This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
11.signal strength based congestion control in manetAlexander Decker
This document discusses several algorithms and approaches for improving TCP performance in mobile ad hoc networks (MANETs) using signal strength measurements:
1. TCP Venoplus is a cross-layer approach that uses signal strength information from the MAC layer to better distinguish between packet losses due to congestion versus random errors.
2. Other algorithms proposed include Link-RED and adaptive pacing to reduce the impact of wireless interference on TCP, as well as techniques to predict and avoid link failures before they occur such as gray zone prediction and multi-agent adaptive DSR.
3. Most of the algorithms aim to minimize unnecessary packet retransmissions when losses are due to non-congestion factors like mobility, thereby improving throughput
4..[26 36]signal strength based congestion control in manetAlexander Decker
This document discusses several algorithms and approaches for improving TCP performance in mobile ad hoc networks (MANETs) using signal strength measurements:
1. TCP Venoplus is a cross-layer approach that uses signal strength information from the MAC layer to better distinguish between packet losses due to congestion versus random errors.
2. Other algorithms proposed include Link-RED to tune wireless link drop probability, adaptive pacing to improve spatial reuse, and algorithms to predict link failures and find stable routes using signal strength measurements.
3. Received signal strength is also used in algorithms to minimize broadcast storms and adapt MAC layer retransmissions to distinguish true link failures from false ones caused by interference.
4. Gray zone prediction and
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
This document describes a proposed system called Enhanced Adaptive Acknowledgement (EAACK) for detecting misbehaving nodes in mobile ad hoc networks (MANETs). The system uses three components - ACK, Secure ACK, and Misbehavior Report Analysis. ACK provides end-to-end acknowledgment, S-ACK provides acknowledgment between three consecutive nodes, and MRA confirms any misbehavior reports. Digital signatures are also used to validate acknowledgments. The system is simulated using the NS-2 network simulator and results show it can effectively detect misbehaving nodes while maintaining good network performance.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
11.signal strength based congestion control in manetAlexander Decker
This document discusses several algorithms and approaches for improving TCP performance in mobile ad hoc networks (MANETs) using signal strength measurements:
1. TCP Venoplus is a cross-layer approach that uses signal strength information from the MAC layer to better distinguish between packet losses due to congestion versus random errors.
2. Other algorithms proposed include Link-RED and adaptive pacing to reduce the impact of wireless interference on TCP, as well as techniques to predict and avoid link failures before they occur such as gray zone prediction and multi-agent adaptive DSR.
3. Most of the algorithms aim to minimize unnecessary packet retransmissions when losses are due to non-congestion factors like mobility, thereby improving throughput
4..[26 36]signal strength based congestion control in manetAlexander Decker
This document discusses several algorithms and approaches for improving TCP performance in mobile ad hoc networks (MANETs) using signal strength measurements:
1. TCP Venoplus is a cross-layer approach that uses signal strength information from the MAC layer to better distinguish between packet losses due to congestion versus random errors.
2. Other algorithms proposed include Link-RED to tune wireless link drop probability, adaptive pacing to improve spatial reuse, and algorithms to predict link failures and find stable routes using signal strength measurements.
3. Received signal strength is also used in algorithms to minimize broadcast storms and adapt MAC layer retransmissions to distinguish true link failures from false ones caused by interference.
4. Gray zone prediction and
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
This document describes a proposed system called Enhanced Adaptive Acknowledgement (EAACK) for detecting misbehaving nodes in mobile ad hoc networks (MANETs). The system uses three components - ACK, Secure ACK, and Misbehavior Report Analysis. ACK provides end-to-end acknowledgment, S-ACK provides acknowledgment between three consecutive nodes, and MRA confirms any misbehavior reports. Digital signatures are also used to validate acknowledgments. The system is simulated using the NS-2 network simulator and results show it can effectively detect misbehaving nodes while maintaining good network performance.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
This document presents a proposed multi-channel distribution scheme for mobile ad hoc networks (MANETs) and evaluates it through simulation. The proposed scheme assigns channels to nodes based on their node IDs to avoid control overhead from time synchronization. While neighboring nodes on the same channel is possible, the probability is low given random node distribution. The proposed scheme is compared to a single-channel scheme in ns-2 simulations. Results show the proposed technique has better performance.
Active path updation for layered routing (apular) in wirelessAlexander Decker
1) The document proposes an Active Path Updation procedure (APULAR) for layered routing in wireless mesh networks to quickly update broken paths and reduce packet loss.
2) In APULAR, the destination node takes responsibility for local repair restoration instead of the source node initiating a new path discovery when a link breaks, as is typically done.
3) The procedure is simulated and shown to outperform AODV and IWMRA routing protocols, achieving better packet delivery ratio, lower control overhead, higher throughput, and lower end-to-end delay.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
The network layer is concerned with routing packets from the source to the destination across multiple networks. It must understand the topology of connected networks and choose optimal paths while avoiding overloading some lines. The network layer provides either connection-oriented or connectionless services to the transport layer and deals with differences when sources and destinations are in different networks. Dynamic routing algorithms like distance vector routing are used to adaptively route packets based on current network conditions.
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
This document summarizes and compares several congestion-aware routing protocols for mobile ad hoc networks (MANETs). It discusses the Congestion Adaptive Routing Protocol (CRP), which uses bypass routes to avoid congested areas and splits traffic between primary and bypass routes adaptively. It also describes the Efficient Congestion Adaptive Routing Protocol (ECARP), which modifies AODV parameters to improve congestion handling, and the Congestion Aware Routing plus Rate Adaptation (CARA) protocol, which establishes routes around congested areas. Finally, it discusses the Congestion Aware Routing Protocol for Mobile ad hoc networks (CARM), which uses a weighted channel delay metric to measure
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
The document discusses packet switching networks and their topology at different levels from LANs to the Internet. Packet switching allows for connectionless and connection-oriented transfer of information. The network layer provides minimum services like routing and addressing to transport data between end systems. Switches like routers and bridges connect different networks and allow information to be shared globally.
Specifica‘tion, verification and simulation of a wireless lanambitlick
This document summarizes a formal specification, verification, and simulation of the MACAW wireless LAN protocol. The specification formally models MACAW using communicating finite state machines and shared variables. The verification analyzes basic configurations of 2, 3, and 4 machines to check for errors like deadlocks, but does not verify all possible configurations. The simulation provides further insight into MACAW's performance and suggests areas for improvement. In summary, the work formally specifies MACAW, verifies parts of its behavior, and simulates its performance to evaluate and potentially enhance the protocol.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
This document proposes a modified AODV (M-AODV) routing protocol for transmitting multimedia traffic like video in mobile ad hoc networks (MANETs). The M-AODV protocol considers sending time, route stability, and bandwidth size to discover highly stable routes for transmitting video frames from source to destination nodes. It encodes the video at the source node and sends route requests with the required bandwidth. The performance is evaluated using NS3 simulation tools based on metrics like throughput, packet loss, and delay. The document also discusses research challenges for video streaming in MANETs like bandwidth usage and availability only when online, and identifies throughput, delay, and packet loss as key issues to address for video transmission in these networks.
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
The document proposes a Bi-Scheduler algorithm to improve throughput in IEEE 802.11n wireless networks using frame aggregation. The algorithm separates frames into different queues based on access category. Delay sensitive frames like voice are directly queued without aggregation. Other frames are aggregated using A-MSDU or A-MPDU based on their characteristics to efficiently transmit frames while meeting their quality of service requirements. The algorithm aims to optimize frame aggregation to improve throughput while maintaining fairness for different traffic types.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
This document proposes a new adaptation method to improve quality of service in mobile ad hoc networks. The method uses a cross-layer approach combining modifications to the IEEE 802.11 MAC standard with a new version of TCP. It takes node mobility, signal strength, and routing protocols into account. Simulation results show the proposal achieves better TCP performance and throughput while improving energy efficiency compared to normal TCP, especially when using the OLSR routing protocol.
The document describes the design and implementation of an on-chip system-on-chip (SOC) interconnect using an i-SLIP scheduling algorithm. The interconnect uses a crossbar switch architecture to connect 8 devices on the chip. Each device has an input and output block that can store up to 32 packets to send and receive. The scheduler block implements the i-SLIP algorithm to determine which packets from the input blocks will be sent to the output blocks. The goal is to provide an efficient communication mechanism between the on-chip devices using a packet-based protocol over the interconnect.
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
This document presents a proposed multi-channel distribution scheme for mobile ad hoc networks (MANETs) and evaluates it through simulation. The proposed scheme assigns channels to nodes based on their node IDs to avoid control overhead from time synchronization. While neighboring nodes on the same channel is possible, the probability is low given random node distribution. The proposed scheme is compared to a single-channel scheme in ns-2 simulations. Results show the proposed technique has better performance.
Active path updation for layered routing (apular) in wirelessAlexander Decker
1) The document proposes an Active Path Updation procedure (APULAR) for layered routing in wireless mesh networks to quickly update broken paths and reduce packet loss.
2) In APULAR, the destination node takes responsibility for local repair restoration instead of the source node initiating a new path discovery when a link breaks, as is typically done.
3) The procedure is simulated and shown to outperform AODV and IWMRA routing protocols, achieving better packet delivery ratio, lower control overhead, higher throughput, and lower end-to-end delay.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
The network layer is concerned with routing packets from the source to the destination across multiple networks. It must understand the topology of connected networks and choose optimal paths while avoiding overloading some lines. The network layer provides either connection-oriented or connectionless services to the transport layer and deals with differences when sources and destinations are in different networks. Dynamic routing algorithms like distance vector routing are used to adaptively route packets based on current network conditions.
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
This document summarizes and compares several congestion-aware routing protocols for mobile ad hoc networks (MANETs). It discusses the Congestion Adaptive Routing Protocol (CRP), which uses bypass routes to avoid congested areas and splits traffic between primary and bypass routes adaptively. It also describes the Efficient Congestion Adaptive Routing Protocol (ECARP), which modifies AODV parameters to improve congestion handling, and the Congestion Aware Routing plus Rate Adaptation (CARA) protocol, which establishes routes around congested areas. Finally, it discusses the Congestion Aware Routing Protocol for Mobile ad hoc networks (CARM), which uses a weighted channel delay metric to measure
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
The document discusses packet switching networks and their topology at different levels from LANs to the Internet. Packet switching allows for connectionless and connection-oriented transfer of information. The network layer provides minimum services like routing and addressing to transport data between end systems. Switches like routers and bridges connect different networks and allow information to be shared globally.
Specifica‘tion, verification and simulation of a wireless lanambitlick
This document summarizes a formal specification, verification, and simulation of the MACAW wireless LAN protocol. The specification formally models MACAW using communicating finite state machines and shared variables. The verification analyzes basic configurations of 2, 3, and 4 machines to check for errors like deadlocks, but does not verify all possible configurations. The simulation provides further insight into MACAW's performance and suggests areas for improvement. In summary, the work formally specifies MACAW, verifies parts of its behavior, and simulates its performance to evaluate and potentially enhance the protocol.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET Journal
This document proposes a modified AODV (M-AODV) routing protocol for transmitting multimedia traffic like video in mobile ad hoc networks (MANETs). The M-AODV protocol considers sending time, route stability, and bandwidth size to discover highly stable routes for transmitting video frames from source to destination nodes. It encodes the video at the source node and sends route requests with the required bandwidth. The performance is evaluated using NS3 simulation tools based on metrics like throughput, packet loss, and delay. The document also discusses research challenges for video streaming in MANETs like bandwidth usage and availability only when online, and identifies throughput, delay, and packet loss as key issues to address for video transmission in these networks.
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
The document proposes a Bi-Scheduler algorithm to improve throughput in IEEE 802.11n wireless networks using frame aggregation. The algorithm separates frames into different queues based on access category. Delay sensitive frames like voice are directly queued without aggregation. Other frames are aggregated using A-MSDU or A-MPDU based on their characteristics to efficiently transmit frames while meeting their quality of service requirements. The algorithm aims to optimize frame aggregation to improve throughput while maintaining fairness for different traffic types.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
This document proposes a new adaptation method to improve quality of service in mobile ad hoc networks. The method uses a cross-layer approach combining modifications to the IEEE 802.11 MAC standard with a new version of TCP. It takes node mobility, signal strength, and routing protocols into account. Simulation results show the proposal achieves better TCP performance and throughput while improving energy efficiency compared to normal TCP, especially when using the OLSR routing protocol.
The document describes the design and implementation of an on-chip system-on-chip (SOC) interconnect using an i-SLIP scheduling algorithm. The interconnect uses a crossbar switch architecture to connect 8 devices on the chip. Each device has an input and output block that can store up to 32 packets to send and receive. The scheduler block implements the i-SLIP algorithm to determine which packets from the input blocks will be sent to the output blocks. The goal is to provide an efficient communication mechanism between the on-chip devices using a packet-based protocol over the interconnect.
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
This document analyzes the throughput of TCP in mobile ad hoc networks through simulations. It finds that TCP throughput decreases initially as the number of hops increases, then stabilizes at higher hop counts. This is due to hidden terminal problems at low hops. The number of retransmissions increases with payloads and flows due to buffering and congestion. TCP performance degrades in wireless networks because it cannot differentiate between congestion and non-congestion packet losses. Mobility, interference, and dynamic topology changes specific to wireless networks cause unnecessary triggering of TCP congestion control mechanisms.
A throughput analysis of tcp in adhoc networkscsandit
Transmission Control Protocol (TCP) is a connection oriented end-end reliable byte stream
transport layer protocol. It is widely used in the Internet.TCP is fine tuned to perform well in
wired networks. However the performance degrades in mobile ad hoc networks. This is due to
the characteristics specific to wireless networks, such as signal fading, mobility, unavailability
of routes. This leads to loss of packets which may arise either from congestion or due to other
non-congestion events. However TCP assumes every loss as loss due to congestion and invokes
the congestion control procedures. TCP reduces congestion window in response, causing unnecessary
degradation in throughput. In mobile ad hoc networks multi-hop path forwarding further
worsens the packet loss and throughput. To understand the TCP behavior and improve the
TCP performance over mobile ad hoc networks considerable research has been carried out. As
the research is still active in this area a comprehensive and in-depth study on the TCP throughput
and the various parameters that degrade the performance of TCP have been analyzed. The
analysis is done using simulations in Qualnet 5.0
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
This document summarizes a research paper that proposes and evaluates a cross-layer optimization approach for the Dynamic Source Routing (DSR) protocol and the 802.11 MAC layer in mobile ad hoc networks. The approach tracks signal strengths of neighboring nodes to distinguish between packet losses due to mobility versus congestion. This information is provided to DSR to avoid unnecessary route error and maintenance processes when losses are due to congestion rather than broken links. Simulations evaluate the approach under different static and mobile scenarios and traffic patterns, showing improvements in routing overhead, packet losses and throughput compared to the conventional DSR protocol.
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
The document analyzes various rate-based congestion control algorithms for wireless technologies. It finds that TCP Vegas performs better than other TCP variants in terms of delivery fraction and delay. However, TCP Vegas has a consistent window size. Congestion avoidance is more effective at resolving congestion and has higher throughput than slow start. Cross-layer congestion control requires significant power and memory. The document then analyzes the performance of AIMD, TFRC, and TCP congestion control protocols via simulation. It finds that GAIMD performs better than TFRC in terms of throughput, while TFRC is better than GAIMD in terms of smoothness.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
Ctcp a cross layer information based tcp for manetijasuc
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and
considers every packet loss as congestion. This results in severe degradation of TCP performance. In this
research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications
are used for adapting the congestion window and achieving better performance. We propose Cross-layer
information based Transmission Control Protocol (CTCP) which consists of four network states.
Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested
state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate
state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion.
Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative
values. Congestion state calls congestion control when network is actually congested and normal state
works as standard TCP. Simulation results show that network state based CTCP is more appropriate for
MANET than packet loss based traditional TCP.
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
Due to tremendous growth of the wireless based application services are increasing the demand for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization in multi-radio wireless mesh networks is a very challenging problem. WMNs have been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX (802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high collision due to improper channel slot usage approximation error. To overcome this here the author propose the cross layer optimization technique by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of these parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of our proposed approach in term of channel slot re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
A network is nothing but multiple nodes are
connected with each other in some manner. The communication
between each node and the topology of the network are important
to make the environment more efficient. The communications
between systems are broadly categorized into two; that are wired
and wireless communication. In wired network, each node will be
connected through physical wires and follows a topology. But in
wireless network the communication between each node will be
happen a centralized node called Access Point. In wireless
environment a special wireless network is called MANET, in
which there will be no centralized Access Points. MANET is
nothing but Mobile Ad-hoc NETwork. In MANET each node acts
as a sender and receiver. And there is no fixed route between
nodes. Based on the nodes reachable, node will change the
routing table dynamically. So the mobility and scalability of the
nodes will not impact the MANET. The self-configuring ability of
the MANET made it popular in military applications and
emergency recovery. So the communication between each node
should be more secure and trustable. And it’s important to
identify the malicious nodes in MANET too. The malicious nodes
are nodes which are not able to sends packets further or the
nodes which are sends false report to the sender. To identify these
malicious nodes and sends the messages with more secure with
authorization need to implement new Intrusion Identification
System called Digital Signature with Acknowledgement name as
Enhanced Adaptive Acknowledgement. The objective of MANET
is fast communication. So its need to analyze the network
throughput also once the new Intrusion Identification System
introduced.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
This document summarizes a research paper that proposes a new routing algorithm called Quadrant-Based Directional Routing (Q-DIR) for multihop wireless networks. Q-DIR is implemented as a cross-layer with Contention Window Adaptation Mechanism (CWAM) to reduce network power consumption and increase throughput. Q-DIR limits flooding to the quadrant containing the source and destination nodes. CWAM adapts the contention window size based on node traffic to improve throughput. Simulation results show that Q-DIR with CWAM outperforms standard flooding protocols by utilizing fewer nodes and increasing throughput while reducing power consumption.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
1) The document proposes an Active Path Updation procedure (APULAR) for layered routing in wireless mesh networks to quickly update broken paths and reduce packet loss.
2) In APULAR, the destination node takes responsibility for local repair restoration instead of the source node initiating a new path discovery when a link breaks, as is typically done.
3) The procedure is simulated and shown to outperform AODV and IWMRA routing protocols, achieving better packet delivery ratio, lower control overhead, higher throughput, and lower end-to-end delay.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
Computer networks have experienced an explosive growth over the past few years, which has lead to some severe congestion problems. Reliable protocols like TCP works well in wired networks where loss occurs mostly because of congestion. However, in wireless networks, loss occurs because of bit rates and handoffs too. TCP responds all losses by congestion control and avoidance algorithms, which results in degradation of TCP’s End-To-End performance in wireless networks. This paper discusses different issues and problems regarding use of TCP in wireless networks and provides comprehensive survey of various schemes to improve performance of TCP in Wireless Networks.
Performance Evaluation of TCP with Adaptive Pacing and LRED in Multihop Wirel...ijwmn
Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of
data over unreliable networks. In practice, most TCP deployments have been carefully designed in the
context of wired networks. Ignoring the properties of wireless and Ad-hoc Networks can lead to TCP
implementations with poor performance. In a wireless network, however packet losses occur more often
due to unreliable wireless links than due to congestion. When using TCP over wireless links, each packet
loss on the wireless link results in congestion control measures being invoked at the source. This causes
severe performance degradation. If there is any packet loss in wireless networks, then the reason for that
has to be found out. If there is congestion, then only congestion control mechanism has to be applied.
This work shows the performance of TCP with Adaptive Pacing (TCP-AP) and Link Random Early
Discard (LRED) as queuing model in multihop transmission when the source and destination nodes are
in mobile nature. The adaptive pacing technique seeks to improve spatial reuse. The LRED technique
seeks to react earlier to link overload. This paper consists of simulated environment results under
different network scenarios. This work proves that the combination of TCP-AP and LRED give much
better result than as the individual technique. Simulations are done with the use of NS-2.
Similar to 11.a review of improvement in tcp congestion control using route failure detection in manet (20)
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
This study evaluated faculty members' attitudes toward shared governance in public universities in Pakistan. It used a questionnaire to assess attitudes on 4 indicators of shared governance: the role of the dean, role of faculty, role of the board, and role of joint decision-making. The study analyzed responses from 90 faculty across various universities. Statistical analysis found significant differences in perceptions of shared governance based on faculty rank and gender. Faculty rank influenced perceptions of the dean's role and role of joint decision-making. Gender influenced overall perceptions of shared governance. The results indicate a need to improve shared governance practices in Pakistani universities.
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
1) The study assessed knowledge of pneumonia prevention among 60 middle-aged adults in rural Moodbidri, India. Most subjects (55%) had poor knowledge and 41.67% had average knowledge. The mean knowledge score was 40.66%.
2) Knowledge was lowest in areas of diagnosis, prevention and management (35.61%) and highest in introduction to pneumonia (45.42%).
3) There was a significant association between knowledge and gender but not other demographic factors like age, education level or occupation. The study concluded knowledge of prevention was low and health education is needed.
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
This document analyzes the impact of fundamental factors on stock prices in India during normal and recessionary periods. It finds that during normal periods from 2000-2007, earnings per share had a positive and significant impact on stock prices, while coverage ratio had a negative impact. During the recession from 2007-2009, price-earnings ratio positively and significantly impacted stock prices, while growth had a negative effect. Overall, the study aims to compare the influence of fundamental factors like book value, dividends, earnings, etc. on stock prices during different economic conditions in India.
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
This document summarizes a study on the needs and necessities of potential rural migrants in Bangladesh and how providing certain facilities could encourage them to remain in rural areas. The study involved surveys of 350 local and non-local people across 7 upazilas to understand their satisfaction with existing services and priority of needs. The findings revealed variations in requirements between local and non-local respondents. Based on the analysis, the study recommends certain priority facilities, such as employment opportunities and community services, that should be provided in rural areas to improve quality of life and reduce migration to cities. Limitations include the small sample size not representing all of Bangladesh and difficulties collecting full information from all respondents.
A study on the evaluation of scientific creativity among scienceAlexander Decker
This study evaluated scientific creativity among 31 science teacher candidates in Turkey. The candidates were asked open-ended questions about scientific creativity and how they would advance science. Their responses showed adequate fluency and scientific knowledge, but low flexibility and originality. When asked to self-evaluate, most said their scientific creativity was partially adequate. The study aims to help improve the development of scientific creativity among future teachers.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
This document discusses a study on the antioxidant defense system in breast cancer patients. The study measured levels of reduced glutathione (GSH), superoxide dismutase (SOD) activity, total antioxidant potential (AOP), malondialdehyde (MDA), and nitrate in 40 breast cancer patients and 20 healthy controls. The results found increased MDA, SOD, and nitrite levels and decreased GSH and AOP levels in breast cancer patients compared to controls, indicating higher oxidative stress in patients from increased free radicals and lower antioxidant defenses.
This study examined 79 dry crania (55 male and 24 female) from southern Nigeria to determine the incidence and dimensions of single and double hypoglossal canals, and whether these dimensions differ between sexes. Measurements were taken of the internal and external diameters of the hypoglossal canals. The results showed significant differences in all dimensions between males and females. Bilateral single hypoglossal canals were most prevalent. In conclusion, the size of the hypoglossal canal is sex-specific, with significant differences found between males and females in this population.
A study on knowledge and practice of post menopausal womenAlexander Decker
The document discusses a study on the knowledge and practices of post-menopausal women in rural Karnataka regarding health maintenance. The study found that 75% of subjects had good overall knowledge, but their practices of breast self-examination and Kegel exercises were very poor, with average scores below 1%. While knowledge of preventing osteoporosis was high, knowledge of cancer prevention was average. There was a positive correlation between knowledge and practices. The study concludes that lifestyle changes, calcium/vitamin D intake, and health screenings are important for post-menopausal health but are lacking in the community.
A study on financial performance of restructured or revived slp es in keralaAlexander Decker
The document analyzes the financial performance of three state-level public enterprises (SLPEs) in Kerala, India that underwent restructuring or revival packages. Ratio analysis is used to compare the enterprises' pre- and post-restructuring financial positions in terms of liquidity, profitability, and long-term solvency. For the first enterprise, ratios show improvement after its 2007 restructuring, with increased current ratio, profits, return on equity, and decreased debt ratios by 2009-2010. The second enterprise's ratios fluctuated without consistent improvement prior to 1999-2000. The document aims to determine if the restructuring packages achieved their objectives of improving SLPE financial soundness.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
How to Get CNIC Information System with Paksim Ga.pptx
11.a review of improvement in tcp congestion control using route failure detection in manet
1. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
A Review of Improvement in TCP congestion Control Using
Route Failure Detection in MANET
S.A.Jain and Sujata K.Tapkir
MAE, Alandi (D)
Emails: sajain@comp.maepune.ac.in, sujata.tapkir@gmail.com
Abstract
A mobile ad-hoc network is an autonomous collection of mobile devices that communicate with each other
over wireless links and cooperate in a distributed manner in order to provide the necessary network
functionality in the absence of a fixed infrastructure. This type of network, operating as a stand-alone
network or with one or multiple points of attachment to cellular networks or the Internet, paves the way for
numerous new and exciting applications. Route failure is very frequent in mobile ad hoc networks as the
nodes are mobile and is a very serious issue also which needs to be addressed. This paper provides an
insight into the TCP congestion control mechanism in mobile ad hoc networks (MANET) and discusses the
recently proposed route failure detection schemes. All these algorithms tend to increase the network
performance in terms of parameters like throughput, packet delivery ratio, end-to-end delay, route
reestablishment delay etc.
Keywords: ad hoc network, route failure, congestion, throughput
INTRODUCTION
At present, a large variety of networks exists, ranging from the well-known infrastructure of cellular
networks to non-infrastructure wireless ad-hoc networks. Wireless ad-hoc or on-the-fly networks are
characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize
themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. The
path between each pair of the users may have multiple links, and the radio between them can be
heterogeneous. This allows an association of various links to be a part of the same network. Mobile ad-hoc
networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as
the Internet. Transmission Control Protocol (TCP) was designed to provide reliable end-to-end delivery of
data over unreliable networks.
Fig.1 Ad-Hoc Network
Due to the inherent reliability of wired networks, there is an implicit assumption made by TCP that any loss
is due to congestion. To reduce congestion, TCP will invoke its congestion control mechanisms whenever
any packet loss is detected. However, MANETs consisting of multi-hop wireless links suffer from packet
9
2. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
losses due to error-prone wireless channels, media access control (MAC) layer contention, and route
breakages. TCP will yield poor performance if it still interprets such losses as congestions and consequently
invokes congestion control and avoidance procedures. Some mechanisms have been proposed which help
TCP to distinguish between packet delivery loss due to route failure or, wireless link collisions on routes.
Part II provides a brief description of the current proposed mechanisms for route failure detection in the
MANET and part III contains the comparison of the algorithms in terms of network parameters. Finally
part IV gives conclusion and future scope.
II.ANALYSIS OF THE MECHANISMS
There are many algorithms for route failure detection and avoidance, some of them are explained below:
A. Node Movement Detection to Overcome False Route Failures [1]
There are two reasons of route failure in the MANET namely node mobility and wireless link collisions on
routes (i.e., false route failure). If the packet delivery loss is due to the latter, unnecessary route
reestablishment will degrade the network performance. This algorithm proposes a node movement
detection scheme that can predict false route failures and prevent unnecessary route reestablishments by
referring to changes in its neighborhood. In this mechanism, every node can determine its movement based
on its neighbor table and decide whether to retransmit a failed packet or to discover an alternate route. The
HELLO message is modified by adding an M flag bit to it. Every node in the network periodically
broadcasts modified HELLO messages to its neighbors via 1-hop flooding. If a node receives a HELLO
message with the M flag bit set to1, it updates its neighbor table and makes a prediction on its movement
by calculating changes in its neighborhood. This algorithm focuses on network parameters like end to end
distance and packet delivery ratio (PDR) for the static chain topology.
012 3 4 5 6 7 8 9 0 1 2 3 45 6 7 8 9 0 1 2 3 4 5 6 7 8 9
Prefix Hop
Type R A M Reserved
Size Count
Destination IP address
Destination Sequence Number
Lifetime
Fig.2 Modified Hello message format
Steps for MDS:
Step1: Each node computes Vn periodically
Step2: If there is a packet delivery failure at the MAC layer, the MAC layer notifies the network layer of
the failure.
Step3: When the network layer receives the notification of a packet delivery failure from the MAC layer,
If Vn < Vn_threshold
Network layer retransmits the failed packet.
The network layer increases Vn by α (penalty for retransmission)
Else
The network layer establishes a detouring alternate route.
The Vn_threshold and α are calculated by following equations.
10
3. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
This algorithm was simulated in NS-2 and it was found that it gives higher TCP throughput than AODV
and performs almost the same as the static routing protocol. It also gives much higher PDR compared with
other schemes when nodes are static and in the mobile situation, MDS performs better than others when the
traffic load is high, i.e., when the CBR rate is above 30 Kbps.
B. Divert Failure Route Protocol Based on AODV [2]
This algorithm is extension to the main AODV protocol. The main goal is to improve the reliability of
routes after an existing link is going to be down due to nodes mobility. To achieve this objective, the
algorithm is going to develop a very useful mechanism in order to avoid a link failure in advance and
construct a new direction in locally (where the incident takes place). For this purpose, two working models
are developed namely “Detection –Model and New-Path-constructor- Model (DM-NPM)”.The main
functions of these models are to predict the signal strength and to determine a link status before it becomes
completely unavailable and find out a new direction to the destination to divert the current link into a route
with a strong transmission. This algorithm focuses on network parameters like Delay, speed, distance. This
algorithm was simulated in NS-2 and it was found that it avoids link failure in advance and reduces the
delay resulting from sending link failure information back to the sender. Some limitations of this scheme
are Low processing and Memory overhead. DFRP monitors the link to next hop and predict the link status
through the signal strength. Main functions of these Models are to predict the signal strength, and to find a
new route to divert the data to the new path, and improve the overall network health.
C. A Feedback-Based Scheme for Improving TCP Performance [3]
TCP Feedback is a feedback based approach to handle the route failures in MANETs. This approach allows
the TCP sender to distinguish between losses due to route failures and those due to network congestion. In
this scheme, the source is informed of the route failure with the help of a Route Failure
Notification(RFN)so that it does not unnecessarily invoke congestion control and can refrain from sending
any further packets until the route is restored with Route Re-establishment Notification(RRN). For this, it
uses a single bulk data transfer session, where a source mobile host is sending packets to a destination
mobile host As soon as the disruption of a route due to the mobility of the next mobile host along that route
is detected, a route failure notification (RFN) packet is explicitly sent to the source and this event is
recorded. This algorithm focuses on network parameters like Data rate, Failure rate, Route re-establishment
delay (RDD).
This algorithm was simulated in NS-2 and it was found that it notifies the source of route failures and
route reestablishments. As the route re-establishment delay grows, TCP-F performs significantly better than
TCP and prevents unnecessary timer back offs during the route failure interval and performance
degradation. But some limitations of this scheme are like Throughput of TCP degrades rapidly with
increasing RRD and greater exponential back off. The result found that there is an improvement in
performance by using TCP-F over regular TCP. So for a given time interval the number of packets passing
through the network increases with data rate. Consequently, if we consider a failure that lasts for
the ‘t’ seconds, the number of packets that are lost in time ‘t’ increases with data rate, which leads to
further performance degradation in TCP. Therefore, as data rates in wireless media increase, feedback is
likely to provide even greater benefits.
D. Ant Colony Algorithm in MANET [4]
This algorithm is inspired from the basic behavior which ants exhibit. Real ants deposit a substance called
pheromone on the ground which helps them to find their food and shortest path from nest to food. It is a
11
4. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
link failure management algorithm which is based on the alternate route finding by ant agents. At the time
of data flow through the link, all the nodes in the links exchange hello message which symbolizes active
link. If a particular hello message does not get response, link break is detected. Node detecting link
breakage will queue up the data packed and search alternate path with the help of new type of packed
forward ant and backward ant. These control packets will soon find alternate path to the next node in the
link. This algorithm focuses on the end-to-end delay and overhead parameter of the mobile ad hoc network.
In this case, routing table will have one additional column which contains IP address of next to next node in
the active link, which is modified by RREP packet. RREP has information about all nodes present in the
link i.e. generated by the destination. This algorithm improves the network throughput and also reduces the
time needed to establish a route from source to destination. No Overhead in sending RERR and re-RREQ
packets. This algorithm was used by the researchers in the route discovery process but its usage to improve
the routing process will provide a new and exciting scope.
E. Reliable Cross-Layer Multicast with Local Backtracking [6]
In the working model of reliable cross-layer multicast, Ad- hoc networks have been studied extensively to
overcome network performance problems and improve performance. In this two types of solutions have
been proposed; Layer triggers and Cross-layering. The cross-layer approach allows layers to actively
interact, by exchanging some specific parameters through the adjacent layers. To provide reliable
multicast and increase the performance of transport communication, the scheme uses the feedback
information from an intermediate multicast node on detection of a path break. It says that if path is broken
then, an upstream intermediate multicast node, called PN (Pivot node), and sends a backtracking
notification message to its upstream nodes and the multicast source. The system maintains a hierarchical
family group to provide local retransmission. Due to the node mobility problem a PN can be aware of
either a link failure or congestion when it does not receive any acknowledgment from its downstream
nodes after a specific interval. Therefore it can cumulate a region that acknowledges the reception of
packets or request retransmission to the upstream agent node. For the simulation probability of link broken
is considered. The advantage of this scheme is that the co-ordination of buffers and local repair scheme
reduces the unnecessary reroute latency and packets retransmission from source node. The simulation
experiments show that in terms of aggregate throughput and TCP congestion window progression, RBM is
more efficient than the others.
III. COMPARISON
All the algorithms describe above are trying to improve the performance of mobile ad-hoc networks in one
way or the other by avoiding congestion. The node movement detection scheme takes into account both the
reasons of packet failure, i.e, node movement and wireless link collision. It performs better than AODV in
terms of TCP throughput and gives a higher packet delivery ratio when nodes are static whereas in case of
ant colony algorithm, only link failure is considered. This mechanism is a modification of AODV protocol
which tries to improve the throughput and end-to-end delay parameters. Probably overhead parameter will
also improve as control packets used in this case are only forward ants and backward ants. On the other
hand, control packets transmitted in pure AODV namely RERR and R-RREQ are not required. Divert
failure route protocol uses the most popular model of radio propagation to compute the received signal
powers which is not used in any other algorithm yet. In case of TCP-feedback based scheme, route failure
is likely to result in gaps in the receiver’s window, which adversely affects TCP’s cumulative
acknowledgment scheme. Therefore, it may be worthwhile exploring alternative end-to-end
acknowledgment schemes such as selective acknowledgment (SACK) and comparing their performance
with cumulative acknowledgment. The goal of Reliable Cross -Layer Multicast with Local Backtracking
algorithm is to avoid undesired retransmission from the source and further to improve the efficiency of
source-to-receivers delivery with the aid of buffer.
IV CONCLUSION
12
5. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
We conclude that the cause of TCP performance degradation in MANETs is due to two major problem one
is TCP is unable to distinguish between losses due to route failures and network congestion. Second is TCP
suffers from frequent route failures. So these different algorithms which we have studied are trying to avoid
the route failures in many ways which ultimately helps to improve the TCP performance. Topics for further
research include thorough mathematical analysis of buffer size and to validate different models of DFRP
protocol using NS-2 simulator.
REFERENCES
[1] Hyun Yu, Sanghyun Ahn,” Node Movement Detection to Overcome False
Route Failures in Mobile Ad Hoc Networks”, 2008 IEEE DOI 10.1109/ICISS.2008.40
[2] Sayid Mohamed Abdule,Suhaidi Hassan,” Divert Failure Route Protocol Based on AODv”, 2010 IEEE
DOI 10.1109/NETAPPS.2010.19
[3]KartikChandran,Sudarshan Raghunathan,SubbarayanVenkatesan, Ravi Prakash,” A Feedback-Based
Scheme for Improving TCP Performance in Ad Hoc Wireless Networks”, IEEE Personal
Comsmunications, February 2001
[4] Jyoti Jain, Roopam Gupta, T.K. Bandhopadhyay,” Ant Colony Algorithm in MANET-Local link
repairing of AODV”, 2011 IEEE
[5] Sridhar K N, Mun Choon Chan,” Modeling Link Lifetime Data with Parametric Regression Models in
MANETs”,IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 12, DECEMBER 2009
[6] Y.-M. Huang, M.-H. Tsai, T.-C. Chiang, T.-W. Hou,” Reliable cross-layer multicast with local
backtracking for improving transmission control protocol performance in ad hoc networks”, The Institution
of Engineering and Technology 2007
[7] C. E. Perkins and P. Bhagwat, “Destination Sequenced Distance-Vector Routing(DSDV) for Mobile
Computers,” Proc. ACM SIGCOMM Conf. Commun. Architectures, Protocols and Apps., Aug. 1994, pp.
234–44
[8] K. N. Sridhar and M. C. Chan, “Stability and hop-count based approach for route computation in
MANET,” in Proc. IEEE ICCCN 2005, SanDiego, CA, Oct. 2005, pp. 25–31
[9] Rappaport, T. S.; .Wireless Communications: Principles and Practice(2nd 107 Edition)., Prentice Hall,
2002
[10] EWA ROMANOWICZ,” TCP with Explicit Link Failure Notification”, Department of Computer
Science, York University, Toronto, Canada
[11]Quing CHEN, Zhisheng NIU, “A delayed adaptive retransmission scheme for false route failure in
MANET”,2004 IEEE,10th asia-pacific conference on communications
13
6. International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org
Business, Economics, Finance and Management PAPER SUBMISSION EMAIL
European Journal of Business and Management EJBM@iiste.org
Research Journal of Finance and Accounting RJFA@iiste.org
Journal of Economics and Sustainable Development JESD@iiste.org
Information and Knowledge Management IKM@iiste.org
Developing Country Studies DCS@iiste.org
Industrial Engineering Letters IEL@iiste.org
Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research JNSR@iiste.org
Chemistry and Materials Research CMR@iiste.org
Mathematical Theory and Modeling MTM@iiste.org
Advances in Physics Theories and Applications APTA@iiste.org
Chemical and Process Engineering Research CPER@iiste.org
Engineering, Technology and Systems PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems CEIS@iiste.org
Innovative Systems Design and Engineering ISDE@iiste.org
Journal of Energy Technologies and Policy JETP@iiste.org
Information and Knowledge Management IKM@iiste.org
Control Theory and Informatics CTI@iiste.org
Journal of Information Engineering and Applications JIEA@iiste.org
Industrial Engineering Letters IEL@iiste.org
Network and Complex Systems NCS@iiste.org
Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science JEES@iiste.org
Civil and Environmental Research CER@iiste.org
Journal of Natural Sciences Research JNSR@iiste.org
Civil and Environmental Research CER@iiste.org
Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare JBAH@iiste.org
Food Science and Quality Management FSQM@iiste.org
Chemistry and Materials Research CMR@iiste.org
Education, and other Social Sciences PAPER SUBMISSION EMAIL
Journal of Education and Practice JEP@iiste.org
Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing:
New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP
Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld
Academic Search Engine, Elektronische
Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar.
Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals
Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).