<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232012000600006</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[An Effective Capacity Estimation Scheme in IEEE802.11-based Ad Hoc Networks]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hasan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mahmud]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,University of Strathclyde Department of Electronic and Electrical Engineering ]]></institution>
<addr-line><![CDATA[ Glasgow]]></addr-line>
<country>UK</country>
</aff>
<aff id="A02">
<institution><![CDATA[,University of Engineering and Technology Department of Computer Systems Engineering ]]></institution>
<addr-line><![CDATA[Peshawar ]]></addr-line>
<country>Pakistan</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2012</year>
</pub-date>
<volume>10</volume>
<numero>6</numero>
<fpage>865</fpage>
<lpage>870</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232012000600006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232012000600006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232012000600006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Capacity estimation is a key component of any admission control scheme required to support quality of service provision in mobile ad hoc networks. A range of schemes have been previously proposed to estimate residual capacity that is derived from window-based measurements of channel estimation. In this paper a simple and improved mechanism to estimate residual capacity in IEEE802.11-based ad hoc networks is presented. The scheme proposes the use of a &#8216;forgiveness&#8217; factor to weight these previous measurements and is shown through simulation-based evaluation to provide accurate utilizations estimation and improved residual capacity based admission control.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[admission control]]></kwd>
<kwd lng="en"><![CDATA[capacity estimation]]></kwd>
<kwd lng="en"><![CDATA[mobile ad hoc networks]]></kwd>
<kwd lng="en"><![CDATA[quality of service]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>An Effective Capacity Estimation Scheme in IEEE802.11&#45;based Ad Hoc Networks</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>H. Zafar*<sup>1,2</sup>, D. Harle<sup>1</sup>, I. Andonovic<sup>1</sup>, L. Hasan<sup>2</sup>, S. Mahmud<sup>2</sup></b></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><sup>1</sup> <i>Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, UK.</i></font></p>  	    <p align="justify"><font face="verdana" size="2"><sup>2</sup><i> Department of Computer Systems Engineering and Department of Electrical Engineering, University of Engineering and Technology, Peshawar, Pakistan.</i> *<a href="mailto:haseeb@nwfpuet.edu.pk">haseeb@nwfpuet.edu.pk</a>.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>ABSTRACT</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Capacity estimation is a key component of any admission control scheme required to support quality of service provision in mobile ad hoc networks. A range of schemes have been previously proposed to estimate residual capacity that is derived from window&#45;based measurements of channel estimation. In this paper a simple and improved mechanism to estimate residual capacity in IEEE802.11&#45;based ad hoc networks is presented. The scheme proposes the use of a &lsquo;forgiveness&rsquo; factor to weight these previous measurements and is shown through simulation&#45;based evaluation to provide accurate utilizations estimation and improved residual capacity based admission control.</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Keywords:</b> admission control, capacity estimation, mobile ad hoc networks, quality of service.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/jart/v10n6/v10n6a6.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b><i>References</i></b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; H. Zafar, M. Zuhairi, D. Harle and I. Andonovic, "A Survey of Quality of Service&#45;aware Routing Approaches for Mobile Ad Hoc Networks", <i>IETE Technical Review</i>, vol. 29, no. 3, May&#45;June 2012, pp. 188&#45;195.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834399&pid=S1665-6423201200060000600001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; L. Chen, W.B. Heinzelman, "QoS&#45;Aware Routing Based on Bandwidth Estimation for Mobile Ad hoc Networks", <i>IEEE Journal on Selected Areas in Communications</i>, vol. 23, no. 3, March 2005, pp. 561&#45;572.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834401&pid=S1665-6423201200060000600002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; Y. Yang, R. Kravets, "Contention&#45;aware admission control for ad hoc networks", <i>IEEE Transactions on Mobile Computing,</i> vol. 4, no. 4, August 2005, pp. 363&#45;377.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834403&pid=S1665-6423201200060000600003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; I.D. Chakeres, E.M. Belding&#45;Royer, J.P. Macker, "Perceptive Admission Control for Wireless Network Quality of Service", <i>Elsevier Ad hoc Networks</i>, vol. 5, no. 7, September 2007, pp. 1129&#45;1148.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834405&pid=S1665-6423201200060000600004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; L. Hanzo (II.), R. Tafazolli, "Admission Control Schemes for 802.11&#45;based Multi&#45;hop Mobile Ad Hoc Networks: a Survey", <i>IEEE Communications Surveys and Tutorials</i>, vol. 11, no. 4, Fourth Quarter 2009, pp. 78&#45;108.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834407&pid=S1665-6423201200060000600005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; "IEEE Standard for Information technology&#45;Telecommunications and information exchange between systems&#45;Local and metropolitan area networks&#45;Specific requirements &#45; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications", <i>IEEE 802.11</i>, June 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834409&pid=S1665-6423201200060000600006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; R. Prasad, M. Murray, C. Dovrolis, K. Claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", <i>IEEE Network</i>, vol. 17, no. 6, 2003, pp. 27&#45;35.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834411&pid=S1665-6423201200060000600007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; H. Zafar, D. Harle, I. Andonovic, L. Hasan, A. Khattak, "QoS&#45;aware Multipath Routing Scheme for Mobile Ad Hoc Networks", <i>International Journal of Communication Networks and Information Security</i>, vol. 4, no. 1, April 2012, pp. 1&#45;10.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834413&pid=S1665-6423201200060000600008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; H. Zafar, S. Mahmud, D. Harle, I. Andonovic, "QoS&#45;Aware Routing Based on Capacity Estimation for Mobile Ad Hoc Networks", <i>Proc. IEEE Wireless Advanced</i>, London, UK, June 2011, pp. 258&#45;262.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834415&pid=S1665-6423201200060000600009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; I. Glover; P. Grant, <i>Digital Communications 2/e</i>, Pearson Ltd., 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834417&pid=S1665-6423201200060000600010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; H. Zafar, D. Harle, I. Andonovic, Y. Khawaja, "Performance Evaluation of Shortest Multipath Source Routing Scheme", <i>IET Communications</i>, vol. 3, no. 5, May 2009, pp. 700&#45;713.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834419&pid=S1665-6423201200060000600011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; The Network Simulator 2.33 (NS&#45;2.33), <a href="http://www.isi.edu/nsnam/ns" target="_blank">http://www.isi.edu/nsnam/ns</a>/</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834421&pid=S1665-6423201200060000600012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; J. Jun, P. Peddabachagari, M. Sichitiu, "Theoretical Maximum Throughput of IEEE 802.11 and its Applications", <i>Proc. 2nd IEEE International Symposium on Network computing and Applications</i>, Cambridge, USA, April 2003, pp. 249&#45;256.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834422&pid=S1665-6423201200060000600013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; M.K. Nakayama, "Statistical analysis of simulation output", <i>Proc. Winter Simulation Conference</i>, 2008, pp. 62&#45;72.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834424&pid=S1665-6423201200060000600014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; H. Zafar, M. Zuhairi, D. Harle and I. Andonovic, "A Review of Techniques for the Analysis of Simulation Output", <i>IETE Technical Review</i>, vol. 29, no. 3, May&#45;June 2012, pp. 223&#45;228.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4834426&pid=S1665-6423201200060000600015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zuhairi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Survey of Quality of Service-aware Routing Approaches for Mobile Ad Hoc Networks]]></article-title>
<source><![CDATA[IETE Technical Review]]></source>
<year>May-</year>
<month>Ju</month>
<day>ne</day>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>188-195</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Heinzelman]]></surname>
<given-names><![CDATA[W.B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad hoc Networks]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>Marc</year>
<month>h </month>
<day>20</day>
<volume>23</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>561-572</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Kravets]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Contention-aware admission control for ad hoc networks]]></article-title>
<source><![CDATA[IEEE Transactions on Mobile Computing]]></source>
<year>Augu</year>
<month>st</month>
<day> 2</day>
<volume>4</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>363-377</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakeres]]></surname>
<given-names><![CDATA[I.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Belding-Royer]]></surname>
<given-names><![CDATA[E.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Macker]]></surname>
<given-names><![CDATA[J.P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Perceptive Admission Control for Wireless Network Quality of Service]]></article-title>
<source><![CDATA[Elsevier Ad hoc Networks]]></source>
<year>Sept</year>
<month>em</month>
<day>be</day>
<volume>5</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1129-1148</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hanzo (II.)]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Tafazolli]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Admission Control Schemes for 802.11-based Multi-hop Mobile Ad Hoc Networks: a Survey]]></article-title>
<source><![CDATA[IEEE Communications Surveys and Tutorials]]></source>
<year>2009</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>78-108</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<article-title xml:lang="en"><![CDATA[IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications]]></article-title>
<source><![CDATA[IEEE 802.11]]></source>
<year>June</year>
<month> 2</month>
<day>00</day>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prasad]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Murray]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dovrolis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Claffy]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Bandwidth estimation: metrics, measurement techniques, and tools]]></article-title>
<source><![CDATA[IEEE Network]]></source>
<year>2003</year>
<volume>17</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>27-35</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Khattak]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks]]></article-title>
<source><![CDATA[International Journal of Communication Networks and Information Security]]></source>
<year>Apri</year>
<month>l </month>
<day>20</day>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahmud]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[QoS-Aware Routing Based on Capacity Estimation for Mobile Ad Hoc Networks]]></article-title>
<source><![CDATA[Proc. IEEE Wireless Advanced]]></source>
<year>June</year>
<month> 2</month>
<day>01</day>
<page-range>258-262</page-range><publisher-loc><![CDATA[London ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glover]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Grant]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Communications]]></source>
<year>2004</year>
<edition>2</edition>
<publisher-name><![CDATA[Pearson Ltd.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Khawaja]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Performance Evaluation of Shortest Multipath Source Routing Scheme]]></article-title>
<source><![CDATA[IET Communications]]></source>
<year>May </year>
<month>20</month>
<day>09</day>
<volume>3</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>700-713</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<source><![CDATA[The Network Simulator 2.33 (NS-2.33)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jun]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Peddabachagari]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sichitiu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Theoretical Maximum Throughput of IEEE 802.11 and its Applications]]></article-title>
<source><![CDATA[Proc. 2nd IEEE International Symposium on Network computing and Applications]]></source>
<year>Apri</year>
<month>l </month>
<day>20</day>
<page-range>249-256</page-range><publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nakayama]]></surname>
<given-names><![CDATA[M.K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Statistical analysis of simulation output]]></article-title>
<source><![CDATA[Proc. Winter Simulation Conference]]></source>
<year>2008</year>
<page-range>62-72</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zafar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zuhairi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Harle]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Andonovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Review of Techniques for the Analysis of Simulation Output]]></article-title>
<source><![CDATA[IETE Technical Review]]></source>
<year>May-</year>
<month>Ju</month>
<day>ne</day>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>223-228</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
