Exploring Issues for QoS Based Routing Algorithms
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
The Internet is growing at an astonishing rate, nearly doubling its enormous size every year. There is an increasing demand for using real time multimedia applications over the Internet. One of the challenging issues in exchanging multimedia information over a network is how to determine a feasible path that satisfies all the requirements of multimedia applications. Thus there is a need for routing mechanism which are able to satisfy requirement of both real time traffic and efficient management of network resources . Quality of service routing is one of these components . QoS(Quality of service) routing provides guarantee of service to the receiver. The main roblem to be solved by QoS routing algorithm is multi onstrained path problem. In general, The multi constrained path problem is Pcomplete that cannot be exactly solved in polynomial time. So various types of heuristic and approximate algorithms have been presented in literature to solve this problem .This paper discusses main approaches used to reduce QoS routing algorithms complexity and to improve overall network performance.
Authors and Affiliations
Dr. Shuchita Upadhyaya , Gaytri Dhingra
Fuzzy Shortest Path For Steiner Tree Problem
In this paper, a modification of the shortest path approximation based on the fuzzy shortest paths evaluations. The Steiner tree problem on a graph in which a fuzzy number instead of a real number is assigned to each edg...
Test Case Reduction Technique for Semantic Based Web Services
Web Services (WS) are the basic building blocks for every e-business applications. They provide efficient reusability mechanism, thereby reducing the development time and cost. Web services can be identified by Uniform R...
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...
A Handoff Technique to Reduce False-Handoff Probability in Next Generation Wireless Networks
Next Generation Wireless Systems (NGWS) include o-existence of current wireless technologies such as WLANs, WiMAX, General Packet Radio Service (GPRS) and Universal obile Telecommunications System (UMTS). The most impo...
A Zero-Watermarking algorithm on multiple occurrences of letters for text tampering detection
Electronic publishing has gained importance with the widespread use of Internet. It involves transmission of digital data in bulk from one place to another. It brings various threats to the data in form of illegal copyin...