SlideShare a Scribd company logo
STOCHASTIC BANDWIDTH ESTIMATION IN 
NETWORKS WITH RANDOM SERVICE 
ABSTRACT: 
Numerous methods for available bandwidth estimation have 
been developed for wireline networks, and their effectiveness is 
well-documented. However, most methods fail to predict 
bandwidth availability reliably in a wireless setting. It is 
accepted that the increased variability of wireless channel 
conditions makes bandwidth estimation more difficult. 
However, a (satisfactory) explanation why these methods are 
failing is missing. This paper seeks to provide insights into the 
problem of bandwidth estimation in wireless networks or, more 
broadly, in networks with random service. We express 
bandwidth availability in terms of bounding functions with a 
defined violation probability. Exploiting properties of a 
stochastic min-plus linear system theory, the task of bandwidth 
estimation is formulated as inferring an unknown bounding 
function from measurements of probing traffic. We present
derivations showing that simply using the expected value of the 
available bandwidth in networks with random service leads to a 
systematic overestimation of the traffic departures. Furthermore, 
we show that in a multihop setting with random service at each 
node, available bandwidth estimates requires observations over 
(in principle infinitely) long time periods. We propose a new 
estimation method for random service that is based on iterative 
constant-rate probes that take advantage of statistical methods. 
We show how our estimation method can be realized to achieve 
both good accuracy and confidence levels. We evaluate our 
method for wired single-and multihop networks, as well as for 
wireless networks. 
EXISTING SYSTEM: 
In bandwidth estimation methods, end-systems exchange 
timestamped probe packets and study the dispersion of these 
packets after they have traversed a network of nodes. In recent 
years, available bandwidth estimation has attracted significant 
interest, and a wide variety of measurement tools and techniques
have been developed. Many of the most popular methods for 
available bandwidth estimation are based on congestion-inducing 
packet trains, where a packet train consists of a 
sequence of probe packets. By sending packet trains at a rate 
exceeding the available bandwidth, the network becomes 
congested, thereby imprinting information on the network state 
on the dispersion of probe packets. Virtually all available 
bandwidth methods were developed for wireline networks, 
where communication channels consist of fixed-capacity links, 
and where the available bandwidth of a link is given by its 
unconsumed capacity. Some of these methods have been 
adapted for wireless networks (see Section II), in particular WiFi 
networks, however, they generally lack the robustness and 
reliability achieved in fixed-capacity wireline environments. A 
potential source of errors are unsuitable model assumptions. 
DISADVANTAGES OF EXISTING SYSTEM:
 FIFO queueing may be highly prevalent in wired network 
infrastructures today, FIFO assumptions are difficult to 
justify in wireless multi access networks 
 Its latencies incurred during channel access lead to non-work- 
conserving systems. 
PROPOSED SYSTEM: 
In this paper, we investigate fundamental difficulties of 
measuring the available bandwidth in wireless networks with 
congestion- inducing packet trains. Rather than revising or 
adapting wireline approaches to wireless channels, e.g., by 
trying to eliminate superimposed random “noise,” we seek to 
develop from the ground up a new modeling and inference 
approach for networks that are subject to randomness of both 
traffic and transmission channels. We dispense with the 
modeling assumption of a work-conserving queueing system 
and, taking advantage of concepts from the stochastic network 
calculus, replace it with that of a general stationary system.
The point of departure of our efforts is a recent system-theoretic 
approach of bandwidth estimation [28]. Here, the network is 
viewed as a time-invariant deterministic system where 
throughput and delays of traffic are governed by an unknown 
bounding function, referred to as service curve. Service curves 
can express work-conserving as well as non-work-conserving 
systems. 
ADVANTAGES OF PROPOSED SYSTEM: 
 FIFO links with cross traffic can be replaced by a more 
general network model without specific requirements on 
the multiplexing method. 
 It present measurement results for wired single-hop and 
multihop networks as well as for wireless networks. 
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz
 RAM - 512 MB(min) 
 Hard Disk - 40 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
• Operating system : Windows XP 
• Coding Language : Java 
• Data Base : MySQL 
• Tool : Net Beans IDE 
REFERENCE: 
Ralf Lübben, Markus Fidler, and Jörg Liebeherr, “Stochastic Bandwidth 
Estimation in Networks With Random Service” IEEE/ACM TRANSACTIONS 
ON NETWORKING, VOL. 22, NO. 2, APRIL 2014.

More Related Content

What's hot

Dotnet channel assignment for throughput optimization in multichannel multir...
Dotnet  channel assignment for throughput optimization in multichannel multir...Dotnet  channel assignment for throughput optimization in multichannel multir...
Dotnet channel assignment for throughput optimization in multichannel multir...Ecway Technologies
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
Pvrtechnologies Nellore
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
AAKASH S
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
jpstudcorner
 
I1102014953
I1102014953I1102014953
I1102014953
IOSR Journals
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
Kamal Spring
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
Pvrtechnologies Nellore
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
idescitation
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
IOSR Journals
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
LeMeniz Infotech
 
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
Amulya Naik
 

What's hot (13)

Dotnet channel assignment for throughput optimization in multichannel multir...
Dotnet  channel assignment for throughput optimization in multichannel multir...Dotnet  channel assignment for throughput optimization in multichannel multir...
Dotnet channel assignment for throughput optimization in multichannel multir...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
I1102014953
I1102014953I1102014953
I1102014953
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
Performance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay StationPerformance Analysis of WiMAX Networks with Relay Station
Performance Analysis of WiMAX Networks with Relay Station
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
40520130101003
4052013010100340520130101003
40520130101003
 
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)
 

Viewers also liked

Proyecto
ProyectoProyecto
Proyecto
Carloz Garcìa
 
8 diapositivas de heladeria
8 diapositivas  de heladeria 8 diapositivas  de heladeria
8 diapositivas de heladeria wilmer_alcoser
 
Jornal jan março_2016
Jornal jan março_2016Jornal jan março_2016
Jornal jan março_2016
Aurpic Animação
 
Informática empresarial los ciegos yy el elefante
Informática empresarial los ciegos yy el elefanteInformática empresarial los ciegos yy el elefante
Informática empresarial los ciegos yy el elefanteYasmid Gallego
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
Papitha Velumani
 
Presentación profesional
Presentación profesionalPresentación profesional
Presentación profesional
José Manuel Sanz
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Papitha Velumani
 
Portafolio de evidencias
Portafolio de evidenciasPortafolio de evidencias
Portafolio de evidencias
PAMGERIS
 
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain PenelitianGambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
CIFOR-ICRAF
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
Papitha Velumani
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacymirabalm
 
متحف الزينة
متحف الزينةمتحف الزينة
متحف الزينةMOLAY80
 

Viewers also liked (16)

Proyecto
ProyectoProyecto
Proyecto
 
8 diapositivas de heladeria
8 diapositivas  de heladeria 8 diapositivas  de heladeria
8 diapositivas de heladeria
 
Jornal jan março_2016
Jornal jan março_2016Jornal jan março_2016
Jornal jan março_2016
 
Informática empresarial los ciegos yy el elefante
Informática empresarial los ciegos yy el elefanteInformática empresarial los ciegos yy el elefante
Informática empresarial los ciegos yy el elefante
 
Tik sma-kelas10smt2
Tik sma-kelas10smt2Tik sma-kelas10smt2
Tik sma-kelas10smt2
 
Dilip bhag resume
Dilip bhag resumeDilip bhag resume
Dilip bhag resume
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
 
Presentación profesional
Presentación profesionalPresentación profesional
Presentación profesional
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
 
mprc
mprcmprc
mprc
 
Portafolio de evidencias
Portafolio de evidenciasPortafolio de evidencias
Portafolio de evidencias
 
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain PenelitianGambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
Gambaran Umum Reformasi Tenurial Lahan Dan Hutan Di Lampung & Desain Penelitian
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
 
Infhumor
InfhumorInfhumor
Infhumor
 
متحف الزينة
متحف الزينةمتحف الزينة
متحف الزينة
 

Similar to Stochastic bandwidth estimation in networks with random service

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
IRJET Journal
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
IOSR Journals
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
IOSR Journals
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
IJCNCJournal
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
Vijay Karan
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
Vijay Karan
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
IOSR Journals
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
ieeeprojectschennai
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
inventionjournals
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
JPINFOTECH JAYAPRAKASH
 
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
pijans
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
JPINFOTECH JAYAPRAKASH
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
Editor IJMTER
 

Similar to Stochastic bandwidth estimation in networks with random service (20)

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
C0941017
C0941017C0941017
C0941017
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
On availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networksOn availability performability tradeoff in wireless mesh networks
On availability performability tradeoff in wireless mesh networks
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 

More from Papitha Velumani

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
Papitha Velumani
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Papitha Velumani
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchPapitha Velumani
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksPapitha Velumani
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
Papitha Velumani
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
Papitha Velumani
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
Papitha Velumani
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
Papitha Velumani
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
Papitha Velumani
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Papitha Velumani
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
Papitha Velumani
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Papitha Velumani
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
Papitha Velumani
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
Papitha Velumani
 
Ensuring the performance of apache http server affected by aging
Ensuring the performance of apache http server affected by aging Ensuring the performance of apache http server affected by aging
Ensuring the performance of apache http server affected by aging
Papitha Velumani
 
Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell
Papitha Velumani
 

More from Papitha Velumani (20)

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
 
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
 
Ensuring the performance of apache http server affected by aging
Ensuring the performance of apache http server affected by aging Ensuring the performance of apache http server affected by aging
Ensuring the performance of apache http server affected by aging
 
Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 

Stochastic bandwidth estimation in networks with random service

  • 1. STOCHASTIC BANDWIDTH ESTIMATION IN NETWORKS WITH RANDOM SERVICE ABSTRACT: Numerous methods for available bandwidth estimation have been developed for wireline networks, and their effectiveness is well-documented. However, most methods fail to predict bandwidth availability reliably in a wireless setting. It is accepted that the increased variability of wireless channel conditions makes bandwidth estimation more difficult. However, a (satisfactory) explanation why these methods are failing is missing. This paper seeks to provide insights into the problem of bandwidth estimation in wireless networks or, more broadly, in networks with random service. We express bandwidth availability in terms of bounding functions with a defined violation probability. Exploiting properties of a stochastic min-plus linear system theory, the task of bandwidth estimation is formulated as inferring an unknown bounding function from measurements of probing traffic. We present
  • 2. derivations showing that simply using the expected value of the available bandwidth in networks with random service leads to a systematic overestimation of the traffic departures. Furthermore, we show that in a multihop setting with random service at each node, available bandwidth estimates requires observations over (in principle infinitely) long time periods. We propose a new estimation method for random service that is based on iterative constant-rate probes that take advantage of statistical methods. We show how our estimation method can be realized to achieve both good accuracy and confidence levels. We evaluate our method for wired single-and multihop networks, as well as for wireless networks. EXISTING SYSTEM: In bandwidth estimation methods, end-systems exchange timestamped probe packets and study the dispersion of these packets after they have traversed a network of nodes. In recent years, available bandwidth estimation has attracted significant interest, and a wide variety of measurement tools and techniques
  • 3. have been developed. Many of the most popular methods for available bandwidth estimation are based on congestion-inducing packet trains, where a packet train consists of a sequence of probe packets. By sending packet trains at a rate exceeding the available bandwidth, the network becomes congested, thereby imprinting information on the network state on the dispersion of probe packets. Virtually all available bandwidth methods were developed for wireline networks, where communication channels consist of fixed-capacity links, and where the available bandwidth of a link is given by its unconsumed capacity. Some of these methods have been adapted for wireless networks (see Section II), in particular WiFi networks, however, they generally lack the robustness and reliability achieved in fixed-capacity wireline environments. A potential source of errors are unsuitable model assumptions. DISADVANTAGES OF EXISTING SYSTEM:
  • 4.  FIFO queueing may be highly prevalent in wired network infrastructures today, FIFO assumptions are difficult to justify in wireless multi access networks  Its latencies incurred during channel access lead to non-work- conserving systems. PROPOSED SYSTEM: In this paper, we investigate fundamental difficulties of measuring the available bandwidth in wireless networks with congestion- inducing packet trains. Rather than revising or adapting wireline approaches to wireless channels, e.g., by trying to eliminate superimposed random “noise,” we seek to develop from the ground up a new modeling and inference approach for networks that are subject to randomness of both traffic and transmission channels. We dispense with the modeling assumption of a work-conserving queueing system and, taking advantage of concepts from the stochastic network calculus, replace it with that of a general stationary system.
  • 5. The point of departure of our efforts is a recent system-theoretic approach of bandwidth estimation [28]. Here, the network is viewed as a time-invariant deterministic system where throughput and delays of traffic are governed by an unknown bounding function, referred to as service curve. Service curves can express work-conserving as well as non-work-conserving systems. ADVANTAGES OF PROPOSED SYSTEM:  FIFO links with cross traffic can be replaced by a more general network model without specific requirements on the multiplexing method.  It present measurement results for wired single-hop and multihop networks as well as for wireless networks. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz
  • 6.  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS: • Operating system : Windows XP • Coding Language : Java • Data Base : MySQL • Tool : Net Beans IDE REFERENCE: Ralf Lübben, Markus Fidler, and Jörg Liebeherr, “Stochastic Bandwidth Estimation in Networks With Random Service” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 2, APRIL 2014.