Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Mesh networks
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=73052]


Abstract
All mesh nodes cooperate in the distribution of data in the network. Mesh networks can relay messages using either a flooding technique or a routing technique. This paper presents a cross-layer approach for enabling high-throughput reliable multicast in multi-hop wireless mesh networks. The building block of our approach is a multicast routing metric, called the expected multicast transmission count (EMTX). EMTX is designed to capture the combined effects of MAC-layer retransmission-based reliability, wireless broadcast advantage, and link quality awareness. The EMTX of single-hop transmission of a multicast packet from am sender is the expected number of multicast transmissions (including retransmissions) required for its next-hop recipients to receive the packet successfully We formulate the EMTX-based multicast problem with the objective of minimizing the sum of EMTX over all forwarding nodes in the multicast tree, aiming to reduce network bandwidth consumption while ensure high end-to-end packet delivery ratio for the multicast traffic. We provide rigorous mathematical formulations and methods to find near-optimal solutions of the problem computationally efficiently
Introduction (Heading 1)
Communications over the wireless medium are by nature error prone. Significant variations in fading and interference levels may lead to transient loss of a link. A handful of researchers explored the idea of physical-layer network coding and developed bandwidth efficient methods for link-layer acknowledgement for multicast transmissions in wireless networks .We formulate the EMTX-based multicast problem with the objective of minimizing the sum of EMTX over all forwarding nodes in the multicast tree. We prove that the problem is NP-hard. A mathematical formulation of the problem in the form of integer linear programming (ILP) is provided. Based on the ILP formulation, we show how to solve the optimization problem computationally efficiently by using the Lagrangian relaxation technique. The EMTX-based multicast routing protocol proposed in this paper can be implemented over any of these single-hop MAC-layer multicast protocols.
RELATED WORK:
LITERATURE SURVEY 1:
In this paper we analyze the reliable MAC protocol called “RMAC” which is supporting reliable broadcast and multicast for wireless ad hoc networks. A wireless ad hoc network is formed by the group of wireless hosts, without the use of any infrastructure. To enable communication, host cooperates among themselves to forward packets on behalf of each other. By utilizing the busy tones to realize the multicast reliability, RMAC uses a variable length control frame to stipulate an order for the receivers to respond, thus solving the feedback collision problem, extends the usage of busy tone for preventing data frame collisions into the multicast scenario and introduces a new usage of busy tone for acknowledging data frames positively. The IEEE 802.11 multicast/broadcast protocol is based on the basic access procedure of Carrier Sense Multiple Access with Collision Avoidance. This protocol does not provide any media access control (MAC) layer recovery on multicast/broadcast frames. Due to increased probability of lost frames resulting from inference or collisions, reliability of multicast/broadcast services is reduced. Also MAC protocol provides both reliable and unreliable services for all three modes of communication: unicast, multicast, broadcast and making it capable of supporting various upper-layer protocols. This paper proposed that RMAC achieves high reliability with limited overhead and also involves lower cost as compare to other reliable MAC protocol
LITERATURE SURVEY 2:
Wireless mesh network (WMN) is used to develop techniques for guaranteeing end-to-end delay performance over multihop wireless communication networks. The aim of WMN is to provide seamless communication in large heterogeneous networks and between heterogeneous devices. According to the architecture of WMN, mesh cloud will allow scaling the network easily. Hence we are addressing WMNs as scalable networks. Routing protocols play an important role in increasing the performance of WMN as the size of network is scaled. Routing process is also affected by the type of communication, like unicast and multicast. Multicasting is eminent type of communiqué nowadays, due to its applications like Distance Learning, Access to Distributed Data Base and Teleconferencing etc. This paper proposes the multicast routing protocol for WMN. Multicast Ad hoc on demand Distance Vector (MAODV) is modified to support scalable WMN. MAODV creates bi-directional shared multicast trees for connecting multicast sources and receivers. In this research work authors briefly narrate the MAODV protocol and it is compared with unicast AODV. Using NS2 a simulation based performance evaluation is done by considering performance metrics, such as Packet Delivery Ratio (PDR), endto-end delay, throughput, overhead and dropped packets. Results show that MAODV routing protocol throughput is 43% and PDR is 31% more than AODV. Bandwidth utilization is measured in terms of overhead; the MAODV is having 50% less overhead than AODV.
LITERATURE SURVEY 3:
Network coding has been a prominent approach to a series of problems that used to be considered intract able with traditional transmission paradigms. Recent work on network coding includes a substantial number of optimization based protocols, but mostly for wireline multicast networks. In this paper, we consider maximizing the b
enefits of network coding for unicast sessions in lossy wireless environments. We propose Optimized Multipath Network Coding (OMNC), a rate control protocol that dramatically improves the throughput of lossy wireless networks. OMNC employs multiple paths to瀠獵⁨潣
push coded packets to the destination, and uses the broadcast MAC to deliver packets between neighboring nodes. The coding and broadcast rate is allocated to transmitters by a distributed optimization algorithm that maximizes the advantage of network codi
ng while avoiding congestion. With extensive experiments on an emulation testbed, we
ng while avoiding congestion. With extensive experiments on an emulation testbed, we find that OMNC achieves more than two-fold throughput increase on average compared to traditional best path routing, and significant improvement over existing multipath rout湩⁧牰瑯
ing protocols with network coding. The performance improvement is notable not only for one unicast session, but also when multiple concurrent unicast sessions coexist in the network.
EXISTING SYSTEM:
With the aim of improving the reliability of single-hop multicast transmissions ,a number of reliable MAC-layer multicast protocols were proposed in the literature. One method is ARQ-based MAC-layer multicast by extending the RTS/CTS/ACK control frames of IEEE 802.11 MAC . The leader-based protocol presented min avoids the need of multiple positive ACK frames for multicast transmissions The batch mode multicast, MAC protocol presented in uses a strict sequential order of RTS/CTS to each destination. The HIMAC solution proposed in uses unary channel feedback and unary negative feedback to address two shortcomings in 802.11 multicasts: channel-state indifference and demand ignorance. The direct-sequence code-division multiple access schemes, which allows multiple n receivers to transmit ACK frames concurrently to reduce the overhead. The frequency-division multiple access mechanism to deal with the overhead issue of ARQ-based MAC-layer multicast protocols. Both the 802.11 MX protocol presented and the RMAC protocol presented in use the busy tone mechanism to offer reliable MAC-layer multicast. Relying on a separate channel, busy tone prevents data frame collisions and solves the hidden terminal problem However, it requires transformation of the network graph G into an auxiliary graph, and therefore makes it impossible to be implemented in a distributed fashion. In this section, we propose a greedy algorithm for tackling the EMTX-based multicast problem
PROPOSED SYSTEM:
The EMTX of single-hop transmission of a multicast packet from a sender is the expected number of multicast transmissions (including retransmissions) required for its next-hop recipients to receive the packet successfully. Our focus in this paper is on developing high-throughput algorithms for reliable multicast routing in multi-hop wireless mesh networks We formulate the EMTX-based multicast problem with the objective of minimizing the sum of EMTX over all forwarding nodes in the multicast tree, aiming to reduce network bandwidth consumption while ensure high end-to-end packet delivery ratio for the multicast traffic. We provide rigorous mathematical formulations and methods to find near-optimal solutions of the problem computationally efficiently The principle of our design of the distributed algorithm is thus for each new member of the multicast group to initiate the procedure for finding a directed path from the existing tree. In particular, the new destination node chooses the path with the minimum sum of additional EMTX required. We have also implemented the distributed algorithm as a multicast routing protocol. Extensive simulation experiments have confirmed that, compared to two baseline approaches, EMTX-based multicast routing can effectively reduce transmission overhead and yet enhance multicast throughput
SYSTEM IMPLEMENTATION:
MODULAE DESCRIPTION:
DISCOVER NODE:
Discover Node:
The optimal RFM is a set of forwarding nodes that form a pair of node-disjoint paths for each multicast destination, minimizing the number of broadcast transmissions by exploiting the wireless broadcast advantage. The source-initiated wireless multicast algorithm proposed in constructs a shared tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source), A common assumption of this related work is that mesh routers in wireless mesh networks follow the binary packet reception model, which fails to take wireless link quality into account. To the best of our knowledge, there is no multicast routing algorithm explicitly designed for high-throughput reliable multicast routing in wireless mesh networks.
FORWADING MESSAGE:
The problem of maximizing multicast traffic load in wireless mesh networks, and presented a number of algorithms for achieving low latency multicast using the wireless broadcast advantage and multi-rate radios. In resilient forwarding mesh (RFM) approach is proposed for protecting multicast sessions from link or node failures. The optimal RFM is a set of forwarding nodes that form a pair of node-disjoint paths for each multicast destination, minimizing the number of broadcast transmissions by exploiting the wireless broadcast advantage. The source-initiated wireless multicast algorithm proposed in constructs a shared tree on which each multicast destination has the minimum possible depth (number of hops from the nearest source this related work is that mesh routers in wireless mesh networks follow the binary Packet reception model.
REPAIR MULTICAST:
Each node in the set Ri initiates the repair process by broadcasting a Repair_Req message. If a non session member receives a Repair_Req message, it broadcasts the Repair_Req message to its neighbors using the same treatment for a Join_Req message. If a session member who is an upstream node of node i receives a Repair_Req message, it replies with aRepair_Reply message using the same treatment for aJoin_Reply message. Similar to the joining process each node in the set Ri may receive multiple Repair Reply messages in the repair process. In all cases, it chooses the repair path with the minimum sum of additional EMTX required.

TRANSMISSION COUNT:
The average number of multicast transmissions (including retransmissions) required for end-to-end delivery of each packet in the multicast session. A smaller transmission count indicates less consumption of the network bandwidth and less interference to other users of the same spectrum, which is desirable in multi-hop wireless networking. The multicast routing performance for the low traffic load, the results for the high traffic load. We observe in both cases that, when the multicast group size increases, the throughput decreases yet at the expense of increasing transmission count.
SYSTEM ARCHITECTURE:
RESULT:
The MAODV protocol is plugged in NS2 as described in [14] and few modifications are done to MAODV to support WMN environment. To compare AODV and MAODV, the authors set up multiple unicast network for AODV. The experiments consider only one multicast group with maximum 4 senders and 24 receivers. The size used for communication is 512 bytes and maximum 10000 packets are flooded in the network. The description about simulation environment is given in Table 1.
To measure the performance of MAODV the performance metrics used are throughput, overhead, PDR, end-to-end delay and drop of packets.
Throughput in network is the total data packets received by the receivers at a particular unit of time and Figure 5 shows the comparison of throughput. At the beginning MAODV shows zero throughput, because it is involved in setting up the group. After 15 seconds throughput of MAODV is better than AODV. In Between 50 and 70 secs all CBR traffics have started sending data; therefore throughput is high in this region. The MAODV illustrates 43% more throughput than AODV.
The metric end-to-end delay considers all possible delays occurred during data transmission. The delays included are queuing delay, retransmission delays at the MAC, propagation delay and transfer times. Figure 6 shows comparison of end-to-end delay. The graph depicts that, all the time data received in MAODV is much better than AODV.
CONCLUSION:
Our focus in this paper is on developing high-throughput algorithms for reliable multicast routing in multi-hop wireless mesh networks. To address this challenge, we have proposed EMTX as a robust metric that captures the combined effects of MAC-layer retransmission-based reliability, wireless broadcast advantage, and link quality awareness. We have formulated the EMTX-based multicast problem with the objective of minimizing the sum of EMTX over all forwarding nodes in the multicast tree. Both centralized and distributed algorithms have been designed for the multicast problem. We have also implemented the distributed algorithm as a multicast routing protocol. Extensive simulation experiments have confirmed that, compared to two baseline approaches, EMTX-based multicast routing can effectively reduce transmission overhead and yet enhance multicast throughput. Open research problems include studying the performance of the proposed protocol in more realistic simulation environments as well as real-life wireless networks.

FUTURE WORK:
For dense networks where each node has a large number of neighbors, the network may also use topology control to reduce the number of neighbors in order to reduce the computation burden. The effect of using topology control on multicast routing performance is an interesting problem and is left for future work.

REFERENCE PAPER:
[1] I. F. Akyildiz, X. Wang, and W. Wangi, “Wireless mesh networks: a survey”, Computer Networks and ISDN Systems, Vol. 47, Issue. 4, pp. 445–487, Mar. 2005.
[2] R. Baumann, “Building scalable and robust wireless mesh networks”, Ph.D. dissertation, ETH ZURICH, 2007, Diss. ETH No. 17306.
[3] J. XU, “Multicast in wireless mesh networks”, Master’s thesis, York University, Toronto, Ontario, Oct. 2006.
[4] E. Royer and C. Perkins, “Multicast operation of the ad hoc on-demand distance vector routing protocol”, in Proceedings of ACM Mobicom, pp. 207–218,1999.

:




In American English, commas, semi-/colons, periods, question and exclamation marks are located within quotation marks only when a complete thought or name is cited, such as a title or full quotation. When quotation marks are used, instead of a bold or italic typeface, to highlight a word or phrase, punctuation should appear outside of the quotation marks. A parenthetical phrase or statement at the end of a sentence is punctuated outside of the closing parenthesis (like this). (A parenthetical sentence is punctuated within the parentheses.)
A graph within a graph is an “inset”, not an “insert”. The word alternatively is preferred to the word “alternately” (unless you really mean something that alternates).
Do not use the word “essentially” to mean “approximately” or “effectively”.
In your paper title, if the words “that uses” can accurately replace the word “using”, capitalize the “u”; if not, keep using lower-cased.
Be aware of the different meanings of the homophones “affect” and “effect”, “complement” and “compliment”, “discreet” and “discrete”, “principal” and “principle”.
Do not confuse “imply” and “infer”.
The prefix “non” is not a word; it should be joined to the word it modifies, usually without a hyphen.
There is no period after the “et” in the Latin abbreviation “et al.”.
The abbreviation “i.e.” means “that is”, and the abbreviation “e.g.” means “for example”.
An excellent style manual for science writers is [7].
Using the Template
After the text edit has been completed, the paper is ready for the template. Duplicate the template file by using the Save As command, and use the naming convention prescribed by your conference for the name of your paper. In this newly created file, highlight all of the contents and import your prepared text file. You are now ready to style your paper.
Authors and Affiliations
The template is designed so that author affiliations are not repeated each time for multiple authors of the same affiliation. Please keep your affiliations as succinct as possible (for example, do not differentiate among departments of the same organization). This template was designed for two affiliations.
For author/s of only one affiliation (Heading 3): To change the default, adjust the template as follows.
Selection (Heading 4): Highlight all author and affiliation lines.
Change number of columns: Select Format >
Columns >Presets > One Column.
Deletion: Delete the author and affiliation lines for the second affiliation.
For author/s of more than two affiliations: To change the default, adjust the template as follows.
Selection: Highlight all author and affiliation lines.
Change number of columns: Select Format >
Columns > Presets > One Column.
Highlight author and affiliation lines of affiliation 1 and copy this selection.
Formatting: Insert one hard return immediately after the last character of the last affiliation line. Then paste the copy of affiliation 1. Repeat as necessary for each additional affiliation.
Reassign number of columns: Place your cursor to the right of the last character of the last affiliation line of an even numbered affiliation (e.g., if there are five affiliations, place your cursor at end of fourth affiliation). Drag the cursor up to highlight all of the above author and affiliation lines. Go to Format > Columns and select “2 Columns”. If you have an odd number of affiliations, the final affiliation will be centered on the page; all previous will be in two columns.
Identify the Headings
Headings, or heads, are organizational devices that guide the reader through your paper. There are two types: component heads and text heads.
Component heads identify the different components of your paper and are not topically subordinate to each other. Examples include Acknowledgments and References and, for these, the correct style to use is “Heading 5”. Use “figure caption” for your Figure captions, and “table head” for your table title. Run-in heads, such as “Abstract”, will require you to apply a style (in this case, italic) in addition to the style provided by the drop down menu to differentiate the head from the text.
Text heads organize the topics on a relational, hierarchical basis. For example, the paper title is the primary text head because all subsequent material relates and elaborates on this one topic. If there are two or more sub-topics, the next level head (uppercase Roman numerals) should be used and, conversely, if there are not at least two sub-topics, then no subheads should be introduced. Styles named “Heading 1”, “Heading 2”, “Heading 3”, and “Heading 4” are prescribed.
Figures and Tables
Positioning Figures and Tables: Place figures and tables at the top and bottom of columns. Avoid placing them in the middle of columns. Large figures and tables may span across both columns. Figure captions should be below the figures; table heads should appear above the tables. Insert figures and tables after they are cited in the text. Use the abbreviation “Fig. 1”, even at the beginning of a sentence.
Table Type Styles
Table Head
Table Column Head


Table column subhead
Subhead
Subhead

copy
More table copya




a. Sample of a Table footnote. (Table footnote)
Example of a ONE-COLUMN figure caption.
Please see last page of this document for AN EXAMPLE of a 2-COLUMN Figure.
Figure Labels: Use 8 point Times New Roman for Figure labels. Use words rather than symbols or abbreviations when writing Figure axis labels to avoid confusing the reader. As an example, write the quantity “Magnetization”, or “Magnetization, M”, not just “M”. If including units in the label, present them within parentheses. Do not label axes only with units. In the example, write “Magnetization (A/m)” or “Magnetization {A[m(1)]}”, not just “A/m”. Do not label axes with a ratio of quantities and units. For example, write “Temperature (K)”, not “Temperature/K”.
Footnotes
Use footnotes sparingly (or not at all) and place them at the bottom of the column on the page on which they are referenced. Use Times 8-point type, single-spaced. To help your readers, avoid using footnotes altogether and include necessary peripheral observations in the text (within parentheses, if you prefer, as in this sentence).
Copyright Forms and Reprint Orders
You must submit the IEEE Electronic Copyright Form (ECF) per Step 7 of the CPS author kit’s web page. THIS FORM MUST BE SUBMITTED IN ORDER TO PUBLISH YOUR PAPER.
Please see Step 9 for ordering reprints of your paper. Reprints may be ordered using the form provided as <reprint.doc> or <reprint.pdf>.
Acknowledgment
The preferred spelling of the word “acknowledgment” in America is without an “e” after the “g”. Avoid the stilted expression, “One of us (R.B.G.) thanks . . .” Instead, try
R.B.G. thanks”. Put applicable sponsor acknowledgments here; DO NOT place them on the first page of your paper or as a footnote.