SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2868
THROUGHPUT PERFORMANCE IMPROVEMENT FOR UNBALANCED
SLOTTED ALOHA RELAY NETWORKS USING HYBRID NETWORK CODING
Prof. A.A. Phatak1, M.M. Alagundagi2
1Asst. Prof., CSE Dept., NBN Sinhgad COE Kegaon, Solapur
2PG Student, CSE Dept., NBN Sinhgad COE Kegaon, Solapur
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - To investigate the throughput performance of
the network coding (NC) schemes under the slotted ALOHA
protocol is mentioned. All-inclusive- interfering unbalanced
network in which two client groups with different numbers of
nodes communicate with each other through a relay node.
This approach derives the closed-form expressions of the
network throughput un-derthephysical-layernetworkcoding
(PNC), traditional high layer network coding (HNC), and non-
network-coding (NNC), respectively. This method also shows
the necessary and sufficient condition to make the relay node
unsaturated. From the analytical results, and find that
although PNC has better transmission efficiency in the two-
way relay channel (TWRC); it does not always have better
network throughput when the network has multiple client
nodes. Then for further improve the network throughput, the
approach propose the hybrid NC scheme, which allows the
relay node to turn it HNC scheme if it fails to explore the PNC
transmission.
This method further obtains the closed-form expression of the
network throughput and the necessary and sufficient
condition to make the relay node unsaturated inthehybrid NC
scheme. Simulation results show that the hybrid NC scheme
has better throughput performance than the PNC, HNC, and
NNC schemes. Moreover, the approach optimizes the network
throughput of the hybrid NC scheme in terms of the
transmission probability of the re- lay node. At the last,
evaluate the throughput performance of hybrid NC scheme
through simulations.
Key Words: Slotted Aloha, Relay Network, PNC, HNC,
Network Coding, etc.…
1. INTRODUCTION
Network coding (NC) has been proposed as a promising
technique to improve the throughput of wireless network.
Traditionally, NC operation is performed at the network
layer, and three time slots are needed for two client nodes to
exchange two packets through a relay node. This approach
refers to this three-time-slotnetwork codingschemeashigh-
layer network coding (HNC) scheme.
The physical-layer network coding (PNC) further explores
the superimposed Electro-Magnetic (EM) wavesasa natural
way of network coding operation.
In PNC scheme, only two time slots are needed for twoclient
nodes to exchange two packets through a relay node, which
significantly improves the network throughput.
1.1 Unbalanced relay network
1.2 Currently Existing Technologies:
Currently there are very few accepted technologies, tools
for carrying out the work of image inpainting. The work is
still in the beginning stage and a lot of researches are being
carried out to explore this area.
Due to the lack of such software’s, the restorers manually
do the work of image inpainting as in museums etc. A
notable library for carrying out image inpainting is under
development and is hosted as an open source project at
sourceforge.net by the name of "restoreInpaint". It is aimed
at making 8 or 16 bit depth images better.Itprovidesseveral
algorithms including detection algorithms(whichcovers the
problem of finding target areas), Inpainting (discovers the
problem of filling detected cracks and missing thin parts of
the images, paintings and frescos), Restoration (deals with
removing noise etc.) along with several other algorithms. It
is implemented in C++.
Software that deals with the solution of this problem is
titled "Photo Wipe" by "Hanov Solutions". It provides tools
for selecting the region to be inpainted and then applies
some algorithm to achieve the desired result.
2. LITERATURE SURVEY
In the literature, the study of PNC is mostly focused on the
physical layer, and based on the two-way relay channel
(TWRC), where two client nodes exchange packetsthrougha
relay node.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2869
When PNC is applied to a general wireless network, the MAC
protocol needs to be adjusted. In two 802.11-like distributed
MAC protocols were proposed to support PNC transmission.
The authors proposed the multi-user PNC methodforslotted
ALOHA network.However,donotprovideanalyticalnetwork
throughput performance on theproposedMACprotocolwith
PNC. Recently, the authors in analyzed the throughput
performanceofPNCcoordinatedwithan802.11-likeprotocol
in a simple balanced network in which all the client nodes
have the same contention window size and transmission
probability.
The throughput performanceofslottedALOHAnetworkwith
HNCschemewas investigatedinanalyzedtheperformanceof
HNC in a multi-hop multicast slotted ALOHA network with
game theoretic approach.,Amerimehretal.proposedamulti-
class queuing model to analyze the maximum stable
throughput of HNC in a slotted ALOHA wireless tandem
network.
The optimized the transmission probabilities subject to flow
conservation and rate constraints in an HNC slotted-ALOHA
multi hop wireless network. The authors investigated the
throughput gainofHNCversusnon-network-coding(NNC)in
a slotted ALOHA network with star topology. However, it is
assumed thatall the client nodes have thesametransmission
probability. Two recent papers, analyzed the throughput
performance of the NNC and HNC schemes in an unbalanced
slotted ALOHA network with one relay node and two client
groups. However, the authors assumed that the two client
groups are far apart such that the client nodes within
different groups do not interfere with each other. In this
paper, author investigate the throughput performance of
network coding schemes (both HNC and PNC) under the
slotted ALOHA protocol in the relay system where two client
groups communicate with each other through a relay node.
Author considers the unbalanced network, where the two
groups have different numbers of nodes with different
transmission probabilities. Furthermore, author considers
the all-inclusive-interfering case where all the nodes in the
network interfere with each other.
This is because:
1) The unbalanced network is morepracticalandgeneral.
As in a wireless network, the number of client nodes in the
two groups may not always be the same, and assigning the
same transmission probability to all the nodes may not
maximize the network throughput.
The balanced network can be treated as a special case of
unbalanced network.
2) In practice, the interferencerangeisusuallylargerthan
the transmissionrange.Thetwoclientgroups,whichbothare
in the transmission range of the relay node, are highly likely
to interfere with each other. However,boththemodelingand
the theoretical analysis of the all-inclusive-interfering
unbalanced network are more complicated.
Author obtain the closed-form expressions of the network
throughput of the PNC, HNC, and NNC schemes under the
slotted ALOHA protocol in the all-inclusive-interfering
unbalanced relay network.
Author further show the necessary and sufficient
condition to ensure the relay node is unsaturated. Author
disaffected by the balance of the total traffic betweenthetwo
client groups; while the throughput performance of PNC is
heavily affected by the value of α, which represents the
probability that a transmitted NC packet contains the
information of two packets.
Thus, PNC may have lower throughput than HNC when α is
small. This motivates us to further propose the hybrid NC
scheme, which allows the relay nodetoturntoHNCschemeif
it fails to explore the PNC transmission. We provide
theoretical analysis onthethroughputperformanceofhybrid
NC scheme together with the necessary and sufficient
condition to ensure the relay node is unsaturated.
The hybrid NC scheme has better throughput performance
than single HNC or PNC scheme. Author further optimize the
network throughput of the hybrid NC scheme in terms of the
transmission probability of the relay node hr.
In particular, author shows that the network throughput of
hybrid NC scheme monotonically decreases with hr.
Therefore, the optimal hr is the minimum value that ensures
all the buffers at the relay node are unsaturated. Simulation
results show that the throughput gain of hybrid NC and that
the throughput performance of HNC is mainlyschemeversus
PNC, HNC, and NNC schemes can respectively reach 127.7%,
154.7%, and 188.9%. The rest of this paper is organized as
follows. Section II presents the network model and the
transmission processes of the NNC, HNC and PNC schemes
with the slotted ALOHA protocol.
Author derives the closed-form expressions of the network
throughput for NNC, HNC, and PNC schemes. Author
proposes the hybrid NC scheme, derive the closed-form
expression of the network throughput, and optimize the
network throughput of hybrid NC scheme. Author carry out
extensive simulations to validate our model, discuss the
relationship between the network throughput of hybrid NC
scheme and system parameters, and compare the
throughput of the NNC, HNC, PNC, and hybrid NC schemes.
3. SYSTEM DESIGN OVERVIEW:
3.1 Problem Statement:
Using Hybrid Network coding scheme, we improve the
throughput performance of network coding schemes (both
HNC and PNC) under the slotted ALOHAprotocol intherelay
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2870
system where two client groups communicate with each
other.
Our aim is to evaluate the throughput performanceofhybrid
NC scheme through simulation.
The proposed SystemcontaintheadvantageofPNC(physical
network coding) and HNC (High layer Network Coding), NC
(Hybrid Network Coding) resp.
By using these methods as per the requirement we can
improve the throughput performance of the hybrid
unbalanced slotted ALOHA protocol.
3.2 Objective and scope:
Main objective is to investigate the throughput performance
of network coding schemes (both HNC and PNC) under the
slotted ALOHA protocol in the relay systemwheretwoclient
groups communicate with each other. 1) To design
framework for Hybrid Unbalanced Slotted ALOHA protocol
which contains?
 Network model of PNC, HNC, slotted ALOHA.
 Transmission process in HNC, PNC.
 Throughput calculation of hybrid NC Schema.
2) To optimize the network throughput.
3) To evaluate the performance of proposed scheme
through simulation.
4) To show that the proposed scheme has better
performance than the exiting scheme.
Scope:
Proposed approach is used to communicate two client
groups under the slotted ALOHA protocol.
4. METHODOLOGY:
4.1 Network Model:
Consider a bidirectional unbalanced relay network withtwo
client groups of u1 and u2 nodes, as shown in transmission
process in NNC scheme. Relay node is within the
transmission range of all the client nodes.
The nodes in different groups are within the
interference range but out of the transmission range of each
other. Thus, two nodes in differentgroupscanonlyexchange
packets through the relay node.
The relay node doesnotgeneratetraffic,andthereis
no traffic within the same clientgroup.Assumethesaturated
traffic load such that each client node always has packets to
send.
There is only one physical channel,andall thenodes
contend for the channel according to the slotted ALOHA
protocol. Assume half-duplex transmission such that a node
cannot transmit and receive simultaneously.
4.2 The NNC, HNC and PNC Transmissions Coordinated
With Slotted ALOHA Protocol:
In the slotted ALOHA protocol, time is divided intoa number
of slots. Each packet transmission startsatthebeginning ofa
time slot. To reduce mutual collisions, each node initiates a
transmission with a given probability when it has packetsto
transmit.
Assume that the transmission probability is the sameforthe
nodes in the same group but different for the nodes in
different groups. If only one node initiates a transmission in
the current time slot, its destination node can successful
receive the packet. Otherwise, collision occurs, and the
transmission in the current time slot is failed.
Next this approach show the transmissionprocessesinNNC,
HNC and PNC schemes during a time slot, respectively. Note
that since the overhead in each scheme is different, the slot
time of each scheme is also different.
In NNC scheme, the successful transmission process from
node ni to nj is s. At the beginning of the timeslot, ni
transmits a packet to n j .time, and then sends back an
acknowledgement (ACK) packet to ni.
The slot time Tslot in NNC scheme can be calculated as
follows:
Tslot= T packet+ TACK + SIFS + 2max ……………. (4.1)
Where Tpacket, TACK, and δmax are the time used for
transmitting the data packet, the time used for transmitting
the ACK packet, and the maximum propagation delay,
respectively.
In HNC scheme, the client node in each group transmits a
packet to the relay node with the same process in NNC
scheme, When a client node transmits, all the other client
nodes in the same group perform opportunistic listening
(receive the transmitted packet and store it in their
temporary buffers).
The transmitting client node also stores the transmitted
packet in its temporary buffer. By doing so, the client nodes
can decode all the NC packets from the relay node in the
second step. After receiving both packets from two client
groups, the relay node forms an NC packet, and then
broadcasts it to the two destination nodesatthebeginningof
the next time slot. Then, the two destination nodes
respectively transmit an ACK packet to the relaynodeaftera
delay of
SIFS and 2SIFS + TACK + max ……………. (4.2)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2871
If the relay node has a packet from only one client group, it
transmits the packet to the destination.
Tslot= Tpacket+ 2TACK + 2SIFS + 3max ……………. (4.3)
In PNC scheme, When two nodes in different groups
concurrently transmit a packet to the relay node, Request to
Send (RTS)/Clear to Send (CTS) mechanism is adopted to
coordinate the transmissions.
Considering that the propagation delay1. Since the
propagation delay could be different for different
transmissions, the slot time should is set according to the
maximum propagation delay, between the relay node and
the client nodes may be different.
This approach uses the similar synchronization method
proposed in to make two packets from two client nodes in
different groups can reach the relay node simultaneously. In
practice, some technologies can be used to relax the
synchronization requirement.
For example, when Orthogonal Frequency Division
Multiplexing (OFDM) technology is used, the relay node can
successfully extract anNCpacketfromthesuperimposed EM
wave if the difference of the arrival times is within the cyclic
prefix (CP) of the OFDM system. The detailed transmission
processes of PNC scheme. First, at the beginning of the time
slot, a client node ends an RTS packet to the relay node with
the information indicating its destination client node(i.e.nj)
in the other group.
After correctly receiving the RTS packet, the relay node first
waits for an SIFS delay, and then broadcasts a CTS packet
with a time stamp containing the transmit instant to both ni
and n j .
When ni and nj receive the CTS packet, they can respectively
calculate the propagation delay between the relay node and
themselves, δi and δj, by subtracting the time stamp in the
CTS from the receiving time. Here, we assume that all the
nodes have a common time reference,whichcanbeobtained
from the Global Positioning System (GPS).
Then, ni and nj send a packet to the relay node with a delay
of
SIFS + 2δmax −2δ j and SIFS + 2δmax −2δ j , respectively.
……………. (4.4)
In the case that n j does not have a packet for ni, it sends a
dummy packet instead. Therefore,therelaynodecanreceive
the two packets simultaneouslyatthetime“theCTStime
stamp + SIFS + 2δmax―, and extract an NC packet. The
relay node then broadcasts an ACK packet to both ni and n j
after an SIFS delay for confirmation.
When a client node successfully transmits a packet, it stores
the transmitted packet in its temporary buffer to make.
At the beginning of the time slot, the relay node broadcasts
an NC packet to ni and nj. After receiving the NC packet, ni
and nj send back an ACK packet respectively after a delay of
SIFS + 2δmax −2δi and SIFS + 2δmax −2δ j …….. (4.5)
Since the two ACK packets will arrive at the relay node
simultaneously, the relay node can check the overlapped
ACK packet and know whether the NC packet is correctly
received or not.
slot time Tslot in PNC scheme equals
Tslot= TRT S + TCT S + Tpacket+ TACK + 3SIFS + 4δmax
……………. (4.6)
Approach proposes the hybridNCscheme,inwhichtherelay
node turns to the HNC scheme if it fails to explore the PNC
transmission. As will be seen later,thehybrid NCschemecan
further improve the network throughput.
In hybrid NC scheme, the successful transmission process
from the client nodes to the relay node is as follows. At the
beginning of a time slot, client node ni sends an RTS packet
to the relay node with the information indicating its
destination node n j in the other client group
D(P) = ……………. (4.7)
5. EXPERIMENTS EXECUTION AND RESULTS:
Fig -1: Network Controller
Fig -2: Network Controller with Client details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2872
Fig -3: Client 1 Uploaded file and ready to Transfer
Fig -4: Client 1 in HNC
Fig -5: Both Files combine together in Relay node
Fig -6: In PNC Schema: CTS Message has been Received
Successfully
6. CONCLUSIONS
This approach studied the throughput performance of the
network coding schemes in the unbalanced slotted ALOHA
network. In particular, the closed-form expressions of the
network throughput for the PNC, HNC, and NNC schemes,
together with the corresponding necessary and sufficient
condition to make the relay node unsaturated.
The throughput performance of PNC significantly
deteriorates when the traffic between two client nodes in
different groups is not balanced. The hybrid NC scheme that
combines the advantagesof PNCandHNCschemestofurther
improve the network throughput.
The closed form expression of network throughput for
hybrid NC scheme together with the necessaryandsufficient
condition to make the relay node unsaturated.
Moreover, this approach optimized the network throughput
of the hybrid NC scheme in terms of the transmission
probability of the relay node. In addition, this is used to
evaluate the throughput performance of the hybrid NC
scheme with simulations.
7. ACKNOWLEDGEMENT:
Firstly, I would like to thank and express my sincere
gratitude towards my guide and HOD CSE Department Prof.
A. A. Pathak for his patience, motivation, and immense
knowledge and also for the continuous support to my
Master's study and related research. He acted as a source of
inspiration in all spheres of my dissertation phases and
necessarily providing all resources along with a great
platform to accomplish my target. Besides my guide,Iwould
like to thank my PG Coordinator Prof. B. R. Solunke for his
scholarly guidance and inspiring suggestions which helped
me in carrying out the present research work.
While working on the current dissertation of “Throughput
Performance improvement for Unbalanced Slotted ALOHA
Relay Networks using Hybrid Network Coding” got exposed
to various new technologies. I am feeling oblige in takingthe
opportunity to sincerely thank to our Hon. Principal Dr.
Shankar D. Navale, for providing me with all the necessary
facilities for the research and motivationduringthistenure.I
would also like to thank other faculty and staffmembers and
non-teaching staff of my department. Finally, and most
importantly, I would like to thank all my ME batch mates for
their help in group learning process and giving mesupport.I
also thankful to my family members for encouragement and
standing beside me throughout my life.
7. REFERENCES
[1] Ahlswede, S. Li and R. Yeung, "Network information
flow", IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-
1216, Jul. 2000.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2873
[2] S.-Y. R. Li, R. W. Yeung and N. Cai, "Linear network
coding", IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371-
381, Feb. 2003.
[3] Zhang, S. C. Liew and P. P. Lam,"Hottopic:Physical-layer
network coding", in Proc. ACM Mobicom, pp. 358-365,
2006.
[4] Popovski and H. Yomo, "The anti-packets can increase
the achievable throughput of a wireless multi-hop
network", in Proc. IEEE Int. Conf. Commun., pp. 3885-
3890, 2006.
[5] Vishnu, V. Kiran and B. R. Sundar, "Physical layer
network coding for two-way relaying with QAM", IEEE
Trans. Wireless Commun.,vol.12,no.10,pp.5074-5086,
Oct. 2013.

More Related Content

What's hot

4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networksambitlick
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Chokepaperpublications3
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 

What's hot (19)

Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Choke
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Chapter4[one.]
Chapter4[one.]Chapter4[one.]
Chapter4[one.]
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 

Similar to IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay Networks using Hybrid Network Coding

Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of networkjpstudcorner
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...chennaijp
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...IRJET Journal
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET Journal
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
 
Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...LogicMindtech Nologies
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networksIRJET Journal
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chipzhao fu
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...IJECEIAES
 
IRJET- Re-Configuration Topology for On-Chip Networks by Back-Tracking
IRJET- Re-Configuration Topology for On-Chip Networks by Back-TrackingIRJET- Re-Configuration Topology for On-Chip Networks by Back-Tracking
IRJET- Re-Configuration Topology for On-Chip Networks by Back-TrackingIRJET Journal
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 

Similar to IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay Networks using Hybrid Network Coding (20)

Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
 
Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...Energy efficient wireless sensor networks using linear programming optimizati...
Energy efficient wireless sensor networks using linear programming optimizati...
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
A survey report on mapping of networks
A survey report on mapping of networksA survey report on mapping of networks
A survey report on mapping of networks
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chip
 
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
Improvement of crankshaft MAC protocol for wireless sensor networks: a simula...
 
IRJET- Re-Configuration Topology for On-Chip Networks by Back-Tracking
IRJET- Re-Configuration Topology for On-Chip Networks by Back-TrackingIRJET- Re-Configuration Topology for On-Chip Networks by Back-Tracking
IRJET- Re-Configuration Topology for On-Chip Networks by Back-Tracking
 
wsn
wsnwsn
wsn
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

IRJET- Throughput Performance Improvement for Unbalanced Slotted Aloha Relay Networks using Hybrid Network Coding

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2868 THROUGHPUT PERFORMANCE IMPROVEMENT FOR UNBALANCED SLOTTED ALOHA RELAY NETWORKS USING HYBRID NETWORK CODING Prof. A.A. Phatak1, M.M. Alagundagi2 1Asst. Prof., CSE Dept., NBN Sinhgad COE Kegaon, Solapur 2PG Student, CSE Dept., NBN Sinhgad COE Kegaon, Solapur ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - To investigate the throughput performance of the network coding (NC) schemes under the slotted ALOHA protocol is mentioned. All-inclusive- interfering unbalanced network in which two client groups with different numbers of nodes communicate with each other through a relay node. This approach derives the closed-form expressions of the network throughput un-derthephysical-layernetworkcoding (PNC), traditional high layer network coding (HNC), and non- network-coding (NNC), respectively. This method also shows the necessary and sufficient condition to make the relay node unsaturated. From the analytical results, and find that although PNC has better transmission efficiency in the two- way relay channel (TWRC); it does not always have better network throughput when the network has multiple client nodes. Then for further improve the network throughput, the approach propose the hybrid NC scheme, which allows the relay node to turn it HNC scheme if it fails to explore the PNC transmission. This method further obtains the closed-form expression of the network throughput and the necessary and sufficient condition to make the relay node unsaturated inthehybrid NC scheme. Simulation results show that the hybrid NC scheme has better throughput performance than the PNC, HNC, and NNC schemes. Moreover, the approach optimizes the network throughput of the hybrid NC scheme in terms of the transmission probability of the re- lay node. At the last, evaluate the throughput performance of hybrid NC scheme through simulations. Key Words: Slotted Aloha, Relay Network, PNC, HNC, Network Coding, etc.… 1. INTRODUCTION Network coding (NC) has been proposed as a promising technique to improve the throughput of wireless network. Traditionally, NC operation is performed at the network layer, and three time slots are needed for two client nodes to exchange two packets through a relay node. This approach refers to this three-time-slotnetwork codingschemeashigh- layer network coding (HNC) scheme. The physical-layer network coding (PNC) further explores the superimposed Electro-Magnetic (EM) wavesasa natural way of network coding operation. In PNC scheme, only two time slots are needed for twoclient nodes to exchange two packets through a relay node, which significantly improves the network throughput. 1.1 Unbalanced relay network 1.2 Currently Existing Technologies: Currently there are very few accepted technologies, tools for carrying out the work of image inpainting. The work is still in the beginning stage and a lot of researches are being carried out to explore this area. Due to the lack of such software’s, the restorers manually do the work of image inpainting as in museums etc. A notable library for carrying out image inpainting is under development and is hosted as an open source project at sourceforge.net by the name of "restoreInpaint". It is aimed at making 8 or 16 bit depth images better.Itprovidesseveral algorithms including detection algorithms(whichcovers the problem of finding target areas), Inpainting (discovers the problem of filling detected cracks and missing thin parts of the images, paintings and frescos), Restoration (deals with removing noise etc.) along with several other algorithms. It is implemented in C++. Software that deals with the solution of this problem is titled "Photo Wipe" by "Hanov Solutions". It provides tools for selecting the region to be inpainted and then applies some algorithm to achieve the desired result. 2. LITERATURE SURVEY In the literature, the study of PNC is mostly focused on the physical layer, and based on the two-way relay channel (TWRC), where two client nodes exchange packetsthrougha relay node.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2869 When PNC is applied to a general wireless network, the MAC protocol needs to be adjusted. In two 802.11-like distributed MAC protocols were proposed to support PNC transmission. The authors proposed the multi-user PNC methodforslotted ALOHA network.However,donotprovideanalyticalnetwork throughput performance on theproposedMACprotocolwith PNC. Recently, the authors in analyzed the throughput performanceofPNCcoordinatedwithan802.11-likeprotocol in a simple balanced network in which all the client nodes have the same contention window size and transmission probability. The throughput performanceofslottedALOHAnetworkwith HNCschemewas investigatedinanalyzedtheperformanceof HNC in a multi-hop multicast slotted ALOHA network with game theoretic approach.,Amerimehretal.proposedamulti- class queuing model to analyze the maximum stable throughput of HNC in a slotted ALOHA wireless tandem network. The optimized the transmission probabilities subject to flow conservation and rate constraints in an HNC slotted-ALOHA multi hop wireless network. The authors investigated the throughput gainofHNCversusnon-network-coding(NNC)in a slotted ALOHA network with star topology. However, it is assumed thatall the client nodes have thesametransmission probability. Two recent papers, analyzed the throughput performance of the NNC and HNC schemes in an unbalanced slotted ALOHA network with one relay node and two client groups. However, the authors assumed that the two client groups are far apart such that the client nodes within different groups do not interfere with each other. In this paper, author investigate the throughput performance of network coding schemes (both HNC and PNC) under the slotted ALOHA protocol in the relay system where two client groups communicate with each other through a relay node. Author considers the unbalanced network, where the two groups have different numbers of nodes with different transmission probabilities. Furthermore, author considers the all-inclusive-interfering case where all the nodes in the network interfere with each other. This is because: 1) The unbalanced network is morepracticalandgeneral. As in a wireless network, the number of client nodes in the two groups may not always be the same, and assigning the same transmission probability to all the nodes may not maximize the network throughput. The balanced network can be treated as a special case of unbalanced network. 2) In practice, the interferencerangeisusuallylargerthan the transmissionrange.Thetwoclientgroups,whichbothare in the transmission range of the relay node, are highly likely to interfere with each other. However,boththemodelingand the theoretical analysis of the all-inclusive-interfering unbalanced network are more complicated. Author obtain the closed-form expressions of the network throughput of the PNC, HNC, and NNC schemes under the slotted ALOHA protocol in the all-inclusive-interfering unbalanced relay network. Author further show the necessary and sufficient condition to ensure the relay node is unsaturated. Author disaffected by the balance of the total traffic betweenthetwo client groups; while the throughput performance of PNC is heavily affected by the value of α, which represents the probability that a transmitted NC packet contains the information of two packets. Thus, PNC may have lower throughput than HNC when α is small. This motivates us to further propose the hybrid NC scheme, which allows the relay nodetoturntoHNCschemeif it fails to explore the PNC transmission. We provide theoretical analysis onthethroughputperformanceofhybrid NC scheme together with the necessary and sufficient condition to ensure the relay node is unsaturated. The hybrid NC scheme has better throughput performance than single HNC or PNC scheme. Author further optimize the network throughput of the hybrid NC scheme in terms of the transmission probability of the relay node hr. In particular, author shows that the network throughput of hybrid NC scheme monotonically decreases with hr. Therefore, the optimal hr is the minimum value that ensures all the buffers at the relay node are unsaturated. Simulation results show that the throughput gain of hybrid NC and that the throughput performance of HNC is mainlyschemeversus PNC, HNC, and NNC schemes can respectively reach 127.7%, 154.7%, and 188.9%. The rest of this paper is organized as follows. Section II presents the network model and the transmission processes of the NNC, HNC and PNC schemes with the slotted ALOHA protocol. Author derives the closed-form expressions of the network throughput for NNC, HNC, and PNC schemes. Author proposes the hybrid NC scheme, derive the closed-form expression of the network throughput, and optimize the network throughput of hybrid NC scheme. Author carry out extensive simulations to validate our model, discuss the relationship between the network throughput of hybrid NC scheme and system parameters, and compare the throughput of the NNC, HNC, PNC, and hybrid NC schemes. 3. SYSTEM DESIGN OVERVIEW: 3.1 Problem Statement: Using Hybrid Network coding scheme, we improve the throughput performance of network coding schemes (both HNC and PNC) under the slotted ALOHAprotocol intherelay
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2870 system where two client groups communicate with each other. Our aim is to evaluate the throughput performanceofhybrid NC scheme through simulation. The proposed SystemcontaintheadvantageofPNC(physical network coding) and HNC (High layer Network Coding), NC (Hybrid Network Coding) resp. By using these methods as per the requirement we can improve the throughput performance of the hybrid unbalanced slotted ALOHA protocol. 3.2 Objective and scope: Main objective is to investigate the throughput performance of network coding schemes (both HNC and PNC) under the slotted ALOHA protocol in the relay systemwheretwoclient groups communicate with each other. 1) To design framework for Hybrid Unbalanced Slotted ALOHA protocol which contains?  Network model of PNC, HNC, slotted ALOHA.  Transmission process in HNC, PNC.  Throughput calculation of hybrid NC Schema. 2) To optimize the network throughput. 3) To evaluate the performance of proposed scheme through simulation. 4) To show that the proposed scheme has better performance than the exiting scheme. Scope: Proposed approach is used to communicate two client groups under the slotted ALOHA protocol. 4. METHODOLOGY: 4.1 Network Model: Consider a bidirectional unbalanced relay network withtwo client groups of u1 and u2 nodes, as shown in transmission process in NNC scheme. Relay node is within the transmission range of all the client nodes. The nodes in different groups are within the interference range but out of the transmission range of each other. Thus, two nodes in differentgroupscanonlyexchange packets through the relay node. The relay node doesnotgeneratetraffic,andthereis no traffic within the same clientgroup.Assumethesaturated traffic load such that each client node always has packets to send. There is only one physical channel,andall thenodes contend for the channel according to the slotted ALOHA protocol. Assume half-duplex transmission such that a node cannot transmit and receive simultaneously. 4.2 The NNC, HNC and PNC Transmissions Coordinated With Slotted ALOHA Protocol: In the slotted ALOHA protocol, time is divided intoa number of slots. Each packet transmission startsatthebeginning ofa time slot. To reduce mutual collisions, each node initiates a transmission with a given probability when it has packetsto transmit. Assume that the transmission probability is the sameforthe nodes in the same group but different for the nodes in different groups. If only one node initiates a transmission in the current time slot, its destination node can successful receive the packet. Otherwise, collision occurs, and the transmission in the current time slot is failed. Next this approach show the transmissionprocessesinNNC, HNC and PNC schemes during a time slot, respectively. Note that since the overhead in each scheme is different, the slot time of each scheme is also different. In NNC scheme, the successful transmission process from node ni to nj is s. At the beginning of the timeslot, ni transmits a packet to n j .time, and then sends back an acknowledgement (ACK) packet to ni. The slot time Tslot in NNC scheme can be calculated as follows: Tslot= T packet+ TACK + SIFS + 2max ……………. (4.1) Where Tpacket, TACK, and δmax are the time used for transmitting the data packet, the time used for transmitting the ACK packet, and the maximum propagation delay, respectively. In HNC scheme, the client node in each group transmits a packet to the relay node with the same process in NNC scheme, When a client node transmits, all the other client nodes in the same group perform opportunistic listening (receive the transmitted packet and store it in their temporary buffers). The transmitting client node also stores the transmitted packet in its temporary buffer. By doing so, the client nodes can decode all the NC packets from the relay node in the second step. After receiving both packets from two client groups, the relay node forms an NC packet, and then broadcasts it to the two destination nodesatthebeginningof the next time slot. Then, the two destination nodes respectively transmit an ACK packet to the relaynodeaftera delay of SIFS and 2SIFS + TACK + max ……………. (4.2)
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2871 If the relay node has a packet from only one client group, it transmits the packet to the destination. Tslot= Tpacket+ 2TACK + 2SIFS + 3max ……………. (4.3) In PNC scheme, When two nodes in different groups concurrently transmit a packet to the relay node, Request to Send (RTS)/Clear to Send (CTS) mechanism is adopted to coordinate the transmissions. Considering that the propagation delay1. Since the propagation delay could be different for different transmissions, the slot time should is set according to the maximum propagation delay, between the relay node and the client nodes may be different. This approach uses the similar synchronization method proposed in to make two packets from two client nodes in different groups can reach the relay node simultaneously. In practice, some technologies can be used to relax the synchronization requirement. For example, when Orthogonal Frequency Division Multiplexing (OFDM) technology is used, the relay node can successfully extract anNCpacketfromthesuperimposed EM wave if the difference of the arrival times is within the cyclic prefix (CP) of the OFDM system. The detailed transmission processes of PNC scheme. First, at the beginning of the time slot, a client node ends an RTS packet to the relay node with the information indicating its destination client node(i.e.nj) in the other group. After correctly receiving the RTS packet, the relay node first waits for an SIFS delay, and then broadcasts a CTS packet with a time stamp containing the transmit instant to both ni and n j . When ni and nj receive the CTS packet, they can respectively calculate the propagation delay between the relay node and themselves, δi and δj, by subtracting the time stamp in the CTS from the receiving time. Here, we assume that all the nodes have a common time reference,whichcanbeobtained from the Global Positioning System (GPS). Then, ni and nj send a packet to the relay node with a delay of SIFS + 2δmax −2δ j and SIFS + 2δmax −2δ j , respectively. ……………. (4.4) In the case that n j does not have a packet for ni, it sends a dummy packet instead. Therefore,therelaynodecanreceive the two packets simultaneouslyatthetime“theCTStime stamp + SIFS + 2δmax―, and extract an NC packet. The relay node then broadcasts an ACK packet to both ni and n j after an SIFS delay for confirmation. When a client node successfully transmits a packet, it stores the transmitted packet in its temporary buffer to make. At the beginning of the time slot, the relay node broadcasts an NC packet to ni and nj. After receiving the NC packet, ni and nj send back an ACK packet respectively after a delay of SIFS + 2δmax −2δi and SIFS + 2δmax −2δ j …….. (4.5) Since the two ACK packets will arrive at the relay node simultaneously, the relay node can check the overlapped ACK packet and know whether the NC packet is correctly received or not. slot time Tslot in PNC scheme equals Tslot= TRT S + TCT S + Tpacket+ TACK + 3SIFS + 4δmax ……………. (4.6) Approach proposes the hybridNCscheme,inwhichtherelay node turns to the HNC scheme if it fails to explore the PNC transmission. As will be seen later,thehybrid NCschemecan further improve the network throughput. In hybrid NC scheme, the successful transmission process from the client nodes to the relay node is as follows. At the beginning of a time slot, client node ni sends an RTS packet to the relay node with the information indicating its destination node n j in the other client group D(P) = ……………. (4.7) 5. EXPERIMENTS EXECUTION AND RESULTS: Fig -1: Network Controller Fig -2: Network Controller with Client details
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2872 Fig -3: Client 1 Uploaded file and ready to Transfer Fig -4: Client 1 in HNC Fig -5: Both Files combine together in Relay node Fig -6: In PNC Schema: CTS Message has been Received Successfully 6. CONCLUSIONS This approach studied the throughput performance of the network coding schemes in the unbalanced slotted ALOHA network. In particular, the closed-form expressions of the network throughput for the PNC, HNC, and NNC schemes, together with the corresponding necessary and sufficient condition to make the relay node unsaturated. The throughput performance of PNC significantly deteriorates when the traffic between two client nodes in different groups is not balanced. The hybrid NC scheme that combines the advantagesof PNCandHNCschemestofurther improve the network throughput. The closed form expression of network throughput for hybrid NC scheme together with the necessaryandsufficient condition to make the relay node unsaturated. Moreover, this approach optimized the network throughput of the hybrid NC scheme in terms of the transmission probability of the relay node. In addition, this is used to evaluate the throughput performance of the hybrid NC scheme with simulations. 7. ACKNOWLEDGEMENT: Firstly, I would like to thank and express my sincere gratitude towards my guide and HOD CSE Department Prof. A. A. Pathak for his patience, motivation, and immense knowledge and also for the continuous support to my Master's study and related research. He acted as a source of inspiration in all spheres of my dissertation phases and necessarily providing all resources along with a great platform to accomplish my target. Besides my guide,Iwould like to thank my PG Coordinator Prof. B. R. Solunke for his scholarly guidance and inspiring suggestions which helped me in carrying out the present research work. While working on the current dissertation of “Throughput Performance improvement for Unbalanced Slotted ALOHA Relay Networks using Hybrid Network Coding” got exposed to various new technologies. I am feeling oblige in takingthe opportunity to sincerely thank to our Hon. Principal Dr. Shankar D. Navale, for providing me with all the necessary facilities for the research and motivationduringthistenure.I would also like to thank other faculty and staffmembers and non-teaching staff of my department. Finally, and most importantly, I would like to thank all my ME batch mates for their help in group learning process and giving mesupport.I also thankful to my family members for encouragement and standing beside me throughout my life. 7. REFERENCES [1] Ahlswede, S. Li and R. Yeung, "Network information flow", IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204- 1216, Jul. 2000.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2873 [2] S.-Y. R. Li, R. W. Yeung and N. Cai, "Linear network coding", IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371- 381, Feb. 2003. [3] Zhang, S. C. Liew and P. P. Lam,"Hottopic:Physical-layer network coding", in Proc. ACM Mobicom, pp. 358-365, 2006. [4] Popovski and H. Yomo, "The anti-packets can increase the achievable throughput of a wireless multi-hop network", in Proc. IEEE Int. Conf. Commun., pp. 3885- 3890, 2006. [5] Vishnu, V. Kiran and B. R. Sundar, "Physical layer network coding for two-way relaying with QAM", IEEE Trans. Wireless Commun.,vol.12,no.10,pp.5074-5086, Oct. 2013.