Browsing by Author "Sooriyaarachchi, SJ"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
- item: Conference-AbstractA Cell biology inspired model for managing packet broadcasts in mobile ad-hoc networkscSooriyaarachchi, SJ; Gamage, CDThe modern computing paradigm is moving towards personal devices that incorporate wireless networking, mobility, and collaborative applications. The networking paradigm that best matches this scenario is the mobile ad-hoc network (MANET). A common instance of a MANET is the dense MANET that can be expected in any setting where large number of people congregate such as movie theatres, sports stadiums, shopping malls, transportation hubs, lobby of public offices, lecture rooms, etc. The existing packet transmission protocols for MANETs are inefficient for dense MANETs due to packet broadcast storms for stateless protocols and non-availability of anchor nodes for stateful protocols. This paper presents a new packet broadcast model developed based on cell biology and provides simulation results on protocol efficiency. As Smartphone devices and collaborative applications proliferate among users, the proposed dense MANET protocol could provide real benefits to Internet enabled users and devices.
- item: Conference-AbstractEvaluation of scalability of hybrid wireless mesh protocol in IEEE 802.11Sooriyaarachchi, SJ; Fernando, WAC; Gamage, CDMobile ad-hoc networks (MANETs) enable ubiquitous computing with wide availability of smart mobile devices and applications. However, robust and lightweight protocols are yet to be implemented for multihop communication. The latest IEEE 802.11 standard released in 2012 captures the concept of muItihop MANETs under Wireless Mesh Networks and proposes Hybrid Wireless Mesh Protocol (HWMP) as the default muItihop path selection protocol. Previous studies on the performance of HWMP have not addressed operating scenarios of mass mobility (to model human user mobility), non-availability of root nodes (to model absence of infrastructure support) and a wide span of node densities (to model different application scenarios). This paper analyses the scalability of HWMP in a MANET of IEEE 802.11 standard wireless mesh stations that move at human walking speeds. The end-to-end delay, data packet delivery ratio and path selection control overhead are evaluated in the presence of random waypoint and mass mobility models for increasing node densities. The simulation results show that there are no significant variations in any of the above important performance metrics among static, random waypoint mobility and mass mobility models. Furthermore, HWMP shows almost a linear path selection control overhead profile for increasing node densities while the packet delivery ratio and the end-to-enddelay reaches a steady level as node density increases up to about 250 nodes.
- item: Thesis-Full-textPerformance evaluation of a web based system : case study - lamp based learnorg moodleSooriyaarachchi, SJ; Nanayakkara, VWeb based applications are widely deployed around the world for everyday activities of an average person ranging from simple entertainment to complex social, economic, political, educational and scientific tasks. LAMP that abbreviates the combination of Linux, Apache, My SQL and PHP is a popular set of technologies on which most of the web applications are deployed. Although LAMP based web applications arc deployed in millions, the question is whether the intended purposes of these applications are fulfilled satisfactorily from the end user's point of view. The response time and the server resource utilization are the most noteworthy yardsticks using which performance is quantified This study proposes a proper performance evaluation procedure and recommends an appropriate set of tools and techniques that can be used for the same. The typical method of evaluating performance is to monitor only the server side resource utilization. Many popular tools report the server resource utilization as average values over a period of few minutes whereas most of the user interactions span only for a few seconds. These average values may indicate that the servers are functioning smoothly, while the users may be suffering from poor response from the server. In contrast, this study proposes that while the response time at the user's end is being monitored, the server resources must also be tracked and analyzed. The case study of LeamOrg- Moodle is used to exemplify the proposed procedure and how the same can be extended. The popular Belief of network always being the bottleneck was not supported by the empirical results of the study. The results obtained for the •'system under study revealed that the memory can also be a resource bottleneck.
- item: Thesis-Full-textRouting and control mechanisms for dense mobile adhoc networks(2016-09) Sooriyaarachchi, SJ; Gamage, CDIt is not an exaggeration to mention that mobile devices have become ubiquitous and they are used for variety of purposes ranging from personal communication to disaster management and more. These devices are capable of establishing mobile ad hoc networks (MANETs) for multihop communication without the support of infrastructure. This enables more interesting and useful applications of mobile devices, for example for collaborative leaners in large classrooms, shoppers in crowded shopping malls, spectators in sports stadiums, online gamers and more. MANETs have not sufficiently developed to a deployable level yet. Routing in MANETs is a major problem. It is challenging to devise routing protocols for MANETs due to dynamic topology resulting from mobility, limited battery life and impairments inherent in wireless links. Traditional routing approach is to tweak the existing routing protocols that are designed for wired networks. Therefore, it is common to appoint special nodes to perform routing controls and gather global state information such as routing tables. We identify this approach as the fixed-stateful routing paradigm. Fixed stateful routing does not scale with the density of MANETs because the routes will get obsolete quickly due to the dynamic topology causing frequent routing updates. The overhead for these frequent updates will be unacceptable when the MANETs become dense. For example, the control overhead of routing updates in most of the traditional routing protocols are of magnitude O(N) or O(N2), where N is the number of nodes in the network. We name the routing approach that does not require to maintain global network states and does not appoint key nodes for routing and control as mobile-stateless routing paradigm. We propose a novel concept called endcast that leverages message flooding for end to end communication in MANETs in mobile-stateless manner. However, flooding causes heavy amounts of redundant messages, contention and collisions resulting in a situation known as broadcast storm problem. When flooding is utilized for end to end communication, the messages will flood beyond the destination. We call this situation broadcast flood problem. Repetitive rebroadcasting in simple flooding is analogous to biological cell division in the growth of human organs. Chalone mechanism is a regulatory system to control the growth of the organs. In this mechanism, each biological cell secretes a molecule called chalone and the concentration of chalones in the environment increases when the number of cells increases. When the chalone concentration exceeds a threshold the cells stop dividing themselves. Counter based flooding is one of the efficient flooding schemes, in which a node decides not to rebroadcast a received message if the message is subsequently heard multiple times exceeding a predefined threshold during a iv v random wait period. Inspired by the chalone mechanism in the growth of the organs we selected counter based flooding to unicast messages in a MANET. We proposed an inhibition scheme to stop the propagation of message beyond the destination to mitigate the broadcast flood problem. In this scheme, the destination transmits a smaller size control message that we call inhibitor that also propagates using counter based flooding but with a smaller random wait period than in the case of data message. Furthermore, inhibitors are limited to the region of the MANET covered by data flooding. The proposed endcast scheme outperforms simple flooding in such a way that over 45% of redundant messages are saved in all the network configurations starting from 100-node network in ideal wireless conditions when the nodes were placed on a playground of 600m 400m and each node was configured to have 200m of transmission radius. Similarly, the protocol manages to save over 45% of redundant messages for all node densities ranging from 10 to 300 in realistic wireless conditions simulated by IEEE 802.11g standard wireless MAC implementation with power saving transmission radius of 40m. This saving increases rapidly as networks grow by size in both the ideal and realistic wireless network conditions. The inhibition scheme of the protocol was also found to be effective, for example, redundant messages grow in number at a rate about 8 frames per every 25 nodes added to the network when there is inhibition in operation whereas the growth rate is about 170 frames per every 25 nodes when the protocol operates without inhibition in the simulated network scenario. The major contribution of this research is the analytical model that we developed to design and evaluate endcast schemes. We developed a graph theoretic model to evaluate the propagation of messages in endcast, based on a preliminary model developed by Viswanath and Obraczka [2]. We modified the model by (i) improving its method of estimating the number of new nodes reached by each level of rebroadcast (ii) modeling the impact of node mobility and (iii) incorporating time domain representation to model the flooding schemes that involve random assessment delays (iii) enabling it to represent efficient flooding schemes such as counter based flooding. We present the process of estimating the area covered by the propagation of flooding messages using a geometric method. Time domain is represented by indesing the edges of the flooding graph by time. The counter value and the threshold in counter based flooding are converted into a rebroadcasting probability and estimated using a probability mass function that we constructed by considering the overlapping of radio range circles of the nodes.