We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Simulation & Performance Evaluation of Aodv Protocol with Qos

essay
The whole doc is available only for registered users
  • Pages: 17
  • Word count: 4068
  • Category: Computers

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Abstract: Ad hoc mobile networking is a current active research area. They can be used in agriculture for monitoring and control of environmental parameters in the form of wireless sensor networks. The aim of this paper is performance evaluation of protocol of these Ad hoc networks i.e. QoS-enabled AODV protocol. The performance evaluation is done by means of its comparison with normal AODV protocol. QoS stands for Quality of Service. The research proposed some enhancements to the AODV protocol to provide QoS by adding extensions to Route Discovery messages, related to bandwidth estimation. This paper focuses on three of the parameters namely Traffic Rate, Speed of nodes & Pause Time of mobile nodes. For evaluation purpose the performance metrics used are Average end-to end Delay, Packet Delivery Ratio (PDR), Normalized Overhead Load (NOL) and Throughput. Performance of the AODV protocol for QoS as well as Non-QoS is evaluated with respect to these parameters.

Keywords: Ad hoc, AODV, Bandwidth Estimation

I. INTRODUCTION

In an Ad hoc mobile network, every node in the network carries its own router with it, and all nodes cooperate in carrying traffic. The whole philosophy of the Ad hoc networking model is a radical departure from the highly structured and frequently hierarchical models employed for both local area and wide area networking, currently in use. The range of possible situations in which Ad hoc networking can be exploited is huge. What mature and robust Ad hoc networking offers is virtually universal connectivity, limited only by the link performance and routing delays of the participating nodes, and their connectivity to the established fixed network. As shown in Fig.1 Ad hoc networks are well within the bounds of today’s technology, provided that suitable Ad hoc routing protocols exist and are implemented.

Fig. 1. Ad-hoc Networking
Static networks mostly use either Distance Vector (DV) or Link State (LS) routing algorithms, neither of which are spectacularly well suited to highly dynamic topologies. In a highly dynamic wireless network, such protocols run into a number of difficulties: ‱ topologies may be highly redundant, with some nodes being in the situation of being able to connect to a very large number of neighbors, while others see very few neighbors. ‱ bandwidth is scarce and cannot be wasted.

‱ battery power on portable equipment is a finite resource that cannot be wasted. ‱ high rates of topology change require high update rates.

A. Routing Models

Routing models can also be divided in following ways:
1) Proactive Routing
2) Reactive Routing
3) Hybrid Routing
This paper focuses on three of the parameters namely traffic rate, speed & pause time of mobile nodes. For evaluation purpose the performance metrics used are average end-to end delay, packet delivery ratio (PDR), normalized overhead load (NOL) and throughput. Evaluate the AODV protocol for QoS as well as Non-QoS is done with three of the parameters & four performance
metrics by means of graphical representation of their interrelations.

B. AODV Protocol Overview

AODV routing protocol is an on-demand reactive routing protocol that uses routing tables with one entry per destination. When a source node needs to find a route to a destination, it starts a route discovery process, based on flooding, to locate the destination node, as shown in Fig. 2.

Fig. 2. Route Discovery Cycle
Upon receiving a route request (RREQ) packet, intermediate nodes update their routing tables for a reverse route to the source. Similarly, the forward route to the destination is updated upon reception of a route reply (RREP) packet originated either by the destination itself or any other intermediate node that has a current route to the destination. The AODV protocol uses sequence numbers to determine timelines of each packet and to prevent the creation of loops. Expiry timers are used to keep the route entries updated. Link failures are propagated by a route error (RERR) message from a broken link to the source node of the corresponding route. When the next hop link breaks, RERR packets are sent by the starting node of the link to a set of n the destination.

C. AODV and QoS-AODV

The Ad hoc On Demand Distance Vector (AODV) protocol is proposed by Perkins. The research focuses on enhancement in performance of normal AODV protocol by improving the QoS. The various QoS parameters can be stated as bandwidth, cost, end-to-end delay, delay variation (jitter), throughput, probability of packet loss, battery charge, processing power etc. Various Performance metrics are to be studied for Performance evaluation of QoS-enabled AODV protocol. Research is going on towards Performance Improvement by emphasizing any of these parameters. This research considers the Bandwidth parameters so as to improve QoS.

II. IMPLEMENTATION

The implementation section discusses how AODV protocol was implemented and analyzed for the comparison. This includes the platform i.e. Fedora and the tools such as ns2 (Network Simulator version 2), NAM (Network Animator) and Gnuplot. Then the core implementation is discussed.

A. Need of Fedora

All simulation, implementation and analysis work was done on Linux. The flavor of Linux used for this purpose was Fedora. The reason for choosing this specific operating system for research work is that, it is one of the most stable and robust platforms around. Secondly Linux systems provide more security than others and security is a very essential element in network environments. Since the platform provides the basis for doing everything, therefore it becomes essential to discuss some core features of this platform.

B. Network Simulator ns2

After setting up the platform, software named ns2 was set up on it which was used for all the analysis and simulation work apart from other tools used. ns2 is the de facto standard for network simulation. Its behavior is highly trusted within the networking community. It is developed at ISI, California, and is supported by the DARPA and NSF.

C. Core Implementation

1) Basic Protocol Simulation: This section discusses how the AODV protocol was simulated and implemented. First the platform i.e. Fedora 8 was set up in a virtual environment. Then ns2 was set up on the platform on which the above said protocols were implemented. ns2 requires a script file to be run on it. These script files are written in a language called TCL (Tool Command Language). We have made use of shell scripting & Gnuplot for plotting of graphs. 2) QoS-Enabled Protocol Simulation: In this research a quality of service (QoS) architecture for supporting real-time data transmission in mobile Ad hoc networks (MANETs) is explored. The QoS architecture includes a QoS transport layer, QoS routing, queue management and a priority MAC protocol. Through simulations, it is found that the QoS architecture reduces packet loss and greatly improves the resource utilization in MANETs. 3)QoS architecture: Figure 3 shows proposed QoS architecture, which includes all networking layers from the application layer to the MAC layer. The bold lines indicate the flow of data packets and the narrow lines indicate the flow of control packets.

B. Bandwidth Estimation

In a distributed Ad hoc network, a host’s available bandwidth is not only decided by the raw channel bandwidth, but also by its neighbor’s bandwidth usage and interference caused by other sources, each of which reduces a host’s available bandwidth for transmitting data. Therefore, applications cannot properly optimize their coding rate without knowledge of the status of the entire network. Thus, bandwidth estimation is a fundamental function that is needed to provide QoS in MANETs. Bandwidth estimation can be performed in several different network layers, as shown in Fig. 3.

Fig. 3: QoS Architecture
|.Type |Reserved |Hop Count | |Broadcast ID | |Destination IP Address | |Destination Sequence Number | |Source IP Address | |Source Sequence Number | |Request Time |

Fig. 4. RREQ Message Format before QoS-Enabling

|Type |Reserved |Hop Count | |Bandwidth Required | |Broadcast ID | |Destination IP Address | |Destination Sequence Number | |Source IP Address | |Source Sequence Number | |Request Time |

Fig. 5. RREQ Message Format after QoS-Enabling

In this research, I tried to improve QoS with major focus on Bandwidth parameter. Fig. 4 & 5 shows RREQ message format before and after QoS enabling. in AODV protocol. For enhancing performance of the basic protocol one more field named “Bandwidth Required” is added in the given RREQ format. This RREQ packet is used to store the information of bandwidth required field & then used to compare it with the current requirement. And, the packet is forwarded to the next intermediate node only when it does have sufficient amount of bandwidth otherwise it is dropped & then it is re-transmitted when favorable condition present.

III. TEST PROCEDURE

A. Performance Analysis

The performance analysis has been done on Fedora 8 as the operating system. ns 2.34 was installed on the platform for simulating the protocols along with necessary software such as GnuPlot, which is software for plotting graphs from the trace files. ns (version 2) is an object oriented, discrete event driven network simulator written in C++ and Otcl.

B. Basic Protocol Simulation

This section discusses how the AODV protocol was simulated and implemented. First the platform i.e. Fedora 8 was set up in a virtual environment. Then ns2 was set up on the platform on which the above said protocols were implemented. ns2 requires a script file to be run on it. These script files are written in a language called TCL (Tool Command Language). We have make use of shell scripting & Gnuplot for plotting of graphs. Some of the basic code to write script files is given below: ‱ ns2 simulation starts with this command:

set ns [new Simulator]
Creating output files (trace files or NAM files)
#Open the trace file
set file1 [open out.tr w]
$ns trace-all $file1
#Open the NAM trace file
set file2 [open out.nam w]
$ns namtrace-all $file2
‱ The termination of the program is done as follows:
#Define a ‘finish’ procedure
proc finish {} {
global ns file1 file2
$ns flush-trace
#Close the trace file
close $file1
close $file2
#Execute NAM on the trace file
exec nam out.nam &
exit 0
}
‱ At the end of the ns2 program, a “finish” procedure is called which specifies the time at which the termination should occur. e.g. $ns at 125.0 “finish”
Definition of a node:
set n0 [$ns node]
Definition of a link:
$ns duplex-link $n0 $n2 10 Mb 10 ms DropTail
‱ A small program using the above commands and simulating a UDP link between two nodes is given below: set ns [new Simulator]
set nf [open out.nam w]
$ns namtrace-all $nf
proc finish {}
{
global ns nf
$ns flush-trace
close $nf
exec nam –a out.nam &
exit 0
}
#Create two nodes
set n0 [$ns node]
set n1 [$ns node]
$ns duplex-link $n0 $n1 1Mb 10ms DropTail
#Create a UDP agent and attach it to node n0
set udp0 [new Agent/UDP]
$ns attach-agent $n0 $udp0

#Create a CBR traffic source and attach it to udp0 set cbr0 [new Application/Traffic/CBR]
$cbr0 set packetSize_ 500
$cbr0 set interval_ 0.005
$cbr0 attach-agent $udp0
#Create a Null agent (a traffic sink) and attach it to node n1 set null0 [new Agent/Null]
$ns attach-agent $n1 $null0
#Connect the traffic source with the traffic sink
$ns connect $udp0 $null0
#Schedule events for the CBR agent
$ns at 0.5 “$cbr0 start”
$ns at 4.5 “$cbr0 stop”
#Call the finish procedure after 5 seconds of simulation time $ns at 5.0 “finish”
#Run the simulation
$ns run

C. Performance Metrics used for Analysis

The following metrics were used for the comparison of the protocols: 1) Throughput: This is the effective share of bandwidth that the application is getting from the network. 2) Bandwidth: This signifies the portion of the available capacity of an end-to-end network path that is accessible to the application or data flow. Consequently, the number of bits that are injected into the network by the various flows of an application have to be adjusted accordingly. 3) Average Packet Delay: It is average packet delivery time from a source to a destination. First for each source-destination pair, an average delay for packet delivery is computed. Then the whole average delay is computed from each pair average delay. 4) Packet Delivery Ratio: It is a ratio of number of data packets delivered to the destination and the number of data packets sent by the source or number of data packets delivered over number of data packets generated. Number of data packets delivered is the total number of received data packets by destinations. 5) Network Overhead Load: It is the ratio of total amount of overhead caused due to control routing packets and the amount of wireless bandwidth wasted to transmit the packets that are dropped in other links.

IV. RESULTS & ANALYSIS

A. Traffic Environment

The tests were performed on CBR traffic with 50 nodes. Packet size was set to 500 and the time interval between transferring the packets was set to 0.005 ms. Bit rate was set to 1 Mbps with a Drop Tail of 10 ms. As it is not easy to create traffic simulations for such large number of nodes manually, therefore the simulations were generated with the help of CMU traffic generator and the scenario was generated with the help of setdest, which are the tools preinstalled with the ns2. The field configuration was set to 500 by 500 m. Accordingly, with the help of three of the parameters & four performance metrics, 12 graphs are generated and are used for evaluation of AODV protocol for QoS as well as Non-QoS. It is clear from Fig. 6 that for data rates above 600 kbps, the average delay suffered by packets is very less for QAODV in comparison with AODV. For low data rates delay suffered is approximately similar for both AODV and QAODV.

The reason behind better performance of AODV is that it blocks the packet at source itself as soon as QoS criteria of path is lost which results in less contention in common intermediate sub-paths of different flows. As shown in Fig. 7, each Pause time, the average packet delay suffered by QAODV is approximately 40-60 ms less than that suffered by AODV. For both AODV and QAODV, minimum delay is achieved when pause time of the nodes is 6 seconds. For each value of speed, the average packet delay suffered by QAODV is very less than that suffered by AODV, as can be seen in Fig. 8. For both AODV and QAODV, minimum delay is achieved when moving speed of the nodes is 4 m/s. Figure 9 shows NOL versus CBR. The overhead of using QAODV is higher than the overhead of AODV at each data rate. The overhead values of both AODV and QAODV decrease with the increase in traffic data rate. It is difficult to explain the reason behind huge increase in the overhead value of QAODV when traffic data rate is 1200kbps. Figure 10 shows NOL versus Pause Time. The overhead of using QAODV is higher than the overhead of AODV at each pause time value. The overhead values of AODV are approximately same at different pause time values. It is difficult to explain the reason behind huge increase in the overhead value of QODV when pause time is set to 12 seconds.

Fig. 6. Average Packet Delay versus CBR

Fig. 7. Average Packet Delay versus Pause Time

Fig. 8. Average Packet Delay versus Speed of Nodes

Fig. 9. NOL versus CBR

Fig. 10. NOL versus Pause Time

Figure 11 shows NOL versus Speed of Nodes. The overhead of using QAODV is higher than the overhead of AODV at each moving speed value. The overhead values of AODV are approximately same at different speed values. Figure 12 shows Packet Delivery Ratio versus Pause Time. Here the data rate is set to 2000kbs and PDR value of QAODV is less than that of AODV at every pause time value. Figure 13 shows Packet Delivery Ratio versus Speed of Nodes. Here the data rate is set to 2000kbs and PDR value of QAODV is less than that of AODV at every speed value.

Fig. 11. NOL versus Speed of Nodes

Fig. 12. Packet Delivery Ratio versus Pause Time

Fig. 13. Packet Delivery Ratio versus Speed of Nodes

Figure 14 shows Throughput versus CBR. At low data rates throughput achieved by QAODV is approximately similar to that achieved by AODV. When the QoS (bandwidth) demand is high, it is difficult to find QoS satisfying path for the flows. Therefore QAODV blocks the packets at source itself with results in decrease in the throughput at the data rates higher than 1200 kbps. Figure 15 shows Throughput versus Pause Time. Here the data rate is set to 2000kbs and QAODV’s throughput is less than AODV’s throughput. For both AODV and QAODV, Throughput achieved is highest when pause time is 4 seconds. Figure 16 shows Throughput versus Speed of Nodes. Here the data rate is set to 2000kbs and QAODV’s throughput is less than AODV’s throughput. For both AODV and QAODV, Throughput achieved is highest when speed is 4 m/s. There is sudden decrease in throughput for both AODV and QAODV when speed is 8 m/s. Throughput achieved by AODV and QAODV does not vary much for the speed values greater than 12m/s.

Fig. 14. Throughput versus CBR

Fig. 15. Throughput versus Pause Time

Fig. 16. Throughput versus Speed of Nodes

V. CONCLUSION

In this research, I presented the QoS (Quality of Service) enabled AODV protocol. Firstly, I have simulated the basic protocol using ns2. Then using Gnuplot, the twelve graphs are generated with three varying scenarios for simulation used are 1) Speed of Nodes, 2) Traffic Rate, 3) Pause Time or Mobility & the performance metrics used are 1) PDR, 2) NOL, 3) Average packet delay, 4) Throughput. Then, the QoS of basic protocol is improved & again graphs are generated. Finally, the comparison of the Non-QoS and QoS-enabled protocol is carried out. The result shows the improvement in routing of data from source to destination. By observing the graphs generated, following points can be concluded: 1) Average Packet Delay is reduced in QAODV as compared to basic AODV protocol. 2) As we are making use of Hello Messages to read the bandwidth, the Network Overhead Load is increased to some extend in QAODV as compared to AODV. 3) Average throughput and Packet Delivery Ratio of QAODV are moderately same as AODV Protocol.

REFERENCES

[1] Ismail Ari, Neelu Jethani, Aniruddha Rangnekar, Sushma Natarajan, “Performance analysis and comparison of Ah hoc routing protocols”, CMSC 691T, Mobile Computing, project report May, 22, 2000 [2] Lei Chen and Wendi Heinzelman, “Network architecture to support QoS in mobile Ad hoc networks”, 2005. [3] Chonggun Kim, Elmurod Talipov, and Byoungchul Ahn, “A reverse AODV routing protocol in Ad hoc mobile networks”, 2006. [4] Chonggun Kim, Elmurod Talipov, Byoungchul Ahn, “A Reverse AODV Routing Protocol in Ad hoc Mobile Networks”, EUC Workshops 2006, LNCS 4097, pp. 522 – 531, 2006.© IFIP International Federation for Information Processing 2006 [5] Habib-ur Rehman, Lars Wolf, “Performance enhancement in AODV with accessibility prediction”, Institute of Operating Systems and Computer Networks (IBR), Technische UniversitĂ€t at Braunschweig, Germany, 1-4244-1455-5/07©2007 IEEE [6] Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wolff, Shen Wan, Neeraj Gurdasani and Doug Galarus, “QoS enhancement and performance evaluation of Ad-hoc routing protocols for rural public safety”, 2007. [7] E. Ahvar, and M. Fathy, “Performance evaluation of routing protocols for high density Ad hoc networks based on Qos by GlomoSim simulator”, 2007. [8] Hang Shen, Guangwei Bai, Junyuan Wang, Yong Jin, Jinjing Tao, “Performance study of a cross-layer based multipath routing protocol for IEEE 802.11e mobile Ad hoc networks”, I. J. Communications, Network and System Sciences, 2008, 4, 285-385. [9] Natalia Vassileva, Francisco Barcelo-Arroyo, “A survey of routing protocols for energy constrained Ad hoc wireless networks”, 2008. [10] R.Asokan, A.M.Natarajan, “Performance evaluation of energy and delay aware Quality of service (QoS) routing protocols in mobile Ad hoc networks”, 2008. [11] Kumar Manoj, Parmanand, S. C. Sharma & S.P. Singh, “Performance of QoS parameter in wireless Ad hoc network (IEEE 802.11b)”, 2009. [12] Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wolff, Shen Wan, Neeraj Gurdasani, Doug Galarus, “QoS enhancement and performance evaluation of Ad hoc routing
protocols for rural public safety”, peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings. [13] Yu-Doo Kim, Il-Young Moon,Sung-Joon Cho, “A comparison of improved AODV routing protocol based on IEEE 802.11 and IEEE802.15.4”, Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132 – 141© School of Engineering, Taylor’s University College. [14] Sanjay Jamwal and Prof. M. Asger, “A Survey of QoS in Mobile Ad-Hoc Networks”, Proceedings of the 3rd National Conference; INDIACom-2009 Computing For Nation Development, February 26 – 27, 2009 [15] Alekha Kumar Mishra, Bibhu Dutta Sahoo, “A modified Adaptive-SAODV prototype for performance enhancement in MANET”, International Journal of Computer Applications in Engineering Technology And Sciences (IJ-CA-ETS), ISSN: 0974-3596 April’09–September’09 Volume 1 : Issue 2 Page: 443. [16] HuiYao Zhang, Marek E. Bialkowski, Garry A. Einicke, and John Homer, “An extended AODV protocol for VoIP application in mobile Ad hoc network”, ECTI transactions on Electrical Eng., Electronics and Communications VOL.7, NO.2 August 2009. [17] Kumar Manoj, Parmanand, S. C. Sharma & S.P. Singh, “Performance of QoS Parameter in Wireless Ad hoc Network (IEEE 802.11b)”, Proceedings of the World Congress on Engineering and Computer Science 2009 Vol I WCECS 2009, October 20-22, 2009, San Francisco, USA [18] Zamree Che-Aron, Wajdi Al-Khateeb, Farhat Anwar, “The enhanced fault-tolerance mechanism of AODV routing protocol for wireless sensor network”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010 [19] S.Sridhar, R.Baskaran, “A survey on QoS based routing protocols for MANET”, International Journal of Computer Applications (0975 – 8887), Volume 8– No.3, October 2010. [20] S. Soundararajan, R. S. Bhuvaneswaran, “Multipath routing backbone for improving QoS in mobile Ad hoc networks”, European Journal of Scientific Research ISSN 1450-216X Vol.53 No.2 (2011), pp.222-230 [21] V. Dilip Kumar, Prof. Ilanchezhipandian, “Enhancement of AODV routing protocol to provide QoS to MANET”, Proceedings of National Conference on Emerging Trends in Computer Science “NCETCS 2011”. [22]V. Bharathi and T. Poongkuzhali, “A performance enhancement of an optimized power reactive routing”, ©gopalax -International Journal of Technology And Engineering System(IJTES): Jan – March 2011- Vol2 .No1 based on AODV Protocol for Mobile AD-HOC Network [23] S.Thirumurugan, “C-AODV :
Routing protocol for Tunnel’s network”, ISSN: 2229-4333(Print) ISSN:0976-8491 IJCST Vol. 2, Iss ue 1, March 2011 [24] Ruchita Goyal, Divyanshu and Manoj Mishra, “Quality of service provisioning in manet using a cross-layer approach for routing”, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.3, May 2011. [25] Hatem M. Hamad, Maaly A. Hassan, “Enhanced multi-radio AODV in hybrid wireless mesh networks”, Journal of Media and Communication Studies Vol. 3(5), pp. 188-197, May 2011. [26] Shahram Jamali, Bita Safarzadeh and Hamed Alimohammadi, “SQR-AODV: A stable QoS-aware reliable on-demand distance vector routing protocol for mobile Ad hoc networks”, Scientific Research and Essays Vol. 6(14), pp. 3015-3026, 18 July, 2011. [27] Teena Arora1, Parminder Singh2 and Sandeep Singh Kang, Performance Evaluation and Improving Bandwidth Utilization of AODV Protocol by Finding Hidden Terminals in Wireless Networks”, International Journal of Computer Science and Telecommunications [Volume 2, Issue 6, September 2011]. [28] Dr D Srinivas Rao, Jooby Ann Thomas, Sake Pothalaiah “QoS through Power Control in MANETs using AODV Protocol”, International Journal of Computer Applications (0975–8887)Volume 31– No.9, October 2011 [29] Heng Luo, “A best effort QoS support routing in mobile Ad hoc networks”,PhD thesis,, University of Edinburgh, December, 2011 [30] Pallavi Sharma, Vijay Singh Rathore, “Regulating bandwidth flow estimation and control for wired/wireless networks”, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-1, Issue-6, January 2012 [31] P. Arivubrakan, V.R. Sarma Dhulipala, “QoS Enhancement by varying Transmission Range in Wireless Ad-hoc Networks”, International Journal of Computer Applications (0975 – 8887), Volume 37– No.9, January 2012. [32] P. Priya Naidu1 and Meenu Chawla, “Extended Ad hoc on demand distance vector local repair trial for MANET”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012 [33] M. Pushpavalli, T.Sindhu, R.Nithya Rubini, A. M. Natarajan, “QoS performance analysis of MANET routing protocol with bandwidth estimation”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012. [34] Gaurav Sharma, Vaishali Sahu, Prashant Kumar Maurya, Mahendra,“Improved multicast AODV:A review”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, Issue 3, May-Jun 2012, pp.1082-1087

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59