SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7310
REDUCTION OF PACKET DATA LOSS IN WIRELESS MESH NETWORK
USING PATH MECHANISM APPROACH
Rohit Bansal1, Manpreet Kaur2, Vishal Garg3
1, 2, 3 Department of Electronics & Communication Engineering
1, 2, 3 Swami Vivekanand Institute of Engineering and Technology, Banur, INDIA
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A wireless mesh network (WMN) is a
communication network made up of radio nodes organized in
a mesh topology. Wirelessmeshnetworkoftenconsistsof mesh
clients, mesh routers and gateways. A wireless Mesh network
uses multi-hop communication. Due to multi-hoparchitecture
and wireless nature, Mesh networks are vulnerable to various
types of Denial of Services attack. It suffers from Packet
dropping at Routing layer. Client nodes are unable to get
services from gateway nodes, hence network gets down. The
Paper emphasis on the developing of a path protocolwhenthe
minimum possible packet drop occurs in wireless mesh
networks. Due to packet dropping occurrences the network
performance degrades. In the work, we have evaluated the
Performance of WMN under packet dropping on the basis of
their throughput and Data packet loss.
Key Words: WMN; Packet Loss, Path Dropping, PDA
1. INTRODUCTION
Wireless mesh networking has emerged as a promising
concept to meet the challenges in next-generation wireless
networks such as providing flexible, adaptive, and
reconfigurable architecture while offering cost-effective
solutions to service providers. Several architectures for
wireless mesh networks (WMNs) havebeenproposedbased
on their applications [1]. One of the most general forms of
WMNs interconnects the stationary andmobileclientstothe
Internet efficiently by the core nodes in multi-hop fashion.
The core nodes are the mesh routers which form a wireless
mesh backbone among them. The mesh routers provide a
rich radio mesh connectivity which significantly reducesthe
up-front deployment cost and subsequentmaintenancecost.
They have limited mobility andforwardthepacketsreceived
from the clients to the gateway router which is connected to
the backhaul network/Internet [2].
The mesh backbone formed by mesh routersprovidesa high
level of reliability [3]. WMNs are being consideredfora wide
variety of applications such as backhaul connectivity for
cellular radioaccessnetworks,high-speedmetropolitan area
mobile networks, community networking, building
automation, intelligent transport system networks, defence
systems, and citywide surveillance systems. Prior efforts on
wireless networks, especially multi-hop ad hoc networks,
have led to significant research contributions that range
from fundamental results on theoretical capacity bounds to
development of efficient routing and transport layer
protocols [4]. However, the recent work is on deploying
sizable WMNs and other important aspects such as network
radio range, network capacity,scalability,manageability,and
security. There are a number of research issues in different
layers of the protocol stack and a number of standards are
coming up for the implementation of WMNs for WANs,
MANs, LANs, and PANs. The mesh networking test beds by
industries and academia further enhanced the research in
WMNs. The mesh networking products by different vendors
are making WMNs a reality [5].
1.1 Architecture of WMN
There are two types of nodes in a WMN called mesh routers
and mesh clients.Compared toconventional wirelessrouters
that perform only routing, mesh routers have additional
functionalities to enablemeshnetworking.Themeshrouters
have multiple interfaces of the same or different
communications technologies based on the requirement.
They achieve more coverage with the same transmission
power by using multi hop communication through other
mesh routers. They can be built on general-purpose
computer systems such as PCs and laptops,orcanbe builton
dedicated hardware platforms (embedded systems). There
are a variety of mesh clients such as laptop, desktop, pocket
PCs, IP phones, RFID readers, and PDAs. The mesh clients
have mesh networking capabilities to interact with mesh
routers, but they are simpler in hardware and software
compared to mesh routers. Normally they have a single
communication interface built on them. The architecture of
WMNs (shown in Figure 1) is the most commonarchitecture
used in many mesh networking applications such as
community networking and home networking. The mesh
routers shown have multiple interfaces with different
networkingtechnologieswhichprovideconnectivitytomesh
clients and other networks such as cellular and sensor
networks. Normally, long-range communication techniques
such as directional antennas are provided for
communication between mesh routers. Mesh routersforma
wireless mesh topology that has self-configuration and self-
healing functions built into them. Some mesh routers are
designated as gatewayswhichhavewiredconnectivityto the
Internet. The integration ofother networkingtechnologiesis
provided by connecting the BS of the network that connects
to WMNs to the mesh routers. Here, theclientscommunicate
to the BS of its own network and the BS in turn
communicates to the mesh router to access the WMN.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7311
Figure 1: Wireless Mesh Network
1.2 Applications of WMNs
WMNs introduce the concept of a peer-to-peer mesh
topology with wireless communication between mesh
routers. This concept helps to overcome many of today’s
deployment challenges, such as the installation of extensive
Ethernet cabling, and enables new deployment models.
Deployment scenarios that are particularly well suited for
WMNs include the following [6]:
 Campus environments (enterprises and
universities), manufacturing, shopping centres,
airports, sporting venues, and special events
 Military operations, disaster recovery, temporary
installations, and public safety
 Municipalities, including downtown cores,
residential areas, and parks
 Carrier-managed service in public areas or
residential communities
Due to the recent research advances in WMNs, they have
been used in numerous applications. The mesh topology of
the WMNs provides many alternative paths for any pair of
source and destination nodes, resulting in quick
reconfiguration of the path when there is a path failure.
WMNs provide the most economical data transfer coupled
with freedom of mobility. Mesh routers can be placed
anywhere such as on the rooftop of a home or on a lamppost
to provide connectivity to mobile/static clients. Mesh
routers can be added incrementally to improvethecoverage
area. These features of WMNs attract the research
community to use WMNs in different applications:
Home Networking: Broadband home networking is a
network of home appliances (personal computer,television,
video recorder, video camera, washing machine,
refrigerator) realized by WLAN technology. The obvious
problem here is the location of the access point in the home,
which may lead to dead zones without service coverage.
More coverage can be achieved by multiple access points
connected using Ethernet cabling, whichleadstoanincrease
in deployment cost and overhead. These problems can be
solved by replacing all the access points by the mesh routers
and establishing mesh connectivity between them. This
provides broadband connectivity between the home
networking devices and only a single connection to the
Internet is needed through the gateway router. By changing
the location and number of mesh routers,thedeadzones can
be eliminated. Figure 2 shows a typical home network using
mesh routers.
Figure 2: Wireless mesh network-based home networking
2. LITERATURE REVIEW
N.A Benjamin et al, 2016 proposed that WMNs can beusedto
transmit vital information arising from the wireless body
sensor network (WBSN) to a backbone network. The
integration of WBSN and WMN technologies results in
wireless sensor mesh network (WSMN) and this type of
network can be utilized for remote health monitoring of
patients. The battery-powered,memory-constrainedsensors
transmit the sensed information to their nearest meshnodes
and the mesh nodes, in turn, use multi-hop routing to
transmit the information to the backbone network devices
like PDA or the servers for health monitoring applications.
The authors have investigated performance of such a WSMN
for patient health monitoring applications, in terms of
parameters likedelay,andthroughputundervaryingnumber
of patients and doctors [7].
Sukla Banerjee, 2010 proposed a mechanism to detect and
remove the black holeandgrayholeattacks.Thistechniqueis
capable of cooperating malicious nodes which drop a
significant fraction of packets in AODV protocol. In this
technique, each node can locally maintain its own table of
black listed nodes whenever it tries to send data to any
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7312
destination nodeand it can also aware the networkaboutthe
black listed nodes [8].
Y.L Sun et al, 2016 have presented trust as a measure of
uncertainty. Using theory of entropy, the authors have
developed a few techniques to compute trust values from
certain observation. In addition, trust models – entropy-
based and probability-based are presented to solve the
concatenationand multi-path trust propagation problems in
a MANET [9].
Yu Cheng et al, 2009 proposed a practical algorithm channel
aware detection (CAD) to detect and isolate the selective
forwarding attackers in the area of multi hop networks such
as WMNs. CAD mainly adopts two strategies for detection
[10]
3. PROBLEM STATEMENT
Client nodes are unable to get services from gateway nodes,
hence network gets down. The paper emphasis on the
developing of a path protocol when the minimum possible
packet drop occurs inwirelessmeshnetworks.Dueto packet
dropping occurrencesthenetwork performancedegrades.In
the work, we have evaluated thePerformanceof WMN under
packet dropping on the basis of their throughput and Data
packet loss.
3.1 Objectives
The objectives of the thesis are summarized as follows:
 Analysis of performance due to packet dropping
attacks in wireless meshnetworksatRoutingLayer.
 Propose a detection Technique.
 Implementation of Proposed Technique using
MATLAB
4. CONCLUSION
Client nodes are unable to get services from gateway
nodes, hence network gets down. The paper emphasis
on the developing of a path protocol when the
minimumpossiblepacketdropoccursinwirelessmesh
networks. Due to packet dropping occurrences the
network performance degrades. In the work, we have
evaluated the Performance of WMN under packet
dropping on the basis of their throughput and Data
packet loss. In the future directions, this work can be
extended by using hundreds of nodes and we need to
develop the Intrusion detection System (IDS) that also
chooses the monitor by considering battery life
parameter. It is important to consider congestion
conditions of the nodes using information obtained
from other layers before determining the nodes to be
malicious. Also, detecting intrusions at different layers
increases the information about the malicious nodes
thus identifying these nodes more accurately.
REFERENCES
[1] X. Wang and A. O. Lim, "IEEE 802.11s wireless mesh
networks: Framework and challenges," Ad Hoc Netw.,
vol. 6, no. 6, pp. 970-984, 2008
[2] G. R. Hertz, S. Max, E. Weir, L. Berlemann, D. Denteneer,
and S. Mangold, “Mesh Technology enabling Ubiquitous
Wireless Networks,” in Proceedings of the 2nd Annual
International Wireless Internet Conference (WICON
’06), Boston, MA, USA: ACM, Invited Paper, pp. 11,
August, 2006.
[3] Yan Zhang, Jun Zheng “Book Title:-Security in Wireless
Mesh Networks”.
[4] w.steven,jan kryus, kyeongsoo kim, juan carlos zuniga
“802.11s tutorial overview of the amendment for
wireless local area networking” in ieee802 plenary,
Dallas , November ,2006.
[5] Akyildiz, I.F.; Xudong Wang “A Survey on Wireless Mesh
Networks” in Communications Magazine, IEEE Volume
43, Issue 9, pp. S23 - S30, September 2005
[6] A. Pirzada and C. McDonald, “Establishing trust in pure
ad hoc networks”, in Proceedings of the 27th
Australasian Conference on Computer Science, Vol.
26,pp. 181-199, 2004.
[7] N. A. Benjamin and S. Sankaranarayanan, “Performance
of wireless body sensor based mesh An Efficient
Algorithm for detection of Selfish Packet Dropping
Nodes in Wireless Mesh Networks 369 network for
health application”, International Journal of Computer
Information Systems and Industrial Management
Applications (IJCISIM), Vol 2, pp. 20 – 28,2016.
[8] Sukla Banerjee, “Detection/Removal of Cooperative
Black and Gray Hole Attack inMobile Ad-HocNetworks”,
Proceedings of the World Congress on Engineering and
Computer Science, WCECS 2010, San Francisco, USA.
[9] Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Information
theoretic framework of trust modeling and evaluation
for ad hoc networks”, IEEE Journal on Selected Areas in
Communications, Vol. 24, pp. 305 – 317, 2016.
[10] Yu Cheng, Devu Manikantan Shila and Tricha Anjali,
“Channel-Aware Detection of Gray Hole Attacks in
Wireless Mesh Networks”, Dept. of Electrical and
Computer Engineering, Illinois Institute of Technology,
Chicago, USA, 2009.
Ad

More Related Content

What's hot (18)

REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USESREVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
International Journal of Technical Research & Application
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
IRJET Journal
 
24 83-1-pb
24 83-1-pb24 83-1-pb
24 83-1-pb
Mahendra Sisodia
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
Iaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
iosrjce
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
Thesis Scientist Private Limited
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
eSAT Publishing House
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
ijsrd.com
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Fg24980983
Fg24980983Fg24980983
Fg24980983
IJERA Editor
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
Rotract CLUB of BSAU
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
Is3116341640
Is3116341640Is3116341640
Is3116341640
IJERA Editor
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
Amina RIYAHI
 
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
idescitation
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
IRJET Journal
 
Iaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areasIaetsd manet a reliable network in disaster areas
Iaetsd manet a reliable network in disaster areas
Iaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
iosrjce
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
Review on a new generation wireless mobile network
Review on a new generation wireless mobile network  Review on a new generation wireless mobile network
Review on a new generation wireless mobile network
eSAT Publishing House
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
ijsrd.com
 
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksA Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks
IJERA Editor
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
Rotract CLUB of BSAU
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
A survey on security threats and detection2013
A survey on security threats and detection2013A survey on security threats and detection2013
A survey on security threats and detection2013
Amina RIYAHI
 
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
idescitation
 

Similar to IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mechanism Approach (20)

Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
ijsrd.com
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
ADHOC-NETWORKS-PPT made by Amank Lingwal
ADHOC-NETWORKS-PPT made by Amank LingwalADHOC-NETWORKS-PPT made by Amank Lingwal
ADHOC-NETWORKS-PPT made by Amank Lingwal
AmankLingwal
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn
 
A017220112
A017220112A017220112
A017220112
IOSR Journals
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Eswar Publications
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
IJERA Editor
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
GunnalaSoumya
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
ijsrd.com
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
ADHOC-NETWORKS-PPT made by Amank Lingwal
ADHOC-NETWORKS-PPT made by Amank LingwalADHOC-NETWORKS-PPT made by Amank Lingwal
ADHOC-NETWORKS-PPT made by Amank Lingwal
AmankLingwal
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
ijwmn
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Eswar Publications
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Kate Campbell
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
VISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated detailsVISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated details
Vishal Kumar Singh
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
speedcomcyber25
 
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdfIBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
VigneshPalaniappanM
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023
Rajesh Prasad
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
UNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdfUNIT 3 Software Engineering (BCS601) EIOV.pdf
UNIT 3 Software Engineering (BCS601) EIOV.pdf
sikarwaramit089
 
VISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated detailsVISHAL KUMAR SINGH Latest Resume with updated details
VISHAL KUMAR SINGH Latest Resume with updated details
Vishal Kumar Singh
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx698642933-DdocfordownloadEEP-FAKE-PPT.pptx
698642933-DdocfordownloadEEP-FAKE-PPT.pptx
speedcomcyber25
 
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdfIBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
IBAAS 2023 Series_Lecture 8- Dr. Nandi.pdf
VigneshPalaniappanM
 
Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023Urban Transport Infrastructure September 2023
Urban Transport Infrastructure September 2023
Rajesh Prasad
 

IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mechanism Approach

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7310 REDUCTION OF PACKET DATA LOSS IN WIRELESS MESH NETWORK USING PATH MECHANISM APPROACH Rohit Bansal1, Manpreet Kaur2, Vishal Garg3 1, 2, 3 Department of Electronics & Communication Engineering 1, 2, 3 Swami Vivekanand Institute of Engineering and Technology, Banur, INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A wireless mesh network (WMN) is a communication network made up of radio nodes organized in a mesh topology. Wirelessmeshnetworkoftenconsistsof mesh clients, mesh routers and gateways. A wireless Mesh network uses multi-hop communication. Due to multi-hoparchitecture and wireless nature, Mesh networks are vulnerable to various types of Denial of Services attack. It suffers from Packet dropping at Routing layer. Client nodes are unable to get services from gateway nodes, hence network gets down. The Paper emphasis on the developing of a path protocolwhenthe minimum possible packet drop occurs in wireless mesh networks. Due to packet dropping occurrences the network performance degrades. In the work, we have evaluated the Performance of WMN under packet dropping on the basis of their throughput and Data packet loss. Key Words: WMN; Packet Loss, Path Dropping, PDA 1. INTRODUCTION Wireless mesh networking has emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers. Several architectures for wireless mesh networks (WMNs) havebeenproposedbased on their applications [1]. One of the most general forms of WMNs interconnects the stationary andmobileclientstothe Internet efficiently by the core nodes in multi-hop fashion. The core nodes are the mesh routers which form a wireless mesh backbone among them. The mesh routers provide a rich radio mesh connectivity which significantly reducesthe up-front deployment cost and subsequentmaintenancecost. They have limited mobility andforwardthepacketsreceived from the clients to the gateway router which is connected to the backhaul network/Internet [2]. The mesh backbone formed by mesh routersprovidesa high level of reliability [3]. WMNs are being consideredfora wide variety of applications such as backhaul connectivity for cellular radioaccessnetworks,high-speedmetropolitan area mobile networks, community networking, building automation, intelligent transport system networks, defence systems, and citywide surveillance systems. Prior efforts on wireless networks, especially multi-hop ad hoc networks, have led to significant research contributions that range from fundamental results on theoretical capacity bounds to development of efficient routing and transport layer protocols [4]. However, the recent work is on deploying sizable WMNs and other important aspects such as network radio range, network capacity,scalability,manageability,and security. There are a number of research issues in different layers of the protocol stack and a number of standards are coming up for the implementation of WMNs for WANs, MANs, LANs, and PANs. The mesh networking test beds by industries and academia further enhanced the research in WMNs. The mesh networking products by different vendors are making WMNs a reality [5]. 1.1 Architecture of WMN There are two types of nodes in a WMN called mesh routers and mesh clients.Compared toconventional wirelessrouters that perform only routing, mesh routers have additional functionalities to enablemeshnetworking.Themeshrouters have multiple interfaces of the same or different communications technologies based on the requirement. They achieve more coverage with the same transmission power by using multi hop communication through other mesh routers. They can be built on general-purpose computer systems such as PCs and laptops,orcanbe builton dedicated hardware platforms (embedded systems). There are a variety of mesh clients such as laptop, desktop, pocket PCs, IP phones, RFID readers, and PDAs. The mesh clients have mesh networking capabilities to interact with mesh routers, but they are simpler in hardware and software compared to mesh routers. Normally they have a single communication interface built on them. The architecture of WMNs (shown in Figure 1) is the most commonarchitecture used in many mesh networking applications such as community networking and home networking. The mesh routers shown have multiple interfaces with different networkingtechnologieswhichprovideconnectivitytomesh clients and other networks such as cellular and sensor networks. Normally, long-range communication techniques such as directional antennas are provided for communication between mesh routers. Mesh routersforma wireless mesh topology that has self-configuration and self- healing functions built into them. Some mesh routers are designated as gatewayswhichhavewiredconnectivityto the Internet. The integration ofother networkingtechnologiesis provided by connecting the BS of the network that connects to WMNs to the mesh routers. Here, theclientscommunicate to the BS of its own network and the BS in turn communicates to the mesh router to access the WMN.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7311 Figure 1: Wireless Mesh Network 1.2 Applications of WMNs WMNs introduce the concept of a peer-to-peer mesh topology with wireless communication between mesh routers. This concept helps to overcome many of today’s deployment challenges, such as the installation of extensive Ethernet cabling, and enables new deployment models. Deployment scenarios that are particularly well suited for WMNs include the following [6]:  Campus environments (enterprises and universities), manufacturing, shopping centres, airports, sporting venues, and special events  Military operations, disaster recovery, temporary installations, and public safety  Municipalities, including downtown cores, residential areas, and parks  Carrier-managed service in public areas or residential communities Due to the recent research advances in WMNs, they have been used in numerous applications. The mesh topology of the WMNs provides many alternative paths for any pair of source and destination nodes, resulting in quick reconfiguration of the path when there is a path failure. WMNs provide the most economical data transfer coupled with freedom of mobility. Mesh routers can be placed anywhere such as on the rooftop of a home or on a lamppost to provide connectivity to mobile/static clients. Mesh routers can be added incrementally to improvethecoverage area. These features of WMNs attract the research community to use WMNs in different applications: Home Networking: Broadband home networking is a network of home appliances (personal computer,television, video recorder, video camera, washing machine, refrigerator) realized by WLAN technology. The obvious problem here is the location of the access point in the home, which may lead to dead zones without service coverage. More coverage can be achieved by multiple access points connected using Ethernet cabling, whichleadstoanincrease in deployment cost and overhead. These problems can be solved by replacing all the access points by the mesh routers and establishing mesh connectivity between them. This provides broadband connectivity between the home networking devices and only a single connection to the Internet is needed through the gateway router. By changing the location and number of mesh routers,thedeadzones can be eliminated. Figure 2 shows a typical home network using mesh routers. Figure 2: Wireless mesh network-based home networking 2. LITERATURE REVIEW N.A Benjamin et al, 2016 proposed that WMNs can beusedto transmit vital information arising from the wireless body sensor network (WBSN) to a backbone network. The integration of WBSN and WMN technologies results in wireless sensor mesh network (WSMN) and this type of network can be utilized for remote health monitoring of patients. The battery-powered,memory-constrainedsensors transmit the sensed information to their nearest meshnodes and the mesh nodes, in turn, use multi-hop routing to transmit the information to the backbone network devices like PDA or the servers for health monitoring applications. The authors have investigated performance of such a WSMN for patient health monitoring applications, in terms of parameters likedelay,andthroughputundervaryingnumber of patients and doctors [7]. Sukla Banerjee, 2010 proposed a mechanism to detect and remove the black holeandgrayholeattacks.Thistechniqueis capable of cooperating malicious nodes which drop a significant fraction of packets in AODV protocol. In this technique, each node can locally maintain its own table of black listed nodes whenever it tries to send data to any
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7312 destination nodeand it can also aware the networkaboutthe black listed nodes [8]. Y.L Sun et al, 2016 have presented trust as a measure of uncertainty. Using theory of entropy, the authors have developed a few techniques to compute trust values from certain observation. In addition, trust models – entropy- based and probability-based are presented to solve the concatenationand multi-path trust propagation problems in a MANET [9]. Yu Cheng et al, 2009 proposed a practical algorithm channel aware detection (CAD) to detect and isolate the selective forwarding attackers in the area of multi hop networks such as WMNs. CAD mainly adopts two strategies for detection [10] 3. PROBLEM STATEMENT Client nodes are unable to get services from gateway nodes, hence network gets down. The paper emphasis on the developing of a path protocol when the minimum possible packet drop occurs inwirelessmeshnetworks.Dueto packet dropping occurrencesthenetwork performancedegrades.In the work, we have evaluated thePerformanceof WMN under packet dropping on the basis of their throughput and Data packet loss. 3.1 Objectives The objectives of the thesis are summarized as follows:  Analysis of performance due to packet dropping attacks in wireless meshnetworksatRoutingLayer.  Propose a detection Technique.  Implementation of Proposed Technique using MATLAB 4. CONCLUSION Client nodes are unable to get services from gateway nodes, hence network gets down. The paper emphasis on the developing of a path protocol when the minimumpossiblepacketdropoccursinwirelessmesh networks. Due to packet dropping occurrences the network performance degrades. In the work, we have evaluated the Performance of WMN under packet dropping on the basis of their throughput and Data packet loss. In the future directions, this work can be extended by using hundreds of nodes and we need to develop the Intrusion detection System (IDS) that also chooses the monitor by considering battery life parameter. It is important to consider congestion conditions of the nodes using information obtained from other layers before determining the nodes to be malicious. Also, detecting intrusions at different layers increases the information about the malicious nodes thus identifying these nodes more accurately. REFERENCES [1] X. Wang and A. O. Lim, "IEEE 802.11s wireless mesh networks: Framework and challenges," Ad Hoc Netw., vol. 6, no. 6, pp. 970-984, 2008 [2] G. R. Hertz, S. Max, E. Weir, L. Berlemann, D. Denteneer, and S. Mangold, “Mesh Technology enabling Ubiquitous Wireless Networks,” in Proceedings of the 2nd Annual International Wireless Internet Conference (WICON ’06), Boston, MA, USA: ACM, Invited Paper, pp. 11, August, 2006. [3] Yan Zhang, Jun Zheng “Book Title:-Security in Wireless Mesh Networks”. [4] w.steven,jan kryus, kyeongsoo kim, juan carlos zuniga “802.11s tutorial overview of the amendment for wireless local area networking” in ieee802 plenary, Dallas , November ,2006. [5] Akyildiz, I.F.; Xudong Wang “A Survey on Wireless Mesh Networks” in Communications Magazine, IEEE Volume 43, Issue 9, pp. S23 - S30, September 2005 [6] A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks”, in Proceedings of the 27th Australasian Conference on Computer Science, Vol. 26,pp. 181-199, 2004. [7] N. A. Benjamin and S. Sankaranarayanan, “Performance of wireless body sensor based mesh An Efficient Algorithm for detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks 369 network for health application”, International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), Vol 2, pp. 20 – 28,2016. [8] Sukla Banerjee, “Detection/Removal of Cooperative Black and Gray Hole Attack inMobile Ad-HocNetworks”, Proceedings of the World Congress on Engineering and Computer Science, WCECS 2010, San Francisco, USA. [9] Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks”, IEEE Journal on Selected Areas in Communications, Vol. 24, pp. 305 – 317, 2016. [10] Yu Cheng, Devu Manikantan Shila and Tricha Anjali, “Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks”, Dept. of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, USA, 2009.