SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 2, April 2021, pp. 1830~1838
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i2.pp1830-1838  1830
Journal homepage: http://ijece.iaescore.com
Best strategy to control data on internet-of-robotic-things in
heterogeneous networks
Wisam Mahmood Lafta1
, Ahmed A. Alkadhmawee2
, Mohammed A. Altaha3
1
Department of Computer Science, University of Technology, Iraq
2
College of Education for Human Sciences, University of Basrah, Iraq
3
College of Veterinary, University of Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Apr 4, 2020
Revised Aug 7, 2020
Accepted Nov 6, 2020
The control and transmission of huge data constitute an immense challenge
in various types of networks (wired and wireless). Congestion caused by the
high traffic and low throughput of huge data continues to be major problems
in a heterogeneous platforms such as internet of things (IoT) technology and
internet-of-robotic-things (IoRT). The heterogeneous network requires new
models and mechanisms to deal with the increased challenges posed by IoT
and IoRT. Accordingly, eliminating the issues that emerge has compelled
finding improved solutions as a new strategy. This study proposed a new
strategy called routing information and distance vector (RIDV) to create the
best improvement of a heterogeneous network. The RIDV strategy activates
the routing information protocol (RIPv2) on a router in wire network parallel
with the ad-hoc on-demand distance vector (AODV) protocol on the wireless
network. The RIDV strategy is used to solve the problems of the diversity of
heterogeneous networks as the basis of the infrastructure IoRT technology.
Hence, this strategy can reduce or avoid congestion through the use of
enhanced and effective best routing protocols. Simulation results using
OPNET show that the proposed method improved the quality of service
(QoS) compared with other related strategies and AODV and RIPv1
protocols in terms of data drop, traffic drop, queue delay, and throughput.
Keywords:
Internet of robotic things
Internet of things
On-demand distance vector
OPNET
Routing information protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wisam Mahmood Lafta
Department of Computer Science
University of Technology
Baghdad, Iraq
Email: 10861@uotechnology.edu.iq
1. INTRODUCTION
The increasing number of smart devices and robot machines is become necessary to control the
influence of developments in various application fields. Robotic devices, drones and autonomous vehicles
augmented are the technologies which will provide the next phase of development of IoT applications [1].
Internet of things (IoT) and Internet-of-Robotic-Things (IoRT) applications are expected to steadily grow
upon networks because a substantial part of human life has become connected to the internet based on the
urgent need related to the technological revolution [2, 3].The Internet is defined as a collection of wired and
wireless networks described as a heterogeneous network [4-6]. The majority of the studies on heterogeneous
networks have been conducted based on one type of network (i.e., either wire or wireless) [7, 8]. The
traditional methods use transmission control protocol (TCP) standard with wire networks and user datagram
protocol (UDP) designed to utilized with wireless networks [9-11]. The TCP and UDP protocols are mostly
used for the important applications of IoT and IoRTin heterogeneous networks. The concepts of IoRT and
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1831
IoT are compatible with the same requirements of heterogeneous networks and technical protocols in IEEE
802.11 MAC and 802.16 MAC (WiMAX), as shown in Figure 1 [12].
Figure 1. Internet of robotic things
The scalability router creates a smart environment based on hyperconnectivity to build an excellent
IoT network and IoRT applications. The methods or strategies are necessary by selecting the only solutions
to understand the high performance and meet the requirements of the good network. These aspects may be a
crucial element in building a dynamic global network infrastructure. IoRT applications scenarios must be
approached for real-life full-scale testbeds, models and practical systems [13]. IoRT is considered important
and complex application because they contain a large amount of data. IoRT applications often suffer from not
applying a dynamic style to deal with slow data transmission and congestion.The main parameters such as
delay, traffic load and network throughput represent critical issues for the IoRT application [14]. Therefore,
designing an effective strategy that achieves real-time data transmission control smoothly is a major
challenge for IoRT applications.
The best elements of IoRT applications are the ad-hoc on-demand distance vector (AODV) and the
routing information protocol (RIP) protocols [15]. The RIP and AODV protocols are mostly used separately
and present best results if they are applied in wireless networks. The proposed approach aims to update and
establish new dealing methods to improve IoRT applications. The proposed method uses TCP and UDP as
standard protocols compatible with the properties of the data transmitted, thereby making the network
organized and harmonious with the packaging type (e.g., sound,.video, .ftp). Some of the best elements of
heterogeneous networks are the AODV and RIP protocols, which are used in heterogeneous network
applications, such as IoRT applications [16].
The proposed method creates a new working mechanism that retuns the dynamic properties in the
AODV and RIPv2 protocols. This new mechanism aims to select the best performance by obtaining new
routings strategies that enhance communication. The new routing mode makes a unified path table process
that distinguishes the routing and distance vector (RIDV) algorithm.
The remainder of this paper is organized as follows. Section 2 explains the features of the distance
vector routing algorithm (DVRA), which demonstrates the dynamic properties of the best protocols, such as
RIP and AODV. Section 3 focuses on the steps of the RIDV algorithm and its work mechanisms to choose
the only performance that makes its work unrestricted. Section 4 discusses the results of the proposed
strategy with important parameters. Section 5 concludes this study with an explanation of the scalable
networks through the results obtained.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1832
2. SYSTEM MODEL
2.1. DVRA
DVR is a metric use to determine the best route across a network by counts a number of hops.
DVRA makes networks reliable according to what is recorded within the priority table by transferring the
packet from the main node to the target. The subsequent hope (router device) should be determined in the
table of priorities [17]. The RIP and AODV protocols are the most important interference and control in
DVRA. These two protocols are supported in the majority of campus LAN networks [18]. The RIP protocol
is a standard protocol used in routing protocol from small to medium TCP/IP networks to apply a distance-
vector algorithm [19]. More than one route between two or more nodes make a router select a method to
calculate the shortest path. The RIP protocol is implemented on the router to achieve the network function
regularly. One of the significant features that enhance the effectiveness of routers is RIP.The RIP protocol
can be classified as follows:
 RIP version 1 (RIPv1) uses broadcast UDP data packets based on a statistic routing [20].
 RIP version 2 (RIPv1) is a dynamic routing that uses multicast packets to exchange routing information
with support authentication [21].
The current study discusses the RIP v2. This feature belongs to the dynamic routing protocol to
reduce the network traffic that fits with the characteristics of AOVD. The software of RIP sends routing
information updates every 30 seconds to create a routing table. Adevice running RIP can receive a default
network via an update from another device that is also running RIP or the main device using the DVRP
strategy. In both ways, the default network is advertised between at least two devices using the DVRP
strategy.
2.2. Dynamic routing protocol
The dynamic algorithm is based on the counting of all possible paths that link with the source to the
target [22]. The table router's information for the entire network is updated by supported information from its
immediate neighbors [23]. Thereafter, the router shares the information with all network mobile nodes and
exchange information between neighbours' nodes at regular intervals [24]. The AODV protocol is one of the
foremost prominent reactive routing protocols and good application on the dynamic routing algorithm.
The AODV protocol uses “HELLO” messages to enhance the reliability of obtainable paths [25].
The "HELLO" messages is period local broadcasts from a source node to inform all nearby mobile nodes in a
wireless network.This message may even be used to update the local network to avoid connectivity issues of
the node [26]. The procedure of the "HELLO" message is organized by the knowledge table to select the path
updated periodically to obviate congested or failed paths. The first request is route requests (RREQs). There
after, wait to answer the second request, which is route replies (RREPs) as shown in Figure 2. If the link is
interrupted or broken, then the answer will be route errors (RERRs) [27]. This dynamic protocol interacts
with the wireless network environment (mobile nods). The confirmed information from the interactive
commands and by investing during a positive aspect connect it with another dynamic environment
represented by a wired network environment (routers) [28]. The confirmed information from the wireless
network environment by interactive commands of the AODV protocol connect with another dynamic
environment represented by a wire network environment using the RIPv2 protocol.
Figure 2. Dynamic performance RREQs and RREPs
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1833
3. RIDV STRATEGY
RIDV can also be a strategy generation from two algorithms to formulate a new algorithm and
support the positive side and disregard or disable the negative aspects of the previous algorithms, there by
forming an efficient algorithm called RIDV. Networks are treated equally (wired and wireless networks)
within the primary hop count networks where a packet crosses, and route discovery with route maintenance,
as shown in Figure 3.
Figure 3. Flowcherat of RIDV strategy
The RIDV algorithm can be explained through the following steps:
Step 1: Source node sends broadcast request to RREQ.
Step 2: If node is a router - Setting the router on RIPv2
Step 3: Else go to step 1 //the source node.
Step 4: Receive a message including the route table with new information.
Step 5: Update the routing table by refreshing to add one hop for each advertised.
Step 6: Selecting the new next node using the AODVprotocol.
Step 7: Search for the best routing path using DVRA.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1834
Step 8: If (destination node within the routing table), then go to step 10.
Step 9: Else (go to step 6).
Step 10: Maintenance routing table shown in Figure 4.
Step 11: Return the result go to step 4 //sending the unified routing paths table to the router because of the
implementation of the same path routing map algorithm (DVR with DRP).
Figure 4. Route maintenance with time
4. SIMMULATION RESULTS AND ANALYSIS
The following results are presented within the factors applied in a heterogeneous network that is
work on IoRT environment as shown in Table 1. Figure 5 shows the dynamic mobility of the IoRT systems
and data management represented by the source node m25. The mobile device sends different instructions to
other nodes from m1 to m15. These nodes (e.g., robot or smart mobiles nodes) may be connected with an
access point (i.e., node 3, node 2) through two routers in OPNET. The simulation is used to perform and
analyze different routing protocols, such as RIPv2 and RIPv1 with AODV, to generate a new RIVD strategy
by applying 15 mobile nodes and by having three different scenarios in an area of 2000×1500 m. In the
results between the first scenarios, the RIPv2 protocol is activated only in routers. In the second scenario,
protocols (RIPv1 default protocol in router) are not activated with the proposed new RIVD strategy to
measure the different factors.
Table 1. Elements of the network
Environment Details type
Mobile node 16 source & destination
Router 2 Wire
Access point 2 Wired& wireless
Maximum packet in queue 50 packets size
Network interface type IoRT application
Topographical area 2000X 1500 sq.m
Routing protocol RIPv2&AODV RIDV
Number of scenarios 3 With the same conditions
Simulation time 20 Mints
Packet Size 260 MB
Simulator OPNET 14.5
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1835
Figure 5. IoRT environment
4.1. Data drop in LAN
Figure 6 shows that RIDV (blue line) is equal to zero compared with other scenarios that did not
lose any packets through the process by time average. The new result from the new proposed strategy led to
the disposal of the loss data.
Figure 6. Data drop in LAN
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1836
4.2. Traffic drop IP
Figure 7 evidently shows that the RIDV strategy curves the lowest. The focus on the blue curves
with other curves means its best result as the packets’/sec less loss achieved in the RIDV strategy in the
properties of IP traffic. By achieving this factor, network congestion is avoided.
Figure 7. Traffic drop IP
4.3. Queue delay
Queue is an important parameter in measuring the delay in any network and congestion pointer.
Moreover, achieving the speed of the network depends on the lowest delay and network stability. Figure 8
shows that the blue line is the best one to determine the speed and slowness of communication by measuring
the accumulated load on point to point in the queue.
Figure 8. Queue delay
4.4. Throughput in the wireless LAN
The second best pointer in the network is the throughput. Figure 9 shows that the blue line is the
highest one compared with the others. That is, the processes work with excellent output. Increased network
productivity indicates its strength and effectiveness, particularly with wireless networks because it is more
vulnerable to noise.
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1837
Figure 9. Throughput in the wireless LAN
The above results imply the dynamic mobility of RIDV algorithm gives high flexibility to the IoRT
enviroment.The RIP and AODV protocol tables were united into one table if these protocols were activated
concurrently. Accordingly, they will end with diminishing time and reduced congestion, thereby resulting
avoid a collision in the passage of information from the mobile source (user) to the mobile destination (robot)
using the available dynamic property.
5. CONCLUSION
The internet of robotic things (IoRT) requires research into the area of seamless heterogeneous
platform integration, things identification (addressing and naming in IoT) and dynamic-things. The current
research is focused on IoT heterogeneous parallel processing and dynamic systems based on parallelism and
concurrency. The dynamic maintain is changing the re-configuration IoT systems in the heterogeneous
network for integration with IoRT service and composition.The problem of control in terms of avoiding
congestion and slow data transmission results from high traffic with the effect of queue delay on network
productivity. Note that the configuration required by the proposed RIDV strategy is better than RIP and
AODV that works separately. The reason is that the AODV protocol has considerable interaction with the
RIPv2 protocol owing to similar properties. The dynamic compatibility features in the RIDV strategy provide
sobriety and reliability to transmit data. In this context, RIDV strategy could be considered maintaining a
path table needed to address scalability and reliability concerns with respect to IoT technologies and IoRT
applications. The high efficiency of the new RIDV strategy makes the heterogeneous network interact with
the surroundings by controlling and transmitting information toward its targets. The implementation of the
same path map algorithm by maintaining a path table periodically gives the RIDV strategy a distinct method
of control and preference, thereby shortening the time and unified path routing table. Future studies should
activate a new RIDV strategy in different independent networks by selecting a rapid means to connect with
mobile devices in wide areas.
REFERENCES
[1] L. A. Grieco, et al., “IoT-aided robotics applications: Technological implications, target domains and open issues,”
Computer Communication, vol. 54, pp. 32-47, 2014.
[2] P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical
and Computer Engineering, vol. 2017, no. 1, pp. 1-25, 2017.
[3] K. Xu, et al., “A tutorial on the internet of things: From a heterogeneous network integration perspective,” IEEE
Network, vol. 30, no. 2, pp. 102-108, 2016.
[4] W. M. Lafta, et al., “Performance evaluation of heterogeneous network based on RED and WRED,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 3, no. 3, pp. 540-545, 2016.
[5] Q. Zhu, et al., “A mobile ad hoc networks algorithm improved AODV protocol,” Procedia Engineering, vol. 23,
pp. 229-234, 2011.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1838
[6] H. H. Qasim, et al., “Design and implementation home security system and monitoring by using wireless sensor
networks WSN/internet of things IOT,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 10, no. 3, pp. 2617-2624, 2020.
[7] B. Sreedevi, et al., “Implementation of Zone Routing Protocol for Heterogeneous Hybrid Cluster Routing to
Support QoS in Mobile Ad hoc Networks,” International Journal of Computer Applications, vol. 25, no. 10,
pp. 1-6, 2011.
[8] S. Patil and A. M. Bhavikatti, “Heterogeneous network optimization using robust power-and-resource based
algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4226-4237,
2019.
[9] K. Pandey and A. Swaroop, “A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs
Routing Protocols,” International Journal of Computer Science Issues, vol. 8, no. 6, pp. 432-441, 2011.
[10] W. M. Lafta, et al., “Heterogeneous Network Performance Improvement Using Proposed OLRED and OLWRED
Strategies,” International Journal of Future Computer and Communication, vol. 5, no. 5, pp. 199-204, 2016.
[11] B. S. Kang, et al., “AODV-RIP: Improved security in mobile ad hoc networks through route investigation
procedure,” Concurrency and Computation Practice and Experience, vol. 22, no. 7, pp. 816-830, 2010.
[12] H. Harman, et al., “Robot assistance in dynamic smart environments—a hierarchical continual planning in the now
framework,” Sensors (Switzerland), vol. 19, no. 22, pp. 1-33, 2019.
[13] O. Vermesan and J. Bacquet, “Cognitive Hyperconnected Digital Transformation,” River Publishers, pp. 1-310,
2017.
[14] J. Govindasamy and S. Punniakody, “A comparative study of reactive, proactive and hybrid routing protocol in
wireless sensor network under wormhole attack,” Journal of Electrical Systems and Information Technology,
vol. 5, no. 3, pp. 735-744, 2018.
[15] A. Dhaka, et al., “Gray and Black Hole Attack Identification Using Control Packets in MANETs,” Procedia
Computer Science, vol. 54, pp. 83-91, 2015.
[16] R. van Glabbeek, et al., “Modelling and verifying the AODV routing protocol,” Distributed Computing, vol. 29,
no. 4, pp. 279-315, 2016.
[17] Z. S. Mahmood, et al., “The Directional Hierarchical AODV (DH-AODV) routing protocol for wireless mesh
networks,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems
Engineering (ICCNEEE), Khartoum, 2016, pp. 224-229.
[18] A. Syarif, et al., “Adding gateway mode for R-AODV routing protocol in hybrid ad hoc network,” TENCON 2011 -
2011 IEEE Region 10 Conference, Bali, 2011, pp. 169-173.
[19] S. G. Thorenoor, “Dynamic routing protocol implementation decision between EIGRP, OSPF and RIP based on
technical background using OPNET modeler,” 2010 Second International Conference on Computer and Network
Technology, Bangkok, 2010, pp. 191-195.
[20] A. A. Susom, “Effectiveness of routing protocols for different networking scenarios,” Advances in Science,
Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 112-121, 2018.
[21] S. G. Fernandez, et al., “Unmanned and autonomous ground vehicle,” International Journal of Electrical and
Computer Engineering (IJECE), vol. 9, no. 5, pp. 4466-4472, 2019.
[22] E. H. Houssein, “Ant-Hoc: A swarm intelligence-based routing protocol for Ad Hoc networks,” IRACST
International Journal of Computer Networks and Wireless Communication, vol. 6, no. 1, pp. 14-23, 2016.
[23] K. Chawla and K. Vats, “Different QoS Based Simulation Evaluation of TORA and GRP Routing Protocol Based
on Frequency Hopping,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 11,
pp. 523-531, 2014.
[24] A. Aneiba and M. Melad, “Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols
Using OPNET,” International Journal of Future Computer and Communication, vol. 5, no. 1, pp. 57-60, 2016.
[25] S. M. Hassan, et al., “Application of Wireless Technology for Control: A WirelessHART Perspective,” Procedia
Computer Science, vol. 105, pp. 240-247, 2017.
[26] W. Mahmood, et al., “OLWRED: Best Selected Strategy for Data Transmission in Heterogeneous Networks,”
International Journal of Computer Applications, vol. 152, no. 4, pp. 11-15, 2016.
[27] J. Song, et al., “WirelessHART : Applying Wireless Technology in Real-Time Industrial Process Control,”
2008 IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, 2008, pp. 377-386.
[28] M. S. E. Alhassan and H. Hagras, “Towards Congestion Control Approach Based on Weighted Random Early
Detection and Type-2 Fuzzy Logic System,” 2018 10th Computer Science and Electronic Engineering (CEEC),
Colchester, United Kingdom, 2019, pp. 71-74.

More Related Content

What's hot

A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...journalBEEI
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencySukhvinder Singh Malik
 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...IRJET Journal
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEiosrjce
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingIRJET Journal
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...journalBEEI
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksjournalBEEI
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 

What's hot (19)

A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networks
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 

Similar to Best strategy to control data on internet-of-robotic-things in heterogeneous networks

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
 
Priority based flow control protocol for internet of things built on light f...
Priority based flow control protocol for internet of things built  on light f...Priority based flow control protocol for internet of things built  on light f...
Priority based flow control protocol for internet of things built on light f...IJECEIAES
 
Performance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyPerformance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyIRJET Journal
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...IJECEIAES
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
 
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 

Similar to Best strategy to control data on internet-of-robotic-things in heterogeneous networks (20)

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Priority based flow control protocol for internet of things built on light f...
Priority based flow control protocol for internet of things built  on light f...Priority based flow control protocol for internet of things built  on light f...
Priority based flow control protocol for internet of things built on light f...
 
Performance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyPerformance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular Technology
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
 
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Best strategy to control data on internet-of-robotic-things in heterogeneous networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 2, April 2021, pp. 1830~1838 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i2.pp1830-1838  1830 Journal homepage: http://ijece.iaescore.com Best strategy to control data on internet-of-robotic-things in heterogeneous networks Wisam Mahmood Lafta1 , Ahmed A. Alkadhmawee2 , Mohammed A. Altaha3 1 Department of Computer Science, University of Technology, Iraq 2 College of Education for Human Sciences, University of Basrah, Iraq 3 College of Veterinary, University of Basrah, Iraq Article Info ABSTRACT Article history: Received Apr 4, 2020 Revised Aug 7, 2020 Accepted Nov 6, 2020 The control and transmission of huge data constitute an immense challenge in various types of networks (wired and wireless). Congestion caused by the high traffic and low throughput of huge data continues to be major problems in a heterogeneous platforms such as internet of things (IoT) technology and internet-of-robotic-things (IoRT). The heterogeneous network requires new models and mechanisms to deal with the increased challenges posed by IoT and IoRT. Accordingly, eliminating the issues that emerge has compelled finding improved solutions as a new strategy. This study proposed a new strategy called routing information and distance vector (RIDV) to create the best improvement of a heterogeneous network. The RIDV strategy activates the routing information protocol (RIPv2) on a router in wire network parallel with the ad-hoc on-demand distance vector (AODV) protocol on the wireless network. The RIDV strategy is used to solve the problems of the diversity of heterogeneous networks as the basis of the infrastructure IoRT technology. Hence, this strategy can reduce or avoid congestion through the use of enhanced and effective best routing protocols. Simulation results using OPNET show that the proposed method improved the quality of service (QoS) compared with other related strategies and AODV and RIPv1 protocols in terms of data drop, traffic drop, queue delay, and throughput. Keywords: Internet of robotic things Internet of things On-demand distance vector OPNET Routing information protocol This is an open access article under the CC BY-SA license. Corresponding Author: Wisam Mahmood Lafta Department of Computer Science University of Technology Baghdad, Iraq Email: 10861@uotechnology.edu.iq 1. INTRODUCTION The increasing number of smart devices and robot machines is become necessary to control the influence of developments in various application fields. Robotic devices, drones and autonomous vehicles augmented are the technologies which will provide the next phase of development of IoT applications [1]. Internet of things (IoT) and Internet-of-Robotic-Things (IoRT) applications are expected to steadily grow upon networks because a substantial part of human life has become connected to the internet based on the urgent need related to the technological revolution [2, 3].The Internet is defined as a collection of wired and wireless networks described as a heterogeneous network [4-6]. The majority of the studies on heterogeneous networks have been conducted based on one type of network (i.e., either wire or wireless) [7, 8]. The traditional methods use transmission control protocol (TCP) standard with wire networks and user datagram protocol (UDP) designed to utilized with wireless networks [9-11]. The TCP and UDP protocols are mostly used for the important applications of IoT and IoRTin heterogeneous networks. The concepts of IoRT and
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1831 IoT are compatible with the same requirements of heterogeneous networks and technical protocols in IEEE 802.11 MAC and 802.16 MAC (WiMAX), as shown in Figure 1 [12]. Figure 1. Internet of robotic things The scalability router creates a smart environment based on hyperconnectivity to build an excellent IoT network and IoRT applications. The methods or strategies are necessary by selecting the only solutions to understand the high performance and meet the requirements of the good network. These aspects may be a crucial element in building a dynamic global network infrastructure. IoRT applications scenarios must be approached for real-life full-scale testbeds, models and practical systems [13]. IoRT is considered important and complex application because they contain a large amount of data. IoRT applications often suffer from not applying a dynamic style to deal with slow data transmission and congestion.The main parameters such as delay, traffic load and network throughput represent critical issues for the IoRT application [14]. Therefore, designing an effective strategy that achieves real-time data transmission control smoothly is a major challenge for IoRT applications. The best elements of IoRT applications are the ad-hoc on-demand distance vector (AODV) and the routing information protocol (RIP) protocols [15]. The RIP and AODV protocols are mostly used separately and present best results if they are applied in wireless networks. The proposed approach aims to update and establish new dealing methods to improve IoRT applications. The proposed method uses TCP and UDP as standard protocols compatible with the properties of the data transmitted, thereby making the network organized and harmonious with the packaging type (e.g., sound,.video, .ftp). Some of the best elements of heterogeneous networks are the AODV and RIP protocols, which are used in heterogeneous network applications, such as IoRT applications [16]. The proposed method creates a new working mechanism that retuns the dynamic properties in the AODV and RIPv2 protocols. This new mechanism aims to select the best performance by obtaining new routings strategies that enhance communication. The new routing mode makes a unified path table process that distinguishes the routing and distance vector (RIDV) algorithm. The remainder of this paper is organized as follows. Section 2 explains the features of the distance vector routing algorithm (DVRA), which demonstrates the dynamic properties of the best protocols, such as RIP and AODV. Section 3 focuses on the steps of the RIDV algorithm and its work mechanisms to choose the only performance that makes its work unrestricted. Section 4 discusses the results of the proposed strategy with important parameters. Section 5 concludes this study with an explanation of the scalable networks through the results obtained.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1832 2. SYSTEM MODEL 2.1. DVRA DVR is a metric use to determine the best route across a network by counts a number of hops. DVRA makes networks reliable according to what is recorded within the priority table by transferring the packet from the main node to the target. The subsequent hope (router device) should be determined in the table of priorities [17]. The RIP and AODV protocols are the most important interference and control in DVRA. These two protocols are supported in the majority of campus LAN networks [18]. The RIP protocol is a standard protocol used in routing protocol from small to medium TCP/IP networks to apply a distance- vector algorithm [19]. More than one route between two or more nodes make a router select a method to calculate the shortest path. The RIP protocol is implemented on the router to achieve the network function regularly. One of the significant features that enhance the effectiveness of routers is RIP.The RIP protocol can be classified as follows:  RIP version 1 (RIPv1) uses broadcast UDP data packets based on a statistic routing [20].  RIP version 2 (RIPv1) is a dynamic routing that uses multicast packets to exchange routing information with support authentication [21]. The current study discusses the RIP v2. This feature belongs to the dynamic routing protocol to reduce the network traffic that fits with the characteristics of AOVD. The software of RIP sends routing information updates every 30 seconds to create a routing table. Adevice running RIP can receive a default network via an update from another device that is also running RIP or the main device using the DVRP strategy. In both ways, the default network is advertised between at least two devices using the DVRP strategy. 2.2. Dynamic routing protocol The dynamic algorithm is based on the counting of all possible paths that link with the source to the target [22]. The table router's information for the entire network is updated by supported information from its immediate neighbors [23]. Thereafter, the router shares the information with all network mobile nodes and exchange information between neighbours' nodes at regular intervals [24]. The AODV protocol is one of the foremost prominent reactive routing protocols and good application on the dynamic routing algorithm. The AODV protocol uses “HELLO” messages to enhance the reliability of obtainable paths [25]. The "HELLO" messages is period local broadcasts from a source node to inform all nearby mobile nodes in a wireless network.This message may even be used to update the local network to avoid connectivity issues of the node [26]. The procedure of the "HELLO" message is organized by the knowledge table to select the path updated periodically to obviate congested or failed paths. The first request is route requests (RREQs). There after, wait to answer the second request, which is route replies (RREPs) as shown in Figure 2. If the link is interrupted or broken, then the answer will be route errors (RERRs) [27]. This dynamic protocol interacts with the wireless network environment (mobile nods). The confirmed information from the interactive commands and by investing during a positive aspect connect it with another dynamic environment represented by a wired network environment (routers) [28]. The confirmed information from the wireless network environment by interactive commands of the AODV protocol connect with another dynamic environment represented by a wire network environment using the RIPv2 protocol. Figure 2. Dynamic performance RREQs and RREPs
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1833 3. RIDV STRATEGY RIDV can also be a strategy generation from two algorithms to formulate a new algorithm and support the positive side and disregard or disable the negative aspects of the previous algorithms, there by forming an efficient algorithm called RIDV. Networks are treated equally (wired and wireless networks) within the primary hop count networks where a packet crosses, and route discovery with route maintenance, as shown in Figure 3. Figure 3. Flowcherat of RIDV strategy The RIDV algorithm can be explained through the following steps: Step 1: Source node sends broadcast request to RREQ. Step 2: If node is a router - Setting the router on RIPv2 Step 3: Else go to step 1 //the source node. Step 4: Receive a message including the route table with new information. Step 5: Update the routing table by refreshing to add one hop for each advertised. Step 6: Selecting the new next node using the AODVprotocol. Step 7: Search for the best routing path using DVRA.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1834 Step 8: If (destination node within the routing table), then go to step 10. Step 9: Else (go to step 6). Step 10: Maintenance routing table shown in Figure 4. Step 11: Return the result go to step 4 //sending the unified routing paths table to the router because of the implementation of the same path routing map algorithm (DVR with DRP). Figure 4. Route maintenance with time 4. SIMMULATION RESULTS AND ANALYSIS The following results are presented within the factors applied in a heterogeneous network that is work on IoRT environment as shown in Table 1. Figure 5 shows the dynamic mobility of the IoRT systems and data management represented by the source node m25. The mobile device sends different instructions to other nodes from m1 to m15. These nodes (e.g., robot or smart mobiles nodes) may be connected with an access point (i.e., node 3, node 2) through two routers in OPNET. The simulation is used to perform and analyze different routing protocols, such as RIPv2 and RIPv1 with AODV, to generate a new RIVD strategy by applying 15 mobile nodes and by having three different scenarios in an area of 2000×1500 m. In the results between the first scenarios, the RIPv2 protocol is activated only in routers. In the second scenario, protocols (RIPv1 default protocol in router) are not activated with the proposed new RIVD strategy to measure the different factors. Table 1. Elements of the network Environment Details type Mobile node 16 source & destination Router 2 Wire Access point 2 Wired& wireless Maximum packet in queue 50 packets size Network interface type IoRT application Topographical area 2000X 1500 sq.m Routing protocol RIPv2&AODV RIDV Number of scenarios 3 With the same conditions Simulation time 20 Mints Packet Size 260 MB Simulator OPNET 14.5
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1835 Figure 5. IoRT environment 4.1. Data drop in LAN Figure 6 shows that RIDV (blue line) is equal to zero compared with other scenarios that did not lose any packets through the process by time average. The new result from the new proposed strategy led to the disposal of the loss data. Figure 6. Data drop in LAN
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1836 4.2. Traffic drop IP Figure 7 evidently shows that the RIDV strategy curves the lowest. The focus on the blue curves with other curves means its best result as the packets’/sec less loss achieved in the RIDV strategy in the properties of IP traffic. By achieving this factor, network congestion is avoided. Figure 7. Traffic drop IP 4.3. Queue delay Queue is an important parameter in measuring the delay in any network and congestion pointer. Moreover, achieving the speed of the network depends on the lowest delay and network stability. Figure 8 shows that the blue line is the best one to determine the speed and slowness of communication by measuring the accumulated load on point to point in the queue. Figure 8. Queue delay 4.4. Throughput in the wireless LAN The second best pointer in the network is the throughput. Figure 9 shows that the blue line is the highest one compared with the others. That is, the processes work with excellent output. Increased network productivity indicates its strength and effectiveness, particularly with wireless networks because it is more vulnerable to noise.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1837 Figure 9. Throughput in the wireless LAN The above results imply the dynamic mobility of RIDV algorithm gives high flexibility to the IoRT enviroment.The RIP and AODV protocol tables were united into one table if these protocols were activated concurrently. Accordingly, they will end with diminishing time and reduced congestion, thereby resulting avoid a collision in the passage of information from the mobile source (user) to the mobile destination (robot) using the available dynamic property. 5. CONCLUSION The internet of robotic things (IoRT) requires research into the area of seamless heterogeneous platform integration, things identification (addressing and naming in IoT) and dynamic-things. The current research is focused on IoT heterogeneous parallel processing and dynamic systems based on parallelism and concurrency. The dynamic maintain is changing the re-configuration IoT systems in the heterogeneous network for integration with IoRT service and composition.The problem of control in terms of avoiding congestion and slow data transmission results from high traffic with the effect of queue delay on network productivity. Note that the configuration required by the proposed RIDV strategy is better than RIP and AODV that works separately. The reason is that the AODV protocol has considerable interaction with the RIPv2 protocol owing to similar properties. The dynamic compatibility features in the RIDV strategy provide sobriety and reliability to transmit data. In this context, RIDV strategy could be considered maintaining a path table needed to address scalability and reliability concerns with respect to IoT technologies and IoRT applications. The high efficiency of the new RIDV strategy makes the heterogeneous network interact with the surroundings by controlling and transmitting information toward its targets. The implementation of the same path map algorithm by maintaining a path table periodically gives the RIDV strategy a distinct method of control and preference, thereby shortening the time and unified path routing table. Future studies should activate a new RIDV strategy in different independent networks by selecting a rapid means to connect with mobile devices in wide areas. REFERENCES [1] L. A. Grieco, et al., “IoT-aided robotics applications: Technological implications, target domains and open issues,” Computer Communication, vol. 54, pp. 32-47, 2014. [2] P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering, vol. 2017, no. 1, pp. 1-25, 2017. [3] K. Xu, et al., “A tutorial on the internet of things: From a heterogeneous network integration perspective,” IEEE Network, vol. 30, no. 2, pp. 102-108, 2016. [4] W. M. Lafta, et al., “Performance evaluation of heterogeneous network based on RED and WRED,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 3, no. 3, pp. 540-545, 2016. [5] Q. Zhu, et al., “A mobile ad hoc networks algorithm improved AODV protocol,” Procedia Engineering, vol. 23, pp. 229-234, 2011.
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1838 [6] H. H. Qasim, et al., “Design and implementation home security system and monitoring by using wireless sensor networks WSN/internet of things IOT,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 2617-2624, 2020. [7] B. Sreedevi, et al., “Implementation of Zone Routing Protocol for Heterogeneous Hybrid Cluster Routing to Support QoS in Mobile Ad hoc Networks,” International Journal of Computer Applications, vol. 25, no. 10, pp. 1-6, 2011. [8] S. Patil and A. M. Bhavikatti, “Heterogeneous network optimization using robust power-and-resource based algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4226-4237, 2019. [9] K. Pandey and A. Swaroop, “A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols,” International Journal of Computer Science Issues, vol. 8, no. 6, pp. 432-441, 2011. [10] W. M. Lafta, et al., “Heterogeneous Network Performance Improvement Using Proposed OLRED and OLWRED Strategies,” International Journal of Future Computer and Communication, vol. 5, no. 5, pp. 199-204, 2016. [11] B. S. Kang, et al., “AODV-RIP: Improved security in mobile ad hoc networks through route investigation procedure,” Concurrency and Computation Practice and Experience, vol. 22, no. 7, pp. 816-830, 2010. [12] H. Harman, et al., “Robot assistance in dynamic smart environments—a hierarchical continual planning in the now framework,” Sensors (Switzerland), vol. 19, no. 22, pp. 1-33, 2019. [13] O. Vermesan and J. Bacquet, “Cognitive Hyperconnected Digital Transformation,” River Publishers, pp. 1-310, 2017. [14] J. Govindasamy and S. Punniakody, “A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack,” Journal of Electrical Systems and Information Technology, vol. 5, no. 3, pp. 735-744, 2018. [15] A. Dhaka, et al., “Gray and Black Hole Attack Identification Using Control Packets in MANETs,” Procedia Computer Science, vol. 54, pp. 83-91, 2015. [16] R. van Glabbeek, et al., “Modelling and verifying the AODV routing protocol,” Distributed Computing, vol. 29, no. 4, pp. 279-315, 2016. [17] Z. S. Mahmood, et al., “The Directional Hierarchical AODV (DH-AODV) routing protocol for wireless mesh networks,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2016, pp. 224-229. [18] A. Syarif, et al., “Adding gateway mode for R-AODV routing protocol in hybrid ad hoc network,” TENCON 2011 - 2011 IEEE Region 10 Conference, Bali, 2011, pp. 169-173. [19] S. G. Thorenoor, “Dynamic routing protocol implementation decision between EIGRP, OSPF and RIP based on technical background using OPNET modeler,” 2010 Second International Conference on Computer and Network Technology, Bangkok, 2010, pp. 191-195. [20] A. A. Susom, “Effectiveness of routing protocols for different networking scenarios,” Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 112-121, 2018. [21] S. G. Fernandez, et al., “Unmanned and autonomous ground vehicle,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4466-4472, 2019. [22] E. H. Houssein, “Ant-Hoc: A swarm intelligence-based routing protocol for Ad Hoc networks,” IRACST International Journal of Computer Networks and Wireless Communication, vol. 6, no. 1, pp. 14-23, 2016. [23] K. Chawla and K. Vats, “Different QoS Based Simulation Evaluation of TORA and GRP Routing Protocol Based on Frequency Hopping,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 11, pp. 523-531, 2014. [24] A. Aneiba and M. Melad, “Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET,” International Journal of Future Computer and Communication, vol. 5, no. 1, pp. 57-60, 2016. [25] S. M. Hassan, et al., “Application of Wireless Technology for Control: A WirelessHART Perspective,” Procedia Computer Science, vol. 105, pp. 240-247, 2017. [26] W. Mahmood, et al., “OLWRED: Best Selected Strategy for Data Transmission in Heterogeneous Networks,” International Journal of Computer Applications, vol. 152, no. 4, pp. 11-15, 2016. [27] J. Song, et al., “WirelessHART : Applying Wireless Technology in Real-Time Industrial Process Control,” 2008 IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, 2008, pp. 377-386. [28] M. S. E. Alhassan and H. Hagras, “Towards Congestion Control Approach Based on Weighted Random Early Detection and Type-2 Fuzzy Logic System,” 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom, 2019, pp. 71-74.