This document proposes a new zone-based bandwidth allocation protocol for wireless networks. The key points are:
1. It divides the network into zones based on hop count from the initial relay station, and allocates bandwidth to each zone to improve quality of service.
2. Within each zone, the bandwidth allocated is distributed to mobile users based on their visiting probability and required bandwidth. This aims to maximize the average user satisfaction rate.
3. The protocol is evaluated through simulations using the Network Simulator 2 (NS2) tool. Results show the protocol improves bandwidth allocation efficiency and reduces quality of service degradation compared to other approaches.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
Many new routing protocols have been proposed for wireless sensor networks to maximize throughput, minimize delay or improve other QoS metrics in order to solve the problems of resource-constrained sensor nodes in large networks. However, many of them are based on flooding or its variants. Many routing messages are propagated unnecessarily and may cause different interference characteristics during route discovery phase and in the actual application data transmission phase. As a result, incorrect routes may be selected. Epidemic algorithms have been used to limit flooding in the field of wireless sensor networks. Directed diffusion has been commonly used in wireless sensor networks because it is designed to improve energy efficiency and scalability. However, the intrinsic flooding scheme for interest subscriptions prevents it from achieving the maximal potential of these two goals. We propose a routing
protocol that uses ID-free epidemic flooding to limit interference in conjunction with metrics for increasing throughput and reducing delay. Simulation results in ns2 show that there is an optimal number of neighbors to achieve the best throughput and delay performance. For a fixed topology of a certain size, there exists an optimal percentage of neighbors that forward the flooding message to achieve the best throughput and delay performance.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
A wireless sensor network consists of severalsensor nodes. Sensor nodes collaborate to collect meaningful environmental information and send them to the base station. During these processes, nodes are prone to failure, due to the energy depletion, hardware or software failure, etc. Therefore, fault tolerance and energy efficiency are two important objectives for reliable packet delivery. To address these objectives a novel method called fuzzy informer homed routing protocol is introduced. The proposed method tries to distribute the workload between every sensor node. A fuzzy logic approach is used to handle uncertainties in cluster head communication range estimation. The simulation results show that the proposed method can significantly reduce energy consumption as compared with IHR and DHR protocols. Furthermore, results revealed that it performs better than IHR and DHR protocols in terms of first node dead and half of the nodes alive, throughput and total remaining energy. It is concluded that the proposed protocol is a stable and energy efficient fault tolerance algorithm for wireless sensor networks.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
The aim of equipping a wireless network with a mobile relay node is to support broadband wireless communications for vehicular users and their devices. The high mobility of vehicular users, possibly at a very high velocity in the area in which two cells overlap, could cause the network to suffer from a reduced handover success rate and, hence, increased radio link failure. The combined impact of these problems is service interruptions to vehicular users. Thus, the handover schemes are crucial in solving these problems. In this work, we first present the adaptive handover hysteresis scheme for the wireless network with mobile relay nodes in the high-speed train scenario. Specifically, our proposed adaptive hysteresis scheme is based on the velocity of the train. Second, the handover call dropping probability is reduced by introducing a modified call admission control scheme to support radio resource reservation for handover calls that prioritizes handover calls of mobile relay over the other calls. The proposed solution in which adaptive parameter is combined with call admission control is evaluated by system level simulation. Our simulation results illustrate an increased handover success rate and reduced radio link failures.
Improving QoS-based Routing by Limiting Interference in Lossy Wireless Sensor...ijwmn
Many new routing protocols have been proposed for wireless sensor networks to maximize throughput, minimize delay or improve other QoS metrics in order to solve the problems of resource-constrained sensor nodes in large networks. However, many of them are based on flooding or its variants. Many routing messages are propagated unnecessarily and may cause different interference characteristics during route discovery phase and in the actual application data transmission phase. As a result, incorrect routes may be selected. Epidemic algorithms have been used to limit flooding in the field of wireless sensor networks. Directed diffusion has been commonly used in wireless sensor networks because it is designed to improve energy efficiency and scalability. However, the intrinsic flooding scheme for interest subscriptions prevents it from achieving the maximal potential of these two goals. We propose a routing
protocol that uses ID-free epidemic flooding to limit interference in conjunction with metrics for increasing throughput and reducing delay. Simulation results in ns2 show that there is an optimal number of neighbors to achieve the best throughput and delay performance. For a fixed topology of a certain size, there exists an optimal percentage of neighbors that forward the flooding message to achieve the best throughput and delay performance.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
As communication plays an important role in day to day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with implements a congestion control mechanism using Router control method for IP-RAN on CDMA cellular network. The Router control mechanism uses the features of CDMA networks using active Queue Management technique to reduce delay and to minimize the correlated losses. When utilizing these new personal tools and services to enrich our lives, while being mobile, we are using Mobile Multimedia applications. As new handsets, new technologies and new business models are introduced on the marketplace, new attractive multimedia services can and will be launched, fulfilling the demands. Because the number of multimedia services and even more so, the context in which the services are used is numerous, the following model is introduced in order to simplify and clarify how different services will evolve, enrich our lives and fulfill our desires.The proposed paper work is to be realized using Matlab platform.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Shortcut Path Tress for Zigbee based Wireless NetworkIJERA Editor
Neighbour Table based shortcut tree routing protocol provides the near optimal routing path as well as maintains the advantages of the ZigBee tree routing such as no route discovery overhead and low memory consumption. However, in Neighbour table based Shortcut tree routing the limitation is that route discovery is only on basis of Distance between Nodes; thus, it cannot provide optimized paths. Here, the concept of link quality factor between nodes along with the distance between two nodes to calculate the shortest path between source and destination. Where the Link quality will depend upon traffic between two nodes, higher the traffic lesser the link quality and vice versa. Score will be calculated for links which is function of Distance and Link Quality between nodes i.e score= f(d,lq), this is the idea proposed in OPTIMIZING ROUTING PATHS UING SHORTCUT TREES FOR ZIGBEE BASED WIRELESS NETWORK.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Performance Analysis of WiMAX Networks with Relay Stationidescitation
IEEE 802.16 is a Broadband Wireless Access (BWA)
network and thus it is considered to be an alternative solution
to wired broadband technologies. Relay station plays a
promising role of extending the range of Base station for long
distances in WiMAX networks. Relay station is suitable to
areas with limited infrastructure such as rural, hilly and lakes,
where it is difficult to install many Base stations with each
having wired connections and it is also suitable to those phases
where obstacles made the coverage limited. The Relay station
is placed in the network connectivity from Base stations and
extends the coverage of a single Base station. In this paper the
performance analysis of WiMAX technology including Relay
station has been done. This paper also focuses on increasing
number of nodes and distance from base station to the
performance of WiMAX networks.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
Abstract
Mobile Ad Hoc Network (MANET) are becoming more and more important in the modern environment. It can be used instantly to connect to the local or remote network without using the pre-existing infrastructure. The mobile or user in the network can together establish the infrastructure. In order to improve the limited range of radio transmission, multiple network ‘hops’ are needed so that the communication between the mobiles can be establish. There are varieties of protocol that had been proposed for the hopping methods but most of them suffer from high overhead. This project proposed a new method of hopping protocol for IEEE 802.11b using the existing network protocol which is Address Resolution Protocol (ARP). The ARP message is used in the network to find the MAC address of the destination. This can also be done by having multi hops where the proposed method using ARP designed will make an intermediate node act as a router in order to find the destination address and forward the data successfully. In this proposed method, the data is directly passed to the intermediate node and the intermediate node will help to find the route to the destination and passed the data to the destination node. This will reduce the transmission time. From the simulation obtained, it proved that the proposed method using the ARP protocol can works well as the existing network protocol which is Ad Hoc On-Demand Distance Vector (AODV). The simulation is composed into two types of environment which are with and without obstacles. The throughput, the packet loss and the round trip time for various distances is simulated and the results shows that the performance of the proposed method using ARP is much better compared to the AODV.
Index Terms: Address Resolution Protocol (ARP), Ad-Hoc, 802.11 Wifi, Hopping
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on qos aware routing in wireless mesh networkeSAT Journals
Abstract Wireless Mesh Networks (WMN) mainly consists of mesh clients and mesh routers. It is mainly effective as an economically successful and a promising technology for providing wireless broadband services. Mesh routers basically form the backbone of the network (WMN) and hence has the minimum mobility. They interconnect the mesh clients and the wireline backbone network. In order to approach the wireline level or same or near QoS, the Wireless Mesh Networks must be QoS aware. In this paper we have worked on the effect of variable transmission power to achieve the desired SNR and to maximize the number of active links at the same time for each links in the network and analyze different approaches to maintain the QoS routing of a wireless mesh network. Index Terms:AODV; AQOR; DSDV; MANET; OPNET; QOS; WMN
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
n this paper, to detect the moving objects between frames in compressed video and to obtain the bes
t
compression video
and the noiseless video. We describe a video in which frames by classifying
macroblocks (MB), and describe motion estimation (ME), motion vector field (MV) and motion
compensation (MC). we propose to classify Macroblocks of each video frame into different
classes and use
this class information to describe the frame content based on the motion vector. MB class informatio
n
video applications such as shot change detection, motion discontinuity detection, Outlier rejection
for
global motion estimation. To reduc
e the noise and to improve the clarity of the compressed video by using
contrast limited adaptive histogram equalization (CLAHE) Algorithm
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
As communication plays an important role in day to day life, the effective and efficient data transmission is to be maintained. This paper mainly deals with implements a congestion control mechanism using Router control method for IP-RAN on CDMA cellular network. The Router control mechanism uses the features of CDMA networks using active Queue Management technique to reduce delay and to minimize the correlated losses. When utilizing these new personal tools and services to enrich our lives, while being mobile, we are using Mobile Multimedia applications. As new handsets, new technologies and new business models are introduced on the marketplace, new attractive multimedia services can and will be launched, fulfilling the demands. Because the number of multimedia services and even more so, the context in which the services are used is numerous, the following model is introduced in order to simplify and clarify how different services will evolve, enrich our lives and fulfill our desires.The proposed paper work is to be realized using Matlab platform.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Shortcut Path Tress for Zigbee based Wireless NetworkIJERA Editor
Neighbour Table based shortcut tree routing protocol provides the near optimal routing path as well as maintains the advantages of the ZigBee tree routing such as no route discovery overhead and low memory consumption. However, in Neighbour table based Shortcut tree routing the limitation is that route discovery is only on basis of Distance between Nodes; thus, it cannot provide optimized paths. Here, the concept of link quality factor between nodes along with the distance between two nodes to calculate the shortest path between source and destination. Where the Link quality will depend upon traffic between two nodes, higher the traffic lesser the link quality and vice versa. Score will be calculated for links which is function of Distance and Link Quality between nodes i.e score= f(d,lq), this is the idea proposed in OPTIMIZING ROUTING PATHS UING SHORTCUT TREES FOR ZIGBEE BASED WIRELESS NETWORK.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Performance Analysis of WiMAX Networks with Relay Stationidescitation
IEEE 802.16 is a Broadband Wireless Access (BWA)
network and thus it is considered to be an alternative solution
to wired broadband technologies. Relay station plays a
promising role of extending the range of Base station for long
distances in WiMAX networks. Relay station is suitable to
areas with limited infrastructure such as rural, hilly and lakes,
where it is difficult to install many Base stations with each
having wired connections and it is also suitable to those phases
where obstacles made the coverage limited. The Relay station
is placed in the network connectivity from Base stations and
extends the coverage of a single Base station. In this paper the
performance analysis of WiMAX technology including Relay
station has been done. This paper also focuses on increasing
number of nodes and distance from base station to the
performance of WiMAX networks.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
Abstract
Mobile Ad Hoc Network (MANET) are becoming more and more important in the modern environment. It can be used instantly to connect to the local or remote network without using the pre-existing infrastructure. The mobile or user in the network can together establish the infrastructure. In order to improve the limited range of radio transmission, multiple network ‘hops’ are needed so that the communication between the mobiles can be establish. There are varieties of protocol that had been proposed for the hopping methods but most of them suffer from high overhead. This project proposed a new method of hopping protocol for IEEE 802.11b using the existing network protocol which is Address Resolution Protocol (ARP). The ARP message is used in the network to find the MAC address of the destination. This can also be done by having multi hops where the proposed method using ARP designed will make an intermediate node act as a router in order to find the destination address and forward the data successfully. In this proposed method, the data is directly passed to the intermediate node and the intermediate node will help to find the route to the destination and passed the data to the destination node. This will reduce the transmission time. From the simulation obtained, it proved that the proposed method using the ARP protocol can works well as the existing network protocol which is Ad Hoc On-Demand Distance Vector (AODV). The simulation is composed into two types of environment which are with and without obstacles. The throughput, the packet loss and the round trip time for various distances is simulated and the results shows that the performance of the proposed method using ARP is much better compared to the AODV.
Index Terms: Address Resolution Protocol (ARP), Ad-Hoc, 802.11 Wifi, Hopping
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study on qos aware routing in wireless mesh networkeSAT Journals
Abstract Wireless Mesh Networks (WMN) mainly consists of mesh clients and mesh routers. It is mainly effective as an economically successful and a promising technology for providing wireless broadband services. Mesh routers basically form the backbone of the network (WMN) and hence has the minimum mobility. They interconnect the mesh clients and the wireline backbone network. In order to approach the wireline level or same or near QoS, the Wireless Mesh Networks must be QoS aware. In this paper we have worked on the effect of variable transmission power to achieve the desired SNR and to maximize the number of active links at the same time for each links in the network and analyze different approaches to maintain the QoS routing of a wireless mesh network. Index Terms:AODV; AQOR; DSDV; MANET; OPNET; QOS; WMN
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
Abstract: For Hybrid wireless network there is need of efficient data routing protocol for improvement of network capability and scalability. By using Distributed Three Hop routing protocol (DTR), we improve capacity of Hybrid network and Reduce overhead. In early Two- Hop Transmission protocol is used for eliminate route maintenance and limited number of hop in routing for Hybrid Wireless Network but it only considers the node transmission within a single cell while DTR can Also deals with Inter-cell communication in real word. DTR is Top-quality from Other routing Protocol to analyses the hybrid wireless networks with the parametric quantity such as throughput, QoS, packet loss, overhead (due to traffic), channel quality, load balancing, routing delivery, scalability and power consumption. DTR also has a congestion control algorithm to avoid load congestion in base station in the case of unbalanced traffic distributions in networks. DTR makes significantly lower overhead by eliminating route monitoring and maintenance. To enhance the efficiency of routing protocol in wireless network Weight Based Data Assignment technique is used for data allocation in distributed routing protocol using the technique of least delay detection to maintain less data congestion in the network . for that DTR divides a message data stream into segments and transmits the segments in a distributed manner.
Keywords: Data Fragmentation, Responses Delay, Hybrid Wireless Network, Three of Routing Protocol, Fuzzy Logic.
Title: Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Author: Amruta A. Mandhare, Kashmira J. Mayekar, Sayali L. Khanekar, Sarika V.Bodake, Sayali S. Bale.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
Efficient Bandwidth Recycling In Wireless Broadband NetworksIJMER
Abstract: Bandwidth recycling is proliferated in wireless broadband networks, in which IEEE 802.16 standard was
designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each
application to ensure the QoS. For variable bit rate (VBR) applications, however, it is difficult for the subscriber station (SS)
to predict the amount of incoming data. To ensure the QoS guaranteed services, the SS may reserve more bandwidth than its
demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme,
named Bandwidth Recycling, to recycle the unused bandwidth without changing the existing bandwidth reservation. The
idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available. Thus, the system
throughput can be improved while maintaining the same QoS guaranteed services. Mathematical analysis and simulation
are used to evaluate the proposed scheme. Simulation and analysis results confirm that the proposed scheme can recycle
55% of unused bandwidth on average. By analyzing factors affecting the recycling performance, three scheduling algorithms
are proposed to improve the overall throughput. The simulation results show that our proposed algorithm improves the
overall throughput by 60% in a steady network. to carry out research object at providing quality of network performance in
Heterogeneous computing environment
Index Terms: QoS, WiMAX, IEEE 802.16, Bandwidth Recycling,
A Review of Sensor Node in Wireless Sensor Networksijtsrd
Wireless Sensor Networks WSNs are collection of tiny sensor nodes capable of sensing, processing and broadcasting data correlated to some occurrence in the network area. The sensor nodes have severe limitation, such as bandwidth, short communication range, limited CPU processing facility, memory and energy. Enhancing the lifetime of wireless sensors network and efficient utilizations of bandwidth are essential for the proliferation of wireless sensor network in different applications. We provide an in depth study of applying wireless sensor networks WSNs to real world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet the requirements of biologists. Although researchers anticipate some challenges arising in real world deployments of WSNs, many problems can only be discovered through experience. We present a set of experiences from a four month long deployment on a remote island. We analyze the environmental and node health data to evaluate system performance. The close integration of WSNs with their environment provides environmental data at densities previously impossible. We show that the sensor data is also useful for predicting system operation and network failures. Based on over one million data readings, we analyze the node and network design and develop network reliability profiles and failure models. Jobanputra Paresh Ashokkumar | Prof. Arun Jhapate ""A Review of Sensor Node in Wireless Sensor Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23620.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23620/a-review-of-sensor-node-in-wireless-sensor-networks/jobanputra-paresh-ashokkumar
Similar to A new algorithm to improve the sharing of bandwidth (20)
"Heart failure is a typical clinical accompanied by symptoms syndrome (e.g. shortness of breath, ankle swelling and fatigue) that lead to structural or functional abnormalities of the heart (e.g. high venous pressure, pulmonary edema and peripheral edema).
In recent years, the significant role of B-type natriuretic peptide has been revealed in the pathogenesis of heart disease and the use of the drug sacubitril/valsartan has started. It has a positive effect on the regulation of the level of B-type natriuretic peptide in the body. It is obviously seen from the the world literature that natriuretic peptides play an important role in the pathophysiology of heart failure. For this reason, many studies suggest that the importance of natriuretic peptides in the diagnosis and treatment of heart failure is recommended.
Due to this, we tried to investigate the effects of a comprehensive medication therapy with a combination of sacubitril/valsartan in the patients with chronic heart failure."
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
A new algorithm to improve the sharing of bandwidth
1. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
A New Algorithm to Improve the Sharing of
Bandwidth
Diakite Laye Hadji1
, Yu Li2
1,2
Dept of Electronics and Information Engineering
Huazhong University of Science and Technology, 430074 Wuhan P.R.China
hadjidiak@gmail.com
Abstract: Infrastructure fewer networks of mobile devices, which are linked with wireless and also self-configured, are known as
mobile ad-hoc network (Manet). Like several other techniques this also has some benefits as well as the challenges in it. As wireless ad-
hoc networks is a collection of wireless nodes, so each node in it serves as a router and forwards packets to other nodes for
communication. The flow is from source to the destination point. In this paper, the focus has been made on some new areas of research
in the field of wireless, mobile ad-hoc networks. The proposed approach will be used to increase the utilization of bandwidth allocation
with the priority with the zones in wireless network environment. This approach will be helpful to maximize the performance of the
network and provide the best performance to the users under the wireless network. QoS for mobile users will be ensured for ad hoc
networks. Demand of the mobile users will be according to the required bandwidth, and proposed bandwidth allocation protocol is zone
based. The zone based bandwidth protocol may reduce the QoS degradation
Keywords: Wireless Networks, Adhoc Bandwidth Allocation, Quality of Service
1. Introduction
Bandwidth Allocation Protocol (BAP) and Bandwidth
Allocation Control Protocol (BACP) provide bandwidth on
demand and also manage link utilization. At the start when
connection is successfully built between peers using
Bandwidth Allocation Control Protocol (BACP), now peer
nodes can work through Bandwidth Allocation Protocol
(BAP). Bandwidth Allocation Control Protocol (BACP)
works over any physical line that must be able to PPP (point-
to-point protocol) multilink with dial ability. In beginning,
Bandwidth Allocation Control Protocol (BACP) works on
ISDN (Integrated Services Digital Network) connections.
When connection is build between peers successfully,
Bandwidth Allocation Protocol (BAP) defines all the work
like packets, parameters and the procedure of talk between
two endpoints. It also adds and drops links from the bundle
of multilink that allow the dynamic behavior of bandwidth
allocation [1]. Bandwidth Allocation Control Protocol
(BACP) is a protocol of internet for connection creation over
ISDN (Integrated Services Digital Network). This protocol is
also known as dial on demand (or bandwidth on demand).
This is a useful technique for high traffic, videoconferencing
and also for backup sessions [2].
Many of multilink bundles are managed by Bandwidth
Allocation Protocol (BAP). It is the subset of Bandwidth
Allocation Control Protocol (BACP). From multi link
bundle, addition and removal process of a single link is
defined by this protocol. It also tells that which peer is
accountable for what decision. The implementation of
Bandwidth Allocation Protocol (BAP) is performed as: Call
request, Callback request and link drop query [3].
(Li) [4] proposed an algorithm in the research regarding
“End-to-End Fair Bandwidth Allocation in Multi-hop
Wireless Ad Hoc Networks”. According to this work fair
allocation of bandwidth is provided for getting the best
performance, and desired results. As a result, the algorithm
for bandwidth allocation in multi-hop wireless ad-hoc
networks is capable to provide suitable resources in the
network. Arora, Singh, and King used the ad hoc networks
for the discovery of the distance vector routing protocol and
route for the packets. Their work was used to enhance the
protocol by finding the hidden terminals. They used the fair
share bandwidth algorithm. The hidden terminals shared the
resources when using the same bandwidth [5]. According to
Valarmarthi and Malmurugan the wireless applications
required the inflexible, audio, and video applications with the
high speed. It is handy to tackle the proper usage of
resources, and fair allocation of bandwidth to all connected
nodes. Their proposed protocol known as “priority based
bandwidth reservation protocol” was designed for wireless
mesh network. This protocol consisted of two phases, the
forward phase in which the message is forwarded for the
data flow to the destination, while the reply phase sends the
message back hop by hop to the correspondence node. The
destination node reserves the bandwidth for requesting node
on a priority basis [6].
2. Related Works
According to a research the new technique is suggested for
bandwidth allocation protocol. The technique work with
bandwidth allocation (DBASE) protocol it may be called as
bandwidth sharing or bandwidth extension protocol [7].
Another work of a researcher is about the “Priority-based
Bandwidth Allocation Protocols for Wireless Networks “.
Research focuses on the limited resources given by working
protocol. So as, a solution to this issue is given by using two
protocols, a traffic-dependent (A1) and other is traffic-
independent (A2). These protocols work according to
priority assigned by limited bandwidth for active nodes. The
simulation is made for the comparison purpose of these
proposed protocols, and it is shown that technique has
recognized among the super performance of traffic
dependent protocol with normal bandwidth and good
performance with traffic independent protocol [8].
The latest research was made by (Yi-Ting Mai) for
bandwidth allocation protocol in multi-hop wireless
networks. The innovated protocol is based on the zone wise
1
2. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
bandwidth allocation for mobile user. The protocol proposed
here provides the high quality of service (QoS) to mobile
users. Bandwidth allocation protocol calculates the demand
of mobile user and provides suitable bandwidth according to
current station of user. The range of bandwidth which is
provided to a mobile user is known as zone in this research,
so the proposed solution is called as zone based bandwidth
allocation protocol.
Figure 1: INTEGRATED WIRELESS NETWORK
TOPOLOGY IN IEEE 802.16-MR NETWORK [9]
3. Notations and Ideas
The basic idea behind this motivation is to reserve the
adequate bandwidth to all mobile users in all relay stations
“in the network” and there is no need of reallocation of
bandwidth among mobile users in relay stations for the same
zone. Hop count is the size of the zone and relation from the
initial station. The zone Size is the ‘L’ that has value
between 0~~1, and zone includes as L = 0, for initial relay
station; total relay stations are as L =1. The relay stations in
an ad hoc network, which emerge out from the mobile
stations and also serve as the relay stations for the ad hoc
networks together. Relay stations act as the promising role
for the extension of base station. The following illustration
will be useful to understand the current proposed schema.
This schema works efficiently in the circumstances as,
1. There are no chances for the two or more than two relay
stations to have access of the medium at the same time,
and also have the same sharing of a medium. There is no
spatial reuse for relay stations.
2. Quality of Service (QoS) degradation is required to be
reduced in the Zone based bandwidth protocol. The
proposed approach will focus upon the performance
maximization for the networks and allocation of
bandwidth.
3. This proposed is also applicable to other types of
topology, but here it considers the IEEE 802.16 network
for bandwidth allocation.
4. Network modeling technique or user profile will
determine the visibility probability of the RS.
5. Satisfaction rate for the purpose of the required
bandwidth will be determined by ration between
allocated bandwidth and required bandwidth.
Use of the proposed scheme is viable in the chessboard
topology and other types of the topology.
4. Presentation of New Algorithm
Same medium will be used by all relay stations in the ad hoc
network without any spatial reuse, i.e. no two or more same
stations will use the medium at the same time. BAP will be
in charge and responsible to allocate the bandwidth and use
DL-MAP and UL-MAP. This proposed scheme is applicable
to other types of typologies. Both network modeling
techniques and user profile can be assumed at each relay
station for the mobile user. P (RSi-j) denotes the probability
of each mobile user at the given relay station RSi-j. The
proposed schema will adopt the applications which are
adaptable to adjustment for a bandwidth.
Summary of Notations used in the paper is given as,
S --- Satisfaction rate for users required bandwidth
L --- Size of Zone
HC --- Hop Count
P (RS i-j) ---- Visiting probability at location RS
P Zone (RS i-j) ----- Normalized probability visiting at
location RS within a zone
BW ----- Data flow rate
RS initial ------- Initial RS in the zone for the allocation of
bandwidth
S-TH ---------- Satisfaction rate at threshold
5. Calculation of Bandwidth Allocation
When flow rate, threshold at Satisfaction, size of Zone L,
and initial mobile user’s location, the allocated bandwidth is
calculated as: RS (i-j) € Zone Rs initial, L,
2
3. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
The hop count between RS (initial) ≤ [HC MAX x L] and RS
i-j. The visiting probability in the zone Pzone/RS (i-j) is
given as following
Pzone/RS (i-j) = PRS (i-j)/∑ (RS in the Zone) PRS.
Satisfaction Rate S =∑ (RS in the Zone) [Min
(N*BW/HCRS(i-j) * BW)]* PRS(i-j) (1)
Where HCRS (i-j hop count between RS i-j and BS. It has
become clear that satisfaction rate S calculated is no longer
than value 1.
Pzone/RS (i-j) meant for the probability of visiting of user at
the location (RS (i-j)) when user does not move outsize of
given zone. The allocated bandwidth is assumed as BWxN.
Satisfaction rate S given at each relation is calculated as
BWxN/BW x HC rs (i-j).
The final allocated bandwidth’s value calculated when
minimum value of N takes the value of S which is larger or
equal to that of Satisfaction threshold S-TH by Mai, Yang,
and Chen [10].
6. Principle of New Algorithm
The novel technique proposed by us is about the “Zone based
priority of bandwidth allocation protocol for wireless
networks and improving the QoS”. Where zone is based on
the range of wireless user and priority, is set through the
demand of the network user. The required need of user
within the range of zone bandwidth will be allocated to them
accordingly. Resources are reallocated as and when required
by other user demands in it. Many traditional schemes make
the scale down of bandwidth rates of connected users, when
a new user is added to the network. This approach will avoid
such activity. As for solution of simulation results the good
results are available from the research of conservative and
adaptive quality of service (CAQoS) by Y.C.Yee [11]. So
this could be embedded within this proposed technique.
Bandwidth reallocation is one of the major concerns of
bandwidth allocation protocol. A previous research has some
resolution for the above matter. Under dynamic traffic load
in wireless network adjustments are made for uplink and
downlink and the decision is made for when and how this
will work. The purpose is to increase the utilization of the
bandwidth along with maintaining the quality of service [12].
For the validation of the proposed technique, a general
simulation is performed. The current priority based quality of
service protocols working in ad-hoc wireless network not
take much attention upon the effect of mutual interfaces
among routers working in the wireless medium. A research is
made by Ueda, Roy, and Saha [13] to investigate the effect
of mutual interfaces on the performance of routing in the
wireless environment and searched the zone wise disjoint
routers to avoid the problem of mutual interface, and this
helped in improving the performance of the network. The
proposed method of the work is related to the priority based
quality of service with routing scheme that uses the zone
wise disjoint routers [13].
7. Evaluation of Performance
Simulation tool and environment (network
simulator 2: NS2)
This part of study has been conducted for the evaluation of
performance for given bandwidth management and
improvement in QoS on zone-based. Network has the link
capacity of 20Mbps, the correspondent node CN is outside of
the user’s network; the simulation has the same visiting
probability in the network at all RSs. The criteria defined for
the performance evaluation is given as following:
Average satisfaction: Allocated bandwidth over the
user’s required bandwidth is called as the average
bandwidth.
Bandwidth Allocation: It is given in the unit called as
Hop Count, and flow rate is with BW in simulation, and
UGS is the flow in simulation.
Allocated bandwidth’s fluctuation determines the deviation
of satisfaction.
Reallocation Ratio of Bandwidth: it is triggered
over the handoff’s total number.
3
4. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
Handoff ratio is defined as the required bandwidth has
not met after the handoff occurred.
Current study evaluates the management of the bandwidth in
a Zone based environment. Different features of the MHs
mobility are designed. Considering the movement of MHs
behavior, we met four experiments such as
MD_AwayFromBS, MD_Equal, MD_CloseToBS, and
MD_CloseToCenter. Other than MD_Equal have 80%
probability in moving the BS, center of mesh, and opposite
of the BS [14].
8. Evaluation of proposed technique
Maximum bandwidth services in a priority based zones will
work by the proposed bandwidth management. By the use of
access rules, bandwidth management could be enabling on a
pre-interface basis. First In and First out (FIFO) scheme is
followed for sending packets, which are queued.
Zone-based priority of bandwidth management can allocate a
part of the available bandwidth with priority to all classes of
network traffic. Priority is set as 0-7, where zero is the
starting and seven is the highest. Class of traffic with zero
bandwidth is allocated, and it effectively blocks the traffic
except there is no higher priority on the network. When
packet arrives it must contain source and destination
information. Packet sending confirmation is done through
normal transmission. The amount of bandwidth provided or
guaranteed for class queues, and priority is assigned to a
class queue. First-in, first-out procedure is applied within the
class queue for packets. At maximum allocation point of
class comes; packets from the next class are preceded in
priority order. Normally each of the class on the available
bandwidth is given a portion, and when this limit reaches at
its maximum, no more traffic is forwarded through it. A class
may temporarily get bandwidth if it not reaches at its limit
and send traffic. Bit spare bandwidth is provided to the class
with the highest priority.
Chessboard topology
In the chessboard topology the average visibility of the MHs
on the each RS is obtained. Size for the Chessboard topology
is the (2n-1) * (2n -1). MH probability is denoted by PM,
location (l.f) and p for the probability. Movement probability
of MH in a neighbor network is PM-(l,f).
It is the probability for the MH visiting to a neighbor, and
second category occurs at the edge of the topology. Every
node meets with other three nodes and MH visiting
probability becomes ¾ *
Figure 2: HOP COUNT FOR P.D.F [14]
This figure shows the hop count from BS the Chessboard
topology with size (n =3-6). It also offers the distribution
behavior that is adequate for the bandwidth management as
compared to other topology types. Thus, chessboard was the
main focus for the simulation.
Scenario as an Example
When they want to create outbound mail traffic, simple mail
transfer protocol (SMTP) accesses rule and permits the
bandwidth management with the following parameters:
Assured bandwidth of 20 percent
Maximum bandwidth of 40 percent
Priority of 0 (zero)
4
5. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
Use of access rules increases the priority in bandwidth
management than without using access rules it must be low.
As far as an example is concerned the outbound Small mail
transfer protocol SMTP traffic is sure of 20 percent within
the allocated bandwidth. It has the maximum limit of 40
available bandwidths. If the access rules are not applicable
with bandwidth management, it may reduce the priority but
use of the access rules increases the priority.
The finding of minimum N, that satisfies the given criteria,
and satisfaction S become equal or larger than Satisfaction
parameters of users. The hop count HC is the length for
allocation bandwidth to the CN. When bandwidth of BW*N
is reserved the N represents that satisfaction S is larger or
equal to that of user parameters S-TH. For the mobile hosts
MHs is BWxN is the bandwidth [10].
9. Results
The results from simulation of the proposed technique show
that zone-based bandwidth allocation can increase the quality
of service (QoS) and also reduces the reallocation overhead
of bandwidth. Qicheng Ma addressed the problem of
maximizing total user utilization in wireless network with
bandwidth allocation and link scheduling. There is no use of
any artificial metrics for increasing the throughput. The aim
for this work is to optimize the actual utility. For this
purpose, scheduling algorithm is introduced which is
centralized in nature. The values of all nodes in objective
functions can be measured through this algorithm. It gave the
better results. The scheduling is of utility based it is applied
in different scenarios for getting the optimal utility. From the
derived algorithm, the simulation gives very optimistic
results. Bandwidth Allocation is impacted by threshold
satisfaction rate as more than 90% and L the size of zone
reserves bandwidth in a large. The bandwidth can be reduced
to 60% when fewer than 90% satisfaction rate is accepted.
Zone based schema is used to achieve the user’ requirements
as threshold satisfaction S-TH = 0.9. Standard deviation of
the satisfaction S increased by a large size of zone as MHs
movement will be frequent in a large area of roaming. It can
be summarized that Handoff degradation ration will be
reduced by the larger zone, and ratio of Reallocation will
depend upon the Bandwidth Allocation cost. Rise in standard
deviation in a satisfaction will inevitably enlarge the zone
size [14]. Handoff Call (Degradation ratio) reduces with an
increase of zone size, and fails to manage the load as it
increases as shown in figure 3. In summary the increase in
zone size will raise the Standard deviation of satisfaction.
Figure 3: AVERAGE SATISFACTION WHEN S-TH
BECOMES EQUAL 0.9[10]
Figure 4: RATIO OF BANDWIDTH REALLOCATION
[10]
Standard deviation does not exceed than 0.15, and proposed
Zone based satisfy the needs. It also achieves the lower
variation in mobility of MH [14].
10. Discussion
The new mobile user demand for the bandwidth can be
simply checked either provider bandwidth is enough for the
user. When idea of the zone is introduced the two types
(inter-zone handoff and intra-zone handoff) between the
relay stations need to be known. The Bandwidth
Reallocation Ratio gives the representation of the mobile
5
7. International Journal of Science and Research (IJSR), India Online ISSN: 2319 – 7064
Volume 1 Issue 2, November 2012
www.ijsr.net
Journal on Selected Areas In Communications, Vol. 19,
No. 10, October 2001.
[7] Nadejda S. Roubtsova, “Priority-based Bandwidth
Allocation Protocols for Wireless Networks”, October
4, 2009.
[8] Mai, Y and Chen, K. (2011). “Design of zone-based
bandwidth management Scheme in IEEE 802.16 multi-
hop relay networks”
[9] Mai, Y, Yang, C., Chen, J. and Chen, K. A Zone-based
Bandwidth Allocation Protocol in WiMAX Multi-hop
Relay Networks. IEEE. 2011.
[10] Yee, C. Y and K.N. Choongb, “A conservative
approach to adaptive call admission control for QoS
provisioning in multimedia wireless networks”,
Accepted 18 August 2006.
[11] Xun. Y, “Bandwidth Reallocation for Bandwidth
Asymmetry Wireless Networks Based on Distributed
Multiservice Admission Control”, Mobile Computing,
IEEE Transactions on Nov.2008.
[12] Ueda, T., Roy, S. and Saha, D.,“A Priority-based QoS
Routing Protocol with Zone Reservation and Adaptive
Call Blocking for Mobile Ad Hoc Networks with
Directional Antenna”
[13] Mai, Y and Chen, K. ‘Design of zone-based bandwidth
management scheme in IEEE 802.16 multi-hop relay
networks’, Journal on Wireless Communications and
Networking 2011,
[14] Yi-Ting Mai, “A Zone-based Bandwidth Allocation
Protocol in WiMAX Multi-hop Relay Networks”, IEEE
2011.
7