Smart Bandwidth Friendly Buffer: Handling Overflow in Wireless Mesh Networks
Journal Title: Journal of Independent Studies and Research - Computing - Year 2016, Vol 14, Issue 1
Abstract
With breakthrough of technological advancement, the significance of data transmission has been in highly demanding. On the other hand, limited buffering capacity has been great challenge that limits the Quality of Service (QoS) and degrade the performance of the network particularly in Wireless Mesh Networks (WMNs). Thus, it is important to provide an efficient utilization bandwidth and buffer management. Further- more, the QoS in WMNs depends immensely on intelli- gent buffer management to avoid unexpected congestion and data loss. Some algorithms have been introduced to improve the buffer capacity and management. However, these suffer from high latency, even the loss of data because of congestion in the buffers, eventually resulting in low throughput. To address these issues we introduce the scheme “Smart Bandwidth Friendly Buffers (SBFB) for Wireless Mesh Networks. The SBFB is inspired by the features of existing schemes like the EZ Flow, WRED (Weighted Random Early Detection, and Back-off mecha- nism algorithms. The SBFB scheme contributes to prior- itize the packets, allowing the down link nodes to perceive the buffer capacity prior to transmission and it also hunts for alternative routes in case of buffer buildup. Our proposed algorithm is validated using Network simula- tor-3 (NS3). Based on the experimental results, we have determined that SBFB has lesser congestion and packet loss probability when compared to other known contem- porary schemes.
Implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python
This paper presents implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python computer programming language. The Fourier Transform is a fundamental signal processing tool whereas th...
Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach
Global Terrorist Dataset (GTD) is a vast collection of terrorist activities reported around the globe. The terrorism database incorporates more than 27,000 terrorism incidents from 1968 to 2014. Every record has spatial...
Analytical Comparison of RSA and RSA with Chinese Remainder Theorem
RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption. Chinese Remainder Theorem (C...
Graph Visualization Tools: A Comparative Analysis
Data visualization is becoming a necessity for big organizations as the social networking data is growing rapidly. It is becoming difficult to visualize data and perform complex comparisons. There have been large databas...
Extracting Key Sentences from Text
Automatic key sentence extraction from a text is a challenging task. It has numerous applications in text processing systems. The actual task of key sentence extraction consists of three main functionalities: (i) Identif...