This document discusses ad hoc and wireless sensor networks. It describes several applications of ad hoc networks including military operations, collaborative work, emergency response, and wireless mesh networks. It also discusses wireless sensor networks and their use in fields like healthcare, environmental monitoring, and more. Finally, it outlines some of the major challenges in designing routing protocols for ad hoc networks such as mobility, bandwidth constraints, and resource limitations.
Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery.
Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
A wireless network typically refers to a system that allows devices to connect to the internet or communicate with each other without using cables. It relies on radio waves to transmit data between devices and access points. Wireless networks can be categorized based on their range and purpose, such as personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). They enable convenient and flexible connectivity, but factors like signal interference, security concerns, and network congestion can affect performance.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery.
Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
A wireless network typically refers to a system that allows devices to connect to the internet or communicate with each other without using cables. It relies on radio waves to transmit data between devices and access points. Wireless networks can be categorized based on their range and purpose, such as personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). They enable convenient and flexible connectivity, but factors like signal interference, security concerns, and network congestion can affect performance.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
3. Military Application:
Useful in communication among a group of soldiers for tactical
operations.
Useful in the coordination of military objects(air planes or warships)
moving at high speeds.
For example leader of the soldiers want to give any order to all
soldiers or to a set of selected persons are involved in the operation.
Used in other services such as location tracking /other satellite
based services.
4. Collaborative and Distributed Computing:
To give information in a group of peoples using conference.
For example:
Group of researchers want to share their research among group of
peoples.
Lecturer distributing notes to the class.
Sharing of a file among network.
5. Emergency Operations:
Ad hoc is used in search and rescue operations, crowd control and
commando operations.
Used in coordinating rescue activities during war or the natural
disaster like earthquakes.
Conventional communication facilities are destroyed in that case ad
hoc network is used for rescue activities.
6. Wireless Mesh Network:
Wireless Mesh Network are the ad hoc wireless network that provide
the many alternate path (to reach the destination) for mobile or fixed
nodes/users.
Quick reconfiguration of the path when the existing path fails due to
node failures.
Making cost for wireless mesh networks is much less than cellular
networks.
Possible deployment scenarios are:
Residential zones
Highways
Business Zones
Important civilian regions
University campuses
7.
8.
9. Mesh Network support high data rate, quick and low cost deployment,
enhanced services, high scalability and high availability.
Deployment and data transfer rate is less.
Services for smart environment like updating information about the
environment and updating digital map.
10. A sensor network is a collection of large number of sensor nodes that
are deployed in particular region.
As we know that the sensor are the tiny devices that have capability to
sensing parameter, processing the data and communicate over the
network.
A sensing can be periodic or sporadic.
Periodic example- Sensing of environmental factors for the
measurement of parameters such as temperature, humidity and
nuclear radiation.
Sporadic example-Detecting border intrusion , measuring the stress on
critical structures.
Military, Health Care, Home security and environmental monitoring
are the application areas of wireless sensor network.
11. Cellular networks – geographical channel reuse.
Incorporating multi-hop relaying with existing fixed infrastructure
increase the capacity of a cellular network.
MCNs provide reliability and flexibility.
Advantages:
Higher capacity due to better channel reuse
Increased flexibility and reliability in routing
Better coverage and connectivity in holes of a cell.
13. The ad hoc wireless Internet extends the services of the
Internet to the end users over an ad hoc wireless network.
Some of the applications of the ad hoc wireless Internet are
wireless mesh networks
provisioning of temporary Internet services to major
conference venues
sports venues
temporary military settlements
battlefields and
broadband Internet services in rural regions
14.
15. The major issues to be considered for a successful ad hoc wireless Internet
are the following:
Gateways
-Gateway nodes in the ad hoc wireless Internet are the entry points to the
wired Internet, owned and operated by a service provider
-The major part of the service provisioning lies with the gateway nodes.
- Gateways perform the following tasks:
keeping track of the end users,
bandwidth management,
load balancing,
traffic shaping,
packet filtering,
bandwidth fairness, and address,
service, and location discovery.
16. Address mobility
-The ad hoc wireless Internet faces the challenge of address mobility.
-This problem is worse here as the nodes operate over multiple wireless
hops.
-Mobile IP can provide temporary alternatives for this
Routing
-Causes major issue due to dynamic changes in the topology, the presence
of gateways, multi-hop relaying, and the hybrid character of the network.
-The solution for this is to use a separate routing protocol, exploit the
presence of gateway nodes in the wireless part of the ad hoc wireless
Internet
17. Transport layer protocol
-Solutions for transport layer depends on the in the TCP’S extension.
-Split approaches that use traditional wired TCP can be used for the
wired part and
- A specialized protocol where the gateways act as the intermediate nodes
at which the connections are split can be used for the ad hoc wireless
networks
-The state maintenance overhead at the gateway nodes has to be done
correctly
Load balancing
- Load balancing techniques are essential to distribute the load so as to
avoid the situation where the gateway nodes become bottleneck nodes
18. Pricing/billing
-Gateway is the preferred choice for charging the traffic to and from the
Internet.
-Pricing schemes can be used for this purpose.
-Pricing the local traffic
(ie)traffic within the wireless part, that is, it originated and terminated
within the wireless part without passing through the gateway nodes
- It is necessary to have a dedicated, secure, and lightweight
pricing/billing infrastructure installed at every node.
Provisioning of security
-To avoid potential hackers, who snoop the information sent in air,
security mechanisms should be used.
-Security is a prime factor to perform e-commerce transactions
19. QoS support
- With the widespread use of voice over IP (VoIP) and growing multimedia
applications over the Internet, provisioning of QoS support in the ad hoc
wireless Internet becomes a very important issue.
Service, address, and location discovery
- Service discovery in any network refers to the activity of discovering or
identifying the party which provides a particular service or resource.
- Address discovery refers to the services such as those provided by address
resolution protocol (ARP) or domain name service (DNS) operating
within the wireless domain.
20. - Location discovery refers to different activities such as detecting the
location of a particular mobile node in the network or detecting the
geographical location of nodes
-LD can provide enhanced services such as routing of packets, location-
based services, and selective region-wide broadcasts.
21. The major challenges that a routing protocol designed for ad hoc
wireless networks faces are as follows
Mobility
- The network topology in an ad hoc wireless network is highly dynamic
due to the movement of nodes, hence an on-going session suffers
frequent path breaks.
- Routing protocols for ad hoc wireless networks must be able to perform
efficient and effective mobility management.
Bandwidth constraint
- In a wireless network, the radio band is limited, and hence the data
rates it can offer are much less than what a wired network can offer.
- This requires that the routing protocols use the bandwidth optimally by
keeping the overhead as low as possible
22. Error-Prone Shared Broadcast Radio Channel
- The wireless links have time-varying characteristics in terms of link
capacity and link-error probability.
- This requires that the ad hoc wireless network routing protocol
interacts with the MAC layer to find alternate routes through better-
quality links.
Hidden and Exposed Terminal Problems
- The hidden terminal problem refers to the collision of packets at a
receiving node due to the simultaneous transmission of those nodes
that are not within the direct transmission range of the sender, but are
within the transmission range of the receiver.
- Collision occurs when both nodes transmit packets at the same time
without knowing about the transmission of each other.
23. - The exposed terminal problem refers to the inability of a node which is
blocked due to transmission by a nearby transmitting node to transmit
to another node.
Resource Constraints
- Two essential and limited resources that form the major constraint for
the nodes in an ad hoc wireless network are battery life and processing
power.
- Devices used in ad hoc wireless networks in most cases require
portability, and hence they also have size and weight constraints along
with the restrictions on the power source.
24. Characteristics of an Ideal Routing Protocol for Ad Hoc
Wireless Networks
-A routing protocol for ad hoc wireless networks should have the
following characteristics:
1.Fully distributed routing, no centralized routing
2.Must adapt to frequent topology changes
3. Minimum connection set up time is desired
4. Local maintenance
5. Minimum packet collision
6. Convergence must be quick
7. Must be loop-free and free from stale routes
8. It must optimally use scarce resources such as bandwidth, computing
power, memory, and battery power.
9. It must cover all the optimal routes in the network topology
10. It should provide good QoS.