Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
IEEE 802.11n mainly aims to provide high throughput, reliability and good security over its other previous
standards. The performance of 802.11n is very effective on the saturated traffic through the use of frame
aggregation. But this frame aggregation will not effectively function in all scenarios. The main objective of
this paper is to improve the throughput of the wireless LAN through effective frame aggregation using
scheduler mechanism. The Bi-Scheduler algorithm proposed in this article aims to segregate frames based
on their access categories. The outer scheduler separates delay sensitive applications from the incoming
burst of multi-part data and also decides whether to apply Aggregated - MAC Service Data Unit (AMSDU)
aggregation technique or to send the data without any aggregation. The inner scheduler schedules
the remaining (delay-insensitive, background and best-effort) packets using Aggregated-MAC Protocol
Data unit (A-MPDU) aggregation technique.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
IEEE 802.11n mainly aims to provide high throughput, reliability and good security over its other previous
standards. The performance of 802.11n is very effective on the saturated traffic through the use of frame
aggregation. But this frame aggregation will not effectively function in all scenarios. The main objective of
this paper is to improve the throughput of the wireless LAN through effective frame aggregation using
scheduler mechanism. The Bi-Scheduler algorithm proposed in this article aims to segregate frames based
on their access categories. The outer scheduler separates delay sensitive applications from the incoming
burst of multi-part data and also decides whether to apply Aggregated - MAC Service Data Unit (AMSDU)
aggregation technique or to send the data without any aggregation. The inner scheduler schedules
the remaining (delay-insensitive, background and best-effort) packets using Aggregated-MAC Protocol
Data unit (A-MPDU) aggregation technique.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
In order to avoid transmission's collisions and improve network performances in wireless mesh networks (WMNs), a reliable and efficient medium access control (MAC) protocol and a good channel allocation are needed. Allowing multiple channels use in the same network is often presented as a possible way to improve the network capacity. As IEEE 802.11, IEEE 802.15 and IEEE 802.16 standards provide more than one channel, thus a trivial way to improve the network performances is to allow transmission on multiple channels in each network node. A lot of research work have been conducted in the area of multi-channel allocation in order to improve the aggregate bandwidth of the hole network. In this paper, we focus our attention on the proposals for solving the channel allocation problem for Multi-Transceiver per node in the backbone level using the IEEE 802.11s technology. We classify these proposals into three categories. The first one consists on channel allocation proposals done at the MAC level independently to the other layers. The second one consists on a channel allocation approaches done by a modified MAC collaborating with upper layers. Finally, the third category concerns channel allocation methods implemented in a new layer resulting from a common-layer design between MAC and Network layer. For each category, the existing multi-channel protocols and their channel allocation approaches are identified. A qualitative comparison is conducted according to the advantages that they present, the limitations and problems they are facing, and the performances they are claiming to offer.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM csandit
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has
attracted much attention in recent years. Quick, accurate and quality information mining is the
core concern of successful search companies. Likewise, spammers try to manipulate IR system
to fulfil their stealthy needs. Spamdexing, (also known as web spamming) is one of the
spamming techniques of adversarial IR, allowing users to exploit ranking of specific documents
in search engine result page (SERP). Spammers take advantage of different features of web
indexing system for notorious motives. Suitable machine learning approaches can be useful in
analysis of spam patterns and automated detection of spam. This paper examines content based
features of web documents and discusses the potential of feature selection (FS) in upcoming
studies to combat web spam. The objective of feature selection is to select the salient features to
improve prediction performance and to understand the underlying data generation techniques.
A publically available web data set namely WEBSPAM - UK2007 is used for all evaluations.
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODELcsandit
As more and more collections of data are available on the Internet, end users but not experts in
Computer Science demand easy solutions for retrieving data from these collections. A good
solution for these users is the conceptual query languages, which facilitate the composition of
queries by means of a graphical interface. In this paper, we present (1) CoQueL, a conceptual
query language specified on E/R models and (2) a translation architecture for translating
CoQueL queries into languages such as XQuery or SQL..
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER csandit
The importance of security is increasing in a current network system. We have found a big
security weakness at the file integration when the people download or upload a file and propose
a novel solution how to ensure the security of a file. In particular, hash value can be applied to
ensure a file due to a speed and architecture of file transfer. Hash server stores all the hash
values which are updated by file provider and client can use these values to entrust file when it
downloads. FileShader detects to file changes correctly, and we observed that it did not show
big performance degradation. We expect FileShader can be applied current network systems
practically, and it can increase a security level of all internet users.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
Channel Allocation and Routing in Wireless Mesh Networks: A survey and qualit...ijwmn
In order to avoid transmission's collisions and improve network performances in wireless mesh networks (WMNs), a reliable and efficient medium access control (MAC) protocol and a good channel allocation are needed. Allowing multiple channels use in the same network is often presented as a possible way to improve the network capacity. As IEEE 802.11, IEEE 802.15 and IEEE 802.16 standards provide more than one channel, thus a trivial way to improve the network performances is to allow transmission on multiple channels in each network node. A lot of research work have been conducted in the area of multi-channel allocation in order to improve the aggregate bandwidth of the hole network. In this paper, we focus our attention on the proposals for solving the channel allocation problem for Multi-Transceiver per node in the backbone level using the IEEE 802.11s technology. We classify these proposals into three categories. The first one consists on channel allocation proposals done at the MAC level independently to the other layers. The second one consists on a channel allocation approaches done by a modified MAC collaborating with upper layers. Finally, the third category concerns channel allocation methods implemented in a new layer resulting from a common-layer design between MAC and Network layer. For each category, the existing multi-channel protocols and their channel allocation approaches are identified. A qualitative comparison is conducted according to the advantages that they present, the limitations and problems they are facing, and the performances they are claiming to offer.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM csandit
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has
attracted much attention in recent years. Quick, accurate and quality information mining is the
core concern of successful search companies. Likewise, spammers try to manipulate IR system
to fulfil their stealthy needs. Spamdexing, (also known as web spamming) is one of the
spamming techniques of adversarial IR, allowing users to exploit ranking of specific documents
in search engine result page (SERP). Spammers take advantage of different features of web
indexing system for notorious motives. Suitable machine learning approaches can be useful in
analysis of spam patterns and automated detection of spam. This paper examines content based
features of web documents and discusses the potential of feature selection (FS) in upcoming
studies to combat web spam. The objective of feature selection is to select the salient features to
improve prediction performance and to understand the underlying data generation techniques.
A publically available web data set namely WEBSPAM - UK2007 is used for all evaluations.
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODELcsandit
As more and more collections of data are available on the Internet, end users but not experts in
Computer Science demand easy solutions for retrieving data from these collections. A good
solution for these users is the conceptual query languages, which facilitate the composition of
queries by means of a graphical interface. In this paper, we present (1) CoQueL, a conceptual
query language specified on E/R models and (2) a translation architecture for translating
CoQueL queries into languages such as XQuery or SQL..
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER csandit
The importance of security is increasing in a current network system. We have found a big
security weakness at the file integration when the people download or upload a file and propose
a novel solution how to ensure the security of a file. In particular, hash value can be applied to
ensure a file due to a speed and architecture of file transfer. Hash server stores all the hash
values which are updated by file provider and client can use these values to entrust file when it
downloads. FileShader detects to file changes correctly, and we observed that it did not show
big performance degradation. We expect FileShader can be applied current network systems
practically, and it can increase a security level of all internet users.
Geometric Correction for Braille Document Images csandit
Image processing is an important research area in computer vision. clustering is an unsupervised
study. clustering can also be used for image segmentation. there exist so many methods for image
segmentation. image segmentation plays an important role in image analysis.it is one of the first
and the most important tasks in image analysis and computer vision. this proposed system
presents a variation of fuzzy c-means algorithm that provides image clustering. the kernel fuzzy
c-means clustering algorithm (kfcm) is derived from the fuzzy c-means clustering
algorithm(fcm).the kfcm algorithm that provides image clustering and improves accuracy
significantly compared with classical fuzzy c-means algorithm. the new algorithm is called
gaussian kernel based fuzzy c-means clustering algorithm (gkfcm)the major characteristic of
gkfcm is the use of a fuzzy clustering approach ,aiming to guarantee noise insensitiveness and
image detail preservation.. the objective of the work is to cluster the low intensity in homogeneity
area from the noisy images, using the clustering method, segmenting that portion separately using
content level set approach. the purpose of designing this system is to produce better segmentation
results for images corrupted by noise, so that it can be useful in various fields like medical image
analysis, such as tumor detection, study of anatomical structure, and treatment planning.
Associative Regressive Decision Rule Mining for Predicting Customer Satisfact...csandit
Opinion mining also known as sentiment analysis, involves customer satisfactory patterns,
sentiments and attitudes toward entities, products, services and their attributes. With the rapid
development in the field of Internet, potential customer’s provides a satisfactory level of
product/service reviews. The high volume of customer reviews were developed for
product/review through taxonomy-aware processing but, it was difficult to identify the best
reviews. In this paper, an Associative Regression Decision Rule Mining (ARDRM) technique is
developed to predict the pattern for service provider and to improve customer satisfaction based
on the review comments. Associative Regression based Decision Rule Mining performs twosteps
for improving the customer satisfactory level. Initially, the Machine Learning Bayes
Sentiment Classifier (MLBSC) is used to classify the class labels for each service reviews. After
that, Regressive factor of the opinion words and Class labels were checked for Association
between the words by using various probabilistic rules. Based on the probabilistic rules, the
opinion and sentiments effect on customer reviews, are analyzed to arrive at specific set of
service preferred by the customers with their review comments. The Associative Regressive
Decision Rule helps the service provider to take decision on improving the customer satisfactory
level. The experimental results reveal that the Associative Regression Decision Rule Mining
(ARDRM) technique improved the performance in terms of true positive rate, Associative
Regression factor, Regressive Decision Rule Generation time and Review Detection Accuracy of
similar pattern.
Segmentation and Labelling of Human Spine MR Images Using Fuzzy Clustering csandit
Computerized medical image segmentation is a challenging area because of poor resolution
and weak contrast. The predominantly used conventional clustering techniques and the
thresholding methods suffer from limitations owing to their heavy dependence on user
interactions. Uncertainties prevalent in an image cannot be captured by these techniques. The
performance further deteriorates when the images are corrupted by noise, outliers and other
artifacts. The objective of this paper is to develop an effective robust fuzzy C- means clustering
for segmenting vertebral body from magnetic resonance images. The motivation for this work is
that spine appearance, shape and geometry measurements are necessary for abnormality
detection and thus proper localisation and labelling will enhance the diagnostic output of a
physician. The method is compared with Otsu thresholding and K-means clustering to illustrate
the robustness. The reference standard for validation was the annotated images from the
radiologist, and the Dice coefficient and Hausdorff distance measures were used to evaluate the
segmentation.
Selection of Best Alternative in Manufacturing and Service Sector Using Multi...csandit
Modern manufacturing organizations tend to face versatile challenges due to globalization,
modern lifestyle trends and rapid market requirements from both locally and globally placed
competitors. The organizations faces high stress from dual perspective namely enhancement in
science and technology and development of modern strategies. In such an instance,
organizations were in a need of using an effective decision making tool that chooses out optimal
alternative that reduces time, complexity and highly simplified. This paper explores a usage of
new multi criteria decision making tool known as MOORA for selecting the best alternatives by
examining various case study. The study was covered up in two fold manner by comparing
MOORA with other MCDM and MADM approaches to identify its advantage for selecting
optimal alternative, followed by highlighting the scope and gap of using MOORA approach.
Examination on various case study reveals an existence of huge scope in using MOORA for
numerous manufacturing and service applications.
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...csandit
Optical Character recognition is the method of digitalization of hand and type written or
printed text into machine-encoded form and is superfluity of the various applications of envision
of human’s life. In present human life OCR has been successfully using in finance, legal,
banking, health care and home need appliances. India is a multi cultural, literature and
traditional scripted country. Telugu is the southern Indian language, it is a syllabic language,
symbol script represents a complete syllable and formed with the conjunct mixed consonants in
their representation. Recognition of mixed conjunct consonants is critical than the normal
consonants, because of their variation in written strokes, conjunct maxing with pre and post
level of consonants. This paper proposes the layered approach methodology to recognize the
characters, conjunct consonants, mixed- conjunct consonants and expressed the efficient
classification of the hand written and printed conjunct consonants. This paper implements the
Advanced Fuzzy Logic system controller to take the text in the form of written or printed,
collected the text images from the scanned file, digital camera, Processing the Image with
Examine the high intensity of images based on the quality ration, Extract the image characters
depends on the quality then check the character orientation and alignment then to check the
character thickness, base and print ration. The input image characters can classify into the two
ways, first way represents the normal consonants and the second way represents conjunct
consonants. Digitalized image text divided into three layers, the middle layer represents normal
consonants and the top and bottom layer represents mixed conjunct consonants. Here
recognition process starts from middle layer, and then it continues to check the top and bottom
layers. The recognition process treat as conjunct consonants when it can detect any symbolic
characters in top and bottom layers of present base character otherwise treats as normal
consonants. The post processing technique applied to all three layered characters. Post
processing of the image: concentrated on the image text readability and compatibility, if the
readability is not process then repeat the process again. In this recognition process includes
slant correction, thinning, normalization, segmentation, feature extraction and classification. In
the process of development of the algorithm the pre-processing, segmentation, character
recognition and post-processing modules were discussed. The main objectives to the
development of this paper are: To develop the classification, identification of deference
prototyping for written and printed consonants, conjunct consonants and symbols based on 3
layered approaches with different measurable area by using fuzzy logic and to determine
suitable features for handwritten character recognition.
GAUSSIAN KERNEL BASED FUZZY C-MEANS CLUSTERING ALGORITHM FOR IMAGE SEGMENTATIONcsandit
Image processing is an important research area in computer vision. clustering is an unsupervised
study. clustering can also be used for image segmentation. there exist so many methods for image
segmentation. image segmentation plays an important role in image analysis.it is one of the first
and the most important tasks in image analysis and computer vision. this proposed system
presents a variation of fuzzy c-means algorithm that provides image clustering. the kernel fuzzy
c-means clustering algorithm (kfcm) is derived from the fuzzy c-means clustering
algorithm(fcm).the kfcm algorithm that provides image clustering and improves accuracy
significantly compared with classical fuzzy c-means algorithm. the new algorithm is called
gaussian kernel based fuzzy c-means clustering algorithm (gkfcm)the major characteristic of
gkfcm is the use of a fuzzy clustering approach ,aiming to guarantee noise insensitiveness and
image detail preservation.. the objective of the work is to cluster the low intensity in homogeneity
area from the noisy images, using the clustering method, segmenting that portion separately using
content level set approach. the purpose of designing this system is to produce better segmentation
results for images corrupted by noise, so that it can be useful in various fields like medical image
analysis, such as tumor detection, study of anatomical structure, and treatment planning.
Mining Fuzzy Association Rules from Web Usage Quantitative Data csandit
Web usage mining is the method of extracting interesting patterns from Web usage log file. Web
usage mining is subfield of data mining uses various data mining techniques to produce
association rules. Data mining techniques are used to generate association rules from
transaction data. Most of the time transactions are boolean transactions, whereas Web usage
data consists of quantitative values. To handle these real world quantitative data we used fuzzy
data mining algorithm for extraction of association rules from quantitative Web log file. To
generate fuzzy association rules first we designed membership function. This membership
function is used to transform quantitative values into fuzzy terms. Experiments are carried out
on different support and confidence. Experimental results show the performance of the
algorithm with varied supports and confidence.
GEOMETRIC CORRECTION FOR BRAILLE DOCUMENT IMAGEScsandit
Braille system has been used by the visually impaired people for reading.The shortage of Braille
books has caused a need for conversion of Braille to text. This paper addresses the geometric
correction of a Braille document images. Due to the standard measurement of the Braille cells,
identification of Braille characters could be achieved by simple cell overlapping procedure. The
standard measurement varies in a scaled document and fitting of the cells become difficult if the
document is tilted. This paper proposes a line fitting algorithm for identifying the tilt (skew)
angle. The horizontal and vertical scale factor is identified based on the ratio of distance
between characters to the distance between dots. These are used in geometric transformation
matrix for correction. Rotation correction is done prior to scale correction. This process aids in
increased accuracy. The results for various Braille documents are tabulated.
A Routing Protocol Orphan-Leach to Join Orphan Nodes in Wireless Sensor Netwo...csandit
The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is
referred to as the basic algorithm of distributed clustering protocols. LEACH allows clusters
formation. Each cluster has a leader called Cluster Head (CH). The selection of CHs is made
with a probabilistic calculation. It is supposed that each non-CH node join a cluster and
becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the
network. Thus several sensor nodes cannot reach any CH. As a result, the remaining part of the
controlled field will not be covered; some sensor nodes will be outside the network. To solve this
problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing
protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play
the role of a gateway which allows the joining of orphan nodes. If a gateway node has to
connect a important number of orphan nodes, thus a sub-cluster is created and the gateway
node is considered as a CH’ for connected orphans. As a result, orphan nodes become able to
send their data messages to the CH which performs in turn data aggregation and send
aggregated data message to the CH. The WSN application receives data from the entire network
including orphan nodes.
The simulation results show that O-LEACH performs better than LEACH in terms of
connectivity rate, energy, scalability and coverage.
Designed by Renowned Architects Infinia has all the offerings of a stylish and contemporary residential complex which comes in Shankarpur, Bhubaneswar, Odisha, loaded with modern amenities to suit your lifestyle.
Infinia is the perfect blend between scenic beauty and strategic convenience. Nestled amidst greenery, it is yet close to all the comforts and conveniences, needs and wants of today’s lifestyle - from hospitals to schools & highway to the airport.
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANN...IJCNCJournal
The key enhancement in the medium access control (MAC) layer is frame aggregation introduced by the
IEEE 802.11n/ac standard to accommodate the growing traffic demand in the WLAN by allowing multiple
packets aggregated per transmission. Frame aggregation efficiently reduces control overhead in the MAC
layer, such as the MAC header and thus it helps to enhance transmission efficiency and throughput
performance of WLAN. However, heterogeneous traffic demand among streams in the WLAN downlink
MU-MIMO channel creates a challenge to efficiently utilize the benefits of frame aggregation.
Transmission efficiency is also compromised during frame size setting determination because when a
frame size is larger, the impact of the overhead frame can be lower, but they are also more vulnerable to
transmission errors. Thus, this trade-off between maximizing frame size and minimizing overhead frames
should be addressed by employing an adaptive frame aggregation technique to derive the optimal frame
size that would maximize the throughput in WLAN downlink MU-MIMO channel. Moreover, when frame
aggregation approach is employed, more frames must wait before transmission in a buffer which causes a
delay in the performance of WLAN. Thus, analysing the trade-off between maximizing throughput and
minimizing delay is a critical issue that should also be addressed to enhance the performance of WLAN.
However, the majority of the existing adaptive aggregation algorithms in the WLAN downlink MU-MIMO
channel are focused to maximize the throughput or minimize the delay. The main contribution of this paper
is to propose a machine learning-based frame size optimization algorithm by extending our earlier
approach in considering the cost of delay to maximize the system throughput of WLAN. The effectiveness of
the proposed scheme is evaluated over the FIFO Baseline Approach and earlier conventional approaches
under the effects of various traffic patterns, channel conditions, and the number of STAs.
Machine Learning based Frame Size Optimization in WLAN Downlink MU-MIMO Chann...IJCNCJournal
The key enhancement in the medium access control (MAC) layer is frame aggregation introduced by the IEEE 802.11n/ac standard to accommodate the growing traffic demand in the WLAN by allowing multiple packets aggregated per transmission. Frame aggregation efficiently reduces control overhead in the MAC layer, such as the MAC header and thus it helps to enhance transmission efficiency and throughput performance of WLAN. However, heterogeneous traffic demand among streams in the WLAN downlink MU-MIMO channel creates a challenge to efficiently utilize the benefits of frame aggregation. Transmission efficiency is also compromised during frame size setting determination because when a frame size is larger, the impact of the overhead frame can be lower, but they are also more vulnerable to transmission errors. Thus, this trade-off between maximizing frame size and minimizing overhead frames should be addressed by employing an adaptive frame aggregation technique to derive the optimal frame size that would maximize the throughput in WLAN downlink MU-MIMO channel. Moreover, when frame aggregation approach is employed, more frames must wait before transmission in a buffer which causes a delay in the performance of WLAN. Thus, analysing the trade-off between maximizing throughput and minimizing delay is a critical issue that should also be addressed to enhance the performance of WLAN. However, the majority of the existing adaptive aggregation algorithms in the WLAN downlink MU-MIMO channel are focused to maximize the throughput or minimize the delay. The main contribution of this paper is to propose a machine learning-based frame size optimization algorithm by extending our earlier approach in considering the cost of delay to maximize the system throughput of WLAN. The effectiveness of the proposed scheme is evaluated over the FIFO Baseline Approach and earlier conventional approaches under the effects of various traffic patterns, channel conditions, and the number of STAs.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN pijans
Wireless Mesh network (WMN) is dynamically self-organizing and self-configured, with the nodes in the
network automatically establishing an ad-hoc network and maintaining the mesh connectivity. The ability
to use multiple-radios and multiple channels can be cashed to increase aggregate throughput of wireless
mesh network. Thus the efficient use of available interfaces and channels without interference becomes
the key factor. In this paper we propose interference aware clustered based channel assignment schemes
which minimizes the interference and increases throughput. In our proposed scheme we have given
priority to minimize interference from nearby mesh nodes in interference range than maximizing channel
diversity. We simulated our proposed work using NS-3 and results show that our scheme improves
network performance than BFSCA and Distributed Greedy CA.
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
Multi-Radio Multi-Channel Wireless Mesh Network (MRMC-WMN) has been considered as one of the key technology for the enhancement of network performance. It is used in a number of real-time applications such as disaster management system, transportation system and health care system. MRMC-WMN is a multi-hop network and allows simultaneous data transfer by using multiple radio interfaces. All the radio interfaces are typically assigned with different channels to reduce the effect of co-channel interference. In MRMC-WMN, when two nodes transmit at the same channel in the range of each other, generates co-channel interference and degrades the network throughput. Co-channel interference badly affects the capacity of each link that reduces the overall network performance. Thus, the important task of channel assignment algorithm is to reduce the co-channel interference and enhance the network performance. In this paper, the problem of channel assignment has been addressed for MRMC-WMN. We have proposed an Interference Aware, Topology, Power and Flow Control (ITPFC) Channel Assignment algorithm for MRMC-WMN. This algorithm assignes the suitable channels to nodes, which provides better link capacity and reduces the co-channel interference. In the previous work performance of the proposed algorithm has been evaluated for a network of 30 nodes. The aim of this paper is to further evaluate the performance of proposed channel assignment algorithm for 40 and 50 nodes network. The results obtained from these networks show the consistent performance in terms of throughput, delay, packet loss and number of channels used per node as compared to LACA, FCPRA and IATC Channel Assignment algorithms.
Wireless mesh networks offer high bandwidth Internet access for mobile users anywhere and at any time.
It is an emerging technology that uses wireless multi-hop networking to provide a cost-efficient way for
community or enterprise users to have broadband Internet access and share network resource. In this paper,
we have tried to give a comparative analysis of various Gateway Placement approaches which can be
helpful in understanding which approach will be useful in which situation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
2. 110 Computer Science & Information Technology (CS & IT)
characteristic of WMN. In a wireless Mesh network, there is fixed infrastructure over fixed
wireless network which is used by wireless host. Every wireless host is connected with any of the
mesh node; some mesh node may have direct association with internet. Channel quality in WMN
fluctuated due to Doppler Effect, fading and interference [1]. MAC provides the actual benefit of
mesh network. MAC- layer protocol by default chooses the minimum available transmission rate
and it does not protect from error. Mesh network based on CSMA/CA MAC protocol which has
single hop transmission characteristics, cannot provide the quality of service for the application
which is streaming in real time like voice calling, video calling, etc. CSMA/CA has some
limitation due to which we need a new MAC protocol which gives better throughput, capacity
and reduce delay. To achieve better QoS it is needed to use the Time division multiple access
(TDMA) based approach in MAC layer. Total channel (frequency channel or single band) is split
into time-frame slot in TDMA scheduling and assignment of transmitting slot to the node is done.
Power drop, collision, data overhead is prevented by every time slot [2]. TDMA with distributed
approach consist of two different procedures. In first procedure it based on Bellman ford
algorithm [3], each node find a nearest feasible link, which are taken from two-hop routing
information updated by neighbour node. In second approach nearest feasible schedule is used to
analyze the global feasible schedule and it inform the availability of a new schedule to the entire
node.
2. RELATED WORK
Number of MAC-layer multicast mechanism was purposed for mesh network to overcome the
inefficiency of the network. Hop-by-hop recovery on loss of packet is provided by researchers in
various ways. Here [4] author gives the analysis of maximized output for a wireless mesh
network over CSMA/CA in MAC layer protocol. Random access is not accounted in CSMA due
to which collision overhead is increased. New development for optimal capacity analysis of
network done in CSMA/CA with multi commodity flow (MCF), author analyze throughput based
on upper and lower bound of the network capacity over CSMA/CA. the drawback of CSMA/CA
is that it is not suitable for real time data transfer like video calling. In [5] if physical rate is
increases efficiency of the MAC layer is decreases. More efficient MAC layer protocol in terms
of scalability still has issues. Proposed scheme by author is MAC protocol based on dual channel
token called (DT-MAC). This protocol is suitable for large number of user in terms of scalability
and efficiency. Token management is extra overhead for network and it is not suitable for upper
layer. In [6] wireless mesh network high throughput need a TDMA based approach. TDMA
support multichannel transmission, schedule dissemination and routing integration. TDMA based
on routing metrics and stability of routing metrics. Experiment shows that it control the network
overhead and it not affected by external interference. It is not useful for large network. In [3]
TDMA each frame is associated with some slot, and non –conflicting link is transmitted through
these slots. Iterative procedure is used to find the nearest feasible schedule by exchanging the link
information between nodes. Another part is work on wave based termination which is used to
detect the scheduled nearest node and if any new node is scheduled which is activated. Spatial-
TDMA [9] used for reduced the energy consumption and improve the throughput author
formulate offline energy –throughput by the tradeoff curve. Physical interference involved where
node used for controlling the power. Author work is based on single channel or single node, it is
not feasible for multi-channel or multiple node scenario. Here [7] author works for high
throughput and reliable mesh network in multi-hop transmission. Reduce network bandwidth in
multicast tree. Author presents a distributed and centralized algorithm for tackle the problem of
multicasting. Obtained result from expected multicast transmission count (EMTX) method,
3. Computer Science & Information Technology (CS & IT) 111
shows the effectiveness it reduces the number of hop-by-hop transmission per packet, but it not
considerable for real life or realistic scenario. A hierarchical mesh tree protocol given in [10]
which achieve efficient routing at the MAC layer. Optimal route is chosen by the using of mesh
tree topology. The used new HMTP also used for maintaining the update of new route formed.
The HMTP topology overcomes the drawback cluster-tree. In[8] improvement of QoS by
avoiding the network congestion, an algorithm is designed for that prediction of congestion is
done before it really happen by using different data, analysis of network and used the historical
data of traffic to generate idea of future network traffic. Through network traffic data, load
balancing is done to avoid congestion in wireless mesh network. But author proposed algorithm
is inefficient to response network congestion properly.
2.1 Issues and Challenges Faced in Multi Radio Wireless Mesh Network
Using IEEE 802.15.5 standard WMN in free frequency bands for wireless communications traffic
has the following issue the need to be addressed as in [12]:
Speed of mobile devices. Physical and transport levels of IEEE 802.15.5 developed for fixed
stations, where high speed can lead to large and rapid changes in channel conditions, which in
turn increases the probability of frame error (FER). This occurrence is due to the Rayleigh fading
channel [11].
Distance: IEEE 802.15.5 is used for communications over short distances of several hundred
meters. Together with this limitation there is a necessity in a large number of access
points/roadside stations (remote control) to cover the entire route. Usually 802.15.5 transmits a
plurality of control frames and messages for the association and/or network authentication before
transmitting useful information.
Handover is also difficult to implement due to the high speed of vehicles on the road, where the
handoff occurs very frequently between the remote control for the entire route.
When designing a Mesh network appear the following difficulties:
Difficult to predict the number of subscribers on the network at different intervals. Difficulties in
predicting the amount of traffic generated by nodes, hence the total system capacity. The wireless
channel is stochastic and time-varying according to different parameters.
It is seen from literature that the existing mac based mesh network suffer improper channel slot
re-utilization. To overcome the short coming here the author propose an efficient cross layer
based channel slot re-utilization optimization based on node classification technique to improve
the QoS of WMNs.
The paper organization is as follows: The proposed channel slot re-utilization models are
presented in Section two. The results and the experimental study are presented in the section
three. The concluding remark is discussed in the last section.
3. PROPOSED MODEL
Here the author proposes an adaptive cross layer based slot channel re-utilization optimization to
improve the QoS of WMNs. The slot re-utilization helps in reducing latency of data delivery LP
4. 112 Computer Science & Information Technology (CS & IT)
LP but there is a chance or risk of beacon collision to some other devices that may join late to the
wireless mesh network. To address this here the author proposes a node classification based slot
re-utilization technique to reduce latency and propose robust wireless mess tree architecture.
3.1 Proposed Node Classification for Slot Re-utilization for WMN
Here the author classifies the device pair based on the information of parenthood and
neighbourhood relationship. The classified device pair (x, y) is as follows
3.1.1 Connected Inner Relay Node Pair (CIRP):
Here x and y are adjacent device that exist physically in the WMN, and either x and y are not
adjacent device; or, either x or y has a child, but xand y have a conjoint adjacent device which is
a child of either x or y.
3.1.2 Connected Leaf Relay Node Pair (CLRP):
Here x and y are adjacent devices that exist physically in the WMN, but neither x nor y has any
child.
3.1.3 Distant Inner Relay Node Pair (DIRP):
Here x and y are not adjacent devices physically but have a conjoint adjacent physical devices in
common, although all these adjacent physical devices are neither x's nor y's children.
3.1.4 Non-connected leaf node pair (NCLRP):
Here x and y are not adjacent physical devices, neither do they have adjacent physical devices in
common. Now the author propose channel slot reutilization by CLRP, DIRP and NCLRP when
the probability of is risk is small which is explained in below section.
3.2 Proposed Slot Re-Utilization for WMN
It is known fact that the radio coverage of a wireless transmitter suffer from path loss
phenomenon. A practical radio propagation model may consider random variations in path loss at
5. Computer Science & Information Technology (CS & IT) 113
different direction and location [13] and [14], [16] respectively. Subsequently the packet
transmission among pair of devices becomes a probabilistic task with probability distribution
utility considering direction or distance among the transmitter and the receiver as a parameter.
The proposed node or device-pair classification and communication evaluation are based on the
perception of adjacent physical devices, which represent a binary association considering that the
two nodes are either adjacent physical devices or are not. Such an association needs a setup of a
thresholding on packet or data reception probability for the decision of adjacent physical devices
in accordance to a source or transmitter. Subsequently the sources or transmitter operative range
of communications would be uneven. However, we can estimate the lower bound of the range of
transmission within which any nodes can have an association with the source or transmitter, or a
higher of the range, outside which no nodes will be able to receive the data from sources or
transmitter successfully.
The symbolization is represented as the lower bound, the upper bound, or the average bound of
range of communication, in which case it is essentially the worst case, best case or the mean case
risk parameters of the analytical result presented in the following sturdy.
3.2.1. Scheme 1:
The predictable mesh area of the particular region mutually covered by two devices and is
3.2.2. Proposition 1:
6. 114 Computer Science & Information Technology (CS & IT)
3.2.3. Proposition 2:
It follows that
7. Computer Science & Information Technology (CS & IT) 115
3.2.4. Proposition 3:
Based on the definition of Proposition 2,
Where
The simulation sturdy of our proposed approach is evaluated in the below section of this paper.
4. SIMULATION RESULT AND ANALYSIS
The system environment used is windows 10 enterprises 64-bit operating system with 16GB of
RAM. The author have used visual studio Dot net framework 4.0, 2010 and used VC++
programming language. The author has conducted simulation study for probability analysis for
channel slot re-utilization by varying the node size and node degree.
8. 116 Computer Science & Information Technology (CS & IT)
In Fig. 1, the author computes the probability of P_Z (x,y) by varying number of node or devices
and node degree value. In figure we can see that when we increase the node degree a value the
probability of collision also increases for all node sizes (50, 100, and 150). The probability of
collision is high for smaller mesh network size (50) when compared to larger network size (150).
Figure 1. Probability analysis for ܲሺ,ݔ ݕሻ
In Fig. 2, the author computes the probability of P_X (x,y)by varying number of node or devices
and node degree value. In figure we can see that when we increase the node degree a value the
probability of collision also increases for all node sizes (50, 100, and 150). The probability of
collision is high for smaller mesh network size (50) when compared to larger network size (150).
Figure 2. Probability analysis for ܲሺ,ݔ ݕሻ
9. Computer Science & Information Technology (CS & IT) 117
Figure 3. Probability analysis
6. CONCLUSIONS
The paper presents a model that help in the design of MWNs that meets the QoS necessities of
the end user. Here in this work we have presented a cross-layer based channel slot reutilization
model based on node classification technique that minimizes the collision for channel slot re-
utilization and thus helps in reducing latency for data transmission in WMN. The experimental
result shows the impact of proposed model on channel slot re-utilization. In future we would
conduct simulation sturdy for latency and compare our proposed model with other distributed,
centralized or MAC based scheduling algorithm.
REFERENCES
[1] Chin-Ya Huang; Ramanathan, P., “Network Layer Support for Gigabit TCP Flows in Wireless Mesh
Networks,” in Mobile Computing, IEEE Transactions on , vol.14, no.10, pp.2073-2085, 2015.
[2] Anusha, M.; Vemuru, S.; Gunasekhar, T., "TDMA-based MAC protocols for scheduling channel
allocation in multi-channel wireless mesh networks using cognitive radio," in Circuit, Power and
Computing Technologies (ICCPCT), International Conference on , vol., no., pp.1-5, 2015.
[3] Djukic, P.; Valaee, S., "Distributed Link Scheduling for TDMA Mesh Networks," in
Communications, 2007. ICC '07. IEEE International Conference on , vol., no., pp.3823-3828, 24-28
2007.
10. 118 Computer Science & Information Technology (CS & IT)
[4] Yu Cheng; Hongkun Li; Peng-Jun Wan; Xinbing Wang, “Wireless Mesh Network Capacity
Achievable Over the CSMA/CA MAC,” in Vehicular Technology, IEEE Transactions on , vol.61,
no.7, pp.3151-3165, 2012.
[5] Teymoori, Peyman; Yazdani, Nasser; Khonsari, Ahmad, “DT-MAC: An Efficient and Scalable
Medium Access Control Protocol for Wireless Networks,” in Wireless Communications, IEEE
Transactions on , vol.12, no.3, pp.1268-1278, 2013.
[6] Sevani, V.; Raman, B.; Joshi, P., “Implementation-Based Evaluation of a Full-Fledged Multihop
TDMA-MAC for WiFi Mesh Networks,” in Mobile Computing, IEEE Transactions on , vol.13, no.2,
pp.392-406, 2014.
[7] Xin Zhao; Jun Guo; Chun Tung Chou; Misra, A.; Jha, S.K., “High-Throughput Reliable Multicast in
Multi-Hop Wireless Mesh Networks,” in Mobile Computing, IEEE Transactions on , vol.14, no.4,
pp.728-741, April 1 2015.
[8] Khasawneh, F.A.; Benmimoune, A.; Kadoch, M.; Khasawneh, M.A., "Predictive Congestion
Avoidance in Wireless Mesh Network," in Future Internet of Things and Cloud (FiCloud), 2015 3rd
International Conference on , vol., no., pp.108-112, 24-26 Aug. 2015
[9] Ouni, A.; Rivano, H.; Valois, F.; Rosenberg, C., “Energy and Throughput Optimization of Wireless
Mesh Networks With Continuous Power Control,” in Wireless Communications, IEEE Transactions
on , vol.14, no.2, pp.1131-1142, 2015.
[10] Rabarijaona, V.H.; Kojima, F.; Harada, H., "Hierarchical mesh tree protocol for efficient multi-hop
data collection," in Wireless Communications and Networking Conference (WCNC), 2014 IEEE ,
vol., no., pp.2008-2013, 6-9 April 2014.
[11] Safronov, R.; Bakhtin, A.; Muravyev, I.; Muratchaev, S., "Designing roadside mesh network with
TDMA," in Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), vol.,
no., pp.131-135, 2014.
[12] K. Bilstrup. A survey regarding wireless communication standarts intended for a high-speed mobile
environment// Technical Report IDE, 2007.
[13] G. Zhou, T. He, S. Krishnamurthy, and J.A. Stankovic, “Models and Solutions for Radio Irregularity
in Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 2, pp. 221-262, 2006.
[14] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Ad Hoc Networks beyond Unit Disk Graphs,” Wireless
Networks, pp. 715-729, 2008.
[15] P. Hall, Introduction to the Theory of Coverage Processes. John Wiley and Sons, 1988.
[16] I. Stojmenovic, A. Nayak, and J. Kuruvila, “Design Guidelines for Routing Protocols in Ad Hoc and
Sensor Networks with a Realistic Physical Layer,” IEEE Trans. Comm., vol. 43, no. 3, pp. 101-106,
2005.
[17] L.-H. Yen and Y.-M. Cheng, “Clustering Coefficient of Wireless Ad Hoc Networks and the Quantity
of Hidden Terminals,” IEEE Comm. Letter, vol. 9, no. 3, pp. 234-236, 2005.
11. Computer Science & Information Technology (CS & IT) 119
AUTHORS
Asha C N received the Bachelor of Engineering degree in Electronics and
Communication Engineering from Bangalore University in 2002 and Master of
Technology degree in VLSI Design & Embedded from Visvesvaraya Technological
University (VTU) in 2008.She is an assistant professor in Electronics and
Communication Engineering Department, Acharya Institute of Technology since
2007. Her research interest includes Wireless Mesh Network (WMN), Cross Layer
Design and Routing protocols. She is life member of Indian Society of Technical
Education(ISTE).
T G Basavaraju received Ph.D. (Engg) from Jadavpur University, Kolkata in the area
of Mobile Adhoc Networks. He obtained his Master Degree in Computer Science and
Engineering from Visveswaraya College of Engineering (UVCE), Bangalore
University. He holds Bachelor’s degree in Computer Science and Engineering from
Kuvempu University. His areas of research are Wireless Adhoc Networks, Sensor
Networks and Mesh networks. He has to his credit more than 55 research publications
in National/International Journals and Conferences. He is Professor and Head of
Computer Science and Engineering Department at Government SKSTI, Bangalore and
has 20 years of experience
.