Quality of Service and Performance Analysis with Reactive Protocol in MANET by a Fuzzy Scheduler

نویسندگان

  • Bharat Tripathi
  • Narendra Pal Singh
  • David B. Johnson
  • David A. Maltz
  • Yih-Chun Hu
  • Charles E. Perkins
  • Elizabeth M. Royer
  • J. Broch
  • D. A. Maltz
  • D. B. Johnson
  • Y. C. Hu
  • Samir R. Das
چکیده

This paper presents an analysis of DSR protocol and packet scheduling algorithm to find those that most improve performance in congested network and proposes our algorithm to improve the performance of DSR protocol by using fuzzy logic in mobile ad hoc networks. Packet schedulers in wireless ad hoc networks serve data packets in FIFO order. Because, a scheduling algorithm to schedule the packet based on their priorities will improve the performance of the network. It is found that the scheduler provides overall improvement in the performance of the system when evaluated under different load and mobility conditions. The performance of this scheduler has been studied using NS2. 34 simulator and measured such as packet delivery ratio, end-to-end delay and throughput and an attempt to apply fuzzy logic in the design and implementation of a rule based scheduling algorithm to solve the shortcoming of well-known drop tail algorithms. Our main contribution is proposing a fuzzy approach to multi-packets scheduling in which the scheduling parameters are treated as fuzzy variables. It is concluded that the proposed fuzzy approach is very promising and it has the potential to be considered for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation Of Modified Fuzzy Priority Scheduler For MANET And Performance Analysis with mixed Traffic

In this paper, we investigate the performance of a fuzzy based Priority Scheduler in wireless Adhoc networks, with real time traffic under varying channel conditions. An Adhoc network is composed of mobile nodes connected by wireless links without any preexisting infrastructure. The network’s dynamic topology poses challenging problems for QoS routing. Hence a scheduling discipline can be used ...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Scheduler Based QoS Analysis in MANET For DSR Protocol

A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. In this paper, we analyze packet scheduling algorithm to find those that most improve performance in congested network. Hence, a scheduling algorithm to schedule the packet based on their priorities will improve t...

متن کامل

A New Method to Reduce Energy Consumption in Manet Network Routing based on OLSR Protocol and Genetic Algorithm

Mobile Ad Hoc Networks (MANET) can be considered as a class of unstructured networks created by a number of autonomous wireless and sensor nodes. The inherent characteristics of such networks have made specific applications, such as multimedia transfer and challenging. Basically, the functionality of a node and very few resources directly affect the delivery of packets which depends on the ...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012