I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
7
,
No
.
3
,
J
u
n
e
201
7
,
p
p
.
1197
~
1
2
0
3
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v7
i
3
.
p
p
1
1
9
7
-
1203
1197
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
JE
C
E
N
o
d
e
D
i
s
j
o
i
n
t
R
a
n
d
o
m
a
n
d
O
p
t
i
m
a
l
P
a
t
h
S
e
l
e
c
t
i
o
n
(
N
D
R
O
P
S
)
A
l
g
o
r
i
t
h
m
f
o
r
S
e
c
u
r
i
t
y
i
n
M
A
N
E
T
S
P.
Su
m
a
1
,
O
.
Na
g
a
ra
j
u
2
,
M
d.
Ali H
us
s
a
i
3
1
K
L
U
n
i
v
e
r
s
i
t
y
,
G
u
n
t
u
r
,
I
n
d
i
a
2
D
e
p
a
r
t
m
e
n
t
o
f
C
S
,
G
o
v
e
r
n
m
e
n
t
C
o
l
l
e
g
e
,
M
a
c
h
e
r
l
a
,
G
u
n
t
u
r
,
I
n
d
i
a
3
D
e
p
t
.
o
f
E
l
e
c
t
r
o
n
i
c
s
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
E
n
g
i
n
e
e
r
i
n
g
,
K
L
U
n
i
v
e
r
s
i
t
y
,
G
u
n
t
u
r
,
A
P
,
I
n
d
i
a
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
9
,
2
0
1
6
R
ev
i
s
ed
Ma
y
9
,
2
0
1
7
A
cc
ep
ted
Ma
y
2
3
,
2
0
1
7
M
o
b
i
le
A
d
h
o
c
Ne
t
w
o
rk
s
a
r
e
s
h
o
rtl
y
c
a
ll
e
d
M
A
NETs.
In
th
e
se
t
y
p
e
s
o
f
n
e
tw
o
rk
s,
f
ix
e
d
in
f
ra
stru
c
tu
re
s
a
r
e
a
b
se
n
t
a
n
d
a
re
d
y
n
a
m
ic
in
n
a
tu
re
.
No
d
e
s
a
re
m
o
v
a
b
le,
a
n
d
th
e
y
a
re
n
o
t
c
o
n
n
e
c
ted
w
it
h
a
n
y
w
ires
.
F
o
r
m
o
n
it
o
rin
g
o
r
su
p
e
rv
isin
g
th
e
tran
sm
issio
n
s
in
M
A
NE
T
S
,
n
o
c
e
n
tral
su
p
e
rv
isio
n
is
p
re
se
n
t.
M
o
v
in
g
n
o
d
e
s,
d
y
n
a
m
ic
to
p
o
lo
g
y
,
a
n
d
a
b
se
n
c
e
o
f
in
f
ra
stru
c
tu
re
a
re
th
e
f
e
a
tu
re
s
o
f
M
AN
ET
s.
T
h
e
s
e
f
e
a
t
u
re
s
a
re
a
d
v
a
n
tag
e
o
u
s
w
h
e
re
w
ir
e
s
c
a
n
n
o
t
b
e
u
se
d
a
n
d
w
h
e
re
n
o
d
e
s
a
re
su
p
p
o
se
d
to
m
o
v
e
.
Bu
t
th
e
re
is
a
p
ro
b
lem
o
f
se
c
u
rit
y
.
Ne
t
w
o
rk
s
a
re
h
ig
h
ly
p
r
o
n
e
t
o
a
tt
a
c
k
s
w
h
e
re
f
in
d
in
g
th
e
ro
o
t
o
f
th
e
c
a
u
se
is
v
e
r
y
h
a
rd
.
M
a
n
y
n
o
d
e
s
d
isjo
i
n
t
r
o
u
ti
n
g
a
lg
o
rit
h
m
s
a
re
p
ro
p
o
se
d
t
o
b
a
lan
c
e
th
e
lo
a
d
,
to
c
o
p
e
u
p
w
it
h
li
n
k
f
a
il
u
re
s,
e
tc.
T
h
is
p
a
p
e
r
p
ro
p
o
se
s
a
n
a
lg
o
rit
h
m
c
a
ll
e
d
No
d
e
Disj
o
in
t
Ra
n
d
o
m
a
n
d
Op
t
im
a
l
P
a
th
S
e
lec
ti
o
n
(ND
ROP
S
)
a
lg
o
rit
h
m
w
h
ich
u
se
s
th
e
c
o
n
c
e
p
t
o
f
d
y
n
a
m
ic
ro
u
ti
n
g
a
n
d
n
o
d
e
d
isjo
i
n
t
ro
u
ti
n
g
to
p
r
o
v
id
e
a
ll
th
e
a
b
o
v
e
-
sta
ted
a
d
v
a
n
tag
e
s
a
lo
n
g
w
it
h
se
c
u
rit
y
.
Ro
u
ti
n
g
o
f
d
a
ta
p
a
c
k
e
ts
is
d
o
n
e
t
h
ro
u
g
h
f
e
w
p
a
th
s
w
h
ich
a
re
n
o
d
e
d
isjo
i
n
t.
T
h
e
m
a
in
e
ss
e
n
c
e
o
f
th
is
a
lg
o
rit
h
m
is
to
d
istri
b
u
te
th
e
d
a
ta
a
m
o
n
g
d
if
fe
re
n
t
ro
u
tes
.
S
o
,
a
m
a
li
c
io
u
s
n
o
d
e
in
a
p
a
t
h
c
a
n
re
tri
e
v
e
o
n
ly
a
fe
w
p
a
c
k
e
ts
in
ra
n
d
o
m
.
T
h
e
si
m
u
lati
o
n
o
f
th
e
p
r
o
p
o
se
d
ND
ROPS
a
lg
o
rit
h
m
is
p
e
rf
o
r
m
e
d
a
n
d
th
e
p
e
rf
o
r
m
a
n
c
e
is
c
o
m
p
a
re
d
u
sin
g
th
ro
u
g
h
o
u
t
a
n
d
p
a
c
k
e
t
d
ro
p
p
r
o
b
a
b
il
it
y
.
K
ey
w
o
r
d
:
A
tt
a
c
k
s
M
A
NET
s
No
d
e
-
d
isjo
in
t
p
a
t
h
s
Ro
u
ti
n
g
Ro
u
ti
n
g
h
ist
o
ry
S
e
c
u
rit
y
Co
p
y
rig
h
t
©
2
0
1
7
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
P.
Su
m
a
K
L
U
n
i
v
e
r
s
i
t
y
,
G
u
n
t
u
r
,
I
n
d
i
a
.
E
m
ail:
s
u
m
ap
atr
a@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
A
n
et
w
o
r
k
w
i
th
m
o
v
i
n
g
n
o
d
es
an
d
ch
a
n
g
i
n
g
to
p
o
lo
g
y
ca
n
b
e
ca
lled
a
MA
NE
T
.
A
ll
th
e
in
d
iv
id
u
al
n
o
d
es
in
m
o
b
ile
ad
-
h
o
c
n
et
w
o
r
k
(
MA
NE
T
S)
f
u
n
ctio
n
s
as
r
o
u
ter
s
.
T
h
e
s
u
p
p
o
r
t
f
o
r
m
o
b
ile
n
o
d
es
co
n
n
ec
ti
v
it
y
an
d
w
ir
eles
s
n
e
s
s
ar
e
t
h
e
b
est
c
h
ar
ac
ter
is
tic
s
o
f
M
ANE
T
S.
Du
e
to
t
h
ese
f
ea
t
u
r
es
M
A
NE
T
S
ar
e
w
id
el
y
n
ee
d
ed
w
h
er
e
w
ir
e
s
an
d
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
te
m
ca
n
n
o
t
b
e
e
s
tab
lis
h
ed
.
T
h
e
a
p
p
licatio
n
f
ield
s
w
h
ich
r
eq
u
ir
e
m
o
v
i
n
g
n
o
d
es
attr
ac
t
M
A
NE
T
s
.
T
h
e
n
o
d
es
in
a
n
et
w
o
r
k
k
m
u
s
t
m
o
v
e
w
it
h
i
n
th
e
b
o
u
n
d
ar
y
.
So
,
th
e
n
o
d
es
w
h
ic
h
cr
o
s
s
th
e
b
o
u
n
d
ar
y
o
u
t
w
il
l
b
e
r
em
o
v
ed
f
r
o
m
th
e
n
et
w
o
r
k
an
d
n
o
d
es
ar
e
also
in
clu
d
ed
w
h
en
th
e
y
co
m
e
in
to
t
h
e
b
o
u
n
d
ar
y
.
T
h
e
ab
s
e
n
ce
o
f
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
te
m
m
a
y
ca
u
s
e
s
e
v
er
al
attac
k
s
.
I
n
w
ir
ed
a
n
d
th
e
n
et
w
o
r
k
s
w
i
th
ce
n
tr
al
s
u
p
er
v
i
s
io
n
,
it
is
ea
s
y
to
d
etec
t
th
e
ca
u
s
e
o
f
th
e
attac
k
.
A
n
d
th
is
i
s
n
o
t
th
e
ca
s
e
w
i
th
MA
NE
T
s
.
T
ill
n
o
w
m
a
n
y
m
e
asu
r
es
ar
e
p
r
o
p
o
s
ed
to
p
r
o
v
id
e
s
ec
u
r
it
y
b
u
t
s
till
t
h
er
e
is
a
n
ee
d
to
in
cr
ea
s
e
th
e
lev
el
o
f
s
ec
u
r
it
y
.
D
y
n
a
m
ic
r
o
u
ti
n
g
a
n
d
n
o
d
e
d
is
j
o
in
t
r
o
u
tin
g
ar
e
t
w
o
d
is
tin
c
t
r
o
u
tin
g
tec
h
n
iq
u
es.
T
h
ese
ar
e
u
s
ed
to
r
estrict
th
e
d
ata
tr
a
n
s
m
is
s
io
n
i
n
a
s
i
n
g
le
p
ath
[
1
]
,
[
2
]
.
T
h
ese
t
y
p
es
o
f
r
o
u
tin
g
tec
h
n
iq
u
e
s
w
er
e
u
s
ed
to
b
alan
ce
th
e
tr
af
f
ic
lo
ad
,
h
a
n
d
le
t
h
e
s
i
tu
atio
n
w
h
e
n
s
o
m
e
f
ail
u
r
e
o
c
cu
r
s
i
n
a
r
o
u
te
e
tc
[
3
]
.
T
h
is
p
ap
er
p
r
o
p
o
s
es
an
alg
o
r
ith
m
w
h
er
e
p
ath
s
o
f
tr
an
s
m
i
s
s
io
n
ar
e
m
a
n
y
a
n
d
ar
e
s
e
lecte
d
in
r
an
d
o
m
.
I
n
t
h
i
s
,
th
e
p
ath
s
s
elec
ted
ar
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
3
,
J
u
n
e
2
0
1
7
:
1
1
9
7
–
1
2
0
3
1198
n
o
d
e
d
is
j
o
in
t.
T
h
e
co
n
ten
t
o
f
t
h
e
p
ap
er
co
m
p
r
i
s
es
o
f
His
to
r
y
,
A
r
ea
s
o
f
ap
p
licatio
n
,
Neg
ati
v
e
ch
ar
ac
t
er
is
tics
,
an
d
v
ar
io
u
s
ch
al
len
g
es
o
f
M
AN
E
T
s
.
T
h
en
A
d
v
a
n
ce
m
en
ts
t
il
l
n
o
w
,
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
w
it
h
n
o
tatio
n
s
f
o
llo
w
ed
b
y
C
o
n
cl
u
s
io
n
.
2.
DE
V
E
L
O
P
M
E
NT
O
F
M
ANET
S
AL
OH
An
et
,
P
ac
k
et
R
ad
io
Ne
t
w
o
r
k
s
(
P
R
NE
T
)
an
d
Su
r
v
i
v
a
b
le
A
d
ap
ti
v
e
R
ad
io
Net
w
o
r
k
s
(
SUR
A
N)
ar
e
u
s
ed
in
t
h
e
1
9
7
0
s
.
C
o
m
m
er
cial
A
d
h
o
c
Net
w
o
r
k
s
w
er
e
p
r
ev
aili
n
g
in
t
h
e
1
9
9
0
s
an
d
later
MA
NE
T
s
ar
e
b
ein
g
u
s
ed
.
3.
AREAS
WH
E
RE
M
ANET
S
ARE P
RE
F
E
RR
E
D
MA
NE
T
S
ar
e
p
r
ef
er
r
ed
in
t
h
e
ar
ea
s
w
h
er
e
w
ir
e
s
ca
n
n
o
t
b
e
u
s
ed
a
n
d
n
o
d
es
ar
e
n
ee
d
ed
to
b
e
m
o
b
ile
in
n
at
u
r
e.
Fe
w
ar
ea
s
w
h
er
e
M
A
NE
T
s
ar
e
u
s
ed
ar
e,
1.
C
o
m
m
u
n
ica
tio
n
i
n
Militar
y
O
r
g
an
izatio
n
s
2.
B
attlef
ield
s
3.
R
esc
u
e
o
r
s
ea
r
ch
in
g
o
p
er
atio
n
s
4.
Dis
aster
m
an
a
g
e
m
e
n
t
an
d
R
ec
o
v
er
y
5.
Ou
td
o
o
r
Ga
m
es
6.
I
n
ter
n
et
w
h
ile
m
o
v
i
n
g
7.
T
ax
ies/
ca
b
s
8.
Sp
o
r
ts
s
tad
iu
m
s
9.
A
ir
cr
a
f
t o
r
w
ater
tr
an
s
p
o
r
t c
o
m
m
u
n
icatio
n
s
etc.
4.
NE
G
A
T
I
VE
CH
A
RAC
T
E
R
I
ST
I
CS
Deficie
n
cy
o
f
C
en
tr
a
liz
ed
mo
n
ito
r
in
g
:
A
C
en
tr
al
s
u
p
er
v
is
in
g
s
y
s
te
m
is
u
s
ed
to
m
a
n
ag
e
t
h
e
co
m
m
u
n
icatio
n
i
n
t
h
e
n
et
w
o
r
k
a
n
d
to
m
o
n
ito
r
t
h
e
s
ec
u
r
it
y
is
s
u
es.
B
u
t
M
A
NE
T
s
ar
e
n
o
t
p
r
o
v
id
ed
w
it
h
s
u
c
h
s
y
s
te
m
[
4
]
.
Ma
n
y
p
r
o
b
le
m
s
ar
is
e
d
u
e
to
th
i
s
.
P
r
o
b
lem
in
fin
d
in
g
th
e
a
tta
ck
er:
No
d
es
ar
e
co
n
tin
u
o
u
s
l
y
a
d
d
ed
an
d
r
em
o
v
ed
f
r
o
m
t
h
e
p
r
e
m
is
e
s
o
f
th
e
n
et
w
o
r
k
.
So
d
etec
tin
g
th
e
ca
u
s
e
f
o
r
an
attac
k
i
s
a
h
ar
d
ta
s
k
[
5
]
.
Leve
l
o
f
A
d
a
p
tin
g
n
ew
n
o
d
es:
T
h
e
n
et
w
o
r
k
m
u
s
t
b
e
ab
le
to
h
an
d
le
a
n
d
ad
ap
t
w
h
en
n
e
w
n
o
d
es
en
ter
th
e
n
et
w
o
r
k
b
o
u
n
d
ar
y
.
A
b
s
e
n
c
e
o
f
th
is
ad
ap
tab
ilit
y
is
a
m
aj
o
r
p
r
o
b
lem
i
n
M
A
NE
T
s
.
N
o
d
e
C
o
o
p
era
tio
n
:
A
ll
th
e
n
o
d
es
m
u
s
t
tr
y
to
co
o
p
er
ate
w
it
h
ea
c
h
o
th
er
as
t
h
er
e
is
n
o
ce
n
tr
al
s
u
p
er
v
i
s
i
n
g
s
y
s
te
m
[
5
]
.
Un
s
ta
b
le
n
etw
o
r
k
T
o
p
o
lo
g
y:
T
h
e
p
o
s
itio
n
s
o
f
th
e
n
o
d
es
ar
e
al
w
a
y
s
c
h
an
g
i
n
g
.
So
,
c
o
o
p
er
atio
n
,
r
eliab
le
co
m
m
u
n
ic
a
tio
n
i
s
p
r
o
b
le
m
atic
[
6
]
.
Limit
in
R
eso
u
r
ce
s
:
E
n
er
g
y
o
f
n
o
d
es,
B
an
d
w
id
t
h
an
d
p
r
o
tectio
n
f
r
o
m
v
ir
u
s
e
s
ar
e
lim
ited
.
T
h
is
ca
u
s
e
s
u
n
r
eliab
le
co
m
m
u
n
icat
io
n
[
7
]
.
P
r
o
b
lem
in
esti
ma
tio
n
o
f
to
ta
l
B
a
n
d
w
id
th
in
a
n
etw
o
r
k:
D
y
n
a
m
ic
to
p
o
lo
g
y
,
ad
d
itio
n
an
d
d
eletio
n
o
f
n
o
d
es
m
a
k
e
th
e
e
s
ti
m
atio
n
o
f
b
an
d
w
id
t
h
h
ar
d
[
8
]
.
I
n
s
ec
u
r
ity
d
u
e
to
p
r
esen
ce
o
f
ma
licio
u
s
n
o
d
e:
T
h
er
e
w
ill
b
e
n
o
ex
ac
t
in
f
o
r
m
atio
n
o
f
n
o
d
e
s
w
i
th
a
n
in
te
n
tio
n
to
attac
k
th
e
n
et
w
o
r
k
‟
s
s
ec
u
r
it
y
[
9
]
.
C
o
mp
a
tib
ilit
y
o
f
P
r
o
to
co
ls
u
s
ed
:
P
r
o
to
co
ls
u
s
ed
b
y
all
t
h
e
n
o
d
es
m
u
s
t
b
e
s
u
p
p
o
r
tin
g
to
ea
ch
o
th
er
f
o
r
r
eliab
le
co
m
m
u
n
icatio
n
[
8
]
.
I
n
ex
a
ct
B
o
u
n
d
a
r
y
o
f
n
etw
o
r
k
:
T
h
e
r
an
g
e
o
f
b
o
r
d
er
o
f
a
n
et
w
o
r
k
is
n
o
t
ap
p
r
o
p
r
iate.
T
h
is
cr
ea
tes
a
p
r
o
b
lem
in
d
ata
tr
an
s
m
is
s
io
n
a
n
d
s
ec
u
r
it
y
i
n
th
e
n
et
w
o
r
k
.
5.
V
ARIO
U
S CH
AL
L
E
NG
E
S
A
va
ila
b
ilit
y
o
f
n
o
d
es:
No
d
es
m
u
s
t
b
e
a
v
ailab
le
to
th
e
ea
c
h
o
th
er
ev
e
n
i
n
th
e
p
r
ese
n
ce
o
f
attac
k
s
a
n
d
li
m
ited
r
eso
u
r
ce
s
etc
[
9
]
.
A
u
th
en
tica
tio
n
o
f
n
o
d
es:
T
h
e
n
o
d
es
in
MA
NE
T
s
m
u
s
t
b
e
au
th
e
n
tica
ted
f
o
r
s
ec
u
r
it
y
.
T
h
is
ca
n
s
to
p
m
alicio
u
s
n
o
d
es
to
ac
t
as
a
n
au
t
h
e
n
ticated
o
n
e.
Au
t
h
e
n
t
icatio
n
o
f
n
o
d
es
s
er
v
e
s
to
i
m
p
r
o
v
e
s
ec
u
r
it
y
i
n
MA
NE
T
s
[
6
]
.
N
o
d
e
A
n
o
n
ymity:
L
i
m
itat
io
n
s
m
u
s
t
b
e
th
er
e
to
alter
t
h
e
o
r
i
g
in
a
l
i
n
f
o
r
m
atio
n
o
f
a
p
er
s
o
n
an
d
o
th
er
r
o
u
tin
g
in
f
o
r
m
a
tio
n
[
9
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
Tit
le
o
f m
a
n
u
s
crip
t is sh
o
r
t a
n
d
clea
r
,
imp
lies
r
esea
r
ch
r
esu
l
ts
(
F
i
r
s
t A
u
th
o
r
)
1199
User
A
u
th
o
r
iz
a
tio
n
:
A
cc
es
s
r
i
g
h
t
s
m
u
s
t b
e
p
r
o
v
id
ed
to
th
e
u
s
er
s
to
p
er
f
o
r
m
s
o
m
e
ac
tio
n
s
[
5
]
.
Da
ta
C
o
n
fid
en
tia
lity:
C
o
n
f
id
e
n
tial d
ata
m
u
s
t
b
e
p
r
o
tecte
d
f
r
o
m
at
tack
er
s
a
n
d
u
n
p
r
iv
ile
g
ed
u
s
er
s
[
8
]
.
I
n
teg
r
ity:
Data
r
et
r
iev
al
an
d
alter
atio
n
r
ig
h
t
s
h
a
v
e
to
b
e
g
iv
en
o
n
l
y
to
th
e
au
th
o
r
ized
p
er
s
o
n
s
to
p
r
o
v
id
e
in
teg
r
it
y
o
f
d
ata.
T
h
is
p
r
o
v
id
es
s
ec
u
r
it
y
[
4
]
.
N
o
n
-
r
ep
u
d
ia
tio
n
:
A
s
o
u
r
ce
an
d
d
esti
n
atio
n
m
u
s
t
a
g
r
ee
th
e
a
ctio
n
p
er
f
o
r
m
ed
b
y
t
h
e
m
.
Di
s
ag
r
ee
m
e
n
t
later
is
n
o
t e
n
co
u
r
ag
ed
.
So
,
m
ea
s
u
r
es
h
av
e
to
ta
k
en
to
p
r
o
tect
th
e
n
et
w
o
r
k
f
r
o
m
n
o
n
r
ep
u
d
iatio
n
[
5
]
.
C
a
tch
a
n
d
d
is
ca
r
d
th
e
ma
lici
o
u
s
n
o
d
es:
I
d
en
tif
icatio
n
o
f
attac
k
i
n
g
n
o
d
es
m
u
s
t
b
e
d
o
n
e
an
d
th
e
y
m
u
s
t
b
e
k
ep
t
a
w
a
y
f
r
o
m
i
n
v
o
l
v
in
g
i
n
th
e
n
et
w
o
r
k
ac
t
iv
i
ties
[
7
]
.
6.
RE
L
A
T
E
D
WO
RK
D
y
n
a
m
ic
r
o
u
ti
n
g
,
n
o
d
e
d
is
j
o
i
n
t
r
o
u
ti
n
g
s
tr
ate
g
ies
w
as
u
s
ed
as
a
s
o
lu
tio
n
f
o
r
v
ar
io
u
s
p
r
o
b
le
m
s
li
k
e
lin
k
f
ail
u
r
e,
f
i
n
d
i
n
g
o
p
ti
m
a
l
p
ath
s
a
n
d
to
b
alan
ce
tr
af
f
ic
t
h
r
o
u
g
h
all
n
o
d
es
etc.
Fe
w
s
u
ch
w
o
r
k
s
ar
e
s
tated
an
d
r
ef
er
en
ce
d
b
elo
w
.
Sh
u
ch
ita
et
a
l.
[
3
]
p
r
o
p
o
s
ed
a
m
et
h
o
d
o
f
f
in
d
i
n
g
n
o
d
e
an
d
lin
k
d
is
j
o
in
t
p
at
h
s
to
atta
in
f
e
w
p
o
s
it
iv
e
q
u
alities
.
A
No
d
e
Dis
j
o
in
t
Mu
ltip
ath
R
o
u
tin
g
C
o
n
s
id
er
in
g
L
in
k
a
n
d
No
d
e
Stab
ilit
y
(
NDM
L
N
R
)
p
r
o
to
co
l
w
a
s
p
r
o
p
o
s
ed
to
r
e
d
u
ce
en
er
g
y
lo
s
s
o
f
f
e
w
n
o
d
es a
n
d
to
w
o
r
k
w
e
ll in
li
n
k
b
r
ea
k
a
g
es
.
No
d
e
-
Dis
j
o
in
t
Mu
l
tip
ath
R
o
u
tin
g
P
r
o
to
co
l
(
NDM
R
)
w
as
p
r
o
p
o
s
ed
[
1
0
]
t
o
m
iti
g
ate
t
h
e
o
v
er
h
ea
d
w
h
ile
r
o
u
ti
n
g
d
ata.
T
h
is
p
r
o
t
o
co
l
p
r
o
p
o
s
ed
an
a
g
en
t
b
ase
d
Ser
v
ice
L
e
v
el
A
g
r
ee
m
e
n
t
(
SLA
m
an
a
g
e
m
en
t)
s
y
s
te
m
to
p
ick
a
n
o
d
e
d
is
j
o
in
t
p
ath
.
T
h
is
is
also
u
s
ed
to
b
alan
c
e
th
e
tr
a
f
f
ic
an
d
to
co
p
e
w
it
h
n
o
d
e
f
ail
u
r
es.
A
m
u
ltip
at
h
r
o
u
tin
g
tec
h
n
iq
u
e
w
a
s
p
r
o
p
o
s
ed
[
1
1
]
to
h
an
d
le
th
e
li
n
k
f
ai
lu
r
es
i
n
M
A
NE
T
s
.
No
d
e
d
is
j
o
in
t
p
ath
s
ar
e
id
en
tifie
d
b
et
w
ee
n
t
h
e
s
en
d
er
an
d
r
ec
eiv
er
to
r
e
d
u
ce
d
elay
a
n
d
to
attain
g
o
o
d
th
r
o
u
g
h
p
u
t
lev
els.
A
p
r
o
to
co
l
w
ith
m
u
ltip
ath
r
o
u
ti
n
g
u
s
i
n
g
No
d
e
d
is
jo
in
t
p
ath
s
w
as
p
r
o
p
o
s
ed
to
w
o
r
k
w
e
ll
in
lin
k
f
ail
u
r
es.
T
h
is
tech
n
iq
u
e
o
f
r
o
u
tin
g
w
a
s
m
ea
n
t
to
r
ed
u
ce
p
ac
k
et
d
r
o
p
p
in
g
,
d
ela
y
a
n
d
e
f
f
ic
i
en
t
d
eli
v
er
y
o
f
d
ata
to
th
e
d
esti
n
a
tio
n
[
1
2
]
.
A
p
r
o
to
co
l b
ased
o
n
A
OD
V
p
r
o
to
co
l w
a
s
s
tated
to
f
in
d
t
h
r
e
e
n
o
d
e
d
is
j
o
in
t
p
ath
s
b
et
w
ee
n
s
en
d
er
an
d
r
ec
eiv
er
.
T
h
is
w
a
s
d
o
n
e
to
r
ed
u
ce
lo
ad
o
n
f
i
x
ed
n
o
d
es b
y
d
is
tr
ib
u
tin
g
lo
ad
o
n
to
m
a
n
y
n
o
d
es [
1
3
]
.
I
n
No
d
e
-
Dis
j
o
in
t
Mu
ltip
ath
r
o
u
ti
n
g
p
r
o
to
co
l
[
1
4
]
f
o
r
r
o
u
tin
g
o
f
p
ac
k
ets
is
d
o
n
e
b
y
m
a
k
i
n
g
th
e
n
o
d
es
d
is
j
o
in
t in
th
e
n
et
w
o
r
k
.
T
h
is
t
y
p
e
o
f
m
u
ltip
at
h
r
o
u
ti
n
g
i
s
d
o
n
e
to
h
av
e
r
eliab
le
d
ata
tr
an
s
f
e
r
in
ti
m
e.
An
E
f
f
icie
n
t
D
y
n
a
m
ic
R
o
u
te
Op
ti
m
izat
io
n
A
l
g
o
r
ith
m
f
o
r
Mo
b
ile
A
d
h
o
c
Net
w
o
r
k
s
[
1
5
]
,
is
an
alg
o
r
ith
m
to
f
in
d
o
p
ti
m
al
r
o
u
t
e.
T
h
is
alg
o
r
ith
m
c
a
n
b
e
s
h
o
r
tly
ca
lled
DR
O
A
.
T
o
o
p
tim
ize
th
e
r
o
u
te
n
u
m
b
er
o
f
h
o
p
s
,
d
ela
y
in
tr
af
f
ic,
p
o
w
er
o
f
n
o
d
es
w
er
e
co
n
s
id
er
ed
.
S.Sh
ar
o
n
et
a
l.
p
r
o
p
o
s
ed
an
ef
f
icie
n
t r
o
u
ti
n
g
p
r
o
to
co
l to
p
r
o
v
id
e
s
ec
u
r
it
y
i
n
d
ata
tr
a
n
s
m
is
s
io
n
.
I
n
t
h
is
[
1
6
]
,
g
eo
g
r
ap
h
ical
o
r
p
o
s
itio
n
b
ased
r
o
u
tin
g
is
d
o
n
e
.
T
i
m
e
is
a
co
n
s
tr
ain
t
in
r
o
u
tin
g
,
i.e
w
h
e
n
ti
m
e
li
m
it
i
s
r
ea
ch
ed
,
o
th
er
n
ex
t
h
o
p
is
ch
o
s
en
f
o
r
tr
an
s
m
is
s
io
n
.
An
o
th
er
t
y
p
e
o
f
r
o
u
ti
n
g
tec
h
n
iq
u
e
w
h
ic
h
is
b
ased
o
n
Alp
h
a
n
u
m
er
ic
[
1
7
]
w
as
p
r
o
p
o
s
ed
.
No
d
es
in
a
n
et
w
o
r
k
ar
e
class
i
f
ied
as
lead
er
n
o
d
es
an
d
ac
tiv
e
n
o
d
es,
w
h
er
e
lead
er
s
ar
e
u
s
ed
to
m
o
n
ito
r
th
e
ac
tiv
e
n
o
d
es.
Data
tr
an
s
m
is
s
io
n
i
s
d
o
n
e
o
n
l
y
th
r
o
u
g
h
th
e
n
o
d
es
w
h
ic
h
ar
e
au
th
o
r
ized
.
T
h
is
alg
o
r
it
h
m
i
s
s
p
ec
iall
y
u
s
ed
to
p
r
ev
en
t
w
o
r
m
h
o
le
attac
k
.
I
n
w
o
r
m
h
o
le
attac
k
a
t
u
n
n
el
is
e
s
tab
lis
h
ed
b
et
w
ee
n
t
w
o
attac
k
er
n
o
d
es
an
d
d
ata
is
tr
an
s
m
itted
i
n
th
r
o
u
g
h
th
is
t
u
n
n
el
o
n
l
y
.
B
ac
k
u
p
r
o
u
ti
n
g
p
r
o
to
co
l
w
a
s
p
r
o
p
o
s
ed
b
y
S.J
L
ee
et
a
l.
,
[
1
8
]
.
T
h
is
is
b
ased
o
n
A
O
DV
p
r
o
to
co
l.
W
h
en
a
li
n
k
f
ail
u
r
e
o
cc
u
r
s
,
alt
er
n
ativ
e
p
at
h
is
s
e
lecte
d
f
o
r
tr
an
s
m
i
s
s
io
n
d
y
n
a
m
ical
l
y
.
No
d
e
d
is
j
o
in
t
p
ath
s
ar
e
u
s
ed
in
On
-
d
e
m
an
d
Mu
l
tip
ath
Dis
ta
n
ce
V
ec
to
r
R
o
u
tin
g
f
o
r
A
d
Ho
c
Net
w
o
r
k
s
[
1
9
]
.
I
n
th
is
r
o
u
ti
n
g
m
eth
o
d
,
m
a
n
y
p
at
h
s
ar
e
in
v
o
lv
ed
f
o
r
d
ata
tr
an
s
m
is
s
io
n
.
St
ale
p
ath
u
s
a
g
e
ca
n
b
e
r
ed
u
ce
d
b
y
th
e
co
n
ce
p
t o
f
n
o
d
e
d
is
jo
in
tn
es
s
.
7.
P
RO
P
O
SE
D
WO
RK
W
e
p
r
o
p
o
s
e
a
r
an
d
o
m
p
ath
s
elec
tio
n
alg
o
r
ith
m
(
ND
R
O
P
S
)
to
r
o
u
te
th
e
d
ata
p
ac
k
e
ts
th
r
o
u
g
h
d
if
f
er
en
t
n
o
d
e
d
is
j
o
in
t
r
o
u
tes
in
o
r
d
er
i
m
p
r
o
v
e
s
ec
u
r
it
y
in
MA
NE
T
S.
I
n
g
en
er
al,
to
s
en
d
d
ata
a
p
ath
is
u
s
e
d
f
o
r
tr
an
s
m
is
s
io
n
.
An
y
n
o
d
e
in
th
is
p
ath
ca
n
r
ea
d
th
e
d
ata.
T
h
is
r
ed
u
ce
s
d
ata
co
n
f
id
en
tial
it
y
a
n
d
s
ec
u
r
it
y
.
T
h
e
p
r
esen
t
w
o
r
k
tr
ie
s
to
f
i
n
d
n
o
d
e
d
is
j
o
in
t
p
ath
s
b
et
w
ee
n
th
e
s
en
d
er
an
d
r
ec
eiv
er
u
s
i
n
g
a
n
y
m
et
h
o
d
p
r
o
p
o
s
ed
b
y
v
ar
io
u
s
a
u
th
o
r
s
.
E
ac
h
s
u
cc
es
s
iv
e
p
ac
k
et
f
o
llo
w
s
d
if
f
er
en
t
r
o
u
tes.
W
h
en
all
th
e
elec
ted
p
ath
s
ar
e
u
s
ed
o
n
ce
,
ag
ain
t
h
e
s
u
cc
es
s
i
v
e
p
ac
k
et
s
s
tar
t
to
tr
a
n
s
m
it
t
h
r
o
u
g
h
th
e
s
el
ec
ted
p
ath
s
a
g
ai
n
i
n
r
a
n
d
o
m
.
Ass
u
m
e
t
h
er
e
ar
e
5
n
o
d
e
d
is
j
o
in
t
r
o
u
tes
b
et
w
ee
n
s
en
d
er
an
d
r
ec
ei
v
er
a
n
d
2
5
p
ac
k
ets
to
b
e
tr
an
s
m
itted
b
et
wee
n
t
h
e
m
.
O
n
l
y
5
p
ac
k
ets
ar
e
tr
an
s
m
it
ted
th
r
o
u
g
h
ea
ch
p
ath
,
t
h
at
to
o
in
r
an
d
o
m
(
h
er
e
an
d
t
h
er
e)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
3
,
J
u
n
e
2
0
1
7
:
1
1
9
7
–
1
2
0
3
1200
Repr
esenta
t
iv
e
No
t
a
t
i
o
ns
:
a.
S is
So
u
r
ce
b.
D
is
Desti
n
atio
n
c.
Set
o
f
No
d
e
Dis
j
o
in
t
P
ath
s
b
et
w
ee
n
s
o
u
r
ce
an
d
d
esti
n
atio
n
ar
e
d
en
o
ted
as
P
.
W
h
er
e
P
=
{
P
1
,
P
2
.
.
.
.
.
.
.
.
.
P
m
}
d.
m
is
to
tal
n
u
m
b
er
o
f
d
is
j
o
in
t p
ath
s
b
et
w
ee
n
S a
n
d
D
e.
m
is
al
s
o
u
s
ed
to
d
en
o
te
th
e
s
i
ze
o
f
an
ar
r
a
y
f.
R
is
a
n
ar
r
ay
to
s
to
r
e
th
e
h
i
s
to
r
y
o
f
p
ath
s
ta
k
e
n
b
y
d
ata.
T
o
im
p
le
m
e
n
t
t
h
i
s
id
ea
,
f
ir
s
t
t
h
e
to
tal
n
u
m
b
er
o
f
n
o
d
e
d
is
j
o
in
ts
p
at
h
s
b
et
w
ee
n
S
a
n
d
D
h
av
e
to
b
e
f
i
n
alize
d
(
Su
p
p
o
s
e
P
1
,
P
2
.
.
.
Pm
)
.
Ma
n
y
al
g
o
r
ith
m
s
ar
e
t
h
er
e
till
n
o
w
to
f
i
n
d
th
e
n
o
d
e
d
is
j
o
in
t
p
ath
s
.
Use
a
n
y
o
f
s
u
c
h
al
g
o
r
ith
m
to
d
eter
m
i
n
e
th
e
n
o
d
e
d
is
j
o
in
t
p
ath
s
.
Dec
lar
e
an
ar
r
a
y
at
th
e
s
o
u
r
ce
n
o
d
e
w
h
ic
h
is
o
f
s
ize
„
m
‟.
P
r
o
ce
s
s
o
f
s
endin
g
da
t
a
:
Sen
d
th
e
p
ac
k
et1
th
r
o
u
g
h
an
y
n
o
d
e
f
r
o
m
P
.
Fo
r
s
u
p
p
o
s
e
it
is
s
e
n
t
th
r
o
u
g
h
P3
.
T
h
en
s
to
r
e
P
3
in
R
,
w
h
er
e
R
is
a
n
y
d
ata
s
tr
u
ct
u
r
e
o
f
len
g
th
„
m
‟
.
Sen
d
t
h
e
n
e
x
t
p
ac
k
e
t
th
r
o
u
g
h
a
n
y
p
at
h
s
f
r
o
m
P
o
th
er
th
a
n
t
h
e
p
ath
s
s
t
o
r
ed
in
R
(
o
th
er
th
a
n
P
3
)
.
Sto
r
e
th
e
n
e
x
t
s
elec
ted
p
ath
in
R
.
R
ep
ea
t
th
i
s
p
r
o
ce
s
s
till
all
p
ac
k
ets
ar
e
s
en
t
o
r
R
is
f
u
ll.
I
f
all
p
ac
k
ets
ar
e
s
en
t
,
th
e
w
o
r
k
is
d
o
n
e
.
I
f
R
is
f
u
ll,
clea
r
its
m
e
m
o
r
y
an
d
s
tar
t th
e
p
r
o
ce
s
s
o
f
s
e
n
d
i
n
g
a
n
d
co
n
tin
u
e
t
ill t
h
e
co
m
p
lete
m
ess
a
g
e
is
s
e
n
t
.
I
f
all
th
e
p
ac
k
ets
p
ass
t
h
r
o
u
g
h
a
s
i
n
g
le
p
at
h
,
t
h
er
e
is
a
ch
a
n
ce
f
o
r
an
attac
k
er
i
n
t
h
is
r
o
u
te
to
g
e
t
all
th
e
in
f
o
r
m
a
tio
n
.
T
h
e
p
r
o
p
o
s
e
d
alg
o
r
ith
m
u
s
e
s
d
if
f
er
e
n
t
p
ath
s
f
o
r
d
ata
tr
an
s
m
i
s
s
io
n
to
ac
h
iev
e
s
ec
u
r
it
y
.
I
f
m
o
r
e
n
u
m
b
er
o
f
p
ath
s
ar
e
c
h
o
s
en
,
w
e
ca
n
s
en
d
t
h
e
p
ac
k
ets
t
h
r
o
u
g
h
al
l
o
f
th
e
m
.
T
h
en
t
h
e
p
er
s
o
n
at
an
y
n
o
d
e
ca
n
n
o
t
h
ea
r
to
th
e
co
m
p
lete
d
ata.
He
ca
n
g
et
o
n
l
y
f
e
w
p
ac
k
et
s
o
f
d
ata
an
d
th
at
to
o
in
r
a
n
d
o
m
.
No
de
Dis
j
o
int
Ra
nd
o
m
a
nd
O
pti
m
a
l P
a
t
hs
Se
lect
io
n a
lg
o
rit
h
m
(
NDRO
P
S
):
Ste
ps
:
1:
Set th
e
n
o
d
es
2:
Dete
r
m
i
n
e
t
h
e
s
e
n
d
er
n
o
d
e
an
d
d
esti
n
at
io
n
n
o
d
e
3:
F
in
d
o
u
t th
e
d
if
f
er
en
t
n
o
d
e
d
is
j
o
in
t p
ath
s
(
P
=P
1
,
P2
,
P
3
.
.
.
.
.
.
P
m
)
co
n
n
ec
tin
g
s
o
u
r
ce
an
d
d
esti
n
a
tio
n
4
:
Dec
lar
e
an
ar
r
ay
R
o
f
s
ize
„
m
‟
to
h
o
ld
th
e
h
i
s
to
r
y
o
f
r
o
u
te
s
u
s
ed
to
tr
an
s
m
it p
ac
k
ets.
5:
Sen
d
th
e
p
ac
k
et
f
r
o
m
a
n
y
p
ath
f
r
o
m
p
.
(
Ass
u
m
e
as
P
x
)
an
d
s
a
v
e
t
h
e
p
ath
a
s
t
h
e
f
ir
s
t
ele
m
e
n
t
o
f
th
e
ar
r
a
y
R.
6:
Se
lect
a
p
ath
f
r
o
m
P
(
A
s
s
u
m
e
P
y
)
to
s
en
d
th
e
s
u
cc
e
s
s
i
v
e
p
ac
k
et
an
d
b
ef
o
r
e
s
en
d
i
n
g
c
h
e
ck
th
e
h
is
to
r
y
.
7:
I
f
th
e
p
at
h
c
h
o
s
en
is
a
lr
ea
d
y
i
n
t
h
e
ar
r
a
y
,
ch
o
o
s
e
o
t
h
er
p
ath
ap
ar
t
f
r
o
m
t
h
e
p
ath
s
i
n
t
h
e
h
is
to
r
y
a
n
d
in
s
er
t
th
at
p
ath
a
s
a
n
e
x
t e
le
m
e
n
t o
f
t
h
e
h
i
s
to
r
y
a
r
r
a
y
.
8:
R
ep
ea
t Step
6
till
th
e
ar
r
ay
is
f
u
ll o
r
th
e
d
ata
p
ac
k
ets
ar
e
c
o
m
p
lete
l
y
s
en
t
.
9:
I
f
R
is
f
u
ll,
d
elete
all
t
h
e
co
n
ten
ts
o
f
t
h
e
ar
r
a
y
an
d
g
o
to
Step
5
.
9:
I
f
th
e
co
m
p
lete
d
ata
is
s
e
n
t
,
T
E
R
MI
NA
T
E
th
e
p
r
o
ce
s
s
.
W
h
en
v
ar
ied
p
ath
s
ar
e
u
s
ed
t
o
s
en
d
s
u
cc
e
s
s
i
v
e
d
ata
p
ac
k
et
s
,
n
o
p
er
s
o
n
at
an
y
n
o
d
e
o
f
n
et
w
o
r
k
ca
n
r
ea
d
th
e
d
ata
co
m
p
lete
l
y
.
B
y
t
h
is
m
an
y
M
ANE
T
attac
k
s
ca
n
b
e
p
r
ev
en
ted
.
A
p
ar
t
f
r
o
m
s
ec
u
r
it
y
,
lo
ad
b
alan
cin
g
,
r
eliab
le
p
ac
k
e
t
tr
a
n
s
m
i
s
s
io
n
,
h
a
n
d
li
n
g
lin
k
f
ail
u
r
es
ef
f
icien
tl
y
,
SE
C
U
R
I
T
Y
ca
n
al
s
o
b
e
ac
h
ie
v
ed
u
s
i
n
g
NDR
OP
S a
lg
o
r
ith
m
.
Usi
n
g
ND
R
OP
S a
lg
o
r
it
h
m
th
e
f
o
llo
w
in
g
attac
k
s
ca
n
b
e
p
r
ev
en
ted
ef
f
ec
t
iv
el
y
.
a.
B
lack
h
o
le
attac
k
: [
2
0
]
b.
B
y
za
n
ti
n
e
attac
k
:
[
5
]
c.
Data
P
ac
k
et
Dr
o
p
p
in
g
attac
k
: [
4
]
d.
E
av
es Dr
o
p
p
in
g
: [
5
]
e.
Fab
r
icatio
n
attac
k
:
[
2
0
]
f.
Gr
e
y
-
h
o
le
attac
k
: [
5
]
g.
Ma
n
in
t
h
e
m
id
d
le
attac
k
: [
4
]
h.
R
u
s
h
i
n
g
attac
k
: [
7
]
i.
Selectiv
e
Fo
r
w
ar
d
in
g
attac
k
: [
1
3
]
j.
W
o
r
m
h
o
le
attac
k
: [
6
]
etc.
8.
RE
SU
L
T
S
AND
DI
SCUS
SI
O
N
T
h
is
s
ec
tio
n
s
h
o
w
s
th
e
s
i
m
u
latio
n
o
f
M
A
NE
T
en
v
ir
o
n
m
e
n
t
an
d
th
e
ex
p
er
i
m
en
tal
r
esu
lts
o
f
th
e
p
r
o
p
o
s
ed
NDROP
S
m
eth
o
d
f
o
r
o
p
tim
al
p
at
h
s
e
lectio
n
.
T
h
en
,
th
e
p
r
o
p
o
s
ed
NDROP
S
r
o
u
tin
g
al
g
o
r
ith
m
is
an
al
y
ze
d
w
ith
t
h
e
attac
k
b
ase
d
NDROP
S
u
s
i
n
g
t
h
e
p
ar
a
m
et
r
ic
an
al
y
s
i
s
,
w
h
ich
h
a
s
b
ee
n
p
er
f
o
r
m
ed
b
ased
o
n
th
e
p
ac
k
et
d
r
o
p
p
r
o
b
ab
ilit
y
a
n
d
th
r
o
u
g
h
p
u
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
Tit
le
o
f m
a
n
u
s
crip
t is sh
o
r
t a
n
d
clea
r
,
imp
lies
r
esea
r
ch
r
esu
l
ts
(
F
i
r
s
t A
u
th
o
r
)
1201
8
.
1
.
Si
m
ula
t
io
n
Set
Up
I
n
th
is
p
ap
er
,
w
e
h
av
e
u
s
ed
MA
T
L
A
B
s
o
f
t
w
ar
e
to
p
er
f
o
r
m
t
h
e
s
i
m
u
la
tio
n
o
f
m
o
b
ile
ad
h
o
c
n
et
w
o
r
k
u
s
i
n
g
v
ar
io
u
s
n
u
m
b
er
s
o
f
n
o
d
es.
I
n
th
e
s
i
m
u
lat
io
n
,
th
e
M
A
NE
T
n
o
d
es
ar
e
f
ix
ed
in
t
h
e
ar
ea
o
f
1
5
0
m
x
1
5
0
m
.
T
h
en
,
th
e
p
er
f
o
r
m
a
n
ce
ev
al
u
at
io
n
is
d
o
n
e
b
ased
o
n
th
e
e
v
alu
atio
n
m
etr
ic
s
.
Fig
u
r
e
1
.
Si
m
u
latio
n
s
et
u
p
f
o
r
th
e
ND
R
OP
S
r
o
u
tin
g
al
g
o
r
ith
m
8
.
2
.
P
er
f
o
r
m
a
nce
E
v
a
lua
t
io
n
T
h
e
p
er
f
o
r
m
an
ce
is
e
v
alu
a
ted
b
ased
o
n
tw
o
d
if
f
er
e
n
t
m
etr
i
cs.
T
h
r
o
u
g
h
p
u
t
is
d
ef
i
n
ed
as
th
e
r
at
e
o
f
s
u
cc
e
s
s
f
u
l
d
ata
tr
an
s
m
is
s
io
n
w
it
h
r
e
s
p
ec
tiv
e
p
ar
tic
u
lar
ti
m
e.
P
ac
k
et
d
r
o
p
p
r
o
b
ab
ilit
y
is
u
s
ed
to
f
in
d
th
e
p
r
o
b
a
b
ilit
y
m
ea
s
u
r
e
ab
o
u
t
t
h
e
lo
s
s
o
f
p
ac
k
et
s
d
u
r
in
g
t
h
e
tr
an
s
m
i
s
s
io
n
.
8
.
2
.
1
.
P
er
f
o
rm
a
nce
E
v
a
lua
t
i
o
n ba
s
ed
o
n
T
hr
o
ug
hp
ut
T
h
e
th
r
o
u
g
h
p
u
t
a
n
al
y
s
is
o
f
th
e
p
r
o
p
o
s
ed
NDROP
S
r
o
u
tin
g
p
r
o
to
co
l
is
s
h
o
w
n
i
n
f
i
g
u
r
e
2
.
Her
e,
th
e
r
ate
o
f
s
u
cc
es
s
f
u
l
p
ac
k
et
d
eli
v
er
y
i
s
ca
lcu
lated
b
et
w
ee
n
th
e
t
w
o
r
o
u
ti
n
g
p
r
o
to
co
l
n
a
m
e
d
as
NDROP
S
an
d
NDROP
S
w
it
h
th
e
attac
k
er
n
o
d
es.
W
h
en
th
e
tr
a
n
s
m
is
s
io
n
t
i
m
e
o
f
d
ata
is
f
ix
ed
as
3
s
ec
o
n
d
s
,
th
e
t
h
r
o
u
g
h
p
u
t
f
o
r
th
e
NDR
OP
S
r
o
u
ti
n
g
a
lg
o
r
ith
m
o
b
tain
ed
as
0
.
97
.
A
t
th
e
s
a
m
e
ti
m
e,
th
e
th
r
o
u
g
h
p
u
t
v
al
u
e
o
f
th
e
NDR
OP
S
w
it
h
attac
k
n
o
d
e
is
ac
h
iev
ed
as
0
.
8
.
Fu
r
th
er
in
cr
ea
s
i
n
g
th
e
tr
an
s
m
i
s
s
io
n
ti
m
e
f
r
o
m
2
s
ec
o
n
d
s
to
6
s
ec
o
n
d
s
,
th
e
th
r
o
u
g
h
p
u
t
o
f
t
h
e
b
o
th
ND
R
OP
S
an
d
NDROP
S
w
it
h
attac
k
n
o
d
es
i
s
o
b
tain
ed
as
0
.
9
5
an
d
0
.
2
5
r
esp
ec
tiv
ely
.
B
asicall
y
,
th
e
attac
k
er
s
p
r
esen
t
in
th
e
r
o
u
tin
g
p
ath
ar
e
u
s
ed
to
r
ed
u
ce
th
e
th
r
o
u
g
h
p
u
t
v
al
u
e.
W
h
ile
f
i
x
in
g
th
e
tr
an
s
m
is
s
io
n
ti
m
e
as
8
s
ec
o
n
d
s
,
th
e
th
r
o
u
g
h
p
u
t
o
f
th
e
NDR
OP
S
p
r
o
to
co
l
an
d
th
e
NDRO
P
S
w
i
th
attac
k
n
o
d
es
is
m
ea
s
u
r
ed
as
0
.
6
7
an
d
0
.
2
1
r
esp
ec
tiv
el
y
.
Fro
m
t
h
e
ab
o
v
e
r
esu
lts
,
w
e
ca
n
s
a
y
t
h
e
p
r
o
p
o
s
ed
NDROP
S
tr
an
s
m
it t
h
e
n
u
m
b
er
o
f
d
ata
p
a
ck
ets
w
i
th
h
i
g
h
t
h
r
o
u
g
h
p
u
t.
Fig
u
r
e
2.
T
h
r
o
u
g
h
p
u
t
a
n
al
y
s
i
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
J
E
C
E
Vo
l.
7
,
No
.
3
,
J
u
n
e
2
0
1
7
:
1
1
9
7
–
1
2
0
3
1202
8
.
2
.
2
.
P
er
f
o
rm
a
nce
E
v
a
lua
t
i
o
n ba
s
ed
o
n
P
a
ck
et
dr
o
p
P
r
o
ba
bil
it
y
Fig
u
r
e
3
s
h
o
w
s
th
e
co
m
p
ar
is
o
n
r
esu
lt
o
f
b
o
th
NDROP
S
a
n
d
NDROP
S
w
ith
attac
k
n
o
d
es
b
ased
o
n
th
e
p
ac
k
et
d
r
o
p
p
r
o
b
a
b
ilit
y
.
A
t
f
ir
s
t,
th
e
e
v
alu
a
tio
n
o
f
th
e
p
ac
k
et
tr
an
s
m
i
s
s
io
n
is
d
o
n
e
w
it
h
o
u
t
u
s
in
g
a
n
y
attac
k
er
n
o
d
es.
Her
e,
th
e
p
ac
k
et
d
r
o
p
p
r
o
b
ab
ilit
y
o
f
t
h
e
p
r
o
p
o
s
ed
NDROP
S
p
r
o
to
co
l
i
s
ac
h
ie
v
ed
as
0
.
03
,
w
h
ile
f
i
x
i
n
g
th
e
ti
m
e
o
f
d
at
a
tr
an
s
m
i
s
s
io
n
is
3
s
ec
o
n
d
s
.
Me
an
w
h
ile,
t
h
e
p
ac
k
et
d
r
o
p
p
r
o
b
ab
ilit
y
o
f
t
h
e
NDROP
S
w
it
h
attac
k
n
o
d
es
i
s
o
b
tain
ed
as
0
.
2
.
W
h
en
th
e
t
r
an
s
m
is
s
io
n
ti
m
e
i
s
f
i
x
ed
as
6
,
th
e
p
ac
k
et
d
r
o
p
p
r
o
b
a
b
ilit
y
m
ea
s
u
r
e
m
en
t
o
f
th
e
NDROP
S
r
o
u
tin
g
p
r
o
to
co
l
i
s
ac
h
ie
v
ed
as
0
.
0
5
.
A
ls
o
,
th
e
th
r
o
u
g
h
p
u
t
v
al
u
e
o
f
th
e
ND
R
OP
S
w
it
h
att
ac
k
n
o
d
es
is
o
b
tain
ed
as
0
.
7
5
,
w
h
ic
h
is
h
ig
h
er
t
h
an
t
h
e
ND
R
OP
S
r
o
u
tin
g
p
r
o
to
co
l.
Fro
m
th
i
s
f
ig
u
r
e,
w
e
ca
n
co
n
clu
d
e
t
h
at
t
h
e
h
i
g
h
est
p
er
f
o
r
m
an
ce
i
s
ac
h
ie
v
ed
b
y
th
e
p
r
o
p
o
s
ed
NDROP
S
r
o
u
tin
g
p
r
o
to
co
l
w
i
th
o
u
t a
ttac
k
er
n
o
d
es.
Fig
u
r
e
3.
P
ac
k
et
d
r
o
p
p
r
o
b
ab
il
it
y
an
a
l
y
s
is
9.
CO
NCLU
SI
O
N
MA
NE
T
S
ar
e
w
id
el
y
p
r
e
f
er
ab
le
w
h
er
e
t
h
er
e
is
a
n
ee
d
f
o
r
m
o
b
ile
n
o
d
es
an
d
w
h
er
e
w
ir
ed
co
n
n
ec
ti
v
it
y
is
h
ar
d
to
estab
lis
h
.
T
h
ese
n
et
w
o
r
k
s
ar
e
v
er
y
m
u
c
h
p
r
o
n
e
to
s
ev
er
al
attac
k
s
d
u
e
to
th
e
lack
o
f
s
u
p
er
v
i
s
io
n
s
y
s
te
m
a
n
d
ad
d
itio
n
/d
eletio
n
o
f
n
o
d
es
in
n
et
w
o
r
k
.
D
y
n
a
m
ic
m
u
ltip
at
h
r
o
u
ti
n
g
a
n
d
n
o
d
e
d
is
j
o
in
t
r
o
u
tin
g
i
n
M
ANE
T
s
ar
e
u
s
e
f
u
l
to
b
alan
ce
lo
ad
,
b
alan
ce
r
es
o
u
r
ce
co
n
s
u
m
p
t
io
n
,
e
n
s
u
r
ed
t
r
an
s
m
is
s
io
n
o
f
d
ata
ev
en
in
l
in
k
f
ail
u
r
es.
T
h
e
No
d
e
Dis
j
o
in
t
R
a
n
d
o
m
a
n
d
Op
ti
m
al
P
ath
Selectio
n
(
NDROP
S)
alg
o
r
ith
m
i
s
n
e
w
l
y
p
r
o
p
o
s
ed
in
th
is
p
ap
er
to
ac
h
i
ev
e
all
t
h
e
ab
o
v
e
s
tated
g
o
als
alo
n
g
w
i
th
s
ec
u
r
it
y
.
T
h
e
co
n
c
ep
t
o
f
th
is
al
g
o
r
ith
m
is
attac
k
p
r
ev
e
n
tio
n
.
T
o
p
r
o
v
e
th
e
p
er
f
o
r
m
an
ce
o
f
t
h
e
p
r
o
p
o
s
ed
NDROP
S
alg
o
r
it
h
m
,
t
h
e
co
m
p
ar
is
o
n
is
m
ad
e
u
s
i
n
g
th
r
o
u
g
h
o
u
t
an
d
p
ac
k
et
d
r
o
p
p
r
o
b
ab
ilit
y
.
I
n
f
u
t
u
r
e,
th
is
w
o
r
k
ca
n
b
e
ex
te
n
d
ed
w
i
th
an
o
p
ti
m
iza
tio
n
alg
o
r
ith
m
to
p
r
o
v
id
e
th
e
r
o
b
u
s
tn
es
s
ag
ai
n
s
t v
ar
io
u
s
attac
k
in
g
s
ce
n
ar
io
s
.
RE
F
E
R
E
NC
E
S
[1
]
M
a
d
h
u
m
it
a
Ka
th
u
ria,
S
a
p
n
a
Ga
m
b
h
ir
,
"
Im
p
ro
v
e
m
e
n
t
o
f
Qu
a
li
ty
o
f
S
e
rv
ic
e
P
a
ra
m
e
ters
in
D
y
n
a
m
ic
a
n
d
He
tero
g
e
n
e
o
u
s
W
B
A
N"
,
In
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
In
f
o
rm
a
ti
c
s
(
IJ
EE
I)
,
v
o
l.
4
,
n
o
.
4
,
De
c
e
m
b
e
r
2
0
1
6
.
[2
]
Ka
z
e
e
m
B.
A
d
e
d
e
ji
,
A
k
in
lo
lu
A
.
P
o
n
n
le,
"
Im
p
ro
v
e
d
Im
a
g
e
En
c
r
y
p
ti
o
n
f
o
r
Re
a
l
-
T
i
m
e
A
p
p
li
c
a
ti
o
n
o
v
e
r
W
irele
s
s
Co
m
m
u
n
ica
ti
o
n
Ne
tw
o
rk
s
u
sin
g
H
y
b
rid
Cry
p
to
g
ra
p
h
y
T
e
c
h
n
iq
u
e
"
,
In
d
o
n
e
sia
n
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
E
n
g
i
n
e
e
rin
g
a
n
d
In
f
o
rm
a
ti
c
s (
IJ
EE
I)
,
v
o
l.
4
,
n
o
.
4
,
De
c
e
m
b
e
r
2
0
1
6
.
[3
]
Dr.
S
h
u
c
h
i
ta
Up
a
d
h
a
y
a
y
a
a
n
d
Ch
a
ru
G
a
n
d
h
i.
,
"
No
d
e
Dis
jo
i
n
t
M
u
lt
i
p
a
th
Ro
u
ti
n
g
Co
n
sid
e
ri
n
g
L
in
k
a
n
d
No
d
e
S
tab
il
it
y
p
ro
t
o
c
o
l:
A
c
h
a
ra
c
teristic
Ev
a
lu
a
ti
o
n
"
,
I
n
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
Iss
u
e
s
(IJ
CS
I)
,
v
o
l.
7
,
no.
1
,
N
o
.
2
.
2
0
1
0
.
[4
]
Zaib
a
Ish
ra
t,
“
S
e
c
u
rit
y
issu
e
s,
c
h
a
ll
e
n
g
e
s &
so
lu
ti
o
n
i
n
M
A
NET
”
,
IJ
CS
T
,
v
o
l.
2
,
n
o
.
4
,
2
0
1
1
.
[5
]
M
a
n
jee
t
S
in
g
h
G
a
g
a
n
p
re
e
t
Ka
u
r,
“
A
S
u
rv
e
y
s
o
f
A
tt
a
c
k
s
in
M
AN
ET
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
in
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
S
o
ft
w
a
r
e
En
g
i
n
e
e
rin
g
,
v
o
l.
3
,
n
o
.
6
,
2
0
1
3
.
[6
]
S
a
c
h
in
L
a
lar,
“
S
e
c
u
rit
y
in
M
A
NE
T
:
V
u
l
n
e
ra
b
il
it
ies
,
A
tt
a
c
k
s
&
S
o
lu
ti
o
n
s
”,
I
n
ter
n
a
t
io
n
a
l
J
o
u
r
n
a
l
o
f
M
u
lt
id
isc
ip
l
in
a
ry
a
n
d
C
u
rr
e
n
t
Re
se
a
rc
h
(
IJ
M
CR)
, v
o
l.
2
,
p
p
.
62
-
6
8
,
2
0
1
4
.
[7
]
G
o
d
w
in
P
o
n
sa
m
,
Dr.
R.
S
rin
iv
a
sa
n
,
“
A
S
u
rv
e
y
o
n
M
AN
ET
S
e
c
u
rit
y
Ch
a
ll
e
n
g
e
s,
A
t
tac
k
s
a
n
d
it
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
E
C
E
I
SS
N:
2
0
8
8
-
8708
Tit
le
o
f m
a
n
u
s
crip
t is sh
o
r
t a
n
d
clea
r
,
imp
lies
r
esea
r
ch
r
esu
l
ts
(
F
i
r
s
t A
u
th
o
r
)
1203
Co
u
n
term
e
a
su
re
s”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Eme
rg
in
g
T
re
n
d
s
&
T
e
c
h
n
o
lo
g
y
in
Co
mp
u
ter
S
c
ien
c
e
(
IJ
ET
T
CS
)
,
v
o
l.
3
,
n
o
.
1
,
2
0
1
4
.
[8
]
H.
Ya
n
g
,
H.
L
u
o
,
e
t
a
l.
,
“
S
e
c
u
rit
y
in
mo
b
il
e
a
d
h
o
c
n
e
tw
o
rk
s:
c
h
a
ll
e
n
g
e
s
a
n
d
so
lu
ti
o
n
s”
,
In
p
r
o
c
.
IEE
E
W
irele
s
s
Co
m
m
u
n
ica
ti
o
n
,
UCL
A
,
L
o
s
A
n
g
e
les
,
CA
,
US
A
,
v
o
l.
1
1
.
3
8
-
4
7
,
2
0
1
3
.
[9
]
S.
M
a
rti
,
T
.
J.
G
iu
li
,
K.
Lai,
M
.
Ba
k
e
r,
“
M
it
ig
a
ti
n
g
Ro
u
t
in
g
M
is
-
b
e
h
a
v
io
r
in
M
o
b
il
e
Ad
Ho
c
Ne
two
rk
s”
,
P
r
o
c
e
e
d
in
g
s
o
f
th
e
6
t
h
A
n
n
u
a
l
I
n
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
M
o
b
i
le
Co
m
p
u
ti
n
g
a
n
d
Ne
tw
o
rk
in
g
(M
o
-
b
iCo
m
‟0
0
)
p
p
.
2
5
5
-
2
6
5
,
2
0
0
0
.
[1
0
]
L
u
o
L
iu
,
L
a
u
rie
Cu
th
b
e
rt,
"
Qo
S
in
No
d
e
-
Disjo
in
t
Ro
u
ti
n
g
f
o
r
A
d
Ho
c
Ne
t
w
o
rk
s
"
,
I.
J
.
Co
mm
u
n
ic
a
ti
o
n
s
Ne
two
rk
a
n
d
S
y
ste
m S
c
ien
c
e
s
,
p
p.
1
-
1
0
3
,
2
0
0
8
.
[1
1
]
A.
M
o
n
ish
a
,
K.
V
ij
a
y
a
la
k
sh
m
i,
"
A
Re
li
a
b
le
No
d
e
-
Disjo
in
t
M
u
lt
i
p
a
t
h
Ro
u
ti
n
g
P
r
o
to
c
o
l
f
o
r
M
A
NE
T"
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
t
a
ti
o
n
a
l
E
n
g
i
n
e
e
rin
g
Res
e
a
rc
h
, v
o
l,
0
3
,
n
o
.
4
,
p
p
.
6
,
2
0
1
3
.
[1
2
]
Ja
y
sh
re
e
T
a
jn
e
,
V
e
e
n
a
G
u
lh
a
n
e
,
"
M
u
lt
ip
a
th
N
o
d
e
-
Disjo
in
t
R
o
u
ti
n
g
P
r
o
to
c
o
l
to
M
in
im
ize
En
d
T
o
En
d
De
lay
a
n
d
Ro
u
ti
n
g
Ov
e
rh
e
a
d
f
o
r
M
A
NE
Ts"
,
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
En
g
in
e
e
rin
g
Re
se
a
rc
h
a
n
d
Ap
p
li
c
a
ti
o
n
s
(
IJ
ER
A)
,
v
o
l.
3
,
n
o
.
4
,
p
p
.
1
6
9
1
-
1
6
9
8
,
2
0
1
3
.
[1
3
]
P
riy
a
n
k
a
G
o
y
a
l,
S
a
h
il
Ba
tra,
A
ji
t
S
in
g
h
,
“
A
L
it
e
ra
tu
re
Re
v
ie
w
o
f
S
e
c
u
rit
y
A
tt
a
c
k
in
M
o
b
il
e
A
d
-
h
o
c
Ne
tw
o
rk
s”
,
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
Ap
p
l
ica
ti
o
n
s
,
v
o
l.
9
,
n
o
.
1
2
,
2
0
1
3
.
[1
4
]
X
u
Yi,
Cu
i
M
e
i,
Ya
n
g
Wei,
X
a
n
Yin
,
“
A
No
d
e
d
isjo
in
t
M
u
lt
i
p
a
t
h
Ro
u
ti
n
g
in
M
o
b
il
e
A
d
h
o
c
Ne
tw
o
rk
s
”
,
IEE
E
,
2
0
1
1
.
[1
5
]
L
ian
g
Hu
a
n
g
,
F
u
b
a
o
W
a
n
g
,
G
u
o
q
ian
g
Ya
n
,
W
e
ij
u
n
Du
a
n
,
“
A
n
E
ff
icie
n
t
Dy
n
a
mic
Ro
u
te
Op
ti
miza
ti
o
n
Al
g
o
ri
th
m
fo
r
M
o
b
il
e
Ad
h
o
c
Ne
two
rk
s”
,
2
n
d
In
te
r
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
Ch
a
ll
e
n
g
e
s
in
En
v
iro
n
m
e
n
ta
l
S
c
ien
c
e
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
(CES
C
E
2
0
1
1
),
v
o
l.
1
1
,
p
a
rt
A
,
p
p
.
5
1
8
–
5
2
4
,
2
0
1
1
.
[1
6
]
S
.
S
h
a
r
o
n
Ra
n
j
in
i,
G
.
S
h
i
n
e
L
e
t
,
“
S
e
c
u
rit
y
-
E
ff
icie
n
t
Ro
u
ti
n
g
F
o
r
Hig
h
ly
D
y
n
a
m
ic
M
A
NE
T
S
“
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
a
n
d
A
d
v
a
n
c
e
d
T
e
c
h
n
o
l
o
g
y
(
IJ
EA
T
)
,
v
o
l
2
,
n
o
.
4
,
2
0
1
3
.
[1
7
]
Ra
ji
n
d
e
r
S
in
g
h
,
P
a
rv
in
d
e
r
S
i
n
g
h
,
M
a
n
o
j
Du
h
a
n
,
"
A
n
e
ff
e
c
ti
v
e
im
p
le
m
e
n
tatio
n
o
f
se
c
u
rit
y
b
a
s
e
d
a
lg
o
rit
h
m
ic
a
p
p
ro
a
c
h
in
m
o
b
il
e
a
d
h
o
c
n
e
tw
o
rk
s”
,
Hu
m
a
n
-
c
e
n
tri
c
Co
m
p
u
ti
n
g
a
n
d
I
n
f
o
rm
a
ti
o
n
S
c
ien
c
e
s,
2
0
1
4
.
[1
8
]
S.
-
J.
L
e
e
a
n
d
M
.
G
e
rla,
"
AODV
-
BR
:
Ba
c
k
u
p
Ro
u
ti
n
g
i
n
Ad
h
o
c
Ne
two
rk
s"
,
In
P
r
o
c
e
e
d
in
g
s
o
f
IEE
E
W
CNC
2
0
0
0
,
Ch
ica
g
o
,
IL
,
S
e
p
.
2
0
0
0
.
[1
9
]
M
a
rin
a
,
M
.
K.,
“
On
-
d
e
m
a
n
d
m
u
lt
ip
a
th
d
istan
c
e
v
e
c
to
r
ro
u
ti
n
g
i
n
a
d
h
o
c
n
e
tw
o
rk
s”
,
Ne
two
rk
Pr
o
to
c
o
ls,
IEE
E
,
p
p
.
1
4
–
2
3
,
2
0
0
1
.
[2
0
]
P
a
n
k
a
ji
n
i
P
a
n
d
a
,
Kh
it
ish
Ku
.
G
a
d
n
a
y
a
k
,
Nira
n
jan
P
a
n
d
a
,
“
M
A
NE
T
A
tt
a
c
k
s
a
n
d
th
e
ir
Co
u
n
term
e
a
su
re
s:
A
S
u
rv
e
y
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ter
S
c
ien
c
e
a
n
d
M
o
b
il
e
C
o
mp
u
t
in
g
(
IJ
CS
M
C)
,
v
o
l.
2
,
n
o
.
1
1
,
p
p
.
3
1
9
-
3
3
0
,
2
0
1
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.