Preview

viral

Satisfactory Essays
Open Document
Open Document
607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
viral
Advance Topic In Network RLDSC Scheduling Policy

Scheduling Policies

Whenever the message arrives in the queue, implement Scheduling Policy.

There are various type of Policies such as..

TSMF

RLDSC :
0• It is a scheduling policy.

0• This Strategy is Remaining Life time Descending and Ascending

0• In this we find the time to live (ttl) of a message in both descending and ascending.

0• All implementation shown here is only for remaining life time descending.
0• There are very minor changes for remaining life time ascending.

0• In this scheduling policy bundles are sorted taking into account their remaining time-to-live (TTL). Bundles with a longer remaining TTL are scheduled to be sent first because they have a higher probability to reach its final destination.

Both FIFO and Random scheduling policies do not take into account the time-to live(TTL) of bundles. TTL is a timeout value that expresses the amount of time that bundles should be stored before being discarded, since they are no longer. meaningful. Remaining Lifetime scheduling policy orders bundles based on their remaining TTL.

0• Two variations of this scheduling policy are considered ,either

1) bundles with smaller remaining TTLs are scheduled to be sent first
(RL Ascending Order)

or

2) bundles with longer remaining TTLs are scheduled to be sent first
(RLDescending

Order).

Anali shah (T13104931023) Shinny Purohit (T13104931001)

Advance Topic In Network RLDSC Scheduling Policy

Implementation :
Some steps we have to follow to implement .

Default_Settings.txt:

Group.movementModel = RandomWaypoint
Group.router = EpidemicRouter
Scenario.endTime = 10000

It is scheduling policy , so we can put our code in message router.java file.

0• In General, there is FIFO in any routing Scheme, But ,here we change it with RLASC

/RLDSC.

0• In message Router, there is a switch case. And by

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 6: The destination device will update its ARP cache, since it need to contact the sender machine soon.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    By applying ipaddress, broadcast, subnet mask and default gateway. So when all settings applied then we get…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    Copy and Paste the following screenshots from your Configuring Static and Default Routes lab below.…

    • 436 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Littlefield Overview

    • 863 Words
    • 4 Pages

    Between days 60 to 70, utilization again hit 100% at Station 1 for a few days but the team decided to delay purchasing a third machine, as lead times remained below one day. At the same time, the queue in front of Station 2 was growing, which was odd as the machine was not completely utilized. This suggested that perhaps the priority of scheduling needed adjustment; so on day 66 the team changed Station 2 priority from FIFO to give preference for Step 4 units. The logic behind this decision was to complete as many units as possible without delay. Once the priority was changed from FIFO to Step 4, the team noticed that both the utilization at Station 2 and the queues began to exhibit high variance from day to day. This suggested that FIFO was a better strategy for Station 2, so the team switched the priority back at day 75.…

    • 863 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Manzana

    • 1120 Words
    • 5 Pages

    1) The TAT is based on calculating the time to complete the backlog and the new policies at the desk of…

    • 1120 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Assignment 1 Soln

    • 846 Words
    • 4 Pages

    Consider sending a large file of F bits from Host A to Host B. There are three links (and…

    • 846 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    1.1 Aim 1.2 Methodology 1.3 Objectives 2. Background 2.1 Performance Evaluation 2.1.1 Measurement 2.1.2 Analysis/Simulation 2.2 Packet Switched Networks 3. Introduction 4. Theory 4.1 Queuing Theory 4.1.1 Queuing Model 4.1.1.1 Concept of a queuing model 4.1.2 Queuing theory notation 4.1.3 The M/M/1 Queue 4.1.4 The M/D/1 Queue 4.2 Switching 4.2.1 Switching Concept 4.2.1.1 Internal Link Blocking 4.2.1.2 Output Port Contention 4.2.1.3 Head Of Line Blocking 4.2.2 Time Between Arrivals 4.2.3 Counting Arrivals 4.2.4 The Queuing Behaviour Of Packets In Output Buffers 4.2.4.1 Calculating The State Probability Distribution 5. Analytical /Simulation Results 5.1 2x2 Switch 5.1.1 Analytical Results 5.1.2 Simulation Results 5.2 4x4 Switch 5.2.1 Analytical Results 5.2.2 Simulation Results 5.3 8x8 Switch 5.3.1 Analytical Results 5.3.2 Simulation Results 5.4 16x16 Switch 5.4.1 Analytical Results 5.4.2 Simulation Results 6. Conclusion 7. Project Management 7.1 Risk Analysis 7.2 Gant Chart 8. References 9. Appendix 2 2 2 2 2 2 2 3 3 3 3 3 4 5 5 7 9 9 9 9 11 11 13 14 14 15 15 15 17 19 19 20 22 22 23 25 25 26 28 28 28 28 28 29…

    • 885 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Viral Marketing

    • 2780 Words
    • 12 Pages

    W H I T E PA P E R : V I R A L M A R K E T I N G…

    • 2780 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Critical Path analysis

    • 393 Words
    • 4 Pages

    1. The earliest start time (EST) and latest finish time (LFT) that each activity can start and…

    • 393 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Viral Marketing

    • 6823 Words
    • 28 Pages

    Online viral campaigns require a seeding strategy that involves choosing the firstgeneration consumers to spread a viral message to. Building on social-capital theory and social-network analysis, this research examines key aspects of the seeding strategy by tracking the diffusion of 101 new videos published on YouTube. The results show that the need for a “big-seed” strategy (i.e., using many seed consumers) depends on message quality. Furthermore, one should choose consumers who have strong ties with the advertiser and who also have strong influence on others, rather than simply wider reach. Among seed consumers, they should share a moderate amount of interest overlap instead of being too homogeneous or heterogeneous as a group.…

    • 6823 Words
    • 28 Pages
    Better Essays
  • Powerful Essays

    Viral Marketing

    • 3116 Words
    • 13 Pages

    – An event or activity that generates publicity, excitement, and information to the consumer. – It's usually something that combines a wacky, jaw-dropping event or experience with pure branding, like tattooing your forehead. – If buzz is done right, people will write about it, so it essentially becomes a great PR vehicle. – Buzz marketing typically includes one shot of adrenaline and a chaser of product information. – Example: http://www.subservientchicken.com…

    • 3116 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Jit Mcdonalds

    • 373 Words
    • 2 Pages

    Companies should use this because it is necessary to know how long it will take for the item to be shipped from the supplier and arrive at the manufacturing facility. Second, the anticipated life or usage of the item must be determined. By knowing these two pieces of information, it is possible to establish procedures that allow the item to be reordered just in time to arrive and replace a worn item, without having the replacement set in storage for an extended period of time.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Viral Marketing

    • 1852 Words
    • 8 Pages

    Viral Marketing is a waste of money. Discuss considering the place of Viral Marketing within the digital marketing mix.…

    • 1852 Words
    • 8 Pages
    Better Essays

Related Topics