Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
This document describes a routing protocol designed for reliable and efficient communication in wireless sensor networks (WSNs). It discusses four existing routing protocols - Gradient-Based Routing (GBR), Gradient Broadcast (GRAB), Dynamic Source Routing (DSR), and Adhoc On-demand Distance Vector Routing (AODV) - and analyzes their performance tradeoffs. It then proposes a new light-weight routing protocol called Efficient and Reliable routing (EAR) that aims to achieve reliable and efficient routing in single-hub and multi-hub WSNs while minimizing energy consumption and communication overhead. The protocol design and operation are explained in detail.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
This document summarizes a survey on energy aware routing and cross-layering in mobile ad hoc networks (MANETs). It discusses how energy conservation is critical in MANETs since nodes are battery powered. It reviews existing energy efficient routing protocols and notes they do not consider quality of service parameters. Cross-layer design allows interaction between layers to improve network performance without degrading quality of service. The document surveys energy aware routing using cross-layer approaches to improve energy efficiency while maintaining quality of service in MANETs.
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
The document discusses investigating the optimum number of neighbors for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then reviews related work that has looked at optimizing parameters like transmission range and node density. The paper aims to find the optimum number of neighbors under static, low mobility, and high mobility conditions using simulations. It analyzes performance metrics like end-to-end delay, throughput, energy consumption, and routing overhead to determine if there is an optimum number and if it differs based on mobility. The document outlines the investigation and summarizes key related work to provide context.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
Wireless sensor network (WSN) is emerging as a
major research field in computer networks over the last decade
due to its wide variety of embedded real time applications.
Sensor networks have infrastructure-less architecture because
of frequently varying topology and link status. Routing is an
extremely challenging task for battery-powered resourceconstrained
WSN, since it is main cause for energy depletion
and energy must be utilized prudently to enhance lifetime
for sensor networks. This drives a myriad of research efforts
aiming at efficient data dissemination. In this paper we
analyze how efficiently MANET specific routing protocols
OLSR (Optimized Link-State Routing protocol), DYMO
(Dynamic MANET On-demand) and ZRP (Zone Routing
Protocol) perform in IEEE 802.15.4 enabled wireless sensor
networks and evaluate their simulation results using Qualnet
simulator. Several simulations were carried out under varying
network size and offered load for performance evaluation and
relative comparison of protocols is reported in terms of average
end to end delay, throughput and jitter.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
Mobile Ad-hoc Network (MANET) is an emerging technology, infrastructure less with self-organizing, selfhealing, multi-hop wireless routing networks in real time. In such networks, many routing problems arise due to complexity in the network mobility which results from difficulty in achieving energy efficient routing
in the field of MANET. Due to the dynamic nature and the limited battery energy of the mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Though existing protocols are not
concentrating about communication links and battery energy, node links are very important factor for improving quality of routing protocols because Node Rank helps us to determine whether the node is within transmission range or out of transmission range through considering residual energy of the node during the routing process. This paper proposes a novel Energy Efficient Node Rank-based Routing (EENRR)
algorithm which includes certain performance metrics such as control overhead and residual energy in order to improve the Packet Delivery Ratio (PDR), and Network Life Time (NLT) from its originally observed routing performance obtained through other existing protocols. Simulation results show that, when the number of nodes increases from 10 to 100 nodes, EENRR algorithm increases the average residual energy by 31.08% and 21.26% over the existing Dynamic Source Routing (DSR) and Energy Efficient Delay Time Routing (EEDTR) protocols, respectively. Similarly it increases the PDR by 45.38% and 28.3% over the existing DSR and EEDTR protocols respectively.
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the
performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the
literature. In this investigation, we consider both deterministic and random channel models to investigate their effects on ad hoc networks. We consider two different types of routing protocols namely single path and multipath routing protocols. We choose Destination Sequence Distance Vector (DSDV), Dynamic Source Routing Protocol (DSR), and Ad-hoc On-Demand Distance Vector (AODV) as the single path routing protocols. On the other hand, we choose Ad-hoc On-Demand Multiple Path Distance Vector (AOMDV) as the multipath routing protocol. The results show that some single path routing protocol can outperform multipath routing protocol under both deterministic and random channel conditions. These results surprisingly contradict the popular claim that multipath routing protocol always outperforms single path routing protocol. A guideline for choosing an appropriate routing protocol for adhoc network has also been provided in this work.
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...AAKASH S
This document presents an outline for a project on developing a QoS-oriented distributed routing protocol for hybrid wireless networks. It discusses existing work that suffers from overhead and scalability issues. The proposed work incorporates five algorithms to select neighbors, schedule packets, adjust segment size based on mobility, eliminate redundant traffic, and reduce redundant data to improve QoS metrics like transmission delay, throughput, and capacity while reducing overhead. It is claimed that using single-hop transmissions can improve performance by reducing overhead, link failures, and improving QoS.
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...IOSR Journals
This document proposes a Multihop Multi-Channel Distributed QoS Scheduling MAC scheme (MMDQS-MAC) to improve the performance of wireless sensor networks. MMDQS-MAC supports dynamic channel assignment where each sensor node is equipped with a directional antenna. It aims to decrease collisions and interference, improve overall network performance, and is suitable for low traffic networks. Simulation results show that MMDQS-MAC improves aggregate throughput, transmission success rate, packet delivery ratio, energy efficiency, and end-to-end delay.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
This document summarizes research on clock synchronization techniques in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining why time synchronization is important. It then discusses challenges in time synchronization due to clock imperfections and variable network delays. The document reviews existing clock synchronization methods like burst transmission and clock sampling. It also covers characteristics of MANETs like dynamic topology. Finally, it surveys previous research on time synchronization algorithms for MANETs, including a decentralized algorithm that achieves fast convergence times and high accuracy.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
The document summarizes a proposed algorithm called MTADF (Multi Hop Traffic-Aware Data Forwarding) for congestion control in wireless sensor networks. The algorithm uses two potential fields - depth potential field and queue length potential field - to route data packets around congested areas along multiple paths. This helps distribute traffic more evenly and utilize less busy nodes, reducing packet drops and improving throughput compared to existing one-hop routing algorithms. The algorithm constructs the two potential fields independently and then combines them to make dynamic forwarding decisions for data packets. Simulations show the MTADF algorithm performs better than previous work in mitigating congestion.
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
This document summarizes research on efficient spreading codes for transmitter-based techniques to mitigate interference in time division duplex code division multiple access (TDD/CDMA) downlink systems. It investigates bitwise and blockwise multiuser transmission schemes that transfer complexity to the transmitter. Different spreading codes are evaluated based on correlation properties to determine suitability for techniques like precoding, pre-rake, and rake diversity. Performance is measured by bit error rate with varying numbers of users to identify the most efficient codes for interference mitigation.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
This document discusses hybrid wireless networks (HWNs) and some of their advantages over traditional wireless networks. It outlines the classification of HWN architectures and some routing protocols that have been proposed for different HWN types. Some key challenges of routing in HWNs are scalability, overhead from the presence of base stations and wired backbones, and high routing overhead. The document proposes looking at overhead and scalability issues for routing in HWNs.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
The document discusses applying compressed sampling (CS) techniques for spectrum sensing and channel estimation in cognitive radio (CR) networks. It first provides background on CS theory, noting that signals can be reconstructed from fewer samples than required by Nyquist's theorem if the signal is sparse. It then proposes a compressed spectrum sensing scheme to detect wideband spectrum using sub-Nyquist sampling. After sensing, it formalizes the notion of sparse multipath channels and discusses estimating such channels using orthogonal matching pursuit. The effectiveness of these CS-based approaches is demonstrated through comparisons with conventional sensing and estimation methods.
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Studyijmvsc
Bangladesh is primarily an agricultural country. Agriculture plays a vital role in its economy in terms of
food safety, value addition, export earnings and employment. Bangladesh weather and soils are suitable for
a variety of harvests cultivation. More than 100 vegetables are produced in this country. Various types of
vegetables are grown in rural Bangladesh in small homesteads and large agricultural land both for the
own consumption and commercial purpose. Commercial vegetable trading has an integrated supply chain
system which depends on some intermediaries and their activities to take the vegetables from producers to
consumers. The main problem is consumer pays two to three times more than the producers’ margin. The
main objectives of this paper are to investigate the existing vegetable supply chain through value stream
analysis and to identify different stakeholders and their activities, and also to illustrate various cost and
price movement towards different stages of the supply chain. Based on the questionnaire different data are
collected from farmers, different market actors, and consumer and finally problems regarding vegetable
value chain are identified. In the existing situation, producers have no control over the vegetable supply
chain, product pricing; rather they are strongly influenced by market syndicates. In order to make the
problems of the existing supply chain network more understandable different analysis is conducted in this
paper. Finally a new network is proposed to the vegetable supply chain.
Inventory Models Involving Lead Time Crashing Cost as an Exponential Functionijmvsc
Inventory management and control is concerned with the acquisition and storage of materials required for
supporting various business operations. Lead time reduction is another important production activity in an
integrated inventory control. Lead time plays a vital role and has been a topic of interest for many authors
in inventory organization.
Lead time is a necessary aspect in any supply chain management and inventory management system. The
time gap between placing of an order and its actual arrival in the inventory is known as lead time. In most
of the literature dealing with inventory problems, either in deterministic or probabilistic model, lead time is
viewed as a prescribed constant or a stochastic variable, which therefore, is not subject to control. But, in
numerous sensible circumstances, lead time can he reduced by an additional crashing cost; in other words,
it is controllable, so in this article, we have considered the lead time crashing cost is an exponential
function of lead time. A solution procedure is developed to find the optimal solution.
In this article, both lead time and the order quantity are considered as the decision variables. The
behaviour of the model is presented graphically. The result is illustrated with the help of a numerical
example. Finally, Graphical representation is presented to illustrate the model. The solution procedure
with the help of the software Matlab 2008 is furnished to determine the optimal solution.
This summary provides the key details from the document in 3 sentences:
The document discusses improving the performance of a small HPC cluster by temporarily extending it to include idle nodes from other servers on the local network, especially at night. However, such an extension raises security and load balancing challenges due to the heterogeneity of the combined system. The document proposes using SSH tunneling and fixing NFS ports to encrypt NFS traffic across the firewall, and implements domain decomposition for dynamic load balancing of jobs across the extended heterogeneous cluster.
This document summarizes a research paper that proposes a new routing protocol called Dynamically Adaptable Improved OLSR (DA-IOLSR) for mobile ad hoc networks. DA-IOLSR uses a connected dominating set (CDS) as its virtual backbone structure and dynamically adapts the backbone in response to network topology changes from node mobility. The paper describes related work on improving the OLSR protocol's multipoint relay selection and on CDS approaches that are adaptable to topology changes. It then presents the DA-IOLSR protocol and evaluates its performance against the standard OLSR protocol through simulations of varying node mobility conditions.
Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor
networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if
referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
The document discusses investigating the optimum number of neighbors for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then reviews related work that has looked at optimizing parameters like transmission range and node density. The paper aims to find the optimum number of neighbors under static, low mobility, and high mobility conditions using simulations. It analyzes performance metrics like end-to-end delay, throughput, energy consumption, and routing overhead to determine if there is an optimum number and if it differs based on mobility. The document outlines the investigation and summarizes key related work to provide context.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
Wireless sensor network (WSN) is emerging as a
major research field in computer networks over the last decade
due to its wide variety of embedded real time applications.
Sensor networks have infrastructure-less architecture because
of frequently varying topology and link status. Routing is an
extremely challenging task for battery-powered resourceconstrained
WSN, since it is main cause for energy depletion
and energy must be utilized prudently to enhance lifetime
for sensor networks. This drives a myriad of research efforts
aiming at efficient data dissemination. In this paper we
analyze how efficiently MANET specific routing protocols
OLSR (Optimized Link-State Routing protocol), DYMO
(Dynamic MANET On-demand) and ZRP (Zone Routing
Protocol) perform in IEEE 802.15.4 enabled wireless sensor
networks and evaluate their simulation results using Qualnet
simulator. Several simulations were carried out under varying
network size and offered load for performance evaluation and
relative comparison of protocols is reported in terms of average
end to end delay, throughput and jitter.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
Mobile Ad-hoc Network (MANET) is an emerging technology, infrastructure less with self-organizing, selfhealing, multi-hop wireless routing networks in real time. In such networks, many routing problems arise due to complexity in the network mobility which results from difficulty in achieving energy efficient routing
in the field of MANET. Due to the dynamic nature and the limited battery energy of the mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Though existing protocols are not
concentrating about communication links and battery energy, node links are very important factor for improving quality of routing protocols because Node Rank helps us to determine whether the node is within transmission range or out of transmission range through considering residual energy of the node during the routing process. This paper proposes a novel Energy Efficient Node Rank-based Routing (EENRR)
algorithm which includes certain performance metrics such as control overhead and residual energy in order to improve the Packet Delivery Ratio (PDR), and Network Life Time (NLT) from its originally observed routing performance obtained through other existing protocols. Simulation results show that, when the number of nodes increases from 10 to 100 nodes, EENRR algorithm increases the average residual energy by 31.08% and 21.26% over the existing Dynamic Source Routing (DSR) and Energy Efficient Delay Time Routing (EEDTR) protocols, respectively. Similarly it increases the PDR by 45.38% and 28.3% over the existing DSR and EEDTR protocols respectively.
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the
performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the
literature. In this investigation, we consider both deterministic and random channel models to investigate their effects on ad hoc networks. We consider two different types of routing protocols namely single path and multipath routing protocols. We choose Destination Sequence Distance Vector (DSDV), Dynamic Source Routing Protocol (DSR), and Ad-hoc On-Demand Distance Vector (AODV) as the single path routing protocols. On the other hand, we choose Ad-hoc On-Demand Multiple Path Distance Vector (AOMDV) as the multipath routing protocol. The results show that some single path routing protocol can outperform multipath routing protocol under both deterministic and random channel conditions. These results surprisingly contradict the popular claim that multipath routing protocol always outperforms single path routing protocol. A guideline for choosing an appropriate routing protocol for adhoc network has also been provided in this work.
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...AAKASH S
This document presents an outline for a project on developing a QoS-oriented distributed routing protocol for hybrid wireless networks. It discusses existing work that suffers from overhead and scalability issues. The proposed work incorporates five algorithms to select neighbors, schedule packets, adjust segment size based on mobility, eliminate redundant traffic, and reduce redundant data to improve QoS metrics like transmission delay, throughput, and capacity while reducing overhead. It is claimed that using single-hop transmissions can improve performance by reducing overhead, link failures, and improving QoS.
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...IOSR Journals
This document proposes a Multihop Multi-Channel Distributed QoS Scheduling MAC scheme (MMDQS-MAC) to improve the performance of wireless sensor networks. MMDQS-MAC supports dynamic channel assignment where each sensor node is equipped with a directional antenna. It aims to decrease collisions and interference, improve overall network performance, and is suitable for low traffic networks. Simulation results show that MMDQS-MAC improves aggregate throughput, transmission success rate, packet delivery ratio, energy efficiency, and end-to-end delay.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
This document summarizes research on clock synchronization techniques in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining why time synchronization is important. It then discusses challenges in time synchronization due to clock imperfections and variable network delays. The document reviews existing clock synchronization methods like burst transmission and clock sampling. It also covers characteristics of MANETs like dynamic topology. Finally, it surveys previous research on time synchronization algorithms for MANETs, including a decentralized algorithm that achieves fast convergence times and high accuracy.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
The document summarizes a proposed algorithm called MTADF (Multi Hop Traffic-Aware Data Forwarding) for congestion control in wireless sensor networks. The algorithm uses two potential fields - depth potential field and queue length potential field - to route data packets around congested areas along multiple paths. This helps distribute traffic more evenly and utilize less busy nodes, reducing packet drops and improving throughput compared to existing one-hop routing algorithms. The algorithm constructs the two potential fields independently and then combines them to make dynamic forwarding decisions for data packets. Simulations show the MTADF algorithm performs better than previous work in mitigating congestion.
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
This document summarizes research on efficient spreading codes for transmitter-based techniques to mitigate interference in time division duplex code division multiple access (TDD/CDMA) downlink systems. It investigates bitwise and blockwise multiuser transmission schemes that transfer complexity to the transmitter. Different spreading codes are evaluated based on correlation properties to determine suitability for techniques like precoding, pre-rake, and rake diversity. Performance is measured by bit error rate with varying numbers of users to identify the most efficient codes for interference mitigation.
This document summarizes and compares various relay selection techniques for cooperative communication systems. It begins by introducing cooperative communication and describing the basic system model involving a source, destination, and multiple relays. It then reviews seven categories of relay selection methods: 1) threshold-based techniques, 2) multiple relay beamforming, 3) cross-layer techniques, 4) distributed techniques, 5) delay-optimized techniques, 6) joint relay selection and resource optimization techniques, and 7) techniques that perform joint uplink and downlink relay selection. Each category is described and examples of approaches within that category are provided. The techniques are compared in terms of their benefits, challenges, and ability to optimize parameters such as power, throughput, and delay.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
This document discusses hybrid wireless networks (HWNs) and some of their advantages over traditional wireless networks. It outlines the classification of HWN architectures and some routing protocols that have been proposed for different HWN types. Some key challenges of routing in HWNs are scalability, overhead from the presence of base stations and wired backbones, and high routing overhead. The document proposes looking at overhead and scalability issues for routing in HWNs.
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
The document discusses applying compressed sampling (CS) techniques for spectrum sensing and channel estimation in cognitive radio (CR) networks. It first provides background on CS theory, noting that signals can be reconstructed from fewer samples than required by Nyquist's theorem if the signal is sparse. It then proposes a compressed spectrum sensing scheme to detect wideband spectrum using sub-Nyquist sampling. After sensing, it formalizes the notion of sparse multipath channels and discusses estimating such channels using orthogonal matching pursuit. The effectiveness of these CS-based approaches is demonstrated through comparisons with conventional sensing and estimation methods.
Value Stream Analysis of Vegetable Supply Chain in Bangladesh: A Case Studyijmvsc
Bangladesh is primarily an agricultural country. Agriculture plays a vital role in its economy in terms of
food safety, value addition, export earnings and employment. Bangladesh weather and soils are suitable for
a variety of harvests cultivation. More than 100 vegetables are produced in this country. Various types of
vegetables are grown in rural Bangladesh in small homesteads and large agricultural land both for the
own consumption and commercial purpose. Commercial vegetable trading has an integrated supply chain
system which depends on some intermediaries and their activities to take the vegetables from producers to
consumers. The main problem is consumer pays two to three times more than the producers’ margin. The
main objectives of this paper are to investigate the existing vegetable supply chain through value stream
analysis and to identify different stakeholders and their activities, and also to illustrate various cost and
price movement towards different stages of the supply chain. Based on the questionnaire different data are
collected from farmers, different market actors, and consumer and finally problems regarding vegetable
value chain are identified. In the existing situation, producers have no control over the vegetable supply
chain, product pricing; rather they are strongly influenced by market syndicates. In order to make the
problems of the existing supply chain network more understandable different analysis is conducted in this
paper. Finally a new network is proposed to the vegetable supply chain.
Inventory Models Involving Lead Time Crashing Cost as an Exponential Functionijmvsc
Inventory management and control is concerned with the acquisition and storage of materials required for
supporting various business operations. Lead time reduction is another important production activity in an
integrated inventory control. Lead time plays a vital role and has been a topic of interest for many authors
in inventory organization.
Lead time is a necessary aspect in any supply chain management and inventory management system. The
time gap between placing of an order and its actual arrival in the inventory is known as lead time. In most
of the literature dealing with inventory problems, either in deterministic or probabilistic model, lead time is
viewed as a prescribed constant or a stochastic variable, which therefore, is not subject to control. But, in
numerous sensible circumstances, lead time can he reduced by an additional crashing cost; in other words,
it is controllable, so in this article, we have considered the lead time crashing cost is an exponential
function of lead time. A solution procedure is developed to find the optimal solution.
In this article, both lead time and the order quantity are considered as the decision variables. The
behaviour of the model is presented graphically. The result is illustrated with the help of a numerical
example. Finally, Graphical representation is presented to illustrate the model. The solution procedure
with the help of the software Matlab 2008 is furnished to determine the optimal solution.
This summary provides the key details from the document in 3 sentences:
The document discusses improving the performance of a small HPC cluster by temporarily extending it to include idle nodes from other servers on the local network, especially at night. However, such an extension raises security and load balancing challenges due to the heterogeneity of the combined system. The document proposes using SSH tunneling and fixing NFS ports to encrypt NFS traffic across the firewall, and implements domain decomposition for dynamic load balancing of jobs across the extended heterogeneous cluster.
This document summarizes a research paper that proposes a new routing protocol called Dynamically Adaptable Improved OLSR (DA-IOLSR) for mobile ad hoc networks. DA-IOLSR uses a connected dominating set (CDS) as its virtual backbone structure and dynamically adapts the backbone in response to network topology changes from node mobility. The paper describes related work on improving the OLSR protocol's multipoint relay selection and on CDS approaches that are adaptable to topology changes. It then presents the DA-IOLSR protocol and evaluates its performance against the standard OLSR protocol through simulations of varying node mobility conditions.
Presently, there are not many literatures on the characterization of reputation and trust in wireless sensor
networks (WSNs) which can be referenced by scientists, researchers and students. Although some research documents include information on reputation and trust, characterization of these features are not adequately covered. In this paper, reputation and trust are divided into various classes or categories and a method of referencing the information is provided. This method used results in providing researchers with a tool that makes it easier to reference these features on reputation and trust in a much easier way than if
referencing has to be directed to several uncoordinated resources. Although the outcome of this work proves beneficial to research in the characterization of reputation and trust in WSNs, more work needs to be done in extending the benefits to other network systems.
RESOURCE ALLOCATION METHOD FOR CLOUD COMPUTING ENVIRONMENTS WITH DIFFERENT SE...IJCNCJournal
In a cloud computing environment with multiple data centers over a wide area, it is highly likely that each data center would provide the different service quality to users at different locations. It is also required to consider the nodes at the edge of the network (local cloud) which support applications such as IoTs that require low latency and location awareness. The authors proposed the joint multiple resource allocation method in a cloud computing environment that consists of multiple data centers and each data center provides the different network delay. However, the existing method does not take account of cases where requests that require a short network delay occur more than expected. Moreover, the existing method does not take account of service processing time in data centers and therefore cannot provide the optimal resource allocation when it is necessary to take the total processing time (both network delay and service processing time in a data center) into consideration in resource allocation.
A CASE STUDY ON CONSTRAINTS AFFECTING THE PRODUCTIVITY OF READYMADE GARMENT (...ijmvsc
The success of Readymade garment (RMG) exports from Bangladesh over the past few decades has
reached to an unprecedented height and sometimes it goes beyond optimistic expectations compared to any
other sectors in the country. Being one of the lucrative multibillion dollar industries, it has provided more
than 4.0 million employment opportunities and ensured women empowerment. It has brought the fortune to
rural women communities and they have become independent by themselves. The garment industry in
Bangladesh faces a number of challenges including fallacious working condition, dearth of safety, political
turbulence and, low remuneration. To sustain in the competitive global market, management has to identify
the prime key opportunities and identify any threats. This study was conducted to analyze the prospects and
constraints of Bangladesh RMG industry using well known multi-criteria decision making (MCDM) method
namely analytic hierarchy process (AHP). To judge the model, data was collected through the focus group
discussion and key informant interviews with the managers of three different garment industries situated in
Gazipur, Bangladesh. The findings of the study showed that “unsound working condition” among several
challenges affects workers working capability and productivity severely. The study recommends that
through proper identification and taking corrective measures against the challenges by the management of
RMG sector, Bangladesh has the opportunity to be the market leader in this sector.
Cloud computing is a major trend and a fast growing phenomena in the IT world. Organizations working in different sectors such as education or business are becoming more interested in moving their applications to the cloud to boost their infrastructure resources; increase their applications’ scalability and reduce costs. This boost in demand for cloud services led to the need for clouds to federate, in order to flawlessly deliver the required computation power and other services. In addition, there is major trend in delegating identity management tasks to identity providers in order to reduce cost. Managing identity and access control across different domains is a challenge. This paper proposes a framework for managing identity in federated clouds based on the use of a Security Assertion Markup Language (SAML) Agent. The agent acts as an interface for a cloud identity manager where it sends and receives identity assertion requests from and to other clouds in the federation. In addition, the agent assigns roles to users using identity attributes received in assertions and cloud’s internal role mapping rules. For testing the agent’s capability to scale and sustain load, a prototype implementation was developed. Performance evaluation results demonstrate the viability of the proposed framework.
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
This document describes using the Analytic Hierarchy Process (AHP) to evaluate the quality of service (QoS) provided by different 3G mobile data networks to determine which network provides the best QoS for web browsing applications. The AHP method builds a hierarchy with the goal of determining the best network at the top, criteria like latency, jitter, data loss and throughput in the middle, and alternative networks at the bottom. Pairwise comparisons are used to calculate weights for the criteria and alternatives. Measured data is collected for the criteria from drive testing of the networks. The weights are then combined to produce overall scores for each network, with the highest scoring network providing the best QoS. The study implements AHP
PERFORMANCE AND COMPLEXITY ANALYSIS OF A REDUCED ITERATIONS LLL ALGORITHMIJCNCJournal
Multiple-input multiple-output (MIMO) systems are playing an increasing and interesting role in the recent
wireless communication. The complexity and the performance of the systems are driving the different
studies and researches. Lattices Reduction techniques bring more resources to investigate the complexity
and performances of such systems.
In this paper, we look to modify a fixed complexity verity of the LLL algorithm to reduce the computation
operations by reducing the number of iterations without important performance degradation. Our proposal
shows that we can achieve a good performance results while avoiding extra iteration that doesn’t bring
much performance.
There is no doubt that network coding is a promising enhancement of routing to improve network throughput and provide high reliability. However, there are several open problems in practical network coding, especially on how to guarantee coding advantage for a decentralized control network without the knowledge of the network topology. The biggest benefit of OpenFlow is to decouple the control plane from the data plane, allowing the centralized forwarding decisions in comparison to traditional distributed control network. As a result, we propose a Software-Defined coding network and address key technical challenges in practice. We design NC-OF, a framework to enable networking coding in SDN networks, and use MMF-NC coding strategy proposed by Guan Xu in NC-OF. Finally, we proved that our solutions can effectively improve network performance through simulation experiments. And we also find that network coding is not necessary when the link bandwidth is enough , because it will bring the problems of time delay, the increase in the amount of calculation and so on.
JOINT-DESIGN OF LINK-ADAPTIVE MODULATION AND CODING WITH ADAPTIVE ARQ FOR COO...IJCNCJournal
This paper analyzes the efficiency of a joint-design of an adaptive modulation and coding (AMC) at the
physical (PHY) layer with an adaptive Rmax-truncated selective-repeat automatic repeat request (ARQ)
protocol at the medium access control (MAC) layer to maximize the throughput of cooperative nonregenerative
relay networks under prescribed delay and/or error performance constraints. Particularly, we
generalize the existing design model/results for cross-layer combining of AMC along with truncated ARQ
in non-cooperative diversity networks in three-folds: (i) extension of the cross-layer PHY/MAC design or
optimization to cooperative diversity systems; (ii) generalization/unification of analytical expressions for
various network performance metrics to generalized block fading channels with independent but nonidentically
distributed (i.n.d) fading statistics among the spatially distributed nodes; (iii) analysis of the
effectiveness of joint-adaptation of the maximum retransmission limit Rmax of ARQ protocol and
cooperative diversity order N for delay-insensitive applications. Our insightful numerical results reveal
that the average throughput can be increased significantly by judiciously combining two additional degrees
of freedom (N and Rmax) that are available in cooperative amplify-and-forward (CAF) relay networks
besides employing AMC at the PHY layer, especially in the most challenging low signal-to-noise ratio
(SNR) regime.
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
In distributed file systems, a well-known congestion collapse called TCP incast (Incast briefly) occurs
because many servers almost simultaneously send data to the same client and then many packets overflow
the port buffer of the link connecting to the client. Incast leads to throughput degradation in the network. In
this paper, we propose three methods to avoid Incast based on the fact that the bandwidth-delay product is
small in current data center networks. The first method is a method which completely serializes connection
establishments. By the serialization, the number of packets in the port buffer becomes very small, which
leads to Incast avoidance. The second and third methods are methods which overlap the slow start period
of the next connection with the current established connection to improve throughput in the first method.
Numerical results from extensive simulation runs show the effectiveness of our three proposed methods.
IMPROVING BITTORRENT’S PEER SELECTION FOR MULTIMEDIA CONTENT ON-DEMAND DELIVERYIJCNCJournal
The great efficiency achieved by the BitTorrent protocol for the distribution of large amounts of data inspired its adoption to provide multimedia content on-demand delivery over the Internet. As it is not designed for this purpose, some adjustments have been proposed in order to meet the related QoS requirements like low startup delay and smooth playback continuity. Accordingly, this paper introduces a BitTorrent-like proposal named as Quota-Based Peer Selection (QBPS). This proposal is mainly based on the adaptation of the original peer-selection policy of the BitTorrent protocol. Its validation is achieved by means of simulations and competitive analysis. The final results show that QBPS outperforms other recent proposals of the literature. For instance, it achieves a throughput optimization of up to 48.0% in low-provision capacity scenarios where users are very interactive.
THE INFLUENCE OF COLLABORATION IN PROCUREMENT RELATIONSHIPSijmvsc
Supply Chain Management often requires independent organizations to work together to achieve shared
objectives. This collaboration is necessary when coordinated actions benefit the group more than the
uncoordinated efforts of individual firms. Despite the commonly reported benefits that can be gained in
close relationships, recent research has indicated that collaboration attempts between purchasing firms
and their suppliers have not been as widespread as anticipated. Using a survey of procurement
professionals, this research investigates how the purchasing function utilizes collaboration in its supply
chain relationships. Structural equation modeling is used to identify how information sharing, decision
synchronization, incentive alignment, collaborative communication, and trust impact collaboration, as well
as how collaboration impacts performance. Results from 86 survey responses indicate that firms are still
not fully utilizing collaborative relationships
VALUE CHAIN DRIVEN HUMAN CAPITAL DEVELOPMENT: AN EVIDENCE FROM AGRICULTURAL V...ijmvsc
Human capital development (HCD) among farmers is a fundamental issue for any developing agrarian
economy. Though education is the prime factor influencing human development, the education provided by
governments to the rural population alone cannot ensure HCD. It is proved in India by efficient working
models like ICT’s e-Choupal and modern agriculture with contract farming that well governed supply
chain practice, development of value chain to serve different customers and transparent interface between
markets and the farmer provide best opportunity for farmers to apply their knowledge (tacit and acquired)
for their social and economic wellbeing, leading to real HCD.
The present study explores whether existing agricultural value chains induce uniform HCD among farmers
of paddy, dry chilli, sugarcane and marigold which are being cultivated and traded in varied formats in
Karnataka. The outcome of the study confirms that efficient value chain that provides free and fair
opportunities for farmers to trade at farm gate is an important factor that drives HCD among farmers.
ANALYZING THE PROCESS CAPABILITY FOR AN AUTO MANUAL TRANSMISSION BASE PLATE M...ijmvsc
The industry today is working intensively on a goal-oriented way towards introducing regular studies in
manufacturing. The current study is part of a large overall spanning project aiming towards an increase in
productivity, i.e. more products produced per year with availability. In this paper we have analyze what
Process Capability is and how it is implemented on a current process. All the steps are listed out in an easy
to understand manner. In current scenario, specifications for products have been tightened due to
performance competition in market. Statistical tools like control charts, process capability analysis and
cause and effect diagram ensure that processes are fit for company specifications while reduce the process
variation and improve product quality characteristic. Process capability indices (PCIs) are used in the
manufacturing process to provide numerical measures on whether a process is capable of producing items
within the predetermined limits. For the analysis purpose MINITAB 16.0 is used and is found that the
process is placed exactly at the centre of the control limits. Analysis also shows that process is not
adequate. The cause and effect diagram is prepared to found out the root cause of variation in diameter of
work. In this study, a process-capability analysis was also carried out in a medium-sized company that
produces machine and spare parts.
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
A Wireless Sensor Network (WSN) contains a large number of sensor nodes equipped with limited energy supplies. In most applications, sensor nodes are deployed in a random fashion. Therefore, battery replacement or charging is considered not practical. As a result, routing protocols must be energy-efficient to prolong the network’s lifetime. In this paper, we propose a new Dynamic Re-clustering LEACH-Based protocol (DR-LEACH) which aims to reduce the energy consumption and extending the network’s lifetime. The idea is to balance energy consumption of Cluster Heads (CHs) by generating clusters with almost equal number of nodes during each round of the network life time. To perform this, we first calculate the optimal number of CHs in each round, and based on that we calculate the optimal size of each cluster. Results show that the proposed protocol improves network lifetime and reduces overall energy consumption compared to LEACH and BCDCP protocols.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
This paper proposes a new method for collecting distributed data in Wireless Sensor Networks (WSNs) that can improve the energy efficiency and network coverage; especially in remote areas. In multi-hop communication, sink nodes are responsible for collecting and forwarding data to base stations. The nodes that are located near a sink node usually deplete their battery faster than other nodes because they are responsible for aggregating the data from other sensor nodes. Several studies have proved the advantages of using mobile sink nodes to reduce energy consumption. Nonetheless, the need for compatible and efficient routing algorithms cannot be understated. Accordingly, a hybrid routing algorithm based on the Dijkstra�s and Rendezvous algorithms is proposed. To improve the energy efficiency and coverage, Energy Efficient Hybrid Unmanned Vehicle Based Routing Algorithm (E2HUV) is proposed to create a routing path for Unmanned Aerial Vehicles (UAVs) that can be used as mobile sinks in WSNs. Performance results show that the E2HUV algorithm offers better efficiency as compared to currently existing algorithms.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
This document analyzes the performance of a neighbor knowledge based broadcast protocol called BCAST in mobile ad hoc networks using network simulator NS-2. It varies the number of data senders (multicast group size) and data sending rate to analyze packet delivery ratio, end-to-end delay, packet loss probability, and network control overhead. The simulation results show that BCAST generally performs well and provides robust performance even with high traffic loads.
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
This document summarizes a research paper that proposes a scalable and power-efficient routing solution for mobile ad hoc networks (MANETs). The paper describes a cluster-based MANET architecture and develops a graph theoretic routing algorithm that finds paths from source to destination nodes using routes with minimum cumulative degree. Simulation results show that the algorithm provides efficient routing paths even as the number of nodes increases, and uses multi-hop connectivity to transmit packets using minimum power irrespective of the number of nodes in the network. The algorithm is shown to be scalable and power efficient compared to other routing methods.
This document summarizes a research paper that proposes an energy and bandwidth constrained routing technique for mobile ad hoc networks (MANETs). It presents an available bandwidth measurement algorithm that estimates available bandwidth more accurately by considering node capacity, link utilization, idle time synchronization, collision probability, and overhead from backoff mechanisms. It also proposes a probability-based overhearing method to reduce energy consumption from overhearing without affecting route quality. The techniques are evaluated using NS2 simulations to analyze network performance in terms of quality of service parameters.
1) The document presents a relay-based routing protocol for wireless in-body sensor networks that aims to maximize network lifetime.
2) The protocol decreases communication distances of in-body sensors by deploying relays on a patient's clothes, allowing sensors to directly communicate with nearby relays.
3) Simulation results show the proposed protocol performs better than other protocols in terms of energy efficiency.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...IJCNCJournal
The rapid growth of Fintech has driven the adoption of blockchain technology for secure, efficient, and tamper-proof digital transactions. However, existing blockchain systems face challenges such as double spending attacks, inefficient consensus mechanisms, and limited trust management, which hinder their scalability and security. To overcome these issues, this research proposes the Fin Trust Blockchain Framework (FTBF), a multi-layered architecture designed to provide secure, scalable, and transparent solutions for Fintech applications. FTBF integrates Zero Trust Architecture (ZTA) at its core to ensure continuous user, node, and transaction validation. To prevent double-spending attacks, the Dynamic Coin Flow Output Model (DCFOM) tracks unspent transaction outputs, ensuring the uniqueness of digital tokens. The framework also introduces a novel consensus mechanism, the Time Elapsed Stake Secure Algorithm (TESSA), which enhances scalability and energy efficiency. Additionally, the Fair Trust Rating Server (FTRS) dynamically calculates and updates trust scores for network participants, storing them on a trust score ledger for transparency and accountability. FTBF addresses key blockchain security, efficiency, and trust management limitations, paving the way for next-generation Fintech solutions with enhanced scalability, resilience, and transparency.
Visually Image Encryption and Compression using a CNN-Based AutoencoderIJCNCJournal
This paper proposes a visual encryption method to ensure the confidentiality of digital images. The model used is based on an autoencoder using aConvolutional Neural Network (CNN) to ensure the protection of the user data on both the sender side (encryption process) and the receiver side(decryption process)in a symmetric mode. To train and test the model, we used the MNIST and CIFAR-10 datasets. Our focus lies in generating an encrypted dataset by combining the original dataset with a random mask. Then, a convolutional autoencoder in the masked dataset will be designed and trained to learn essential image features in a reduced-dimensional latent space and reconstruct the image from this space. The used mask can be considered as a secret key known in standard cryptographic algorithms which allows the receiver of the masked data to recover the plain data. The implementation of this proposed encryption model demonstrates efficacy in preserving data confidentiality and integrity while reducing the dimensionality (for example we pass from 3072 Bytes to 1024 Bytes for CIFAR-10 images). Experimental results show that the used CNN exhibits a proficient encryption and decryption process on the MNIST dataset, and a proficient encryption and acceptable decryption process on the CIFAR-10 dataset.
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...IJCNCJournal
We present efficient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computational complexity of isogeny computations from O(g4) to O(g3) operations for genus 2 curves, achieving significant efficiency gains over traditional elliptic curve methods. Detailed pseudocode and comprehensive complexity analyses demonstrate these improvements both theoretically and empirically. Additionally, we provide a thorough security analysis, including proofs of resistance to quantum attacks such as Shor's and Grover's algorithms. Our findings establish hyperelliptic isogeny-based cryptography as a promising candidate for secure and efficient post-quantum cryptographic systems.
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksIJCNCJournal
The Internet of Things (IoT) encompasses a wide various of heterogeneous devices that leverage their capabilities in environmental sensing, data processing, and wireless communication. Among these, wireless sensors are one of the most widely used technologies in such networks. However, Wireless Sensor Networks (WSNs) face significant challenges in Medium Access Control (MAC), particularly in power management and network lifetime. To address these issues and enhance network efficiency and reliability, we propose a MAC approach for WSNs based on routing data. This approach, termed TDMA-CADH (TDMA Cross-Layer Approach Aware Delay/Throughput in Heterogeneous WSN), employs a cross-layer strategy to optimize resource utilization by minimizing transmission delay, maximizing channel throughput, and ensuring energy efficiency and extended network lifetime. The primary goal of this work is to design an effective MAC approach for WSNs that adhere to energy consumption and network lifetime constraints while reducing delay and improving channel throughput. To evaluate the performance of TDMA-CADH, we conducted simulations using the Network Simulator (NS-3) and compared it with existing approaches, including Random Leaves Ordering (RAND-LO), Depth Leaves Ordering (DEPTH-LO), Depth Remaining Leaves Ordering (DEPTH-RELO), and our initial version, Close Remaining Leaves Ordering (CLOSERELO). By including CLOSE-RELO in the comparison, we aimed to assess the advancements achieved in our new approach. The results demonstrate that TDMA-CADH significantly improves channel throughput and reduces transmission delay while maintaining energy efficiency and network lifetime. These findings suggest that our proposed method can effectively enhance the performance of Wireless Sensor Networks in IoT applications.
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksIJCNCJournal
Underwater Wireless sensor network (UWSN) has become a main topic in the research of underwater communication with more research challenges. One of the main issues in the UWSN communication process is Quality of Service (QoS). Therefore, for enhancing the QoS in the UWSN a novel Clustering Hello routing based Honey Badger GoogleNet (CHbHBG) model is proposed. Primarily, the required sensor hubs are placed in the underwater communication environment. Further, the energy usage of each node is monitored and energy-efficient cluster head is selected by the proposed mechanism. Moreover, the data rate resources were predicted and allocated at the channel using the fitness process of the model. The optimal allocation process improves the QoS in the network. To prove the efficacy of the system, the metrics including throughput, network lifetime, latency, energy consumption, PDR, transmission loss, and path creation time are validated and compared with the recent models. The developed model attained the higher network performance as 99.72% PDR, 949.2kbps throughput, 4004.31s network lifetime, and 230.84J energy consumption.
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksIJCNCJournal
This paper explores the Quality of Service (QoS) performance of two widely used Software-Defined Networking (SDN) controllers, POX and Ryu, using Mininet for network simulation. SDN, a transformative approach to network architecture, separates the control and data planes, enabling centralized management, improved agility, and cost-effective solutions. The study evaluates key QoS parameters, including throughput, delay, and jitter, to understand the capabilities and limitations of the POX and Ryu controllers in handling traffic under diverse network topologies. The research employs a systematic methodology involving the design of custom network topologies, implementation of OpenFlow rules, and analysis of controller behavior under simulated conditions. Results reveal that while POX offers simplicity and ease of use, making it suitable for smaller-scale applications
and experimentation, Ryu provides superior scalability and adaptability for more complex network environments. The findings highlight the strengths and challenges of each controller, providing valuable insights for organizations seeking to optimize SDN deployment. This study contributes to the growing body of knowledge on SDN technologies and their role in building scalable, efficient, and resilient network infrastructures.
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...IJCNCJournal
The rapid growth of Fintech has driven the adoption of blockchain technology for secure, efficient, and tamper-proof digital transactions. However, existing blockchain systems face challenges such as double-spending attacks, inefficient consensus mechanisms, and limited trust management, which hinder their scalability and security. To overcome these issues, this research proposes the FinTrust Blockchain Framework (FTBF), a multi-layered architecture designed to provide secure, scalable, and transparent solutions for Fintech applications. FTBF integrates Zero Trust Architecture (ZTA) at its core to ensure continuous user, node, and transaction validation. To prevent double-spending attacks, the Dynamic Coin Flow Output Model (DCFOM) tracks unspent transaction outputs, ensuring the uniqueness of digital tokens. The framework also introduces a novel consensus mechanism, the Time Elapsed Stake Secure Algorithm (TESSA), which enhances scalability and energy efficiency. Additionally, the Fair Trust Rating Server (FTRS) dynamically calculates and updates trust scores for network participants, storing them on a trust score ledger for transparency and accountability. FTBF addresses key blockchain security, efficiency, and trust management limitations, paving the way for next-generation Fintech solutions with enhanced scalability, resilience, and transparency.
Visually Image Encryption and Compression using a CNN-Based AutoencoderIJCNCJournal
This paper proposes a visual encryption method to ensure the confidentiality of digital images. The model used is based on an autoencoder using a Convolutional Neural Network (CNN) to ensure the protection of the user data on both the sender side (encryption process) and the receiver side (decryption process) in a symmetric mode. To train and test the model, we used the MNIST and CIFAR-10 datasets. Our focus lies in generating an encrypted dataset by combining the original dataset with a random mask. Then, a convolutional autoencoder in the masked dataset will be designed and trained to learn essential image features in a reduced-dimensional latent space and reconstruct the image from this space. The used mask can be considered as a secret key known in standard cryptographic algorithms which allows the receiver of the masked data to recover the plain data. The implementation of this proposed encryption model demonstrates efficacy in preserving data confidentiality and integrity while reducing the dimensionality (for example we pass from 3072 Bytes to 1024 Bytes for CIFAR-10 images). Experimental results show that the used CNN exhibits a proficient encryption and decryption process on the MNIST dataset, and a proficient encryption and acceptable decryption process on the CIFAR-10 dataset.
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...IJCNCJournal
We present e cient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computational complexity of isogeny com- putations from O(g4) to O(g3) operations for genus 2 curves, achieving signi cant e ciency gains over traditional elliptic curve methods. Detailed pseudocode and comprehensive complexity analyses demonstrate these improvements both theoretically and em- pirically. Additionally, we provide a thorough security analysis, including proofs of resistance to quantum attacks such as Shor's and Grover's algorithms. Our ndings establish hyperelliptic isogeny-based cryptography as a promising candidate for secure and e cient post-quantum cryptographic systems.
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT NetworksIJCNCJournal
The Internet of Things (IoT) encompasses a wide various of heterogeneous devices that leverage their capabilities in environmental sensing, data processing, and wireless communication. Among these, wireless sensors are one of the most widely used technologies in such networks. However, Wireless Sensor Networks (WSNs) face significant challenges in Medium Access Control (MAC), particularly in power management and network lifetime. To address these issues and enhance network efficiency and reliability, we propose a MAC approach for WSNs based on routing data. This approach, termed TDMA-CADH (TDMA Cross-Layer Approach Aware Delay/Throughput in Heterogeneous WSN), employs a cross-layer strategy to optimize resource utilization by minimizing transmission delay, maximizing channel throughput, and ensuring energy efficiency and extended network lifetime. The primary goal of this work is to design an effective MAC approach for WSNs that adhere to energy consumption and network lifetime constraints while reducing delay and improving channel throughput. To evaluate the performance of TDMA-CADH, we conducted simulations using the Network Simulator (NS-3) and compared it with existing approaches, including Random Leaves Ordering (RAND-LO), Depth Leaves Ordering (DEPTH-LO), Depth Remaining Leaves Ordering (DEPTH-RELO), and our initial version, Close Remaining Leaves Ordering (CLOSE-RELO). By including CLOSE-RELO in the comparison, we aimed to assess the advancements achieved in our new approach. The results demonstrate that TDMA-CADH significantly improves channel throughput and reduces transmission delay while maintaining energy efficiency and network lifetime. These findings suggest that our proposed method can effectively enhance the performance of Wireless Sensor Networks in IoT applications.
Enhancement of Quality of Service in Underwater Wireless Sensor NetworksIJCNCJournal
Underwater Wireless sensor network (UWSN) has become a main topic in the research of underwater communication with more research challenges. One of the main issues in the UWSN communication process is Quality of Service (QoS). Therefore, for enhancing the QoS in the UWSN a novel Clustering Hello routing based Honey Badger GoogleNet (CHbHBG) model is proposed. Primarily, the required sensor hubs are placed in the underwater communication environment. Further, the energy usage of each node is monitored and energy-efficient cluster head is selected by the proposed mechanism. Moreover, the data rate resources were predicted and allocated at the channel using the fitness process of the model. The optimal allocation process improves the QoS in the network. To prove the efficacy of the system, the metrics including throughput, network lifetime, latency, energy consumption, PDR, transmission loss, and path creation time are validated and compared with the recent models. The developed model attained the higher network performance as 99.72% PDR, 949.2kbps throughput, 4004.31s network lifetime, and 230.84J energy consumption.
Comparative Analysis of POX and RYU SDN Controllers in Scalable NetworksIJCNCJournal
This paper explores the Quality of Service (QoS) performance of two widely used Software-Defined Networking (SDN) controllers, POX and Ryu, using Mininet for network simulation. SDN, a transformative approach to network architecture, separates the control and data planes, enabling centralized management, improved agility, and cost-effective solutions. The study evaluates key QoS parameters, including throughput, delay, and jitter, to understand the capabilities and limitations of the POX and Ryu controllers in handling traffic under diverse network topologies. The research employs a systematic methodology involving the design of custom network topologies, implementation of OpenFlow rules, and analysis of controller behavior under simulated conditions. Results reveal that while POX offers simplicity and ease of use, making it suitable for smaller-scale applications and experimentation, Ryu provides superior scalability and adaptability for more complex network environments. The findings highlight the strengths and challenges of each controller, providing valuable insights for organizations seeking to optimize SDN deployment. This study contributes to the growing body of knowledge on SDN technologies and their role in building scalable, efficient, and resilient network infrastructures.
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...IJCNCJournal
Network on Chip (NoC) has revolutionized on-chip communication in multicore systems, establishing itself as a critical design paradigm for modern multicore processors and System-on-Chip (SoC) architectures. In contrast to standard bus-based interconnects, NoC employs a network-like structure that enables scalable and efficient communication between several processing components. This technique has addressed the issues raised by the rising complexity of integrated circuits, providing higher performance, reduced latency, and increased power efficiency. NoC has played a critical role in enabling the development of high-performance computing systems and sophisticated electrical devices by facilitating robust communication channels between components, marking a substantial shift from earlier interconnect technologies. Mapping tasks to the Network on Chip (NoC) is a critical challenge in multicore systems, as it can substantially impact throughput due to communication congestion. Poor mapping decisions can lead to an increase in total makespan, increase in task missing deadlines, and underutilization of cores. The proposed algorithm schedules tasks to cores while considering network congestion through various links and availability of processing elements. The experimental results demonstrate that the proposed algorithm improves task deadline satisfaction and minimize makespan by 23.83% and 22.83%, respectively, when compared to other dynamic task allocation algorithms.
Formal Abstraction & Interface Layer for Application Development in Automatio...IJCNCJournal
This paper presents a novel, formal language semantics and an abstraction layer for developing application code focussed on running on agents or nodes of a multi-node distributed system aimed at providing any IoT service, automation, control or monitoring in the physical environment. The proposed semantics are rigorously validated by K-Framework alongside a simulation with code produced using the said semantics. Furthermore, the paper proposes a clocking strategy for systems built on the framework, potential conflict resolution designs and their trade-offs, adherence to CAP Theorem and verification of the atomic semantic using Fischer’s Protocol. A negative test-case experiment is also included to verify the correctness of the atomic semantic.
Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in No...IJCNCJournal
Network on Chip (NoC) has revolutionized on-chip communication in multicore systems, establishing itself as a critical design paradigm for modern multicore processors and System-on-Chip (SoC) architectures. In contrast to standard bus-based interconnects, NoC employs a network-like structure that enables scalable and efficient communication between several processing components. This technique has addressed the issues raised by the rising complexity of integrated circuits, providing higher performance, reduced latency, and increased power efficiency. NoC has played a critical role in enabling the development of high-performance computing systems and sophisticated electrical devices by facilitating robust communication channels between components, marking a substantial shift from earlier interconnect technologies. Mapping tasks to the Network on Chip (NoC) is a critical challenge in multicore systems, as it can substantially impact throughput due to communication congestion. Poor mapping decisions can lead to an increase in total makespan, increase in task missing deadlines, and underutilization of cores. The proposed algorithm schedules tasks to cores while considering network congestion through various links and availability of processing elements. The experimental results demonstrate that the proposed algorithm improves task deadline satisfaction and minimize makespan by 23.83% and 22.83%, respectively, when compared to other dynamic task allocation algorithms.
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...IJCNCJournal
Wireless Sensor Networks (WSNs) are crucial for various applications such as environmental monitoring, industrial automation, and healthcare. However, the constrained energy resources of sensor nodes have a substantial effect on the longevity and performance of these networks. To address this issue, this paper introduces the Optimized Energy Efficient algorithm in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics together. The study offers a new approach to selecting cluster heads by combining residual energy and distance metrics. The proposed algorithm called modified intelligent energy efficiency cluster algorithm (MIEEC-A), that enhances WSN energy efficiency by choosing nodes with high residual energy and close proximity to their neighbours as cluster heads. Extensive simulations and evaluations show that this approach effectively extends network lifetime, improves data aggregation, and boosts energy efficiency, thus making a valuable contribution to WSN lifetime.
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...IJCNCJournal
The increasing use of Industrial Internet of Things (IIoT) devices has brought about new security vulnerabilities, emphasizing the need to create strong and effective security solutions. This research proposes a two-layered approach to enhance security in IIoT networks by combining lightweight encryption and RNN-based attack detection. The first layer utilizes Improved Elliptic Curve Cryptography (IECC), a novel encryption scheme tailored for IIoT devices with limited computational resources. IECC employs a Modified Windowed Method (MWM) to optimize key generation, reducing computational overhead and enabling efficient secure data transmission between IIoT sensors and gateways. The second layer employs a Recurrent Neural Network (RNN) for real-time attack detection. The RNN model is trained on a comprehensive dataset of IIoT network traffic, including instances of Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM), ransomware attacks, and normal communications. The RNN effectively extracts contextual features from IIoT nodes and accurately predicts and classifies potential attacks. The effectiveness of the proposed two-layered approach is evaluated using three phases. The first phase compares the computational efficiency of IECC to established cryptographic algorithms including RSA, AES, DSA, Diffie-Hellman, SHA-256 and ECDSA. IECC outperforms all competitors in key eneration speed, encryption and decryption time, throughput, memory usage, information loss, and overall processing time. The second phase evaluates the prediction accuracy of the RNN model compared to other AI-based models DNNs, DBNs, RBFNs, and LSTM networks. The proposed RNN achieves the highest overall accuracy of 96.4%, specificity of 96.5%, precision of 95.2%, and recall of 96.8%, and the lowest false positive of 3.2% and false negative rates of 3.1%.
Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic ...IJCNCJournal
Orthogonal Frequency Division Multiplexing (OFDM) is a highly efficient multicarrier modulation method that is widely used in current high-speed wireless communication systems. It offers numerous benefits, including high capacity and resilience to multipath fading channels, when compared to other techniques. However, a significant drawback of OFDM is its high peak-to-average power ratio (PAPR), which can result in in-band distortion and out-of-band radiation due to the non-linearity of high power amplifiers. To address this issue, several techniques have been suggested, such as Selective Mapping (SLM), Partial Transmit Sequence (PTS), Clipping, and Nonlinear Compounding, which will be discussed later in the paper. The clipping technique, in particular, has been thoroughly analyzed as a simple and crucial method for reducing PAPR. However, an arbitrary choice of clipping threshold can result in significant signal distortion, degrading the transmission quality. Therefore, it is essential to find an optimum threshold that minimizes PAPR while preserving signal quality, which is a challenging task. The classical clipping scheme may not yield satisfactory results in this regard. This paper proposes a modified clipping scheme that estimates the dynamic range of a noisy OFDM signal. The estimated parameters are then used to determine the optimal threshold, which is more reliable than the previous technique that assumes an arbitrary dynamic value. Simulation results indicate that the proposed modified clipping scheme has achieved a PAPR reduction of 3.5 dB compared to the original OFDM.
A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetim...IJCNCJournal
The Internet of Things (IoT) facilitates real-time connectivity of objects, allowing for access from anywhere at any time. For IoT Low-Power and Lossy Networks (LLNs), the Routing Protocol for Low-Power and Lossy Networks (RPL) has been introduced. In RPL-based topologies, the rank of nodes reflects their positions within the network, calculated by adding the rank of a node's preferred parent to the link metric between them. However, due to inaccuracies in assigning link metric values to neighboring nodes, frequent changes in preferred parent selection occur, resulting in significant control overhead, increased energy consumption, higher latency, and degraded Packet Delivery Ratio (PDR). This paper presents an optimized path selection method that ensures the most stable and optimal choice of preferred parents for nodes. Using the Cooja simulator under various network densities, the proposed approach demonstrates a 73% reduction in preferred parent changes, a 49% decrease in control overhead, and a 50% reduction in total energy consumption. Additionally, it improves PDR by 46% and reduces latency by 2.81 seconds.
A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network ...IJCNCJournal
Wireless Sensor Networks (WSNs) are crucial for various applications such as environmental monitoring, industrial automation, and healthcare. However, the constrained energy resources of sensor nodes have a substantial effect on the longevity and performance of these networks. To address this issue, this paper introduces the Optimized Energy Efficient algorithm in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics together. The study offers a new approach to selecting cluster heads by combining residual energy and distance metrics. The proposed algorithm called modified intelligent energy efficiency cluster algorithm (MIEEC-A), that enhances WSN energy efficiency by choosing nodes with high residual energy and close proximity to their neighbours as cluster heads. Extensive simulations and evaluations show that this approach effectively extends network lifetime, improves data aggregation, and boosts energy efficiency, thus making a valuable contribution to WSN lifetime.
Peak ground acceleration (PGA) is a critical parameter in ground-motion investigations, in particular in earthquake-prone areas such as Iran. In the current study, a new method based on particle swarm optimization (PSO) is developed to obtain an efficient attenuation relationship for the vertical PGA component within the northern Iranian plateau. The main purpose of this study is to propose suitable attenuation relationships for calculating the PGA for the Alborz, Tabriz and Kopet Dag faults in the vertical direction. To this aim, the available catalogs of the study area are investigated, and finally about 240 earthquake records (with a moment magnitude of 4.1 to 6.4) are chosen to develop the model. Afterward, the PSO algorithm is used to estimate model parameters, i.e., unknown coefficients of the model (attenuation relationship). Different statistical criteria showed the acceptable performance of the proposed relationships in the estimation of vertical PGA components in comparison to the previously developed relationships for the northern plateau of Iran. Developed attenuation relationships in the current study are independent of shear wave velocity. This issue is the advantage of proposed relationships for utilizing in the situations where there are not sufficient shear wave velocity data.
THE RISK ASSESSMENT AND TREATMENT APPROACH IN ORDER TO PROVIDE LAN SECURITY B...ijfcstjournal
Local Area Networks(LAN) at present become an important instrument for organizing of process and
information communication in an organization. They provides important purposes such as association of
large amount of data, hardware and software resources and expanding of optimum communications.
Becase these network do work with valuable information, the problem of security providing is an important
issue in organization. So, the stablishment of an information security management system(ISMS) in
organization is significant. In this paper, we introduce ISMS and its implementation in LAN scop. The
assets of LAN and threats and vulnerabilities of these assets are identified, the risks are evaluated and
techniques to reduce them and at result security establishment of the network is expressed.
Expansive soils (ES) have a long history of being difficult to work with in geotechnical engineering. Numerous studies have examined how bagasse ash (BA) and lime affect the unconfined compressive strength (UCS) of ES. Due to the complexities of this composite material, determining the UCS of stabilized ES using traditional methods such as empirical approaches and experimental methods is challenging. The use of artificial neural networks (ANN) for forecasting the UCS of stabilized soil has, however, been the subject of a few studies. This paper presents the results of using rigorous modelling techniques like ANN and multi-variable regression model (MVR) to examine the UCS of BA and a blend of BA-lime (BA + lime) stabilized ES. Laboratory tests were conducted for all dosages of BA and BA-lime admixed ES. 79 samples of data were gathered with various combinations of the experimental variables prepared and used in the construction of ANN and MVR models. The input variables for two models are seven parameters: BA percentage, lime percentage, liquid limit (LL), plastic limit (PL), shrinkage limit (SL), maximum dry density (MDD), and optimum moisture content (OMC), with the output variable being 28-day UCS. The ANN model prediction performance was compared to that of the MVR model. The models were evaluated and contrasted on the training dataset (70% data) and the testing dataset (30% residual data) using the coefficient of determination (R2), Mean Absolute Error (MAE), and Root Mean Square Error (RMSE) criteria. The findings indicate that the ANN model can predict the UCS of stabilized ES with high accuracy. The relevance of various input factors was estimated via sensitivity analysis utilizing various methodologies. For both the training and testing data sets, the proposed model has an elevated R2 of 0.9999. It has a minimal MAE and RMSE value of 0.0042 and 0.0217 for training data and 0.0038 and 0.0104 for testing data. As a result, the generated model excels the MVR model in terms of UCS prediction.
Department of Environment (DOE) Mix Design with Fly Ash.MdManikurRahman
Concrete Mix Design with Fly Ash by DOE Method. The Department of Environmental (DOE) approach to fly ash-based concrete mix design is covered in this study.
The Department of Environment (DOE) method of mix design is a British method originally developed in the UK in the 1970s. It is widely used for concrete mix design, including mixes that incorporate supplementary cementitious materials (SCMs) such as fly ash.
When using fly ash in concrete, the DOE method can be adapted to account for its properties and effects on workability, strength, and durability. Here's a step-by-step overview of how the DOE method is applied with fly ash.
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
This presentation provides a detailed overview of air filter testing equipment, including its types, working principles, and industrial applications. Learn about key performance indicators such as filtration efficiency, pressure drop, and particulate holding capacity. The slides highlight standard testing methods (e.g., ISO 16890, EN 1822, ASHRAE 52.2), equipment configurations (such as aerosol generators, particle counters, and test ducts), and the role of automation and data logging in modern systems. Ideal for engineers, quality assurance professionals, and researchers involved in HVAC, automotive, cleanroom, or industrial filtration systems.
Video Games and Artificial-Realities.pptxHadiBadri1
🕹️ #GameDevs, #AIteams, #DesignStudios — I’d love for you to check it out.
This is where play meets precision. Let’s break the fourth wall of slides, together.
1.2 Need of Object-Oriented Programming.pdfVikasNirgude2
Design and implementation of new routing
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
DOI : 10.5121/ijcnc.2015.7409 127
DESIGN AND IMPLEMENTATION OF NEW ROUTING
STRATEGY FOR ENHANCED ENERGY EFFICIENT IN
WSN
Mehdi Bouallegue1,2
, Hager Benfradj3
, Kosai Raoof1
and Bouallegue Ridha3
1
Laboratory of Acoustics at University of Maine, LAUM UMR CNRS n 6613, France
2
System of communication SysCom, ENIT, Tunisia
3
Innovation of communication and cooperative mobiles, InnoV’COM Lab, University of
Carthage,Tunisia
ABSTRACT
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes
are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and
challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN
lifetime and especially at the network layer which uses routing strategies to maintain the routes in the
network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach
considers not only the distance between wireless sensors but also the energy of node acting as a router in
order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed,
network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in
WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy
might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
KEYWORDS
Energy saving, Routing protocol, lifetime, WSN, power consumption, Sensor node, NS2.
1. INTRODUCTION
In the last few years, wireless sensor networks have increasingly attracted considerable attention
among researchers in the field of Telecommunications. They are considered as one of the most
active areas of technology development due to their unique characteristics, low cost, easy
deployment and flexibility [1].
WSN help human to perform many tasks such as habitat monitoring, industry application,
collaborative and distributed computing, military, agriculture, emergency operations and health
care application [2] [4]. Although wireless sensor network is employed in various fields, it has
many constraints such as limited storage capacities, limited communication abilities and
especially limited energy resources due to the finite battery-power available [5]. In this type of
networks, each wireless sensor is able of acting as a router along with being a source node or
destination node. Hence, when sensor cannot achieve correctly its task, the performance of WSN
can be greatly impeded and eventually the basic availability of the network such as routing
approach can be affected.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
128
On the other hand, reload or replace sensor nodes battery after their exhaustion is very difficult
especially in unreachable areas such as desert or battlefield [6]. So a careful energy resource
management is needed to increase the lifetime of wireless sensor networks. Substantial researches
have been carried out to analyze and overcome the constraints of WSNs.
Hence, several routing protocols have been designed and implemented to improve the
performance of these types of networks.
Indeed, routing protocols play an important role in WSNs. They permits to determine the optimal
path to a destination, ensures successful connectivity and guarantee reliable communication. But
the problem in existing energy aware communication protocols is that they try to find an optimal
path and then repeatedly use this best route for every communication, which conducts to rapid
energy diminution of the wireless sensors on the selected path. Substantial researches have been
carried out to analyze and overcome the constraints of WSNs. Hence, several routing protocols
have been designed and implemented to enhance the performance of these types of networks.
Authors in [8] proposed a new protocol called MAODV derived from AODV mechanism. Their
idea was to take into account the bit error rate as the metric to be reduced for route selection. The
simulation results showed that MAODV improves the packet delivery ratio at the cost of a delay
increase.
In addition, in [9] authors considered the transmit power control as a metric to improve the
performance of AODV routing technique. The same authors proposed in [10] a new strategy to
set a timeout for a path in order to remove the stale paths after a certain timeout period and
minimize the number of control packets. Hence, this approach permits to reduce the power
consumption of the network. A small change in the traditional AODV protocol which integrates
local routing of intermediate sensors in order to improve energy consumption of the network is
proposed in [11] and called E-AODV approach.
Among these works, most of them just integrated one cost metric (as energy or BER or transmit
power, etc.) to optimize the energy consumption of the wireless network.
In this paper, we propose a new routing strategy which considers not only the distance between
wireless sensors but also the energy of node acting as a router in order to find the best path and
achieve a dynamic and adaptive routing to increase network lifetime as long as possible.
Performance analysis of both reactive and proactive routing protocols namely DSR, AODV,
DSDV was studied in our earlier work [3] on the basis of various performance metrics and under
various traffic scenarios. Through extensive simulations, we deduced that AODV and DSR
yielded better performance than the DSDV even when the network has a large number of sensor
nodes. The results also disclose that AODV routing technique becomes more effective in
providing better performance when the studied metrics are simulated. So we concluded that
AODV technique can be considered as the most energy efficient protocol.
In this regard, we suggest a new energy efficient communication protocol for wireless sensor
networks based on the AODV platform. The main goal of our approach is to enhance the network
lifetime as well as discover the optimal path from the source sensor to the destination based on
combination of two most important metrics to evaluate the optimal path namely: distance relative
to the sink and energy available in each sensor node acting as router. Our new algorithm extends
and optimizes the routing AODV approach.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
129
This work is arranged into five sections. Section II covers a brief overview of routing
strategy. Section III describes the considered performance metrics. Section IV provides a detail
description of the design and implementation of our proposed routing approach. In section V we
compare the performance of CEDM-DR protocol with its counterpart routing technique. Finally
the conclusion of the work and future directions are provided in the last section.
2. OVERVIEW OF WSN ROUTING PROTOCOL
In wireless communication we can distinguish two categories. The first needs to have direct
access to the base station (BS) for the transmission of communications. While the second has the
opportunity to access to the BS via the intermediate nodes using a communication hop by hop
[17]. The most important problem for an ad-hoc network is the delivery of data packets between
the mobile nodes. Since the node topology changes frequently this makes routing very
problematic.
Low bandwidth, limited battery capacity, and proneness to errors add to the complexity of the
design of an efficient routing protocol. A routing technique in WSN presents many challenges
compared to data routing in wired networks.
Indeed, the choice of the route is done by routing algorithms. Different routing methods are
proposed for wireless sensor networks. These protocols are classified according to many
parameters and to the strategies of discovering and maintaining routes.
Protocols can be classified [20] as reactive, proactive and hybrid, depending on their operation
and type of requests. Proactive protocols control peer connectivity to ensure the availability of
any path between the active nodes. In order to maintain a common network topology, sensor
nodes announce their routing state tables of the entire network.
On the other hand, reactive protocols establish paths only on request. Meanwhile, the sensors are
inactive in terms of routing behavior. Nodes transmit each routing request to their peers until
comes to a sink node and the last answer on the reverse communication path.
2.1. DSDV Routing protocol
Destination Sequenced Distance Vector (DSDV) [12] is a hop-to-hop distance vector routing
protocol. It is characterized by each host maintaining a table consisting of the next-hop neighbor
and the distance to the destination in terms of number of hops.
In order to obtain the optimal path, the protocol DSDV guarantees loop free routes to each
destination node, this is based on an average settling delay, which is a delay before advertising a
route. All the hosts periodically broadcast their tables to their neighboring nodes in order to
maintain an updated view of the network.
2.2. DSR Routing Protocol
The DSR protocol is a reactive protocol that aims to limit the bandwidth consumed by packet
routing in wireless ad-hoc wireless networks. Dynamic source routing protocol [13] is based on
the concept of a routing algorithm from the source node to discover routes.
This means that every node needs only forward the packet to its next hop specified in the header
and need not check its routing table as in a table-driven algorithm. Determining source routes
requires accumulating the address of each device between the source and destination during the
route discovery.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
130
2.3. AODV Routing Protocol
The ad-hoc on demand distance vector is an on demand algorithm, meaning that it builds routes
between nodes only as desired by source nodes. It maintains these routes as long as they are
needed by the sources. AODV [8] [12] uses sequence numbers to ensure the freshness of routes.
This routing protocol builds routes using a route request on a route reply query cycle.
AODV uses a reactive approach for finding routes and a proactive approach for identifying the
most recent path. This protocol uses the same route discovery process to DSR protocol for finding
fresh routes.
3. PERFORMANCE METRICS
The technical performance of our proposed routing algorithm is evaluated based on various
performance metrics [3].
3.1 Average energy consumption
The energetic consumption is the average of the total energy consumption of the entire network to
transmit data packets from a source to destination. We obtain the energy consumption by
calculating the ratio of the sum of the total energy consumed by each node to the total number of
nodes [21].
[
So a protocol that uses less energy during the simulation is considered more effective [12].
3.2 Lifetime
Network lifetime is the time span from the deployment to the instant when the WSN is considered
non-functional. It can be, for example, the instant when a percentage of sensors die and
consequently the loss of coverage occurs [6] [14].
3.3 Packet Lost
It represents the total number of data packets dropped during the simulation. The loss of a packet
may be due to a collision during transmission process.
rs NPNPPL −= (1)
Where:
- PL: The number of packet lost
- NPs: The number of packet send
- NPr: The number of packet received
4. CEDM-DR PROTOCOL DESIGN AND IMPLEMENTATION
4.1 WSN Energy Consumption Model
In this work, the energy consumed by both the transmitter and the receiver blocks was evaluated
for calculating the total energy consumption in the network. We perform the transmitter and
receiver hardware model as introduced in [3] [19].
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
131
The total energy consumed by a wireless sensor S is the consumed energy by its communication
block (transmitter / receiver), sensing block and processing block [15].
We consider that transceiver circuit of a wireless node operates according to three modes. Indeed,
when there is information to send the sensor node operates in the communication mode so all
these circuits are active.
But, if there is no data to communicate the sensor circuits switch to standby mode. During this
mode, wireless node is in a state of listening and sensing.
This strategy contributes to reduce energy consumption that's why the power consumption in this
mode is small enough to be neglected.
In this study we assume that the energy consumed by the sensing and the processing block is
neglected because it is quite negligible with respect to the energy consumed by the
communication block [17] [18].
.
(2)
Where:
- Ec-sens is the energy consumed during sensing process.
- Ec-proc is the Energy consumed during the processing phase
- Ec-com Energy consumed during communication phase.
(3)
We considered the energy model as introduced in [19] and shown in the following Figure.
Figure 1. Energy model adopted
The total energy consumption of the communication process is expressed as follows [18]:
(4)
Where:
- ETx represents the energy consumed during the transmission process.
EEEsE comcproccsenscctot −−−− ++=)(
)()( sEsE comcpctot −− ≈
),(),()( dLEdLEsE RxTxctot +=−
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
132
- ERx represents the energy consumed during the reception process.
- L is the number of bit transmitted.
- d is the distance between transmitting sensor and receiving sensor
Expressing each terms:
(5)
(6)
Where:
- Ecircuit represents the energy consumed by the electronic circuits.
- Kamp : is the transmission amplification coefficient
- λ is the path loss exponent.
4.2 CEDM-DR Algorithm
In this section, we describe the algorithm of our new routing protocol which is based on
combination of two major metrics: distance and energy.
- Step 1: Each network node(s) transmits hello messages to discover neighboring nodes to
one hop.
- Step 2: Verification that the sink and the source node own neighboring nodes. ( If true go
to Step3 else Stop )
- Step 3: All network nodes discover neighboring nodes through the Step 1.
- Step 4: All network nodes evaluate the distance between each neighbor and the sink. This
distance is expressed as follows:
(7)
Where the Xs and Ys are respectively the coordinate of the node “s”.
- Step 5 : The weight is calculated using two parameters which are the remaining energy in
the node receiver and the distance between the receiver node and the sink.
(8)
- Step 6 : When one of the sensor nodes needs to transmit data it will choose the node with
the highest weight among these neighbors.
The setting parameters considered in our simulations are summarized in Table II.
To simulate different routing protocols we choose network simulator 2 (Ns2) since it is open
source free software in which different specifications in the environment can simply modified and
changed. Figure 2 presents an example of wireless sensor network under NS2.
Performance of the routing protocols AODV and the new protocol CEDM-DR are evaluated
based on different performance metrics, average energy consumption, the lifetime of the network
and total dropped data packets.
λ
dLkLEsE ampcircuitTx ***)( +=
LEsE circuitRx *)( =
( ) ( )2
sin
2
sin)( ksksSink YYXXsD −+−=
)(
1
)(Re)(
sD
smainingEnergysWeight
Sink
+=
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
133
Table 1. Simulation Parameters.
Parameters Values
Routing Protocols AODV, CEDM-DR
Number of Nodes deployed 25 to 200
Environment Size 400*400m2
Nodes Placement Strategy Random
Transmission Range 100m
Initial Node Energy 2.5 Joules
Tx Power 0.07mw
Idle Power 0.03mw
Sleep power 0.01mw
Energy circuit 50nJ/bit
K amplification coefficient 100pJ/bit/m2
Simulation Time 150sec
Antenna Model Omni Antenna
Propagation Model Two Ray Ground
Transport Protocol TCP/UDP
Figure 2. Simulation on NS2
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
134
Figure 3. Total average energy consumption
The average energy consumed by the sensor nodes as a function of the number of nodes is
illustrated in Figure 3. We note that for all variations of the number of node the new routing
protocol implemented still consumes less than the traditional AODV protocol using CEDM-DR,
we observe between 0% and 66% energy savings when compared with AODV.
Figure 4. Lifetime of the network
Figure 4 depicts the number of nodes living on a total of 200 nodes with respect to the number of
transmissions during the simulation. These curves show that the new protocol CEDM-DR
improves the entire network’s lifetime. This is mainly due to the dynamic priority-weight
adopted.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
135
Figure 5. Total of dropped packet
The total number of packet lost as a function of the number of sensor nodes is drawn in Figure 5.
From this plot, we confirm that our new approach allows to obtain lower number of packet lost
than its counterpart. The CEDM-DR protocol reduces between 0% and 50% of packet lost.
5. CONCLUSIONS
In this paper, the performance of a new routing protocol using two important cost metrics has
been evaluated through extensive simulations verifying that our proposed algorithm is effective in
saving energy and leads the system to overall enhancements.
Indeed, implementation and experimentation of Combined Energy and Distance Metrics Dynamic
Routing Protocol (CEDM-DR) using network simulator reveals that our new approach is better
than AODV in energy consumption, Packet Lost and especially in Lifetime.
To sum up, the above results illustrate that the CEDM-DR strategy works well when compared
with AODV. Hence, our future plan is to evaluate security issues in this new routing approach
CEDM-DR.
ACKNOWLEDGEMENTS
This work was supported in part by Laboratory of Acoustics at University of Maine, LAUM
UMR CNRS n_6613 in France and Laboratory of System of communication Sys’Com, ENIT in
Tunisia.
REFERENCES
[1] Lee, S.hyun. & Kim Mi Na, (2008) “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5,
pp120-122. Anna, H. Wireless sensor network design , (Wiley), 2003.
[2] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE
Communications Magazine, pp. 102-114, Aug. 2002.
[3] Mehdi Bouallegue, Kosai Raoof, Maha Ben Zid, Ridha Bouallegue, Impact of Variable Transmission
Power on Routing Protocols in Wireless Sensor Networks, 10th International Conference on Wireless
Communications, Networking and Mobile Computing (Wicom14),Beijing, China September 2014.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
136
[4] W. B. Heinzelman, Application-specific protocol architectures for wireless networks, Ph.D.
dissertation, Massachusetts Institute of Technology, May 2000.
[5] Heinzelman W B, Chandrakasan, A.P., An application-specific protocol architecture for wireless
microsensor networks, Wireless Communications IEEE Transaction, vol 1, 2002.
[6] Y. Chen and Q. Zhao, On the lifetime of wireless sensor networks, Communications Letters, IEEE,
vol. 9, no. 11, pp. 976978, 2005.
[7] Awatef Benfradj Guiloufi, Nejeh Nasri, Abdennaceur Kachouri, Energy- Efficient Clustering
Algorithms for Fixed and Mobile Wireless Sensor Networks, in The International Wireless
Communications and Mobile Computing Conference, IWCMC´14 Cyprus, 2014.
[8] Gianluigi Ferrari, Simone A. Malvassori, Marco Bragalini, Ozan K. Tonguz, Physical Layer-
Constrained Routing in Ad-hoc Wireless Networks: A Modfied AODV Protocol with Power Control,
IWWAN, 2005.
[9] Tamilarasi M., Palanivelu T.G., Integrated Energy-Aware Mechanism for MANETs using On
demand Routing, World Academy of Science, Engineering and Technology,2008.
[10] Tamilarasi M. and Palanivelu T.G., Adaptive link timeout with energy aware mechanism for on
demand routing in MANETs, Ubiquitous Computing and Communication Journal, 2010.
[11] Charu Gupta, Pankaj Sharma, Implementation of Energy Aware Routing Protocol for Mobile Ad Hoc
Networks, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 11, November 2013.
[12] Chetan, B.M, Deshpande P.P., Gireesh Hegde, B. and Srinivas, Analysis of DSDV and AODV for
Disaster Management System in Coal Mines, Wireless Communications, Networking and Mobile
Computing (WiCOM), 23-25 Sept. 2011.
[13] A. Almutairi and T. Hendawy, Performance Comparison of Dynamic Source Routing in Ad-Hoc
Networks, IEEE GCC Conference ,Dubai,19 - 22 Feb. ,2011.
[14] Bhardwaj, M and Chandrakasan, A.P ,Bounding the Lifetime of Sensor Networks Via Optimal Role
Assignments,in Proceedings of the 21st IEEE INFOCOM.Vol 13.No.4, January 2011.
[15] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey,
Computer Networks, vol. 38, pp. 393 422, 2002.
[16] Proakis, J. G. Digital communications, New York: McGraw Hill, 1995.
[17] Rappaport, T. S., Wireless communications: principles and practice, New York: Prentice Hall, 1996.
[18] Gopinath Balakrishnan , Mei Yang , Yingtao Jiang, and Yoohwan Kim, Performance Analysis of
Error Control Codes for Wireless Sensor Networks, Fourth International Conference on Information
Technology, ITNG’07, 2007.
[19] Tran Cong Hung and Nguyen Hong Quan, A proposal for improve the lifetime of wireless sensor
network, International Journal of Computer Networks & Communications (IJCNC), Vol.6, No.5,
September 2014.
[20] J. N. Al-karaki and A. E. Kamal, Routing techniques in wireless sensor networks: A survey, IEEE
Wireless Communications, vol. 11, pp. 628, 2004.
[21] Zhongwei zhang and Hong Zhou, Empirical examination of mobile Ad-hoc routing protocols on
wireless sensor networks, International Journal of Computer Networks & Communications (IJCNC),
Vol.1, No.1, November 2010.
Authors
Mehdi Bouallegue received the B.S. degree in 2008 from Higher Institute of Computer
and Communication Techniques, Tunisia and M.S. degree in 2010 from National
Engineering School of Tunis. Currently he is a Ph.D. student at the School of
Engineering of Tunis. He is a researcher associate with Laboratory of Acoustics at
University of Maine, LAUM UMR CNRS n° 6613, France, and Laboratory System of
communication SysCom, ENIT, Tunisia.He is Assistant in National school of Engineering of Carthage
(ENI Carthage), Tunisia. His research interests are mainly in the field of telecommunications, wireless
sensor networks, optimization of routing protocols, Network simulation.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4, July 2015
137
Kosai Raoof obtained his M.Sc. and Ph.D. from Grenoble University in 1990 and 1993
respectively; in 1998 he obtained the Habilitation à Diriger Des Recherches Degree (HDR).
He was invited to join Laboratoire des Images et Signaux (LIS) in 1999, to participate in the
founding of telecommunication research group. His research interest was first focalized on
advanced MIMO systems and joint CDMA synchronization; he studied and introduced polarized diversity
in MIMO systems. In 2007 he joined GIPSA-LAB to continue his research on Smart Sensor Networks and
cooperative MIMO antenna systems. He is a referee for many international journals and conferences in the
field of telecommunications and signal processing. He is currently a full professor at the ENSIM
Engineering College, University of Maine, Le Mans.
Ridha Bouallegue received the Ph.D. degrees in electronic engineering from the National
Engineering School of Tunis. In Mars 2003, he received the Hd.R degrees in multiuser
detection in wireless communications. From September 1990 He was a graduate Professor
in the higher school of communications of Tunis (SUP’COM), he has taught courses in
communications and electronics. From 2005 to 2008, he was the Director of the National
engineering school of Sousse. In 2006, he was a member of the national committee of science technology.
Since 2005, he was the laboratory research in telecommunication Director’s at SUP’COM. From 2005, he
served as a member of the scientific committee of validation of thesis and Hd.R in the higher engineering
school of Tunis.