This document summarizes a study that evaluates and compares the performance of two routing protocols (DSDV and DSR) in mobile ad hoc networks using network simulation. It finds that DSDV has shorter delays but higher routing load as network size increases, making it unsuitable for large, dynamic networks. DSR has moderate routing load and longer delays, making it better for medium-sized networks without high delay requirements. The study uses ns-2 simulation with varying network sizes from 10 to 50 nodes to measure metrics like end-to-end delay, jitter, and normalized routing load under different traffic patterns.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...ijsrd.com
In this paper we propose an energy efficient video transmission strategy for wireless sensor networks, which combines wavelet-based image decomposition and cooperative communication. The proposed scheme uses the selective decode and forward (SDF) cooperation, so that a relay node collaborates with the source by forwarding only a lower-resolution version of the original video, obtained via discrete wavelet transform (DWT). We show that the proposed SDF-DWT strategy is more energy efficient than non-cooperative single-hop and multi-hop, also outperforming the regular SDF scheme. In addition, we show that our method can achieve the energy efficiency of incremental DF (IDF), without the need of a feedback channel.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...ijsrd.com
In this paper we propose an energy efficient video transmission strategy for wireless sensor networks, which combines wavelet-based image decomposition and cooperative communication. The proposed scheme uses the selective decode and forward (SDF) cooperation, so that a relay node collaborates with the source by forwarding only a lower-resolution version of the original video, obtained via discrete wavelet transform (DWT). We show that the proposed SDF-DWT strategy is more energy efficient than non-cooperative single-hop and multi-hop, also outperforming the regular SDF scheme. In addition, we show that our method can achieve the energy efficiency of incremental DF (IDF), without the need of a feedback channel.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector (AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
Our area of interest for the paper is the improvement of performance of DSR routing protocol by
changing in algorithm and this Improved DSR protocol should compare with remaining protocols
taken in this research paper.
2. In this paper we made changesin traditional DSR protocol and generation of new improved DSR the
different performance parameters and compare with AODV/DSR/DSDV protocols in mobility and
non- mobility scenarios nodes up to 300.
3. We can plot the graphs throughput, End to end Delay, Packet delivery Ratio, Dropping Ratio, and
average energy consumption on Mobility and Non-Mobility scenario by using Network Simulator
version 2.34 for Modified DSR protocols. M-DSR, DSDV perform well when Mobility is low.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector (AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Nonmobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.
Our area of interest for the paper is the improvement of performance of DSR routing protocol by
changing in algorithm and this Improved DSR protocol should compare with remaining protocols
taken in this research paper.
2. In this paper we made changesin traditional DSR protocol and generation of new improved DSR the
different performance parameters and compare with AODV/DSR/DSDV protocols in mobility and
non- mobility scenarios nodes up to 300.
3. We can plot the graphs throughput, End to end Delay, Packet delivery Ratio, Dropping Ratio, and
average energy consumption on Mobility and Non-Mobility scenario by using Network Simulator
version 2.34 for Modified DSR protocols. M-DSR, DSDV perform well when Mobility is low.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
Cognitive radio networks allow unlicensed
(secondary) users to opportunistically utilize the idle
resource of a licensed network for communication
without affecting the quality of service being offered to
the primary or licensed users. This paper investigates
the effect of mobility on performance of multi-hop
cognitive radio network under various propagation
models. MPEG4 video; a bandwidth intensive traffic, is
tested over these network conditions for secondary
users and results are validated using NS2 simulations.
Performance metrics used for evaluation include
throughput, delay variations etc.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc NetworksGiselleginaGloria
One of the most important challenges of a Mobile Ad Hoc Network (MANET) is to ensure efficient routing among its nodes. A Connected Dominating Set (CDS) is a widely used concept by many protocols for broadcasting and routing in MANETs. Those existing protocols require significant message overhead in construction of CDS. In this paper, we propose a simple, inexpensive and novel algorithm of computing a minimum CDS. The proposed algorithm saves time and message overhead in forming a CDS while supporting node mobility efficiently. Simulation results show that the proposed algorithm is efficient in terms of both message complexity and the size of the CDS.
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...IJECEIAES
Conservation of the energy is one of the main design issues in wireless sensor networks. The limited battery power of each sensor node is a challenging task in deploying this type of network. The challenge is crucial in reliable wireless network when implementing efficient error correcting scheme with energy consuming routing protocol. In this work, we investigated the energy performance of LDPC code in multi-hop wireless sensor network. We proposed a model of two base stations to prolong the lifetime and build a reliable and energy-efficient network. Through performed MATLAB simulations, we examine the energy effectiveness of multiple base stations model on reliable wireless sensor network performance in different network dimensions.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
Telecommunications is increasingly vital to the society at large, and has become essential to
business, academic, as well as social activities. Due to the necessity to have access to
telecommunications, the deployment requires regulations and policy. Otherwise, the deployment
of the infrastructures would contribute to environment, and human complexities rather than
ease of use.
However, the formulation of telecommunication infrastructure deployment regulation and
policy involve agents such as people and processes. The roles of the agents are critical, and are
not as easy as it meant to belief. This could be attributed to different factors, as they produce
and reproduce themselves overtime.
This paper presents the result of a study which focused on the roles of agents in the formulation
of telecommunication infrastructures deployment regulation and policy. In the study, the
interactions that take place amongst human and non-human agents were investigated. The study
employed the duality of structure, of Structuration theory as lens to understand the effectiveness
of interactions in the formulation of regulations, and how policy is used to facilitate the
deployment of telecommunications infrastructure in the South African environment.
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
The main task of this article is to focus on the performance of cooperative MIMO relaying in terms of data rate and Power. Furthermore, compare these performances when using Maximum Ratio Combining (MRC) and equal gain combining (EGC).The average SNR improvement of MRC is typically about 5 dB better than with EGC and direct link.The preciseness of the derived closed form expression of optimum power allocation of the DF-based relaying system is demonstrated by simulation results.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
This work proposes a new differential cooperative diversity scheme with high data rate and low decoding complexity using the decode-and-forward protocol. The proposed model does not require either differential encoding or channel state information at the source node, relay nodes, or destination node where the data sequence is directly transmitted and the differential detection method is applied at the relay nodes and the destination node. The proposed technique enjoys a low encoding and decoding complexity at the source node, the relay nodes, and the destination node. Furthermore, the performance of the proposed strategy is analyzed by computer simulations in quasi-static Rayleigh fading channel and using the decode-and-forward protocol. The simulation results show that the proposed differential technique outperforms the corresponding reference strategies.
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...IJERA Editor
Wireless sensor network are increasingly used in data-intensive applications such as micro-climate monitoring,
precision agriculture and audio/video surveillance. A key challenges faced by data-intensive wsn’s is to transmit
all the data generated with an application’s lifetime to the base station despite the fact that sensor nodes have
limited power supply. We propose using low-cost disposable mobile really and our work in the following
aspects First, it does not require complex motion planning of mobile nodes. Second we integrate the energy
consumption due to both mobility and wireless transmission. Our framework consists of first algorithm
computes an optimal routing tree. The second, we integrate the energy consumption due to both mobility and
wireless transmissions .The second algorithm improves the topology of the routing tree by greedily adding new
nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology.
Frequently forming a network topology without the use of any existing network infrastructure. We compare the
performance of the three prominent routing protocols for the mobile relay is Adhoc on Demand Distance Vector
(ADVO), Destination Sequenced Distance Vector (DSDV) and Temporally Ordered Routing Protocols (TORA).
We have chosen four performance metrics such as Average Delay, Packet Delivery Fraction, Routing load and
varying Mobility nodes, simulation for the popular routing protocols AODV, DSDV, and TORA. The
simulation is carried out on NS-2. The performance differentials are analyzed using varying network size and
simulations times. The simulation results confirm that ADVO performs well in terms of Average Delay, Packet
Delivery Fraction. As far as routing load concers TORA performs well.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
A Mobile Ad-hoc Network (MANET) has a collection of numbers of wireless nodes which is each device in MANET having ability to free to move in any direction so that it is useful in all applications. In MANET nodes change position quite frequently, this means that we have need routing protocols that quickly adapts to topology changes. An ad-hoc network is self-organising and distributive in manner. The MANET is
works as router so that linked with the other nearest devices. A mobile ad hoc network (MANET) is a
wireless network follows the multiple hop routing instead of static network infra to provide network connectivity. Each device in a MANET is free to move independently in all direction freewaysand will
therefore nodes change position in large networks all routing protocols. The routing protocols are needed for conveying information in Ad-hoc network there are various performance parameters to compare the Ad-hoc routing protocols.
Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
IJCER (www.ijceronline.com) International Journal of computational Engineering research
1. Chetan adhikary, Dr. HB Bhuvaneswari, Prof K. Jayaraman /International Journal Of Computational
Engineering Research / ISSN: 2250–3005
Performance Evaluation and Model Using DSDV and DSR routing in
Ad-hoc network
Chetan adhikary1, Dr. HB Bhuvaneswari2, Prof K. Jayaraman3
1
M.Tech Scholar, Department of Electronics and Communications Engineering, AMC Engineering College, Bangalore-
560010
2
Professor, Department of Electronics and Communications Engineering, AMC Engineering College, Bangalore-560010
3
Research Scholar, Mentor & Competancy Developer
Abstract:
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes communicating with each other using multi-
hop wireless links without any existing network infrastructure or centralized administration. Previously, a variety of routing
protocols targeting specifically at this environment was developed and some performance simulations were made.
However, the related works took the simulation model with a constant network size. On the contrary, this paper considers
the problem from a different perspective, using the simulation model with dynamic network size. Furthermore, based on
Quality Of Service QoS (delay, jitter) and routing load, this paper systematically discusses the performance evaluation and
comparison of two typical routing protocols of ad hoc networks with different simulation model and metrics.
Keywords: Ad hoc networks, Performance evaluation, QoS, Routing protocols, Network simulation.
1. Introduction
In an Ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. Such networks find
applicability in disaster management environment, crowd control, military applications and conferences. Each of these
applications has specific QoS to be met. There is no stationary infrastructure such as base stations in ad hoc networks. Each
node in the network is also acts a router, forwarding data packets for other nodes. Moreover bandwidth, energy and
physical security are limited. These constraints in combination with network topology make routing protocols in ad hoc
networks challenging.
In this paper a systematic performance study of two routing protocols of ad hoc networks, which is distance vector
routing protocol DSDV [2] and Dynamic Source Routing DSR [3] is done. Destination Sequenced Distance-Vector
(DSDV) routing protocol is one of the first protocols proposed for ad hoc wireless network. It is an enhanced version of the
distributed Bellman-Ford algorithm. DSDV is a table driven protocol. Every mobile node in the network maintains a
routing table in which all of the possible destinations within the network and the number of hops to each destination are
recorded. DSR has an on-demand behavior, in which they initiate routing activity only in the presence of date packet in
need of a route.
This paper discusses the performance evaluation of DSDV and DSR routing protocol which takes the QoS (delay,
jitter) and routing load as evaluation metrics.
2. Simulation Model and Evaluation Metrics
The simulator for evaluating routing protocol is implemented with the Network Simulator version 2 (ns2) [4].
Simulation model varies the network size from 10 to 50 nodes placed within 1000m×1000m area. The mobile nodes are
stationary. Time required for each simulation 50s.
A. Channel and radio model
Generally there are three propagation models in ns2, the free space model, two-ray ground reflection model and
the shadowing model. The free space propagation model assumes the ideal propagation condition where there is only one
clear line-of-sight path between the transmitter and receiver. H.T Friss[5] presents the following equation to calculate the
received signal power in free space at distance d from the transmitter.
(1)
where Pt is the transmitted signal power, and are the antenna gains of the transmitter and receiver respectively,
L(L>=1) is the system loss and 𝞴 is the wavelength. Generally, Gt = Gr= 1 and L=1 in ns2 simulations. The free space
model basically represents the communication range as a circle around the transmitter. If the receiver is within the circle, it
receives all the packets. A single line-of-sight path between two mobile nodes is seldom the only means of propagation.
IJCER | July-August 2012 | Vol. 2 | Issue No.4 |977-980 Page 977
2. Chetan adhikary, Dr. HB Bhuvaneswari, Prof K. Jayaraman /International Journal Of Computational
Engineering Research / ISSN: 2250–3005
The two-ray ground reflection model considers both the direct path and a ground reflection path. S. Corson and J. Macker
[6] showed that this model gives more accurate prediction at long distance than the free space model. The received power at
distance d is predicted by
(2)
where ht and hr are the heights of the transmitting and receiving antennas respectively.
The above equation shows a faster power loss than Eq.(1) when the distance increases. However, the two-ray
model does not give a good result for a short distance due to oscillation caused by the constructive and destructive
combination of the two rays. Instead, the free space model is still used when d is small. Therefore, a cross-over distance dc
is calculated in this model. When d<dc Eq. (1) is used. When d>dc , Eq.(2) is used . At cross-over distance, Eqs.(1) and (2)
give the same result. So dc can be calculated as
(3)
The free space model and the two-ray model predict the received power as a deterministic function of distance.
They both represent the communication range as an ideal circle. In reality, the received power at certain distance is a
random variable due to multipath propagation effects, which is also known as fading effects. In fact, the above two models
predicts the mean received power at distance d.
B. MAC protocol and traffic pattern
The IEEE 802.11 MAC protocol with Distributed Coordination Function (DCF) [7] is used as the MAC layer in
our scenarios. DCF is the basic access method used by the mobile nodes to share the wireless channel under independent ad
hoc configuration. It uses a RTS/CTS/DATA/ACK pattern for all unicast packets and simply sends out DATA for all
broadcast packets. The access scheme is Carrier Sense Multiple Access/collision avoidance (CSMA/CA) with
acknowledgements.
A traffic generator named cbrgen was developed to simulate constant bit rate sources in ns2. We use it to generate
6 pair/12 pair/24 pair/30 pair/60 pair of udp stream stochastically. Each CBR package size is 512 bytes and one package is
transmitted in 1second.
C. Performance metrics
The following metrics are applied for comparing the protocol performance. Some of these metrics are suggested by
the MANET working group for routing protocol evaluation [6].
Average end-to-end data delay: This includes all possible delays caused by buffering during routing discovery
latency, queuing at the interface queue and retransmission delays at the MAC, propagation and transfer times.
Jitter: the delay variation between each received data packets
Normalized routing load: the sum of the routing control messages such as HELLO,RREQ etc., counted by k bit/s.
3. Simulation Results and Performance Analysis
A. End to End delay analysis
DSDV protocol exhibits a shorter delay because it is a kind of table-driven routing protocol, each node maintains a
routing table in which all the possible destination are recorded, only packets belonging to valid routes at the ending instant
get through. A lot of packets are lost until new (valid) route table entries have been propagated through the network by the
route update messages in DSDV.
Fig 1. End to end delay versus number of nodes.
IJCER | July-August 2012 | Vol. 2 | Issue No.4 |977-980 Page 978
3. Chetan adhikary, Dr. HB Bhuvaneswari, Prof K. Jayaraman /International Journal Of Computational
Engineering Research / ISSN: 2250–3005
When requesting a new route, DSR first searches the route cache storing routes information it has learned over the past
routing discovery stage and has not used the timer threshold to restrict the stale information which may lead to a routing
failure. Moreover DSR needs to put the routes information not only in the route reply message but also in the data packets
which relatively makes the data packets longer than before. Both of the two mechanism make DSR to have a long delay
than DSDV.
B. Jitter Analysis
DSDV is continuous to present the trend of ascending with the size larger than 20. This is depicted in Fig 2.
Fig 2. Average jitter versus no of nodes
C. Routing Load Analysis
The routing load of a protocol has influenced node efficiency of battery energy and decided its scalability
especially under an environment of narrower bandwidth and easier congestion.
For DSDV the routing load naturally increases at a faster rate along with the number of nodes increasing as shown
in Fig.3.
Fig 3. Routing Load versus no of nodes.
Nearly an order of magnitude separates DSR, which has the heavier overhead with the number of nodes smaller than 50.
D. Performance summary
When DSDV must maintain the entire situation information, when topology changes frequently and network size
increases, the increment of routing load is very quick, and it is not fit for large scale and high speed moving wireless
environment.
DSR routing load is moderate and a long delay which is suitable to a medium scale network environment without
higher delay demand.
4. Conclusion
DSDV can be employed in scenario wherein the network topology is known and not dynamically changing. An
existing wired network protocol can be applied to ad hoc wireless network with many fewer modifications.
This paper discusses the simulation model for variable network size. This paper contributes in area of impact of
different simulation model on routing protocol.
IJCER | July-August 2012 | Vol. 2 | Issue No.4 |977-980 Page 979
4. Chetan adhikary, Dr. HB Bhuvaneswari, Prof K. Jayaraman /International Journal Of Computational
Engineering Research / ISSN: 2250–3005
References
[1] Li Layuan, Li Chunlin and Yaun Peiyan, “Performance evaluation and simulations of routing protocols in Adhoc
network”, Computer communication 30 (2007) 1890-1898.
[2] Charles E. Perkins and Pravin Bhagwat “Highly dynamic Destination Sequenced Distance Vector routing (DSDV)
for mobile computers”, in: Proceedings of SIFCOMM’ 94 Conference on Communication Architectures, Protocols
and Applications, August1994, pp.234-244.
[3] David B. Johnson, David A. Maltz and Yih-Chun Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc
Networks”, draft-ietf-manet-dsr-10.txt, July 2004.
[4] The Network Simulator –ns2. Available from http://www.isi.edu/nsnam/ns/index.html/
[5] H.T Friss, “A note on a simple transmission formula”, in: Proc: IRE, 34, 1946.
[6] S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET) Routing Protocol Performance Issues and
Evaluation[S]”, RFC2501, 1999.
[7] T.S Rappaport, Wireless Communication: Principles and Practice, Oct, Prentice Hall, Upper Saddle River, NJ, 1995.
[8] IEEE Computer Society LAN MAN Standards Committee,”Wireless LAN Medium Access Protocol (MAC) and
Physical Layer (PHY) Specification”, IEEE Std 802.11-1997, The Institute of Electrical and Electronics Engineers,
New York, 1997.
IJCER | July-August 2012 | Vol. 2 | Issue No.4 |977-980 Page 980