SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 04-09
www.iosrjournals.org
DOI: 10.9790/2834-10630409 www.iosrjournals.org 4 | Page
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
Dr. Sonal Jignesh Rane
Department of Electrical & ElectronicsEngg.,ITM Vocational University,Vadodara,Gujarat,India
Abstract: IEEE 802.15.4 Standard is used for low rate, low power consumption and low cost wireless sensor
network applications. This standard has an attractive feature for real time application by providing Guaranteed
Time Slot (GTS) Mechanism. By applying this mechanism, this standard gives real time guaranty to deliver the
time critical data. The GTS is started in the Beacon-enabled mode based on the superframe structure which is
defined by PAN-Coordinator. A node has to use at least one whole GTS in a transmission. However, it is not
necessary that each node fully utilise its transmission capacity in a particular time slot if the packet arrival rate
is too small. Hence, bandwidth utilisation is reduced. This paper explores the underutilization of bandwidth in
WSN,the performance optimization of the GTS Mechanismand analyzes GTS mechanism by evaluating
throughput using conventional method and proposed adaptive method (Adaptive Neuro Fuzzy Inference System
(ANFIS)-soft computing technique) in OPNET Modeler.
Keywords: Wireless sensor network (WSN), OPNET, Adaptive Neuro Fuzzy Inference System, IEEE 802.15.4,
GTS, GTS Throughput, Packet Medium Access Delay, Wasted Bandwidth.
I. Introduction
IEEE 802.15.4 standard defines the protocol connection orientation of a personal area network (PAN).
The standard uses carrier sense multiple access with a collision avoidance medium access (CSMA/CA)
mechanism and supports varieties of topologies for the network viz. star as well as peer-to-peer topologies. The
IEEE 802.15.4 [1] Medium Access Control (MAC) protocol supports beacon enabled and non beacon mode. In
the beacon enabled mode beacon frames are sent by coordinator periodically for synchronization of sensor nodes.
The advantage of beacon enabled mode is that all nodes can wake up and sleep at the same time allowing very
low duty cycles and hence save energy. Using the optional superframe structure, time slots can be allocated by
the PAN coordinator to devices with time critical data, known as Guaranteed Time Slots (GTS) to fulfill Quality
of Service requirements [2]. The primary goal of GTS allocation is providingcommunication services to time
critical data, i.e., make certain guarantees on eventual delivery and delivery times of packets to be transmitted by
local devices to the network coordinator. In this paper mainly focus is on uplink scenario, which is more relevant
for WSNs applications. Adaptive Neuro-Fuzzy Inference System (ANFIS) is used here to decide the number of
packets to be transmitted for optimization of throughput of GTS mechanism based on Packet Interarrival time and
Data rate.
The remainder of this paper is organized as follows. Section II and section III give a brief overview of
the IEEE 802.15.4 protocol, its MAC layer specifications and Superframe Structure. In section IV, Soft GTS
mechanism is organized. Simulation results are discussed in section V. Finally it is concluded in conclusion.
II. IEEE 802.15.4 Mac Layer
IEEE 802.15.4 MAC layer protocol [3] can work in two modes viz. non beacon enabled and beacon
enabled mode. The non beacon enabled mode is same as non slotted CSMA/CA which provides scalability and
self organization to the network while beacon enabled mode uses the superframe structure which defines a time
interval during the frames are exchanged between PAN coordinator and associated nodes for the synchronization
purpose. Beacon enabled mode works as a slotted CSMA/CA and it enables the allocation of time slots in
superframe which is known as Guaranteed Time Slots (GTSs) for the nodes which guaranteed the data frames.
Each superframe is divided into Contention Access Period (CAP), where nodes contend among each
other to send packets, and a Contention Free Period (CFP), where nodes have GTSs to send packets without
contention and thus with guaranteed transmission. The Beacon Order (BO) and Superframe Order (SO) decide
the length of the superframe structure and its active period.
Real-time guarantees can be achieved by using the GTS mechanism [4, 5] in beacon-enabled mode.
The node allocates GTS with a minimum service guarantee, enabling the prediction of the worst-case timing
performance of the network. Power-efficiency can be achieved by operating at low duty cycles (down to 0.1%)
as power efficiency and timeliness guarantees are often two opposite requirements in wireless sensor networks.
Analysis of GTS mechanism is evaluated for GTS throughput using OPNET Modeller [6], which can
be achieved due to the packet size based on data rate and Interarrival time.
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
DOI: 10.9790/2834-10630409 www.iosrjournals.org 5 | Page
III. Superframe Structure
When the PAN Coordinator selects the beacon-enabled mode [7], it forces the use of a Superframe
structure which is shown in Figure 1 to manage communication between the devices that are associated to that
PAN. The format of the superframe is defined by the PAN Coordinator. The superframe, corresponding to the
Beacon Interval (BI), is defined by the time between two consecutive beacons, and includes an active period
and, optionally, a following inactive period. The active period, corresponding to the Superframe Duration (SD),
is divided into 16 equally sized time slots, during which data transmission is allowed. Each active period can be
further divided into a Contention Access Period (CAP) and an optional Contention Free Period (CFP). Slotted
CSMA/CA is used within the CAP. The CFP is activated by the request sent from a device to the PAN
Coordinator. Upon receiving this request, the PAN Coordinator checks whether there are sufficient resources
and, if possible, allocates the requested time slots. This requested group of time slots is called Guaranteed Time
Slot (GTS) and is dedicated exclusively to a given device. A CFP support up to 7 GTSs and each GTS may
contain multiple time slots. The allocation of the GTS cannot reduce the lengthof the CAP to less than the value
specified by aMinCAPLength constant.
Figure 1:The IEEE 802.15.4 Super frame structure [6]
The structure of the superframe is defined by two parameters, the Beacon Order (BO) and the
Superframe Order (SO), which determine the length of the superframe and its active period. The setting of BO
and SO must satisfy the relationship 0 ≤ SO ≤ BO ≤ 14. The length of the superframe (BI) and the length of its
active period (SD) are defined as follows:
BI = aBaseSuperframeDuration x 2BO
,
SD = aBaseSuperframeDuration x 2SO
.
The aBaseSuperframeDuration constant denotes the minimum length of the superframe when BO is
equal to 0. The IEEE 802.15.4 standard fixes this duration to 960 symbols. If SO = BO then SD = BI and the
superframe is always active. According to the standard, if SO = 15, the Superframe will not be active following
the beacon. If BO = 15, then the superframe shall not exist and the network will operate in the non beacon-
enabled mode. In this case, the value of SO is ignored. As a result, a PAN that wishes to use the superframe
structure must set Beacon Order to a value between 0 and 14 and Superframe Order to a value between 0 and the
value of Beacon Order. Each independent PAN selects a unique identifier. This PAN identifier (PAN ID) allows
communication between devices within a network using short addresses and enables transmissions between
devices across independent networks. Thus, all networks can operate independently from all others currently in
operation.
The PAN Coordinator may accept or reject the GTS allocation request from the End Device according
to the value of the user defined attribute GTS Permit [8]. The End Device can specify the time when the GTS
allocation and deallocation requests are sentto the PAN Coordinator (Start Time and Stop Time attributes). This
allocation request also includes the number of required time slots (GTS Length attribute) and their direction,
transmit or receive (GTS Direction attribute).
The GTS mechanism packet flow structure is shown in Figure 2. When the requested GTS is assigned
to a given device, its application layer starts generating data blocks that correspond to the MAC frame payload
(i.e. MAC Service Data Unit (MSDU)). The size of the frame payload is specified by the probability distribution
function of the MSDU Size attribute.
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
DOI: 10.9790/2834-10630409 www.iosrjournals.org 6 | Page
Figure 2: Packet flow structure in GTS enabled mode [8]
The probability distribution function, specified in the MSDU Interarrival Time attribute, defines the
inter-arrival time between two consecutive frame payloads. Then, the frame payload is wrapped in the MAC
header and stored as a frame in the buffer with a given capacity (Buffer Capacity attribute). The default size of
the MAC header (MAC_HEADER_SIZE) is 104 bits, since only 16-bit short addresses are used for
communication (according to standard specification). The maximum allowed size of the overall frame (i.e.
frame payload plus the MAC header) is equal to aMaxPHYPacketSize (1016 bits). The generated frames
exceeding the buffer capacity are dropped. When the requested GTS is active, the frames are removed from the
buffer, wrapped in the PHY headers and dispatched to the network with an outgoing data rate equal to physical
data rate WPAN_DATA_RATE (250 kbps).
IV. Proposed Soft Computing Method
Soft Computing is an innovative approach to constructing computationally intelligent systems, which
tries to mimic natural creatures. In this sense soft computing is the name of a family of problem-solving methods
that have analogy with biological reasoning and problem solving and sometimes referred to as cognitive
computing. The basic methods included in cognitive computing are fuzzy logic (FL), neural networks (NN),
Artificial Neuro Fuzzy Inference System (ANFIS) and genetic algorithms (GA).
ANFIS (Adaptive Neuro-Fuzzy Inference System) is the combination of Neural Network and Fuzzy
inference System (FIS) [9,10]. In ANFIS Neural Network can be trained by FIS and having characteristic of both.
Here ANFIS is used to determine the MSDU packet size based on the data rate and MSDU Interarrival time. Here
best Packet Size is decided depending upon two inputs, given to ANFIS for optimizing the GTS throughputas
shown in Figure 3.
ANN+FIS
=ANFIS
Interarrival
Rate
Data rate
Packet
Size
Figure 3: Internal architecture of ANN with respective inputs and outputs
A packet Interarrival time and data rate input decides the best packet size output through trained
ANFIS. ANFIS (using a feed forward ANN with multi layers Perception model, with 2 nodes in the input Layer,
10 nodes in hidden layer and 1 node in the output layer) is used offline with OPNET modeler for IEEE
802.15.4GTS mechanism and evaluated the performance. Total (53x53) 2809 pairs are used to minimize the error
between trained output and desired output as shown in Figure 4.
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
DOI: 10.9790/2834-10630409 www.iosrjournals.org 7 | Page
Figure 4: ANFIS training
ANFIS architecture was trained with Number of nodes are 131 with training data pairs of 2809 using 49
fuzzy rules.
V. Simulation Setup & Results
The Simulation Setup consists of one PAN Coordinator and one associated devices (GTS enabled)
within it coverage. There is no medium access contention so devices would not have any influence on the
simulation results due to that two devices are enough to evaluate the performance of GTS mechanism. For the
sake of simplicity, and without loss of generality, it is assume that only one time slot of GTS is occupied by any
node and the duty cycle of a superframe is 100% (SO = BO).
Figure 5: Wireless Sensor Network for GTS Mechanism
Figure 5 shows the simulation setup of the Conventional GTS Mechanism. For the evaluation of the
GTS throughput, GTS is set to 1 time slot and acknowledgement traffic is disabled. The buffer capacity is 4kbits
for simulation and simulation time is 5 sec. The simulation was carried out by varying packet size and keeping
packet Interarrival time constant (0.001824 sec). The distance between the two nodes is 25meters.
INTERARRIVAL
TIME
PACKET SIZE
DATA
RATE
ANFIS FROM
MATLAB
IEEE 802.15.4
WSN for GTS
MECHANISM
GTS
THROUGHPUT
EVALUATION
Figure 6: System Setup for ANFIS based GTS Mechanism
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
DOI: 10.9790/2834-10630409 www.iosrjournals.org 8 | Page
The system setup for evaluation of performance of GTS mechanism for WSN using ANFIS in OPNET
and MATLAB [11-14] is shown in Figure 6.
The impact of data Rate, Packet Size , Packet Interarrival Time, Buffer Size is evaluated on GTS
throughput using conventional and soft computing method for different values of SO (=BO). The intense of this
section is to optimize the GTS throughput during one time slot of GTS when inter arrival time is set to
0.001824sec and for different values of the SO. Since the frames are transmitted without acknowledgements, the
underutilized bandwidth can only result from IFS or from intermittent data arrival at the buffer.
Figure 7: GTS Throughput v/s Superframe Order
Figure 7 describes the GTS throughput for conventional GTS mechanism and Proposed Soft GTS
mechanism for packet size of 50 bits. In these graphs, the GTS Throughput has reached its saturation throughput
when the curve reaches its maximum peak value and plateaus. Throughput gradually decreases after reaching
certain SO. The higher the SO, the larger the SD is. This creates unproductive service in time slot window
duration with the corresponding buffer size and packet generation. This can be observed for SO beyond 7.
High values of SO values are not suitable for WSN application because as the SO value is high, SD
also will be higher. This will provide more time duration to transmit the data but simultaneously delay will
increase and throughput will decrease.
Figure 8: Packet Medium Access Delay (PMAD) v/s Superframe Order
Figure 8 plots the packet medium access delay (sec). When SO increases, 0.001824 s inter-arrival time
records a bigger range of Packet Medium Access Delay (PMAD). This indicates the significant relationship of
inter-arrival time, packet size and buffer size. As shown in Figure 8 initially PMAD is somewhat stable and
then starts to decrease slightly. The point at which the PMAD decreases slightly indicates that the PMAD
contribution originates from the long SD produced by the SO. The PMAD measurement is similar for the same
SO regardless of the buffer size until it reaches that slightly decreased point. Also for higher SO values, all
frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of
SO, delay will increase.
For SO values higher or equal to 5, all frames stored in the buffer and transmitted during one GTS and
the delay grows with SO. For higher values of SO, delay will increase.
ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN
DOI: 10.9790/2834-10630409 www.iosrjournals.org 9 | Page
Figure 9: Wasted Bandwidth v/s Superframe Order
From Figure 9, it is observed that wasted bandwidth is less in proposed method compare to
conventional method. A device with a low arrival rate that has been allocated one time slot of GTS, may use it
only partially. This leads to underutilization of the GTS band width resources. Due to the prefixed time slot
duration in a superframe, it is practically impossible to balance the arrival rate of a device and its guaranteed
GTS bandwidth. The amount of wasted bandwidth increases with the variance between the guaranteed
bandwidth and the arrival rate. However, wasted bandwidth decreases in proposed adaptive method by applying
ANFIS soft computing technique.
VI. Conclusion
In this paper, GTS Mechanism in the IEEE 802.15.4 Standard is evaluated in beacon enabled mode,
widely used in WSN application. The evaluation was performed using IEEE 802.15.4 OPNET simulation model
and soft computing technique (ANFIS). Higher SO values i.e., greater than 7 are not supported by WSN
application. Selection of SO must be done carefully to ensure that the GTS in a superframe can accommodate at
least one packet size. The GTS throughput is increased and Packet Medium Access Delay, Wasted bandwidth
are decreased for the proposed Adaptive GTS mechanism (ANFIS) for different values of packet size and SO
values. The evaluation results that were obtained provide excellent statistics to pursue our future work. The
performance of GTS mechanism can be more improved by applying fuzzy as well as genetic algorithm.
Acknowledgment
Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda and Electrical
& Electronics Department, ITM Vocational University, Vadodara for technical help in doing this work.
References:
[1]. IEEE Std 802.15.4-2996, September, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE, 2006. [Online]. Available:
http://www.ieee802.org/15
[2]. Holger Karl and Andreas Willig, “Protocolsand Architectures for Wireless Sensor Networks.” John Wiley & Sons, Ltd. ISBN: 0-
470-09510-5.
[3]. Anis Koubâa, Mário Alves, Eduardo Tovar, “IEEE 802.15.4 for Wireless Sensor Networks: A Technical
Overview”.www.hurray.isep.ipp.pt. Technical Report.
[4]. Pangun Park, Carlo Fischione, Karl Henrik Johansson, “Performance analysis of GTS allocation in Beacon Enabled IEEE
802.15.4”, Proceeding SECON‟09 Proceedings of th 6th Annaul IEEE communications society conference on Sensor,Mesh and Ad
Hoc communications and Networks Pages 431-439.
[5]. Anis Koubâa, Mário Alves, Eduardo Tovar,André Cunha, “An implicit GTS allocation mechanism in IEEE 802.15.4 for time-
sensitive wireless sensor networks: theory and practice”, Real-Time Syst (2008) 39: 169–204, DOI 10.1007/s11241-007-9038-x.
[6]. OPNET Technologies, Inc., Opnet Modeler Wireless Suite –ver. 11.5A, http:// www.opnet.com.
[7]. Per P. Jurcık and A.Koubaa, The IEEE 802.15.4 OPNET Simulation Model: Reference Guide v2.0. Technical Report HURRAY-
TR-070509, CISTER-ISEP research unit, Porto, Portugal, May 2007. (http://www.open-zb.net).
[8]. M.N. Hassan and Robert Stewart, “Analysis of buffer size dimensioning in GTS enabled IEEE 802.15.4 WSN for real-time
applications”, Int. J. Mobile Network Design and Innovation, Vol. 3, No. 4, 2011.
[9]. Jurcik, P., Koubaa, A., Alves, M., Tovar, E. and Hanzalek, Z. (2007) „A simulation model for the IEEE 802.15.4 : delay/throughput
evaluation of the GTS mechanism‟, in 15th IEEE International Symposium on Modelling, Analysis, and Simulation of Computer
and Telecommunication Systems(MASCOTS 2007), October, pp.109–116, Istanbul, Turkey.
[10]. Brown M., Harris C.J., “Neuro fuzzy adaptive modeling and control”, Prentice Hall, 1994.
[11]. Haykin, S. Neural Networks: A Comprehensive Foundation; Macmillian College Publishing: New York, NY, USA, 1994.
[12]. Using Neural Network: User Guide, theMathworks Inc.
[13]. Website: WWW.MATHWORKS.COM The Mathworks In.
[14]. Ms. Sonal J. Rane, Prof. Satish K. Shah, Ms. Dharmistha D Vishwakarma,” Soft Computing Technique Based Throughput
Optimization of GTS mechanism for IEEE 802.15.4 Standard” in International Journal of Soft Computing and Software
Engineering [JSCSE], Vol. 3, No. 3, 2013.

More Related Content

What's hot

Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformTELKOMNIKA JOURNAL
 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
 
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...IJCNCJournal
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Routing in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space TechniqueRouting in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space Techniquesipij
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
B031201016019
B031201016019B031201016019
B031201016019ijceronline
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
 
Optimization of drx parameter for power saving in lte
Optimization of drx parameter for power saving in lteOptimization of drx parameter for power saving in lte
Optimization of drx parameter for power saving in lteeSAT Publishing House
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...hemanthbbc
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 

What's hot (17)

Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithm
 
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
 
P01754110117
P01754110117P01754110117
P01754110117
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Routing in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space TechniqueRouting in All-Optical Networks Using Recursive State Space Technique
Routing in All-Optical Networks Using Recursive State Space Technique
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
B031201016019
B031201016019B031201016019
B031201016019
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 
EESRDA
EESRDAEESRDA
EESRDA
 
Optimization of drx parameter for power saving in lte
Optimization of drx parameter for power saving in lteOptimization of drx parameter for power saving in lte
Optimization of drx parameter for power saving in lte
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 

Viewers also liked

Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 

Viewers also liked (20)

H017634452
H017634452H017634452
H017634452
 
K018117479
K018117479K018117479
K018117479
 
A012130105
A012130105A012130105
A012130105
 
B010120913
B010120913B010120913
B010120913
 
P01821104110
P01821104110P01821104110
P01821104110
 
L017158389
L017158389L017158389
L017158389
 
A010420117
A010420117A010420117
A010420117
 
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
Optimization of Cutting Parameters for Minimizing Cycle Time in Machining of ...
 
U130304127141
U130304127141U130304127141
U130304127141
 
G017264447
G017264447G017264447
G017264447
 
C010620914
C010620914C010620914
C010620914
 
I1101047680
I1101047680I1101047680
I1101047680
 
Q01314109117
Q01314109117Q01314109117
Q01314109117
 
G012454144
G012454144G012454144
G012454144
 
D1303032730
D1303032730D1303032730
D1303032730
 
I011125160
I011125160I011125160
I011125160
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
I010415255
I010415255I010415255
I010415255
 
D1103012736
D1103012736D1103012736
D1103012736
 
D017252327
D017252327D017252327
D017252327
 

Similar to B010630409

A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newswatisabnis87
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515IJRAT
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
 
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
 
MyThesis
MyThesisMyThesis
MyThesisAmit Liron
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices csandit
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICEScscpconf
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...Elizabeth Williams
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
 

Similar to B010630409 (20)

A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-new
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
 
B010340611
B010340611B010340611
B010340611
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
 
MyThesis
MyThesisMyThesis
MyThesis
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

B010630409

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 04-09 www.iosrjournals.org DOI: 10.9790/2834-10630409 www.iosrjournals.org 4 | Page ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN Dr. Sonal Jignesh Rane Department of Electrical & ElectronicsEngg.,ITM Vocational University,Vadodara,Gujarat,India Abstract: IEEE 802.15.4 Standard is used for low rate, low power consumption and low cost wireless sensor network applications. This standard has an attractive feature for real time application by providing Guaranteed Time Slot (GTS) Mechanism. By applying this mechanism, this standard gives real time guaranty to deliver the time critical data. The GTS is started in the Beacon-enabled mode based on the superframe structure which is defined by PAN-Coordinator. A node has to use at least one whole GTS in a transmission. However, it is not necessary that each node fully utilise its transmission capacity in a particular time slot if the packet arrival rate is too small. Hence, bandwidth utilisation is reduced. This paper explores the underutilization of bandwidth in WSN,the performance optimization of the GTS Mechanismand analyzes GTS mechanism by evaluating throughput using conventional method and proposed adaptive method (Adaptive Neuro Fuzzy Inference System (ANFIS)-soft computing technique) in OPNET Modeler. Keywords: Wireless sensor network (WSN), OPNET, Adaptive Neuro Fuzzy Inference System, IEEE 802.15.4, GTS, GTS Throughput, Packet Medium Access Delay, Wasted Bandwidth. I. Introduction IEEE 802.15.4 standard defines the protocol connection orientation of a personal area network (PAN). The standard uses carrier sense multiple access with a collision avoidance medium access (CSMA/CA) mechanism and supports varieties of topologies for the network viz. star as well as peer-to-peer topologies. The IEEE 802.15.4 [1] Medium Access Control (MAC) protocol supports beacon enabled and non beacon mode. In the beacon enabled mode beacon frames are sent by coordinator periodically for synchronization of sensor nodes. The advantage of beacon enabled mode is that all nodes can wake up and sleep at the same time allowing very low duty cycles and hence save energy. Using the optional superframe structure, time slots can be allocated by the PAN coordinator to devices with time critical data, known as Guaranteed Time Slots (GTS) to fulfill Quality of Service requirements [2]. The primary goal of GTS allocation is providingcommunication services to time critical data, i.e., make certain guarantees on eventual delivery and delivery times of packets to be transmitted by local devices to the network coordinator. In this paper mainly focus is on uplink scenario, which is more relevant for WSNs applications. Adaptive Neuro-Fuzzy Inference System (ANFIS) is used here to decide the number of packets to be transmitted for optimization of throughput of GTS mechanism based on Packet Interarrival time and Data rate. The remainder of this paper is organized as follows. Section II and section III give a brief overview of the IEEE 802.15.4 protocol, its MAC layer specifications and Superframe Structure. In section IV, Soft GTS mechanism is organized. Simulation results are discussed in section V. Finally it is concluded in conclusion. II. IEEE 802.15.4 Mac Layer IEEE 802.15.4 MAC layer protocol [3] can work in two modes viz. non beacon enabled and beacon enabled mode. The non beacon enabled mode is same as non slotted CSMA/CA which provides scalability and self organization to the network while beacon enabled mode uses the superframe structure which defines a time interval during the frames are exchanged between PAN coordinator and associated nodes for the synchronization purpose. Beacon enabled mode works as a slotted CSMA/CA and it enables the allocation of time slots in superframe which is known as Guaranteed Time Slots (GTSs) for the nodes which guaranteed the data frames. Each superframe is divided into Contention Access Period (CAP), where nodes contend among each other to send packets, and a Contention Free Period (CFP), where nodes have GTSs to send packets without contention and thus with guaranteed transmission. The Beacon Order (BO) and Superframe Order (SO) decide the length of the superframe structure and its active period. Real-time guarantees can be achieved by using the GTS mechanism [4, 5] in beacon-enabled mode. The node allocates GTS with a minimum service guarantee, enabling the prediction of the worst-case timing performance of the network. Power-efficiency can be achieved by operating at low duty cycles (down to 0.1%) as power efficiency and timeliness guarantees are often two opposite requirements in wireless sensor networks. Analysis of GTS mechanism is evaluated for GTS throughput using OPNET Modeller [6], which can be achieved due to the packet size based on data rate and Interarrival time.
  • 2. ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN DOI: 10.9790/2834-10630409 www.iosrjournals.org 5 | Page III. Superframe Structure When the PAN Coordinator selects the beacon-enabled mode [7], it forces the use of a Superframe structure which is shown in Figure 1 to manage communication between the devices that are associated to that PAN. The format of the superframe is defined by the PAN Coordinator. The superframe, corresponding to the Beacon Interval (BI), is defined by the time between two consecutive beacons, and includes an active period and, optionally, a following inactive period. The active period, corresponding to the Superframe Duration (SD), is divided into 16 equally sized time slots, during which data transmission is allowed. Each active period can be further divided into a Contention Access Period (CAP) and an optional Contention Free Period (CFP). Slotted CSMA/CA is used within the CAP. The CFP is activated by the request sent from a device to the PAN Coordinator. Upon receiving this request, the PAN Coordinator checks whether there are sufficient resources and, if possible, allocates the requested time slots. This requested group of time slots is called Guaranteed Time Slot (GTS) and is dedicated exclusively to a given device. A CFP support up to 7 GTSs and each GTS may contain multiple time slots. The allocation of the GTS cannot reduce the lengthof the CAP to less than the value specified by aMinCAPLength constant. Figure 1:The IEEE 802.15.4 Super frame structure [6] The structure of the superframe is defined by two parameters, the Beacon Order (BO) and the Superframe Order (SO), which determine the length of the superframe and its active period. The setting of BO and SO must satisfy the relationship 0 ≤ SO ≤ BO ≤ 14. The length of the superframe (BI) and the length of its active period (SD) are defined as follows: BI = aBaseSuperframeDuration x 2BO , SD = aBaseSuperframeDuration x 2SO . The aBaseSuperframeDuration constant denotes the minimum length of the superframe when BO is equal to 0. The IEEE 802.15.4 standard fixes this duration to 960 symbols. If SO = BO then SD = BI and the superframe is always active. According to the standard, if SO = 15, the Superframe will not be active following the beacon. If BO = 15, then the superframe shall not exist and the network will operate in the non beacon- enabled mode. In this case, the value of SO is ignored. As a result, a PAN that wishes to use the superframe structure must set Beacon Order to a value between 0 and 14 and Superframe Order to a value between 0 and the value of Beacon Order. Each independent PAN selects a unique identifier. This PAN identifier (PAN ID) allows communication between devices within a network using short addresses and enables transmissions between devices across independent networks. Thus, all networks can operate independently from all others currently in operation. The PAN Coordinator may accept or reject the GTS allocation request from the End Device according to the value of the user defined attribute GTS Permit [8]. The End Device can specify the time when the GTS allocation and deallocation requests are sentto the PAN Coordinator (Start Time and Stop Time attributes). This allocation request also includes the number of required time slots (GTS Length attribute) and their direction, transmit or receive (GTS Direction attribute). The GTS mechanism packet flow structure is shown in Figure 2. When the requested GTS is assigned to a given device, its application layer starts generating data blocks that correspond to the MAC frame payload (i.e. MAC Service Data Unit (MSDU)). The size of the frame payload is specified by the probability distribution function of the MSDU Size attribute.
  • 3. ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN DOI: 10.9790/2834-10630409 www.iosrjournals.org 6 | Page Figure 2: Packet flow structure in GTS enabled mode [8] The probability distribution function, specified in the MSDU Interarrival Time attribute, defines the inter-arrival time between two consecutive frame payloads. Then, the frame payload is wrapped in the MAC header and stored as a frame in the buffer with a given capacity (Buffer Capacity attribute). The default size of the MAC header (MAC_HEADER_SIZE) is 104 bits, since only 16-bit short addresses are used for communication (according to standard specification). The maximum allowed size of the overall frame (i.e. frame payload plus the MAC header) is equal to aMaxPHYPacketSize (1016 bits). The generated frames exceeding the buffer capacity are dropped. When the requested GTS is active, the frames are removed from the buffer, wrapped in the PHY headers and dispatched to the network with an outgoing data rate equal to physical data rate WPAN_DATA_RATE (250 kbps). IV. Proposed Soft Computing Method Soft Computing is an innovative approach to constructing computationally intelligent systems, which tries to mimic natural creatures. In this sense soft computing is the name of a family of problem-solving methods that have analogy with biological reasoning and problem solving and sometimes referred to as cognitive computing. The basic methods included in cognitive computing are fuzzy logic (FL), neural networks (NN), Artificial Neuro Fuzzy Inference System (ANFIS) and genetic algorithms (GA). ANFIS (Adaptive Neuro-Fuzzy Inference System) is the combination of Neural Network and Fuzzy inference System (FIS) [9,10]. In ANFIS Neural Network can be trained by FIS and having characteristic of both. Here ANFIS is used to determine the MSDU packet size based on the data rate and MSDU Interarrival time. Here best Packet Size is decided depending upon two inputs, given to ANFIS for optimizing the GTS throughputas shown in Figure 3. ANN+FIS =ANFIS Interarrival Rate Data rate Packet Size Figure 3: Internal architecture of ANN with respective inputs and outputs A packet Interarrival time and data rate input decides the best packet size output through trained ANFIS. ANFIS (using a feed forward ANN with multi layers Perception model, with 2 nodes in the input Layer, 10 nodes in hidden layer and 1 node in the output layer) is used offline with OPNET modeler for IEEE 802.15.4GTS mechanism and evaluated the performance. Total (53x53) 2809 pairs are used to minimize the error between trained output and desired output as shown in Figure 4.
  • 4. ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN DOI: 10.9790/2834-10630409 www.iosrjournals.org 7 | Page Figure 4: ANFIS training ANFIS architecture was trained with Number of nodes are 131 with training data pairs of 2809 using 49 fuzzy rules. V. Simulation Setup & Results The Simulation Setup consists of one PAN Coordinator and one associated devices (GTS enabled) within it coverage. There is no medium access contention so devices would not have any influence on the simulation results due to that two devices are enough to evaluate the performance of GTS mechanism. For the sake of simplicity, and without loss of generality, it is assume that only one time slot of GTS is occupied by any node and the duty cycle of a superframe is 100% (SO = BO). Figure 5: Wireless Sensor Network for GTS Mechanism Figure 5 shows the simulation setup of the Conventional GTS Mechanism. For the evaluation of the GTS throughput, GTS is set to 1 time slot and acknowledgement traffic is disabled. The buffer capacity is 4kbits for simulation and simulation time is 5 sec. The simulation was carried out by varying packet size and keeping packet Interarrival time constant (0.001824 sec). The distance between the two nodes is 25meters. INTERARRIVAL TIME PACKET SIZE DATA RATE ANFIS FROM MATLAB IEEE 802.15.4 WSN for GTS MECHANISM GTS THROUGHPUT EVALUATION Figure 6: System Setup for ANFIS based GTS Mechanism
  • 5. ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN DOI: 10.9790/2834-10630409 www.iosrjournals.org 8 | Page The system setup for evaluation of performance of GTS mechanism for WSN using ANFIS in OPNET and MATLAB [11-14] is shown in Figure 6. The impact of data Rate, Packet Size , Packet Interarrival Time, Buffer Size is evaluated on GTS throughput using conventional and soft computing method for different values of SO (=BO). The intense of this section is to optimize the GTS throughput during one time slot of GTS when inter arrival time is set to 0.001824sec and for different values of the SO. Since the frames are transmitted without acknowledgements, the underutilized bandwidth can only result from IFS or from intermittent data arrival at the buffer. Figure 7: GTS Throughput v/s Superframe Order Figure 7 describes the GTS throughput for conventional GTS mechanism and Proposed Soft GTS mechanism for packet size of 50 bits. In these graphs, the GTS Throughput has reached its saturation throughput when the curve reaches its maximum peak value and plateaus. Throughput gradually decreases after reaching certain SO. The higher the SO, the larger the SD is. This creates unproductive service in time slot window duration with the corresponding buffer size and packet generation. This can be observed for SO beyond 7. High values of SO values are not suitable for WSN application because as the SO value is high, SD also will be higher. This will provide more time duration to transmit the data but simultaneously delay will increase and throughput will decrease. Figure 8: Packet Medium Access Delay (PMAD) v/s Superframe Order Figure 8 plots the packet medium access delay (sec). When SO increases, 0.001824 s inter-arrival time records a bigger range of Packet Medium Access Delay (PMAD). This indicates the significant relationship of inter-arrival time, packet size and buffer size. As shown in Figure 8 initially PMAD is somewhat stable and then starts to decrease slightly. The point at which the PMAD decreases slightly indicates that the PMAD contribution originates from the long SD produced by the SO. The PMAD measurement is similar for the same SO regardless of the buffer size until it reaches that slightly decreased point. Also for higher SO values, all frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of SO, delay will increase. For SO values higher or equal to 5, all frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of SO, delay will increase.
  • 6. ANFIS Based Soft GTS Mechanism For IEEE 802.15.4 WSN DOI: 10.9790/2834-10630409 www.iosrjournals.org 9 | Page Figure 9: Wasted Bandwidth v/s Superframe Order From Figure 9, it is observed that wasted bandwidth is less in proposed method compare to conventional method. A device with a low arrival rate that has been allocated one time slot of GTS, may use it only partially. This leads to underutilization of the GTS band width resources. Due to the prefixed time slot duration in a superframe, it is practically impossible to balance the arrival rate of a device and its guaranteed GTS bandwidth. The amount of wasted bandwidth increases with the variance between the guaranteed bandwidth and the arrival rate. However, wasted bandwidth decreases in proposed adaptive method by applying ANFIS soft computing technique. VI. Conclusion In this paper, GTS Mechanism in the IEEE 802.15.4 Standard is evaluated in beacon enabled mode, widely used in WSN application. The evaluation was performed using IEEE 802.15.4 OPNET simulation model and soft computing technique (ANFIS). Higher SO values i.e., greater than 7 are not supported by WSN application. Selection of SO must be done carefully to ensure that the GTS in a superframe can accommodate at least one packet size. The GTS throughput is increased and Packet Medium Access Delay, Wasted bandwidth are decreased for the proposed Adaptive GTS mechanism (ANFIS) for different values of packet size and SO values. The evaluation results that were obtained provide excellent statistics to pursue our future work. The performance of GTS mechanism can be more improved by applying fuzzy as well as genetic algorithm. Acknowledgment Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda and Electrical & Electronics Department, ITM Vocational University, Vadodara for technical help in doing this work. References: [1]. IEEE Std 802.15.4-2996, September, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE, 2006. [Online]. Available: http://www.ieee802.org/15 [2]. Holger Karl and Andreas Willig, “Protocolsand Architectures for Wireless Sensor Networks.” John Wiley & Sons, Ltd. ISBN: 0- 470-09510-5. [3]. Anis Koubâa, Mário Alves, Eduardo Tovar, “IEEE 802.15.4 for Wireless Sensor Networks: A Technical Overview”.www.hurray.isep.ipp.pt. Technical Report. [4]. Pangun Park, Carlo Fischione, Karl Henrik Johansson, “Performance analysis of GTS allocation in Beacon Enabled IEEE 802.15.4”, Proceeding SECON‟09 Proceedings of th 6th Annaul IEEE communications society conference on Sensor,Mesh and Ad Hoc communications and Networks Pages 431-439. [5]. Anis Koubâa, Mário Alves, Eduardo Tovar,AndrĂ© Cunha, “An implicit GTS allocation mechanism in IEEE 802.15.4 for time- sensitive wireless sensor networks: theory and practice”, Real-Time Syst (2008) 39: 169–204, DOI 10.1007/s11241-007-9038-x. [6]. OPNET Technologies, Inc., Opnet Modeler Wireless Suite –ver. 11.5A, http:// www.opnet.com. [7]. Per P. Jurcık and A.Koubaa, The IEEE 802.15.4 OPNET Simulation Model: Reference Guide v2.0. Technical Report HURRAY- TR-070509, CISTER-ISEP research unit, Porto, Portugal, May 2007. (http://www.open-zb.net). [8]. M.N. Hassan and Robert Stewart, “Analysis of buffer size dimensioning in GTS enabled IEEE 802.15.4 WSN for real-time applications”, Int. J. Mobile Network Design and Innovation, Vol. 3, No. 4, 2011. [9]. Jurcik, P., Koubaa, A., Alves, M., Tovar, E. and Hanzalek, Z. (2007) „A simulation model for the IEEE 802.15.4 : delay/throughput evaluation of the GTS mechanism‟, in 15th IEEE International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS 2007), October, pp.109–116, Istanbul, Turkey. [10]. Brown M., Harris C.J., “Neuro fuzzy adaptive modeling and control”, Prentice Hall, 1994. [11]. Haykin, S. Neural Networks: A Comprehensive Foundation; Macmillian College Publishing: New York, NY, USA, 1994. [12]. Using Neural Network: User Guide, theMathworks Inc. [13]. Website: WWW.MATHWORKS.COM The Mathworks In. [14]. Ms. Sonal J. Rane, Prof. Satish K. Shah, Ms. Dharmistha D Vishwakarma,” Soft Computing Technique Based Throughput Optimization of GTS mechanism for IEEE 802.15.4 Standard” in International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, 2013.