-[12]. Also the time of entering the node also varies for every application.
to the network and exiting from it be unpredictable. Work
on unipath routing has been proposed in many literatures 1.4 Problem Identification
[18]-[22]. There two main classes of routing protocols in The problem considered in this paper is to provide a routing
MANET, i.e., table-based or proactive and on demand or scheme for MANET’s so that the QoS can be provided to
reactive protocols [23]. Any suitable mix may give better the mobile nodes with decreasing the amount of overhead
results. Their varied scope and promising features cause transmission and providing such an architecture which
114 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 5, May 2010

properly manages the network with minimum probability of Equation 1. states that the path with banwidth left on them
error occurrence. Though the consumption of resources is a denoted by bwe(i,j) which is greater than bwmin are selected
problem, yet a bigger problem is that even after giving so and the one with min. value is decided to be assigned.
much of network capacity, protocols still lack in providing Equation 2. states that for delay the summation of all the
QoS strictly. Getting in a bit depth there is a strong delays on all the links is taken and the path where it is
requirement to make the updation of the topological found to be less than D is selected. Similarly other criterion
information to a defined level. The reason being frequent can be calculated.
updation may consume considerable amount of network
2.2 Clusters and Cluster Head
resources as well as delayed updation may cause delay in
detection of topology changes. Hence, this calls for the Among several approaches there are techniques which have
development, which finds a way solving both of these considered the network as a whole and others have used
problems. clustering to manage the network effectively. This clustering
is the technique which made it possible to deploy hybrid
1.5 Paper Organization approach of protocols in MANET’s. Since, the formation of
The rest of the paper is organized in such a way that the clusters is to be done carefully, previous works have done
second section describes previous works in the field of clustering on three main basis viz. fixed geographical
quality of Service management, clustering and formation of locations [3], based on numerousity of nodes in a cluster and
cluster heads. This section also describes the previously depending upon hop counts [4]. The GPS system provides
proposed architectures in this field along with a short the information about exact co-ordinate of the node in the
description of co-operative routing. The third section consist geographical location through which we can form fix size
of our proposed work with thorough description of how and fixed boundary clusters with a little dynamics. However,
clustering is to be done and how hierarchical modeling can in the second approach we formed the clusters depending
help in solving the problems. This provides with a upon the count of the nodes permissible in a cluster. The
comprehensive architecture for QoS management third approach uses the proximity of neighborhood of nodes
mechanism with detailed description. The fourth section in the network and other subjective values. Also, the
consists of the future work that can be done in this field. determination of cluster head should be done in a way
Finally, the paper is concluded in section five. keeping in mind the proper division of work on the nodes so
that no node would get overloaded with work. This
2. Related Work determination cannot be done with exact calculation and
without error but yet we have much data to calculate that
2.1 Quality of Service which node is free most of the time and hence which can
The QoS parameters are those properties of the network serve as cluster head. Although in current scenario we have
which plays important role in the delivery of required such advance devices which have extremely high processing
information over the network. The requirement of QoS is capability and hence the selection of cluster head may not be
that neither all applications require same network resources very strict but yet we try to keep cluster heads away from
nor from commercial point of view all users pay same for relaying the data.
services. So there is a need to make such distinctions. Now
2.3 Previously Defined Architecture
as many parameters are considered in the QoS related to the
network the transmission will become more effective. There Several architectures have been defined using hybrid of
are some parameters [1], identified to be considered proactive as well as reactive approach and tried to solve the
essential for the transmission viz. bandwidth, delay, jitter problem of MANETS’s. One of the most popular has used
and reliable delivery of data. There is also requirement to the same hybrid approach [1] and defined how the work is
pay attention to the way they are managed, about where and done in reactive way for path determination and reservation.
how. Some architecture effectively managed these in the
form of matrices and calculations are done with defined
formulas, [2]. The QoS matrix which is used to store the
values of parameters of links between every two nodes is
having the node id on both rows and columns. The values
filled in the matrix are the values for every link in the
network and looks like as given below:

(a) Contract enforcer


the equations are as follows:
bwp(s,d)= min bwe(i,j)>=bwmin …(1)
(i,j)έP(s,d)

delayP(s,d)= ∑ de(i,j) <= D …(2)


(i,j)έP(s,d)

These equations can be interpreted as follows:


(IJCNS) International Journal of Computer and Network Security, 115
Vol. 2, No. 5, May 2010

transmitted to the destination with their individual overhead


or they may be merged in a single packet destined to 15
where they may be reconstructed to form separate packets.
Hence the load on network from 18 to 15 is reduced on the
cost of processing on 18 and 15. Such places where this
merging is carried out are called Rendezvous points. Since it
cannot be assumed for packets to arrive these points at
exactly same time the packets face some waiting time at
these positions, the time for which these packets wait are
called rendezvous period and should be chosen such so that
(b) Design of QoS management in MANET they may not increase delay to unacceptable level. These
rendezvous points are mainly those from where traffic is
Figure 1. The architecture of contract enforcement and path considerably high i.e. in case of MANET’s they are mainly
determination/reservation. interfaces between clusters.
This is sown in figure 1(a) and 1(b). This architecture
divides the work in two main portions viz. contract 3. Proposed Work
enforcement and QoS management. The contract
3.1 Cluster Formation Criteria and Dynamics in
enforcement is done using four modules viz. shaper module,
Clustering
Packet Classifier module, packet scheduler module and
feedback module. The QoS management finds a path in The method of cluster formation in this work depends upon
reactive way to the destination following the defined service two conditions. Depending upon previous experiences we
level agreement. Another architecture defines how this have data about what amount of time some node is using the
traditional Ad-Hoc network can be interfaced with IP transmission medium. The sum of this value should not
network [5]. This architecture provides a well defined exceed a threshold value within a period of time. Hence as
separation of IP network and MANET. It tries to remove the soon as we reach this value we start the formation of new
misconceptions which most people have about IP links. It cluster. Though it may increase the performance but can
has defined the interaction well. Another model tells about cause non-symmetric structure of cluster. To keep it
Integrated Services [13], [14], Differentiated Service [15], symmetric we pose a limit on the maximum hops from the
FQMM [6],[13],[16] and SWAN [6],[17]. The Integrated cluster head permissible in the cluster. Now, these are two
Services (IntServ) model was the first standardized model criteria’s and whichever is met first can cause the start of
developed for the Internet. The Differentiated Services formation of new cluster. Till the dynamics of cluster is
(DiffServ) model was designed to overcome the inherent considered the changes in clusters may be triggered due to
demerits of the IntServ model by IETF (RFC 1633). A two reasons. First, if the usage value exceeds the maximum
Flexible QoS Model for MANET (FQMM) has been threshold value and secondly if any node moves out of
proposed which considers the characteristics of MANET’s neighbourhood of cluster, causing changes in many clusters.
and tries to take advantage of both the per-flow service This is shown in figure 3.
granularity in IntServ and the service differentiation in
DiffServ. SWAN model was developed by the Comet team
at Columbia University. The model divides the traffic into
real time UDP traffic and best effort TCP traffic.
2.4 Co-operative Routing
Since the motion of mobile agents is pure overhead and if
this could be minimized then it can save a considerable
amount of bandwidth and also the mobile nodes are quiet
sufficient to bear the overhead of merging packets if they
can be an approach of co-operative routing[3] was proposed
which reduces the overhead transmission.
Figure 3. Flow of Control for Cluster formation
Pseudo code for clustering:
Here usage_threshold maximum usage permitted,
hop_threshold maximum hops permitted from the cluster
head, passed as arguments to a function named
form_cluster(), pop() retrieves a node from the
neighbourhood list of head sent as argument and named
head_threshold, sum_cluster_usage is the sum of usage in
the cluster, node_usage is the individual usage of one node,
Figure 2. Cooperative Routing
hop_to_cluster is the hops taken by anode to reach the head,
It is shown in figure 2. The message from 22, 23 and 24 cluster_head_mamber[] is an array containing the id’s of
arrived 18 at three different times and are destined to 1, 2 nodes added in the cluster, node_id is the identification of
and 3. As in figure 1 either they could be individually nodes, node_cluster_head is a field with every node pointing
116 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 5, May 2010

to the cluster head of itself, current_cluster_head is the head 3.2 Architecture


of the cluster for which clustering is done presently and The architecture shown in the figure is just a more detailed
least_usage_value is a function finding the node with least and modified form a previously proposed architectures. This
usage among unassigned nodes kept in a list and passed as architecture mainly defines the way in which path
argument called list_unassigned_node. determination is done in case of multilevel hierarchical
form_cluster(usage_threshold,hop_threshold) model and reservation is done afterwards. The architecture
(1) pop(head_neighbourhood) can be referred in figure 5. This calls for generation of a
(2) if(sum_cluster_usage+node_usage < mobile agent on demand hence reactive in nature. The agent
usage_threshold || hop_to_cluster < hop_threshold) after finding the QoS path to the destination returns via
(3) then: cluster_head_member[next]= node_id; same path to the source reserving resources at each
(4) :node_cluster_head= cluster_head_id; intermediate cluster head. If the reservation fails due to
(5) else current_cluster_head = reservation of resources by some other agent meanwhile,
least_usage_value(list_unassigned_node) then again the path determination is done. However the path
(6) goto step(1); determination phase requires contract as well as the
3.3 Hierarchical Model information of network capacity left at that time which is
maintained by the cluster heads.
The hierarchy in the network means dividing the network in
smaller regions and managing the regions as if they are
small MANET’s. This is like the divide and conquers
approach in the algorithms which we use to divide the
problem in smaller parts. Initially it looks like the same
clustering approach. This gives us several benefits, as this
may divide the load between several nodes to maintain the
topology of the network. This hierarchy will also cause Figure 5. The Proposed Architecture for QoS management
effective path determination as well as routing and need not
to travel on any path which may not lead to the destination. 3.3 Working Principle and Explanation
This causes the QoS effectively managed. The hierarchy
which we use is rooted to several levels and taking an 3.3.1 Hybrid Approach
abstract view the functioning is similar. The cluster The previously defined problem of finding a way between
formation criterions which are previously described can be high bandwidth consumption for overhead transmission and
used to make upper layer clusters. Now consider a tree delayed updation can be better solved by the hybrid
where root is the complete MANET and the leaves are the approach where at each level the topological information is
lowest and most fundamental clusters. Each node on the n- updated by mobile agent for every cluster after certain time
1th level is a group of these fundamental clusters. All such and the path determination can be done in reactive way by
clusters on every level are on equivalent positions on the another mobile agent on demand. Before coming on to the
network. The formation and splitting criteria are same actual description of operation of mobile agents we must
except the values which will be different in every level. The discuss that there are several instances of same mobile agent
values will also be dynamically generated since there is no travelling in the network and hence to distinguish between
limitation over maximum Value of levels. This can be better them we need to give every instance a unique Id.
shown by figure below. The hierarchical model is
maintained by a mobile agent instances of which are 3.3.2 Topology Maintaining Mobile Agent
travelling in the network inside each cluster and instances The mode of operation can be described in following steps:
are also running on every level in proactive way updating • Every node performs the neighbouhood detection. Each
the information after every certain time intervals. Also this node must detect the neighbor nodes with which it has a
mobile agent waits for some time on every node. There are direct link. Neighbor Discovery Protocol (NDP) is used
nodes which act as interfaces between clusters acting as to discover the neighbors and update the neighbors
Rendezvous points where mobile agents co-operate to carry table. It periodically transmits HELLO message at
the information. It is illustrated in figure 4. regular intervals. The reception of NDP beacons
indicates "node found" or "node unreachable"
information, the node will respond as follows:
Node found NDP packet: upon receiving a beacon from a
new neighbor; the neighbor table is updated by adding this
neighbor information as a new record with a zero in the NV
field.
Unreachable NDP packet: NDP packet could be detected as
an unreachable neighbor node, so that neighbor record will
be deleted from the neighbors table.
• If any change is detected, it is communicated to mobile
agent when comes to the node. The motive of
communicating only changes is to minimize the amount
Figure 4. Cluster Formation and Hierarchical Model
(IJCNS) International Journal of Computer and Network Security, 117
Vol. 2, No. 5, May 2010

of load on network again on the cost of extra processing • The agent reaches back to the source. In this way a
on the side of nodes. quality of service path is reserved for the source.
• This mobile agent moves inside the cluster and collects The last packet of transmission moves on with setting
all such information as well as updates all such resources free. For this we need a special field value of
information on the node. This causes the maintenance which causes continuation of reservation or setting resources
of topology of the cluster on every node. The cluster free.
head calculates some figures about the paths and the
3.3.4 QoS Path Determination in detail
network capacity left with its cluster. This complete
information with the agent is updated when it reaches This process is done by reaching every cluster head and
the cluster head. It is later on communicated to the collecting the information for various parameters. The
higher level cluster head by another agent and the formulas in equation 1 and 2 are as it is followed in our
process of updation goes on to maintain the complete work and give a clear picture about how the calculations are
topological information. done to determine the paths fulfilling the criteria. However
This updation in upper level cluster is done in following from the side of cluster head the responsibilities are to
way: provide access to the data on the node about its cluster to the
• The information of cluster available at lower level is mobile agent. The rest is on the agent. Whenever the
calculated to generate some information for upper layer destination node is found in the cluster the head is
cluster head. responsible to tell the lowest level QoS path. In case of
• Every such lower level cluster head is travelled through failure of path determination an alternative path is chosen,
interfaces by agent and agent for this level takes which in our work, we try to prepare for, if it happens to
information from cluster heads only. occur. For this we maintain several such paths and choose
• This information is updated for upper level cluster head. alternative on the spot. However, choosing such alternative
An important point to be noted is that the generated path may constrain our future selections. If all such paths
information is not the info about each link but an abstract are not found then we move forward for second execution of
knowledge of the bandwidth available through that cluster, path determination. Another point which should be
delay through that cluster and similar information about considered is there are some QoS parameters which
other parameters. Also if some change in the node themselves depend upon other parameters such as delay or
membership is encountered. In this way the info is updated congestion, jitter and reliability on mobility of nodes etc.
at the highest cluster head. The guarantee for control of jitter is given by cashing of
packets i.e. in case a data packet is delayed due to excessive
3.3.3 Path Determining and Resource Reserving traffic load or caused due to new path selection then the
Mobile Agent packet already cashed in the memory is used to make up the
The process of path determination and reservation is done delivery gap. Another thing to be considered is the handoff
by another mobile agent who works in the following way: process. If handoff occurs frequently, it has adverse effect on
• Whenever any node needs to transmit the data, it every aspect of QoS. Hence several factors which could
generates the mobile agent and directs it to the cluster cause potential problems during handoff are also managed
head. under QoS. This management of QoS during handoff is
• At cluster head if the destination node is in the current considered differently. During handoff process, the data
cluster then the head tells a QoS path to the agent. available at the cluster head is to be transmitted to the new
• If the destination is not in the current cluster, the agent is cluster head. This transmission of data is always inter-
told the way for upper layer cluster head. cluster in cases when the handoff is due to head moving out
• The process is repeated till the cluster of some level tells of the cluster, since the indication of need of handoff is
that the node is available in its cluster. From here the received only at the motion of head out of the cluster. Also
agent takes the path from source to destination the handoff may occur if the load on the node is so increased
following the lowest level clusters. that it can no more bear the responsibility of cluster head in
• This movement of the mobile agent till it reaches such a that case the handoff is intra-cluster. To manage this
cluster head which has both the source and destination handoff process we divide the information available at the
in its region causes the agent to see from the highest cluster head to be divided into two parts:
level the topology of the required region. 1) Readily available
• The agent then reaches the destination’s lowest cluster 2) Calculated information
head following the told path by the cluster head. This readily available information is the one which can be
At this stage the path to the destination cluster is known. All gathered inside the cluster as and when it is required. The
the intermediate cluster heads of lowest level are then calculated info is very concentrated and calculated from a
travelled in reverse order to reserve the path resources for long time in the past. Now since the handoff process
the source in the following way: requires some transfer of information about the cluster if the
• The agent itself returns from the lowest level cluster cluster head is leaving the cluster this transferred info would
heads, intermediate in the path. be only the calculated info. The will be gathered by a
request.
• At every cluster head it reaches intermediately it reserves
the required amount of resources which should strictly
follow the contract.
118 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 5, May 2010

4. Conclusion [6] John B. Oladosu, Akinwale O. Alao, Matthew O.


Adigun, Justice O. Emuoyibofarhe, Design and
The architecture proposed and the model used solves the Simulation of a Quality of Service (QoS) Guaranteed
problem of management of topology and providing QoS in a Model for Mobile Ad Hoc Networks.
better way than any other work proposed in this field [7] David Kotz and Robert S. Gray, Mobile Agents and the
however the practicality and implementation are no doubt Future of the Internet, ACM Operating Systems Review,
matter of molding the proposals and to change them the way August 1999, pp. 7-13
they fit. Higher load of processing is imposed on the nodes [8] Danny B. Lange and Mitsuru Oshima. Seven good
having ample amount of processing capacity and the load of reasons for mobile agents Communications of the ACM,
transmission is reduced thereby saving bandwidth. 42(3):88– 89, March 1999.
Reliability of the routing protocol depends on its [9] Corson, S., J.Macker, “Mobile ad hoc networking
performance within highly dynamic networks. Scalability is (MANET): routing protocol performance issues and
determined by the protocol's performance at crowded evaluation considerations,” RFC 2501, Jan.1999.
networks. QoS is expressed by the protocol resistance to the [10] Hakim Badis and Khaldoun Al Agha, An Efficient
network changes. Applying divide and conquer approach QOLSR Extension Protocol For QoS in Ad hoc
used in this design helps to effectively manage the network Networks.
in highly dynamic situations and decreases the probability of [11] Manal Abdullah, Helen Bakhsh, Agent-based Dynamic
fault on the network. Routing System for MANETs, ICGST-CNIR Journal,
Volume 9, Issue 1, July 2009.
5. Future Scope [12] K. A. H. Amin, “resource efficient and scalable routing
The architecture in view of its functioning provides a strict using,” university of north texas, 2003.
set of rules for effective management of QoS in MANET’s [13] Hannan Xiao, Winston K.G. Seah, Anthony L O and
yet it deserves thorough study and simulation on some test Kee Chaing Chua, A flexible Quality of service Model
bed to evaluate its practical results and feasibility. Still the For Mobile Ad-Hoc Networks, IEEE, 2000
work can be done to minimize the overhead transmission for [14] R. Braden, D. Clark, and S. Shenker, “Integrated
topology maintenance. If feasible to deploy in practical Services in the Internet Architecture – an Overview,”
environment GPS tracking can also be used to reduce load IETF RFC1663, June 1994.
on bandwidth. Also fixed geographical clustering has its [15] K. Nichols, V. Jacobson, and L. Zhang, “A Two-Bit
own advantages and hence can be modified in similar way Differentiated Services Architecture for the Internet,”
to reduce load. Consider agent's size, especially in scalable RFC2638, ftp://ftp.rfceditororg/in-notes/rfc2638.txt, July
networks. Minimizing agent size may benefit from the idea 1999.
of MPRs. Regulate TtM value depending on the network [16] K. Wu and J. Harms, “QoS Support in Mobile Ad Hoc
state to save the unnecessary fast updating. Adjust the agent Networks,” Crossing Boundaries – an interdisciplinary
population to maintain the optimal node-agent ratio in the journal, vol.1, no. 1, pp. 92-104.
network. [17] R. Sivakumar, P. Sinha, and V. Bharghavan, “CEDAR:
A Core-Extraction Distributed Ad Hoc Routing
Algorithm,” IEEE Journal on Selected Areas in
References Communication, vol. 17, no.8, pp. 1454-1465, August
[1] M.Sulleman Memon, Manzoor Hashmani and Niaz 1999.
A.Memon,A Framework for QoS Management and [18] S. Murthy and G. L. Aceves, “An Efficient Routing
Contract Enforced Services in MANETs for Prioritized Protocol for Wireless Networks,” Mobile Networks and
Traffic Environment, IJCSNS International Journal of Applications, 1996, Vol. 1, No. 2.
Computer Science and Network Security, VOL.9 No.4, [19] C. E. Perkins and P. Bhagwat, “Highly Dynamic
April 2009. Destination-Sequenced Distance-Vector Routing
[2] S.S.Manvi and P.Venkataram, Mobile agent based (DSDV) for Mobile Computers,” Proceedings of ACM
approach for QoS routing, The Institution of Engineering SIGCOMM, 1994, pp. 234-244.
and Technology 2007. [20] C. E. Perkins and E. M. Royer, “Ad-hoc On-Demand
[3] Parama Bhaumik, Somprokash Banyopadhyay, Mobile Distance Vector Routing,” Proceedings of the 2nd IEEE
Agent Based Message Communication in Large Ad hoc Workshop on Mobile Computing Systems and
Networks through Co-operative Routing using Inter- Applications, 1999.
Agent Negotiation at Rendezvous Points. [21] D. B. Johnson and D.A. Maltz, “Dynamic Source
[4] S.A.Hosseini-Seno, B.Pahlevanzadeh, T.C.Wan, R. Routing in Ad Hoc Wireless Networks,” Mobile
Budiarto, M.M.Kadhum, A DISTRIBUTED Computing, 1996, pp. 153-181.
RESOURCE-MANAGEMENT APPROACH IN [22] S. Mueller, R. P. Tsang and D. Ghosal, “Multipath
MANETS, Journal of Engineering Science and Routing in Mobile Ad Hoc Networks: Issues and
Technology Vol. 4, No. 2 (2009) 142 – 153,2009. Challenges,” In Performance Tools and Applications to
[5] Thomas Heide Clausen, A MANET Architecture Model, Networked Systems, Vol. 2965 of LNCS, 2004.
INSTITUT NATIONAL DE RECHERCHE EN
INFORMATIQUE ET EN AUTOMATIQUE, January
2007.
(IJCNS) International Journal of Computer and Network Security, 119
Vol. 2, No. 5, May 2010

[23] Muhammad Sulleman Memon, Manzoor Hashmani


and Niaz A. Memon, 2008, A review for uniqueness and
variations in throughput due to performance parameters
of simulators on MANETs routing protocols, presented
in 7th International Conference on EHAC’08, University
of Cambridge, UK Cambridge, 20-22 Feb, 2008, PP:
202-208.

Authors Profile

A.K.Vatsa is working as Assistant Professor


in the School of Computer Engineering and
Information Technology at Shobhit University,
Meerut (U.P.). He obtained his M-Tech(C.E.)
from Shobhit University and B-Tech(I.T.)
from V.B.S. Purvanchal University, Jaunpur
(U.P.). He has worked as software engineer in
software industry. He has been in teaching for
the past one decade. He has been member of
several academic and administrative bodies. During his teaching
he has coordinated several Technical fests and National
Conferences at Institute and University Level. He has attended
several seminars, workshops and conferences at various levels. His
several papers are published in various national and international
conferences across India. His area of research includes MANET
(Mobile Ad-Hoc network), Congestion Control and VOIP-SIP
(Voice over IP).

Gaurav Kumar is pursuing his Bachelor of


Technology in Computer Science and
Engineering from Shobhit University, Meerut
(Formally Shobhit Institute of Engineering
and Technology, Meerut) affiliated to Uttar
Pradesh Technical University and is likely to
complete in the June, 2010. He has published
several papers in National Conferences. He
has good organizing and leadership skills and has been a part of
several societies. He has organized several technical events at Inter
and Intra University and Institute level. He has keen interest in
research area related to MANET (Mobile Ad-Hoc Network) and
WSN (Wireless Sensor Network).

Вам также может понравиться