M Tech Dissertations

Permanent URI for this collectionhttp://ir.daiict.ac.in/handle/123456789/3

Browse

Search Results

Now showing 1 - 10 of 11
  • ItemOpen Access
    Traffic profile measurement and traffic driven network reconfiguration
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2011) Monga, Jasneet Kaur; Srivastava, Sanjay
    In multi hop ad hoc network, nodes are constrained by the power or the energy sources that are available. Efficient algorithms for saving the energy are required to manage the network in such a manner that the resources available, get properly utilized and nodes in the network do not drain out. Switching and working over idle and busy periods of a node, one can achieve this dual goal and it comes under the category of sleep scheduling. In this approach, the basic emphasis is on the traffic profiles of the network nodes which is estimated based on the network traffic flows. The traffic estimated becomes the weight of the path between the different source destination pairs available in the network and this value averaged either at the local level or the global level is needed to be reduced, hence saving the overall energy of the network. The traffic weighted paths which consume energy above the average or the threshold value become the prime candidates for the consideration. The aim is to go for shorter and lighter paths in the network which require the sleeping nodes in the proximity of heavy and longer paths to be awaken to be a part of network topology and saving the extra energy wasted on longer paths. This makes the nodes in longer paths go through a sleep state so that they can be utilized when they are required, hence making topology changes by reconfiguring the paths.
  • ItemOpen Access
    Bidirectional service composition
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2010) Khakhkhar, Sandip; Chaudhary, Sanjay
    Service is a network addressable software component to perform a specific task. A service consumes given input parameters, performs specific task based on input parameters and returns the result in terms of output parameters. A service request specifies required task in terms of input parameters that can be provided and output parameters that are required. A service discovery mechanism can be used to find services that can be executed to satisfy service request. Service and service request is match by comparing their input/output parameters. A service request may be complex enough that it can not be satisfied by an individual service. It might be possible to execute a chain of services in a particular order to satisfy service request. This chain of services is referred as composition plan and service offered by executing this composition plan is referred as composite service. The aim of service composition algorithm is to generate a composition plan and generate composite service to satisfy service request. Services involved in composition plan are selected manually while designing composite service in static composition process. This process consumes considerable amount of time and effort. It is also vulnerable to changes in input/output of services. A dynamic composition algorithm is required that can automatically select services involved in composite plan and generate a composite service on-the-fly. Main issue with dynamic composition algorithms is composition time taken by algorithm to generate a composite service. Composition time indicates duration of the time at which the service request was submitted to the algorithm till the algorithm generate a composite service that can satisfy service request. Composition time depends upon the number of services required to explore in order to find services that can take part in composite plan. Dynamic composition algorithms presented in previous work mainly follows either forward chaining approach or backward chaining approach to find a composite service. Performance of algorithms based on forward chaining approach or backward chaining approach suffers for certain cases to generate a composite service where number of services explored increases exponentially as number of iterations increases. This work proposes a dynamic composition algorithm that gives consistent performance across all the cases. Proposed algorithm approaches from two directions alternatively, one follows forward chaining approach and other follows backward chaining approach. Composition algorithm following only forward chaining approach or backward chaining approach performs all the iterations in one direction only where as proposed algorithm requires only half number of iterations in both directions. Algorithm uses two types of matching strategy to compare input/output parameters. First one is based on keyword matching and second one based on semantic matching strategy. Performance of proposed algorithm is evaluated by performing relevant experiments and results are compared with algorithms based on only forward chaining approach or backward chaining approach. Proposed algorithm explores less number of services and takes less composition time compared to algorithms based on only forward chaining approach or backward chaining approach.
  • ItemOpen Access
    Game theory based strategies for cooperation in ad hoc wireless networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2010) Rajput, Nitin Singh; Srivastava, Sanjay; Divakaran, Srikrishnan
    In self-organized ad-hoc wireless networks, nodes belong to different authorities, pursue different goals, have constrains like energy; therefore, cooperation among them cannot be taken for granted. Non cooperation of nodes causes increase in probability of packet drop and increase in probability of route or network failure, which leads to poor network performance. On other hand if nodes always cooperate, network does not last for a long as nodes are energy constrained. Several schemes are proposed in literature based on incentive and reputation mechanism. All of them outperforms in their own set of assumptions and have certain issues.

    Researchers started looking at game theory as a probable solution and proposed some schemes, but yet to come up with better solutions. We focus on optimization of service received by a node from network and delivered to network considering energy as constraint. We first derive the probability by which a node accept the relay request of other nodes based on energy constraint. Then apply game theory based schemes Generous Tit For Tat (GTFT), Neighboring GTFT (N-GTFT) and contrite Tit For Tat (C-TFT) for acceptance of relay requests; well known in economics, behavioral science and biology for cooperation. We find that all above mention scheme converges towards parato optimal values of service received and deliver to network in presence and absentia of noise in network. We find that when network has pair wise mixed strategies (any two from GTFT, N-GTFT and C-TFT) then also convergences remain same as it is for single strategy. But when there are 50% non cooperative nodes (Always Drops strategy), C-TFT is the dominating strategy. Also C-TFT copes up with 10% or more noise in the network as other strategy fail to do so, however they cope well with lesser amount of noise. At the end CTFT evolve as the dominating strategy when all strategies including Always Drops simulated under evolutionary method of comparison in noisy and noise free network. C-TFT out performs because it switches to mutual Tit For Tat after cooperating against fixed unilateral non cooperation from other nodes and also cope up with own unintentional defection caused by noise.

  • ItemOpen Access
    Testbed based experimental analysis of transport protocols over wireless ad hoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Shah, Harshil Anilkumar; Srivastava, Sanjay
    Ad hoc networks are networks with no infrastructure and self-organized in nature. ad hoc networks allow nodes to form network when they come into range of each other provided nodes are configured in ad hoc mode. But these types of network are challenges like high bit error rates, route failures due to mobility, high noise, signal fading and low speed etc. to deal with. Due to this, protocols which are widely used in traditional wired networks may not perform well in MANETs. lower layers like MAC and network layer are either completely changed like 802.11 instead of 802.3 at MAC layer and introducing reactive routing protocols instead of only proactive routing at network layer or significant improvement schemes have been proposed for wireless networks in the existing legacy wired network protocols. But transport layer in MANET is mostly similar to wired networks except some improvements like TCP-ELFN and TCP-Feedback and new transport protocols like Ad hoc-TCP (ATCP), Transport Protocol for Ad hoc networks (TPA) and Ad-hoc Transport Pro- tool (ATP).performance degradation of TCP over wireless links is mainly due to wireless characteristics, TCP features like self-clocking, loss based congestion control, coupling of congestion and reliability, slow start. Several studies have been carried out to evaluate performance of TCP over MANETs but most of them are simulation based studies. But as simulation scenarios can not model exactly the unpredictable nature of wireless environment, we have decided to analyze performance of trans- port protocols over experimental test bed which can be more accurate evaluation of protocols in real-life situation. Performance of 2 transport protocols is analyzed.
  • ItemOpen Access
    Cache performance evaluation in DSR protocol through cross-layering for mobile ad hoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Sharma, Kapil; Sunitha, V.
    Wireless mobile ad-hoc networks are being actively studied by many researchers these days. These networks are suitable to be used in various situations because of (i) their infrastructure-less property and (ii) the mobility of the nodes of the network. However, it is these features which give rice to problems in study of such networks. Further, routing is one of the basic issues in any network design. Inclusion of moving capability to the nodes, make the routing problem more complicated. One is always interested in increasing the throughput and reducing overhead while at the same time solving the issues related to routing. DSR is a protocol that is extensively used for routing in such networks. Cache management and route caching play a significant role in using DSR successively to attain the best behavior for these networks. This thesis looks at and suggests some methods for route caching in DSR.
  • ItemOpen Access
    Cooperation enforcement mechanisms in wireless adhoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Chaturvedi, Manish Shivshankar; Srivastava, Sanjay
    Wireless adhoc networks are autonomous, infrastrutureless networks where there are no dedicated routers or base stations and nodes are expected to cooperate in Wireless performing routing duties to keep network connected. Cooperation can be assumed if all nodes belong to single authority (e.g. military service or disaster management). But in applications where nodes do not belong to single authority and have limited resources (energy of battery driven devices), like pervasive computing or ubiquitous computing environment, one can not deny possibility of node selfishness. Also as there is no central authority to control node behavior, one can not deny possibility of node maliciousness. Many cooperation enforcement schemes are proposed in literature, and every scheme is shown to perform better under its own set of assumptions. These assumptions are different for different schemes. So, we aim at defining common set of assumptions and comparing selected schemes on this common ground with respect to packet delivery ratio, energy consumption, routing and other control overhead. We find that with the traffic scenario where nodes do not need services of one another at the same time, the cooperation schemes are not effective in dealing with node selfish ness. We also find that, while dealing with malicious nodes, all cooperation schemes perform better than Dynamic Source Routing(DSR) protocol in improving packet de- livery ratio(PDR), but this improvement comes at the cost of significant increase in routing control packets overhead and energy consumption of cooperation enforcement schemes is higher than that of DSR. Also they fail in punishing misbehaving nodes and the PDR of malicious nodes is comparable to that of good nodes.
  • ItemOpen Access
    Identifying small world network properties in ad-hoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Garg, Neha; Sunitha, V.
    Small World Network is a densely connected network with low degree of separation. These types of networks have high clustering property like regular network as well as have low average path length like random network. Thus, Small World Networks are both Locally and Globally ecient as compared to other networks. The above prop- erties can be described using parameters like characteristic path length (L), clustering coefficient (C), local efficiency (Eloc) and global efficiency (Eglob). Through experiments, done in the past, it has been found that many real world networks exihibit the properties of small world network. This has given rise To finding models for real world networks so that the models reflect small world ness of the real world network. This thesis uses the model of converting a square grid into a small world model by introducing some special nodes. The equations to compute the small world parameters for this model with one and or two special nodes derived in this thesis.
  • ItemOpen Access
    Comparative study between exponential back off and dynamic waiting strategies for medium access in wireless ad hoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2009) Shah, Rahul; Srivastava, Sanjay
    IEEE 802.11 DCF (IEEE 802.11 Distributed Coordination Function) is widely used MAC protocol for wireless channel access. Although it is developed for single hop networks where all nodes are in the same radio range, it can be directly used for wireless multiphop hoc networks. But performance of IEEE 802.11 DCF in wireless ad hoc networks su

    ers as it has been developed considering single hop networks only. Many amendments has been proposed to enhance its performance in multihop ad hoc networks. One such scheme is DWMAC (Dynamic Waiting Medium Access Control). In this work, performance of IEEE 802.11 DCF and DWMAC are compared for different network scenarios and traffic patterns. It has been observed that the performance of DWMAC can be further improved if we alter the restricted mode operation of the nodes. We have proposed a new modified protocol DWMAC-Modied and have shown by simulations that DWMAC-Modied offers singnificant improvements.

  • ItemOpen Access
    Queueing-theoretic framework for perfermance analysis of mobile ad hoc networks with finite buffer nodes
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2008) Shah, Sapan; Lenin, R. B.; Srivastava, Sanjay
    Wireless Ad Hoc network is a decentralized wireless network which allows nodes to join and create networks without any infrastructure. These kinds of networks are advantageous because they can be readily deployed anywhere, anytime. Mobile Ad Hoc Network (MANET) is a special type of ad hoc network where nodes are mobile. Due to mobility of the nodes, network topology may change rapidly and unpredictably. MANETs are expected to plat a vital role in a variety of applications and are therefore studied extensively. It is imperative to analyze these networks, to assess the suitability of their use in different scenarios and to identify the techniques to improve their performance. In last few years, many models have been proposed to analyze MANETs. Many of then have an unrealistic assumption of an infinite buffer in each node. Moreover, in MANETs, as nodes are mobile, a packet may revisit the same node which creates feedback loops of a packet. These loops make modeling and analysis of MANETs difficult as the network becomes cyclic. This work analyzes MANET with finite buffer nodes. Open finite queuing network with gated queue, intermittent links and servers is used. The expansion method technique has been used to study the open finite queuing network with stable links and servers. We modify the method for intermittency. Numerical results are derived and compared with simulation results to show effectiveness of the method.
  • ItemOpen Access
    Effect of channel asymmetry on reputation based cooperation mechanisms in mobile ad-hoc networks
    (Dhirubhai Ambani Institute of Information and Communication Technology, 2008) Vasavada, Tejas; Srivastava, Sanjay
    Enforced cooperation among MANET nodes is an active research issue. In applications, where the users have different goals and there is no central authority to control them, users may become selfish. These nodes may not forward packets sent by others and thus affect the basic functionality of the network. One proposed class of protocols to handle such scenarios is based on reputation functions. In reputation based schemes, nodes maintain reputation values of other nodes. Reputation value of a node is high for nodes that forward the received packets and low otherwise. Nodes with very low reputation values are identified as selfish nodes and isolated from network operations. In such schemes, every node has to observe whether its neighbour is forwarding packets or not. A node after sending a packet to its neighbour to forward further, increases reputation of neighbour if it overhears the same packet from the neighbour. If it does not overhear the packet, reputation of neighbour is reduced. This is the basic method to observe whether neighbour node is cooperative or not. Here basic assumption is that the channel between two neighbour nodes is always symmetric. This assumption does not hold true due to two reasons: (1) Nodes are moving. Neighbour node may have forwarded the packet but by the time it forwards, either observing node or neighbour or both might move out of each others range. (2) Even if both are in each others range, due to multipath fading, observing node may not overhear the packets forwarded by neighbour node. Thus sometimes even honest nodes may be considered selfish and isolated due to this asymmetry. This reduces throughput of honest nodes. In this thesis work we have examined the probability of channel asymmetry as a function of ratio r(of inter node distance and transmission range), for given values of relative average velocity of nodes V and Ricean parameter K. Ricean parameter K represents type of the environment i.e. obstructed or unobstructed. We have proposed an enhancement of existing reputation protocol OCEAN. In the enhanced protocol, observing node probabilistically updates reputation of neighbour when it does not overhear. This probabilistic update takes into account probability of channel asymmetry. We have tried to minimize false positives, i.e. honest nodes being detected as selfish. We have shown through simulations that false negatives, i.e. selfish nodes being detected as honest, do not increase much. We have also shown that how false positives and false negatives change as degree of dishonesty of selfish nodes change. At last, we have shown that throughput levels of honest nodes in original OCEAN protocol and modified OCEAN protocol are almost same.