SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Distributed cache updating for the Dynamic
source routing protocol

(Synopsis)
Abstract
On-demand routing protocols use route caches to make routing
decisions. Due to mobility, cached routes easily become stale. To
address the cache staleness issue, prior work in DSR used heuristics
with ad hoc parameters to predict the lifetime of a link or a route.
The goal of our project is to proactively disseminating the broken
link information to the nodes that have that link in their caches. We
define a new cache structure called a cache table and present a
distributed cache update algorithm. Each node maintains in its cache
table the information necessary for cache updates. When a link failure
is detected, the algorithm notifies all reachable nodes that have
cached the link in a distributed manner. We show that the algorithm
outperforms DSR with path caches and with Link-MaxLife, an adaptive
timeout mechanism for link caches. We conclude that proactive cache
updating is key to the adaptation of on-demand routing protocols to
mobility.
The modules that are included in this project are
 Route Request
 Route Maintenance
 Message Transfer
 Cache Update
Module 1: Route Request
When a source node wants to send packets to a destination to
which it does not have a route, it initiates a Route Discovery by
broadcasting a ROUTE REQUEST. The node receiving a ROUTE
REQUEST checks whether it has a route to the destination in its cache.
If it has, it sends a ROUTE REPLY to the source including a source
route, which is the concatenation of the source route in the ROUTE
REQUEST and the cached route. If the node does not have a cached
route to the destination, it adds its address to the source route and
rebroadcasts the ROUTE REQUEST. When the destination receives the
ROUTE REQUEST, it sends a ROUTE REPLY containing the source route
to the source. Each node forwarding a ROUTE REPLY stores the route
starting from itself to the destination. When the source receives the
ROUTE REPLY, it caches the source route.
Module 2: Message Transfer
The Message transfer relates with that the sender node wants to
send a message to the destination node after the path is selected and
status of the destination node through is true. The receiver node
receives

the

message

completely

and

then

it

send

the

acknowledgement to the sender node through the router nodes where
it is received the message.
Module 3: Route Maintenance
Route Maintenance, the node forwarding a packet is responsible
for confirming that the packet has been successfully received by the
next hop. If no acknowledgement is received after the maximum
number of retransmissions, the forwarding node sends a ROUTE
ERROR to the source, indicating the broken link. Each node forwarding
the ROUTE ERROR removes from its cache the routes containing the
broken link.
Module 4: Cache Updating
When a node detects a link failure, our goal is to notify all
reachable nodes that have cached that link to update their caches. To
achieve this goal, the node detecting a link failure needs to know
which nodes have cached the broken link and needs to notify such
nodes efficiently. Our solution is to keep track of topology propagation
state in a distributed manner.

Introduction
About the Project
Routing protocols for ad hoc networks can be classified into two
major types: proactive and on-demand. Proactive protocols attempt to
maintain up-to-date routing information to all nodes by periodically
disseminating topology updates throughout the network. In contrast,
on demand protocols attempt to discover a route only when a route is
needed. To reduce the overhead and the latency of initiating a route
discovery for each packet, on-demand routing protocols use route
Caches. Due to mobility, cached routes easily become stale. Using
stale routes causes packet losses, and increases latency and overhead.
In this paper, we investigate how to make on-demand routing
Protocols adapt quickly to topology changes. This problem is important
because such protocols use route caches to make routing decisions; it
is challenging because topology changes are frequent.
To address the cache staleness issue in DSR (the Dynamic
Source

Routing

protocol)

prior

work

used

adaptive

timeout

mechanisms. Such mechanisms use heuristics with ad hoc parameters
to predict the lifetime of a link or a route. However, a predetermined
choice of ad hoc parameters for certain scenarios may not work well
for others, and scenarios in the real world are different from those
used in simulations. Moreover, heuristics cannot accurately estimate
timeouts because topology changes are unpredictable. As a result,
either valid routes will be removed or stale routes will be kept in
caches.
In our project, we propose proactively disseminating the broken
link information to the nodes that have that link in their caches.
Proactive cache updating is key to making route caches adapt quickly
to topology changes. It is also important to inform only the nodes that
have cached a broken link to avoid unnecessary overhead. Thus, when
a link failure is detected, our goal is to notify all reachable nodes that
have cached the link about the link failure.
We define a new cache structure called a cache table to maintain
the information necessary for cache updates. A cache table has no
capacity limit; its size increases as new routes are discovered and
decreases as stale routes are removed. Each node maintains in its
cache table two types of information for each route. The first type of
information is how well routing information is synchronized among
nodes on a route: whether a link has been cached in only upstream
nodes, or in both upstream and downstream nodes, or neither. The
second type of information is which neighbor has learned which links
through a ROUTE REPLY.
We design a distributed algorithm that uses the information kept
by each node to achieve distributed cache updating. When a link
failure is detected, the algorithm notifies selected neighborhood nodes
about the broken link: the closest upstream and/or downstream nodes
on each route containing the broken link, and the neighbors that
learned the link through ROUTE REPLIES. When a node receives a
notification, the algorithm notifies selected neighbors. Thus, the
broken link information will be quickly propagated to all reachable
nodes that need to be notified.
Our algorithm has the following desirable properties:
Distributed: The algorithm uses only local information and
communicates with neighborhood Nodes; therefore, it is scalable with
network size.
Adaptive: The algorithm notifies only the nodes that have cached
a broken link to update their Caches; therefore, cache update
overhead is minimized.
Proactive on-demand: Proactive cache updating is triggered ondemand, without periodic behavior.
Without ad hoc mechanisms: The algorithm does not use any ad
hoc parameters, thus making route caches fully adaptive to topology
changes.
Module 1: Route Request
When a source node wants to send packets to a destination to
which it does not have a route, it initiates a Route Discovery by
broadcasting a ROUTE REQUEST. The node receiving a ROUTE
REQUEST checks whether it has a route to the destination in its cache.
If it has, it sends a ROUTE REPLY to the source including a source
route, which is the concatenation of the source route in the ROUTE
REQUEST and the cached route. If the node does not have a cached
route to the destination, it adds its address to the source route and
rebroadcasts the ROUTE REQUEST. When the destination receives the
ROUTE REQUEST, it sends a ROUTE REPLY containing the source route
to the source. Each node forwarding a ROUTE REPLY stores the route
starting from itself to the destination. When the source receives the
ROUTE REPLY, it caches the source route.
Module 2: Message Transfer
The Message transfer relates with that the sender node wants to
send a message to the destination node after the path is selected and
status of the destination node through is true. The receiver node
receives

the

message

completely

and

then

it

send

the

acknowledgement to the sender node through the router nodes where
it is received the message.
Module 3: Route Maintenance
Route Maintenance, the node forwarding a packet is responsible
for confirming that the packet has been successfully received by the
next hop. If no acknowledgement is received after the maximum
number of retransmissions, the forwarding node sends a ROUTE
ERROR to the source, indicating the broken link. Each node forwarding
the ROUTE ERROR removes from its cache the routes containing the
broken link.
Module 4: Cache Updating
When a node detects a link failure, our goal is to notify all
reachable nodes that have cached that link to update their caches. To
achieve this goal, the node detecting a link failure needs to know
which nodes have cached the broken link and needs to notify such
nodes efficiently. Our solution is to keep track of topology propagation
state in a distributed manner.
The algorithm starts either when a node detects a link failure or
when it receives a notification.
In a cache table, a node not only stores routes but also maintain
two types of information for each route: (1) how well routing
information is synchronized among nodes on a route; and (2) which
neighbor has learned which links through a ROUTE REPLY. Each node
gathers

such

information

during

route

discoveries

and

data

transmission, without introducing additional overhead. The two types
of information are sufficient; because each node knows for each
cached link which neighbors have that link in their caches.

Benefits of Dynamic Source Routing Protocol
The Dynamic Source Routing Protocol have the following
advantages.
 The Node have the information about the networks
 The DSR reduce the Packet loss and latency time
 The Node maintains the Route Status and Path for data
transfer
 The Node automatically handles the Cache Updation
Process
 Use

On-Demand

communication

and

Adaptive

type

of

protocol

for
System Analysis
Existing System
 TCP performance degrades significantly in Mobile Ad hoc
Networks due to the packet losses. Most of these packet losses
result from the Route failures due to network mobility.
 TCP assumes such losses occur because of congestion, thus
invokes congestion control mechanisms such as decreasing
congestion windows, raising timeout, etc, thus greatly reduce
TCP throughput.
 However, after a link failure is detected, several packets will be
dropped from the network interface queue; TCP will time out
because of these packet losses, as well as for Acknowledgement
losses caused by route failures.
 There is no intimation information regarding about to the failure
links to the Node from its neighboring Node’s. So that the Source
Node cannot able to make the Route Decision’s at the time of
data transfer.
Limitation of Existing System
 The Stale routes causes packet losses if packets cannot be
salvaged by intermediate nodes
 The stale routes increases packet delivery latency, since the MAC
layer goes through multiple retransmissions before concluding a
link failure
 Use Adaptive time out mechanisms
 If the cache size is set large, more stale routes will stay in
caches because FIFO replacement becomes less effective

Proposed System
 Prior work in DSR used heuristics with ad hoc parameters to
predict the lifetime of a link or a route. However, heuristics
cannot accurately estimate timeouts because topology changes
are unpredictable.
 Prior researches have proposed to provide link failure feedback
to TCP so that TCP can avoid responding to route failures as if
congestion had occurred.
 We propose proactively disseminating the broken link
information to the nodes that have that link in their caches. We
define a new cache structure called a cache table and present a
distributed cache update algorithm. Each node maintains in its
cache table the Information necessary for cache updates.
 The Source Node has the information regarding about the
Destination and the Intermediate Node links failure, So that it is
useful from Packet loss and reduce the latency time while data
transfer throughout the Network.
Advantages of Proposed System
 Proactive cache updating also prevents stale routes from being
propagated to other nodes
 We defined a new cache structure called a cache table to
maintain the information necessary for cache updates. We
presented a distributed cache update algorithm that uses the
local information kept by each node to notify all reachable nodes
that have cached a broken link. The algorithm enables DSR to
adapt quickly to topology changes.
 The algorithm quickly removes stale routes no matter how nodes
move and which traffic model is used.
Problem Formulation
Objectives
The Dynamic Source Routing Protocol have the following
objectives
 The Node have the information about the neighboring Nodes
in the Network
 The DSR reduce the Packet loss and latency time
 The Node maintains the Route Status and Path information for
data transfer and path request
 The Node automatically handles the Cache Updation Process if
any Link failure is happened in the Network
 Use

On-Demand

communication

and

Adaptive

type

of

protocol

for
Software Requirement Specification
The software requirement specification is produced at the
culmination of the analysis task. The function and performance
allocated to software as part of system engineering are refined by
establishing

a

complete

information

description

as

functional

representation, a representation of system behavior, an indication of
performance

requirements

and

design

constraints,

appropriate

validation criteria.
User Interface
* Swing - Swing is a set of classes that provides more powerful
and flexible components that are possible with AWT. In addition to the
familiar components, such as button checkboxes and labels, swing
supplies several exciting additions, including tabbed panes, scroll
panes, trees and tables.
* Applet - Applet is a dynamic and interactive program that can
run inside a web page displayed by a java capable browser such
as hot java or Netscape.
Hardware Interface
 Hard disk

:

40 GB

 RAM

: 512 MB

 Processor Speed

: 3.00GHz

 Processor

: Pentium IV Processor

4.1.1 Software Interface
 JDK 1.5
 Java Swing
 MS-Access

Weitere ähnliche Inhalte

Was ist angesagt?

Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mumbai Academisc
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationProf Ansari
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocolMehedi
 

Was ist angesagt? (20)

Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
 
Dsdv
DsdvDsdv
Dsdv
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
C 16
C 16C 16
C 16
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 

Andere mochten auch

Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Mumbai Academisc
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)Mumbai Academisc
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Mumbai Academisc
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Mumbai Academisc
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Mumbai Academisc
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)Mumbai Academisc
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Mumbai Academisc
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Mumbai Academisc
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)Mumbai Academisc
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Mumbai Academisc
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Mumbai Academisc
 

Andere mochten auch (17)

Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
 
Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)Modeling & automated containment of worms(synopsis)
Modeling & automated containment of worms(synopsis)
 
Engineering
EngineeringEngineering
Engineering
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
Web based development
Web based developmentWeb based development
Web based development
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)Odam an optimized distributed association rule mining algorithm (synopsis)
Odam an optimized distributed association rule mining algorithm (synopsis)
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...
 
A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)A geometric approach to improving active packet loss measurement(synopsis)
A geometric approach to improving active packet loss measurement(synopsis)
 
Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)Noise reduction by fuzzy image filtering(synopsis)
Noise reduction by fuzzy image filtering(synopsis)
 
Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)Multiple routing configurations for fast ip network recovery(synopsis)
Multiple routing configurations for fast ip network recovery(synopsis)
 

Ähnlich wie Distributed cache updating for the dynamic source routing protocol(synopsis)

Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networkshuda2018
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Study of load balanced routing protocols in mobile ad hoc networks
Study of load balanced routing protocols in mobile ad hoc networksStudy of load balanced routing protocols in mobile ad hoc networks
Study of load balanced routing protocols in mobile ad hoc networksAlexander Decker
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 

Ähnlich wie Distributed cache updating for the dynamic source routing protocol(synopsis) (20)

UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Study of load balanced routing protocols in mobile ad hoc networks
Study of load balanced routing protocols in mobile ad hoc networksStudy of load balanced routing protocols in mobile ad hoc networks
Study of load balanced routing protocols in mobile ad hoc networks
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 

Mehr von Mumbai Academisc

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list Mumbai Academisc
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list Mumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsMumbai Academisc
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Mumbai Academisc
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
 

Mehr von Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Jsp
JspJsp
Jsp
 
Project list
Project listProject list
Project list
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Distributed cache updating for the dynamic source routing protocol(synopsis)

  • 1. Distributed cache updating for the Dynamic source routing protocol (Synopsis)
  • 2. Abstract On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. The goal of our project is to proactively disseminating the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. We show that the algorithm outperforms DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is key to the adaptation of on-demand routing protocols to mobility.
  • 3. The modules that are included in this project are  Route Request  Route Maintenance  Message Transfer  Cache Update Module 1: Route Request When a source node wants to send packets to a destination to which it does not have a route, it initiates a Route Discovery by broadcasting a ROUTE REQUEST. The node receiving a ROUTE REQUEST checks whether it has a route to the destination in its cache. If it has, it sends a ROUTE REPLY to the source including a source route, which is the concatenation of the source route in the ROUTE REQUEST and the cached route. If the node does not have a cached route to the destination, it adds its address to the source route and rebroadcasts the ROUTE REQUEST. When the destination receives the ROUTE REQUEST, it sends a ROUTE REPLY containing the source route to the source. Each node forwarding a ROUTE REPLY stores the route starting from itself to the destination. When the source receives the ROUTE REPLY, it caches the source route. Module 2: Message Transfer The Message transfer relates with that the sender node wants to send a message to the destination node after the path is selected and status of the destination node through is true. The receiver node receives the message completely and then it send the acknowledgement to the sender node through the router nodes where it is received the message. Module 3: Route Maintenance Route Maintenance, the node forwarding a packet is responsible for confirming that the packet has been successfully received by the
  • 4. next hop. If no acknowledgement is received after the maximum number of retransmissions, the forwarding node sends a ROUTE ERROR to the source, indicating the broken link. Each node forwarding the ROUTE ERROR removes from its cache the routes containing the broken link. Module 4: Cache Updating When a node detects a link failure, our goal is to notify all reachable nodes that have cached that link to update their caches. To achieve this goal, the node detecting a link failure needs to know which nodes have cached the broken link and needs to notify such nodes efficiently. Our solution is to keep track of topology propagation state in a distributed manner. Introduction About the Project Routing protocols for ad hoc networks can be classified into two major types: proactive and on-demand. Proactive protocols attempt to maintain up-to-date routing information to all nodes by periodically disseminating topology updates throughout the network. In contrast, on demand protocols attempt to discover a route only when a route is needed. To reduce the overhead and the latency of initiating a route discovery for each packet, on-demand routing protocols use route Caches. Due to mobility, cached routes easily become stale. Using stale routes causes packet losses, and increases latency and overhead. In this paper, we investigate how to make on-demand routing Protocols adapt quickly to topology changes. This problem is important because such protocols use route caches to make routing decisions; it is challenging because topology changes are frequent.
  • 5. To address the cache staleness issue in DSR (the Dynamic Source Routing protocol) prior work used adaptive timeout mechanisms. Such mechanisms use heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, a predetermined choice of ad hoc parameters for certain scenarios may not work well for others, and scenarios in the real world are different from those used in simulations. Moreover, heuristics cannot accurately estimate timeouts because topology changes are unpredictable. As a result, either valid routes will be removed or stale routes will be kept in caches. In our project, we propose proactively disseminating the broken link information to the nodes that have that link in their caches. Proactive cache updating is key to making route caches adapt quickly to topology changes. It is also important to inform only the nodes that have cached a broken link to avoid unnecessary overhead. Thus, when a link failure is detected, our goal is to notify all reachable nodes that have cached the link about the link failure. We define a new cache structure called a cache table to maintain the information necessary for cache updates. A cache table has no capacity limit; its size increases as new routes are discovered and decreases as stale routes are removed. Each node maintains in its cache table two types of information for each route. The first type of information is how well routing information is synchronized among nodes on a route: whether a link has been cached in only upstream nodes, or in both upstream and downstream nodes, or neither. The second type of information is which neighbor has learned which links through a ROUTE REPLY. We design a distributed algorithm that uses the information kept by each node to achieve distributed cache updating. When a link
  • 6. failure is detected, the algorithm notifies selected neighborhood nodes about the broken link: the closest upstream and/or downstream nodes on each route containing the broken link, and the neighbors that learned the link through ROUTE REPLIES. When a node receives a notification, the algorithm notifies selected neighbors. Thus, the broken link information will be quickly propagated to all reachable nodes that need to be notified. Our algorithm has the following desirable properties: Distributed: The algorithm uses only local information and communicates with neighborhood Nodes; therefore, it is scalable with network size. Adaptive: The algorithm notifies only the nodes that have cached a broken link to update their Caches; therefore, cache update overhead is minimized. Proactive on-demand: Proactive cache updating is triggered ondemand, without periodic behavior. Without ad hoc mechanisms: The algorithm does not use any ad hoc parameters, thus making route caches fully adaptive to topology changes. Module 1: Route Request When a source node wants to send packets to a destination to which it does not have a route, it initiates a Route Discovery by broadcasting a ROUTE REQUEST. The node receiving a ROUTE REQUEST checks whether it has a route to the destination in its cache. If it has, it sends a ROUTE REPLY to the source including a source route, which is the concatenation of the source route in the ROUTE REQUEST and the cached route. If the node does not have a cached route to the destination, it adds its address to the source route and rebroadcasts the ROUTE REQUEST. When the destination receives the
  • 7. ROUTE REQUEST, it sends a ROUTE REPLY containing the source route to the source. Each node forwarding a ROUTE REPLY stores the route starting from itself to the destination. When the source receives the ROUTE REPLY, it caches the source route. Module 2: Message Transfer The Message transfer relates with that the sender node wants to send a message to the destination node after the path is selected and status of the destination node through is true. The receiver node receives the message completely and then it send the acknowledgement to the sender node through the router nodes where it is received the message. Module 3: Route Maintenance Route Maintenance, the node forwarding a packet is responsible for confirming that the packet has been successfully received by the next hop. If no acknowledgement is received after the maximum number of retransmissions, the forwarding node sends a ROUTE ERROR to the source, indicating the broken link. Each node forwarding the ROUTE ERROR removes from its cache the routes containing the broken link. Module 4: Cache Updating When a node detects a link failure, our goal is to notify all reachable nodes that have cached that link to update their caches. To achieve this goal, the node detecting a link failure needs to know which nodes have cached the broken link and needs to notify such nodes efficiently. Our solution is to keep track of topology propagation state in a distributed manner. The algorithm starts either when a node detects a link failure or when it receives a notification.
  • 8. In a cache table, a node not only stores routes but also maintain two types of information for each route: (1) how well routing information is synchronized among nodes on a route; and (2) which neighbor has learned which links through a ROUTE REPLY. Each node gathers such information during route discoveries and data transmission, without introducing additional overhead. The two types of information are sufficient; because each node knows for each cached link which neighbors have that link in their caches. Benefits of Dynamic Source Routing Protocol The Dynamic Source Routing Protocol have the following advantages.  The Node have the information about the networks  The DSR reduce the Packet loss and latency time  The Node maintains the Route Status and Path for data transfer  The Node automatically handles the Cache Updation Process  Use On-Demand communication and Adaptive type of protocol for
  • 9. System Analysis Existing System  TCP performance degrades significantly in Mobile Ad hoc Networks due to the packet losses. Most of these packet losses result from the Route failures due to network mobility.  TCP assumes such losses occur because of congestion, thus invokes congestion control mechanisms such as decreasing congestion windows, raising timeout, etc, thus greatly reduce TCP throughput.  However, after a link failure is detected, several packets will be dropped from the network interface queue; TCP will time out because of these packet losses, as well as for Acknowledgement losses caused by route failures.  There is no intimation information regarding about to the failure links to the Node from its neighboring Node’s. So that the Source Node cannot able to make the Route Decision’s at the time of data transfer.
  • 10. Limitation of Existing System  The Stale routes causes packet losses if packets cannot be salvaged by intermediate nodes  The stale routes increases packet delivery latency, since the MAC layer goes through multiple retransmissions before concluding a link failure  Use Adaptive time out mechanisms  If the cache size is set large, more stale routes will stay in caches because FIFO replacement becomes less effective Proposed System  Prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology changes are unpredictable.  Prior researches have proposed to provide link failure feedback to TCP so that TCP can avoid responding to route failures as if congestion had occurred.  We propose proactively disseminating the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a
  • 11. distributed cache update algorithm. Each node maintains in its cache table the Information necessary for cache updates.  The Source Node has the information regarding about the Destination and the Intermediate Node links failure, So that it is useful from Packet loss and reduce the latency time while data transfer throughout the Network. Advantages of Proposed System  Proactive cache updating also prevents stale routes from being propagated to other nodes  We defined a new cache structure called a cache table to maintain the information necessary for cache updates. We presented a distributed cache update algorithm that uses the local information kept by each node to notify all reachable nodes that have cached a broken link. The algorithm enables DSR to adapt quickly to topology changes.  The algorithm quickly removes stale routes no matter how nodes move and which traffic model is used.
  • 12. Problem Formulation Objectives The Dynamic Source Routing Protocol have the following objectives  The Node have the information about the neighboring Nodes in the Network  The DSR reduce the Packet loss and latency time  The Node maintains the Route Status and Path information for data transfer and path request  The Node automatically handles the Cache Updation Process if any Link failure is happened in the Network  Use On-Demand communication and Adaptive type of protocol for
  • 13. Software Requirement Specification The software requirement specification is produced at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by establishing a complete information description as functional representation, a representation of system behavior, an indication of performance requirements and design constraints, appropriate validation criteria. User Interface * Swing - Swing is a set of classes that provides more powerful and flexible components that are possible with AWT. In addition to the familiar components, such as button checkboxes and labels, swing supplies several exciting additions, including tabbed panes, scroll panes, trees and tables. * Applet - Applet is a dynamic and interactive program that can run inside a web page displayed by a java capable browser such as hot java or Netscape. Hardware Interface  Hard disk : 40 GB  RAM : 512 MB  Processor Speed : 3.00GHz  Processor : Pentium IV Processor 4.1.1 Software Interface  JDK 1.5  Java Swing  MS-Access