SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Table 1: Simulation Parameter

                          Parameter              Value
                          Simulator              Ns2 - 2.29
                          Simulation Time        15 min
                          Packet Interval        0.01 sec
                          Background Data
                          Traffic                CBR / TCP
                          Packet Size            512 bytes
                          Transmission Range     100,200,300,400 Kbytes
                          Routing Protocol       DSDV
                          MAC Protocol           IEEE 802.11




1. Scenario will be like this only




2. Example screen is shown, its single queue management

       According to the congestion in AP dual queue will reduce the traffic



3.In wired queue management can be seen but in wireless we are not able to see.




                                 Ambit lick Solutions
                   Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
NETWORK MODULE


               Client-server computing or networking is a distributed application
 architecture that partitions tasks or workloads between service providers
 (servers) and service requesters, called clients. Often clients and servers operate
 over a computer network on separate hardware. A server machine is a high-
 performance host that is running one or more server programs which share its
 resources with clients. A client also shares any of its resources; Clients
 therefore initiate communication sessions with servers which await (listen to)
 incoming requests.



PACKET SCHEDULING

    This packet scheduling policy is simple to implement, and yields good
 performance in the common case that node schedules are known, and
 information about node availability is accurate. A potential drawback is that a
 node crash (or other failure event) can lead to a number of wasted RTSs to the
 failed node. When added across channels, the number may exceed the limit of 7
 retransmission attempts allowed for a single channel in the IEEE 802.11




                           Ambit lick Solutions
              Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
BANDWIDTH SHARING


                      Approach where each node requests and grants as much
bandwidth as possible at each turn. Additionally, we compare the RENO algorithm
for packet scheduling to a First-In-First-Out (FIFO) scheduler where all the SDUs
with the same next-hop are enqueued into the same buffer. For this purpose we
simulate a network with an increasing number of nodes, from 2 to 10, arranged in a
chain topology. Each node has one traffic flow directed to the chain end-point
node, carried with a constant bit-rate stream of 1000 bytes packets emulating
infinite bandwidth demands. Congestion control has been extensively studied for
networks running a single protocol. However, when sources sharing the same
network react to different congestion signals, the existing duality model no longer
explains the behavior of bandwidth allocation. The existence and uniqueness
properties of equilibrium in heterogeneous protocol case are examined.



BURSTY TRAFFIC

          The end-to-end throughput (or throughput, for short), which is defined as
the number of bits received by the destination node per second for a given traffic
flow, without any MAC overhead. As it can be seen, the throughput steeply
decreases as the number of nodes increases, regardless of the scheme adopted. This
is because an increasing fraction of the channel capacity is employed to relay
packets at intermediate nodes. For instance, with three nodes the end-to-end

                             Ambit lick Solutions
                Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
throughput is about 2/3 of the available raw bandwidth: 1/3 is consumed by the
traffic flow that is one hop from the destination, and 2/3 is consumed by the other
one that has a length of two hops.




                             Ambit lick Solutions
                Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

Weitere ähnliche Inhalte

Was ist angesagt?

Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
rapatil
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layer
Alisha Korpal
 
Packet switching
Packet switchingPacket switching
Packet switching
Vikash Dhal
 

Was ist angesagt? (20)

Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Data link layer
Data link layerData link layer
Data link layer
 
Cs8591 u4
Cs8591 u4Cs8591 u4
Cs8591 u4
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 
Congestion control
Congestion control Congestion control
Congestion control
 
G028033037
G028033037G028033037
G028033037
 
8 Packet Switching
8 Packet Switching8 Packet Switching
8 Packet Switching
 
Report on data link layer
Report on data link layerReport on data link layer
Report on data link layer
 
Cs8601 4
Cs8601 4Cs8601 4
Cs8601 4
 
Packet switching
Packet switchingPacket switching
Packet switching
 
3a data link layer
3a data link layer 3a data link layer
3a data link layer
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 

Andere mochten auch

Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
ambitlick
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routing
ambitlick
 
Admission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networksAdmission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networks
ambitlick
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
ambitlick
 
Dynamic aodv
Dynamic aodvDynamic aodv
Dynamic aodv
ambitlick
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discovery
ambitlick
 
Energy cluster
Energy clusterEnergy cluster
Energy cluster
ambitlick
 

Andere mochten auch (17)

On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routing
 
De snoepreisjes van de Europese Unie
De snoepreisjes van de Europese UnieDe snoepreisjes van de Europese Unie
De snoepreisjes van de Europese Unie
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
Admission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networksAdmission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networks
 
Stichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke AmerikanenStichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
 
Mahindra Renault Sandero
Mahindra Renault SanderoMahindra Renault Sandero
Mahindra Renault Sandero
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
Vorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-MagazineVorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-Magazine
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?
 
Dynamic aodv
Dynamic aodvDynamic aodv
Dynamic aodv
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discovery
 
Energy cluster
Energy clusterEnergy cluster
Energy cluster
 
Waarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser aflooptWaarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser afloopt
 
Jean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf opJean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf op
 

Ähnlich wie TCP Fairness for Uplink and Downlink Flows in WLANs

Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
Iaetsd Iaetsd
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
Alexander Decker
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
ijwmn
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 

Ähnlich wie TCP Fairness for Uplink and Downlink Flows in WLANs (20)

Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Data link layer
Data link layer Data link layer
Data link layer
 
datalinklayermukesh
datalinklayermukeshdatalinklayermukesh
datalinklayermukesh
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
3
33
3
 
High performance communication networkss
High performance communication networkssHigh performance communication networkss
High performance communication networkss
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Hn analysis
Hn analysisHn analysis
Hn analysis
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 

Mehr von ambitlick

Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
ambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 

Mehr von ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

TCP Fairness for Uplink and Downlink Flows in WLANs

  • 1. Table 1: Simulation Parameter Parameter Value Simulator Ns2 - 2.29 Simulation Time 15 min Packet Interval 0.01 sec Background Data Traffic CBR / TCP Packet Size 512 bytes Transmission Range 100,200,300,400 Kbytes Routing Protocol DSDV MAC Protocol IEEE 802.11 1. Scenario will be like this only 2. Example screen is shown, its single queue management According to the congestion in AP dual queue will reduce the traffic 3.In wired queue management can be seen but in wireless we are not able to see. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 2. NETWORK MODULE Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high- performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests. PACKET SCHEDULING This packet scheduling policy is simple to implement, and yields good performance in the common case that node schedules are known, and information about node availability is accurate. A potential drawback is that a node crash (or other failure event) can lead to a number of wasted RTSs to the failed node. When added across channels, the number may exceed the limit of 7 retransmission attempts allowed for a single channel in the IEEE 802.11 Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 3. BANDWIDTH SHARING Approach where each node requests and grants as much bandwidth as possible at each turn. Additionally, we compare the RENO algorithm for packet scheduling to a First-In-First-Out (FIFO) scheduler where all the SDUs with the same next-hop are enqueued into the same buffer. For this purpose we simulate a network with an increasing number of nodes, from 2 to 10, arranged in a chain topology. Each node has one traffic flow directed to the chain end-point node, carried with a constant bit-rate stream of 1000 bytes packets emulating infinite bandwidth demands. Congestion control has been extensively studied for networks running a single protocol. However, when sources sharing the same network react to different congestion signals, the existing duality model no longer explains the behavior of bandwidth allocation. The existence and uniqueness properties of equilibrium in heterogeneous protocol case are examined. BURSTY TRAFFIC The end-to-end throughput (or throughput, for short), which is defined as the number of bits received by the destination node per second for a given traffic flow, without any MAC overhead. As it can be seen, the throughput steeply decreases as the number of nodes increases, regardless of the scheme adopted. This is because an increasing fraction of the channel capacity is employed to relay packets at intermediate nodes. For instance, with three nodes the end-to-end Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 4. throughput is about 2/3 of the available raw bandwidth: 1/3 is consumed by the traffic flow that is one hop from the destination, and 2/3 is consumed by the other one that has a length of two hops. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com