IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
This paper is based on Wavelength Division Multiplexing (WDM) optical networking. In this optical networking, prior to data transfer, lightpath establishment between source and
destination nodes is usually carried out through a wavelength reservation protocol. This wavelength is reserved corresponding to a route between the source and destination and the
route is chosen following any standard routing protocol based on shortest path. The backward reservation protocol is implemented initially. A fixed connected and weighted network is
considered. The inputs of this implementation are the fixed network itself and its corresponding shortest path matrix. After this initial level of implementation, the average node usage over a time period is calculated and various thresholds for node usage are considered. Above threshold value, request arriving at that path selects its next shortest path. This concept is
implemented on various wavelengths. The output represents the performance issues of dynamic congestion control.
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Eswar Publications
Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications.Ad-hoc
network consists of self-actuated node that collaborates in order to transfer the information.Trajectory-based Statistical
Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order to satisfy probability of
packet delivery over multi-hopbut failed provide higher throughput on the multipath data delivery. TheVoid Aware Pressure Routing (VAPR) method used hop count and intensity information to build a directional data delivery system but
performance of specialized geographic routing based multipath data delivery was not attained. To maintain the higher
throughput level on ad-hoc network data delivery, Median Multicast Throughput Data Delivery (MMTDD) mechanism is
proposed in thispaper.The basic idea of MMTDD mechanism is to divide a message into multiple shares and deliver them via
multiple independent source paths to the destination. MMTDD mechanism with the average time standard takes the best
threshold value for every data (i.e.,) packet partitioning by avoiding packet loss. By this means, MMTDD mechanism uses
the Average Time Standard (ATS) to guarantee the required packet allocationwith higher throughput level. With the application of ATS, the MMTDD mechanism derives the theoretical model by attainingapproximately 4% higher throughput level on the multipath data delivery in ad-hoc network. MMTDD mechanism makes use of time scheduling
schemes to discover and maintain data delivery paths with minimal time consumption.Median Multicast in MMTDD
mechanism used the balanced state flow model to deliver data on multiple paths and experiment is conducted on factors such
as time consumption, data delivery rate,average delivery delay and throughput level.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
This paper is based on Wavelength Division Multiplexing (WDM) optical networking. In this optical networking, prior to data transfer, lightpath establishment between source and
destination nodes is usually carried out through a wavelength reservation protocol. This wavelength is reserved corresponding to a route between the source and destination and the
route is chosen following any standard routing protocol based on shortest path. The backward reservation protocol is implemented initially. A fixed connected and weighted network is
considered. The inputs of this implementation are the fixed network itself and its corresponding shortest path matrix. After this initial level of implementation, the average node usage over a time period is calculated and various thresholds for node usage are considered. Above threshold value, request arriving at that path selects its next shortest path. This concept is
implemented on various wavelengths. The output represents the performance issues of dynamic congestion control.
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Eswar Publications
Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications.Ad-hoc
network consists of self-actuated node that collaborates in order to transfer the information.Trajectory-based Statistical
Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order to satisfy probability of
packet delivery over multi-hopbut failed provide higher throughput on the multipath data delivery. TheVoid Aware Pressure Routing (VAPR) method used hop count and intensity information to build a directional data delivery system but
performance of specialized geographic routing based multipath data delivery was not attained. To maintain the higher
throughput level on ad-hoc network data delivery, Median Multicast Throughput Data Delivery (MMTDD) mechanism is
proposed in thispaper.The basic idea of MMTDD mechanism is to divide a message into multiple shares and deliver them via
multiple independent source paths to the destination. MMTDD mechanism with the average time standard takes the best
threshold value for every data (i.e.,) packet partitioning by avoiding packet loss. By this means, MMTDD mechanism uses
the Average Time Standard (ATS) to guarantee the required packet allocationwith higher throughput level. With the application of ATS, the MMTDD mechanism derives the theoretical model by attainingapproximately 4% higher throughput level on the multipath data delivery in ad-hoc network. MMTDD mechanism makes use of time scheduling
schemes to discover and maintain data delivery paths with minimal time consumption.Median Multicast in MMTDD
mechanism used the balanced state flow model to deliver data on multiple paths and experiment is conducted on factors such
as time consumption, data delivery rate,average delivery delay and throughput level.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY CO...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COG...ijmnct
A secondary cooperative overlay dynamic spectrum access protocol in cognitive radio networks is proposed, allowing secondary users to access the primary system using full power without causing harmful
interference to primary users. Moreover, an enhancement in the primary system will be achieved as a result of secondary relaying of primary messages. A detailed description of the protocol is given and illustrated with network scenarios.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
Quality of Service (QoS) provisioning in networks requires proper scheduling algorithm. Internet traffic,
especially real-time multimedia applications, is bursty in nature . Hence, in addition to the service rate
which is commonly used to isolate service of sessions, other parameters should be involved. In this paper
a scheduling algorithm is proposed that attempts to provide a balance between bursty and non-bursty
(smooth) traffic. We improve thewell-known packet scheduling algorithm, SCFQ.Our proposed algorithm
is proficient to compensate an adjustable amount of missed service to each session. The average delay of
the proposed algorithm is evaluated by simulation. An important advantage of our algorithm is that
byselecting correct parameter setting for each session, the average delay of a bursty session can be
reduced. Furthermore, compared to SCFQ our proposed algorithm does not necessitate any additional
computation.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
One of Machine Type Communication (MTC) applications is Wireless Sensor Network
(WSN). WSN is an intelligent network application system to collect, integrate, and transmit data
autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium
and collaborate to accomplish a common task, such as enviroment monitoring, military
surveillance and industrial process control. The constraining aspect of WSN usage is the
limited power of each sensor node, so energy efficiency becomes an important issue in WSN.
Routing is a function in WSN, which consumes a substantial amount of energy. One of the
routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive
Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace
Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then
WSN over HAP using the LEACH routing protocol evaluated its performance. Performance
indicators that we evaluated are engergy consumption, number of dead nodes and total average
packets which is sent to HAP. From a series of simulations conducted, the results obtained that
the higher the laying of HAP, then the coverage area will be greater. So that the energy
consumption will be smaller, the number of dead node less and the avarage of total packet
delivered to the HAP will be greater.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...IJCNCJournal
Optical burst switching (OBS) is being considered as an optical transmission technology that meets the increasing bandwidth demands and requirements of quality of service (QoS) of the next generation alloptical Internet. Due to technological limitations such as optical buffers are not yet available at core nodes, ensuring QoS in OBS networks is difficult to perform flexibly compared to electronic networks (e.g. IP network). In this paper, a combination of the prediction based on burst traffic and fibre delay links (FDL) is proposed to allocate wavelengths properly, ensuring QoS and improving the network performance. Efficiency evaluations based on mathematical analysis and simulation will confirm the advantages of our proposed model.
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
This paper presents an optimal bandwidth allocation method for a networked control system (NCS) which includes time-driven sensor, event-driven controller and random channels. A hidden markov model (HMM) with a discretized state space is formulated for the random traffic to predict the network states using a suitable data window. Network bandwidth is allocated based on the predicted traffic state subject to bounds on the deterministic traffic that guarantee acceptable NCS performance and do not exceed hardware limitations. Bandwidth allocation uses minimization of unmet bandwidth demand. A stability condition is derived for a variable but bounded sampling period interval. Computer simulation results show the effect of varying the number of discrete states for the HMM and the window width on bandwidth allocation. The results compare favorably with a published approach based on fuzzy logic.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium
Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe
CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We
implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly
focused on the classification of MAC protocols according to the techniques being used or problem dealt
with and presented a theoretical evaluation of protocols. This paper presents the comparative study of
CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and
supports the arguments with the simulation results. The comparative study can be used to find the best
suited MAC protocol for wireless sensor networks in different environments.
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
IEEE 802.11n mainly aims to provide high throughput, reliability and good security over its other previous
standards. The performance of 802.11n is very effective on the saturated traffic through the use of frame
aggregation. But this frame aggregation will not effectively function in all scenarios. The main objective of
this paper is to improve the throughput of the wireless LAN through effective frame aggregation using
scheduler mechanism. The Bi-Scheduler algorithm proposed in this article aims to segregate frames based
on their access categories. The outer scheduler separates delay sensitive applications from the incoming
burst of multi-part data and also decides whether to apply Aggregated - MAC Service Data Unit (AMSDU)
aggregation technique or to send the data without any aggregation. The inner scheduler schedules
the remaining (delay-insensitive, background and best-effort) packets using Aggregated-MAC Protocol
Data unit (A-MPDU) aggregation technique.
Quality of Service (QoS) provisioning in networks requires proper scheduling algorithm. Internet traffic,
especially real-time multimedia applications, is bursty in nature . Hence, in addition to the service rate
which is commonly used to isolate service of sessions, other parameters should be involved. In this paper
a scheduling algorithm is proposed that attempts to provide a balance between bursty and non-bursty
(smooth) traffic. We improve thewell-known packet scheduling algorithm, SCFQ.Our proposed algorithm
is proficient to compensate an adjustable amount of missed service to each session. The average delay of
the proposed algorithm is evaluated by simulation. An important advantage of our algorithm is that
byselecting correct parameter setting for each session, the average delay of a bursty session can be
reduced. Furthermore, compared to SCFQ our proposed algorithm does not necessitate any additional
computation.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
One of Machine Type Communication (MTC) applications is Wireless Sensor Network
(WSN). WSN is an intelligent network application system to collect, integrate, and transmit data
autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium
and collaborate to accomplish a common task, such as enviroment monitoring, military
surveillance and industrial process control. The constraining aspect of WSN usage is the
limited power of each sensor node, so energy efficiency becomes an important issue in WSN.
Routing is a function in WSN, which consumes a substantial amount of energy. One of the
routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive
Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace
Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then
WSN over HAP using the LEACH routing protocol evaluated its performance. Performance
indicators that we evaluated are engergy consumption, number of dead nodes and total average
packets which is sent to HAP. From a series of simulations conducted, the results obtained that
the higher the laying of HAP, then the coverage area will be greater. So that the energy
consumption will be smaller, the number of dead node less and the avarage of total packet
delivered to the HAP will be greater.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...IJCNCJournal
Optical burst switching (OBS) is being considered as an optical transmission technology that meets the increasing bandwidth demands and requirements of quality of service (QoS) of the next generation alloptical Internet. Due to technological limitations such as optical buffers are not yet available at core nodes, ensuring QoS in OBS networks is difficult to perform flexibly compared to electronic networks (e.g. IP network). In this paper, a combination of the prediction based on burst traffic and fibre delay links (FDL) is proposed to allocate wavelengths properly, ensuring QoS and improving the network performance. Efficiency evaluations based on mathematical analysis and simulation will confirm the advantages of our proposed model.
Optimal resource allocation in networked control systems using viterbi algorithmjournalBEEI
This paper presents an optimal bandwidth allocation method for a networked control system (NCS) which includes time-driven sensor, event-driven controller and random channels. A hidden markov model (HMM) with a discretized state space is formulated for the random traffic to predict the network states using a suitable data window. Network bandwidth is allocated based on the predicted traffic state subject to bounds on the deterministic traffic that guarantee acceptable NCS performance and do not exceed hardware limitations. Bandwidth allocation uses minimization of unmet bandwidth demand. A stability condition is derived for a variable but bounded sampling period interval. Computer simulation results show the effect of varying the number of discrete states for the HMM and the window width on bandwidth allocation. The results compare favorably with a published approach based on fuzzy logic.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium
Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe
CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We
implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly
focused on the classification of MAC protocols according to the techniques being used or problem dealt
with and presented a theoretical evaluation of protocols. This paper presents the comparative study of
CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and
supports the arguments with the simulation results. The comparative study can be used to find the best
suited MAC protocol for wireless sensor networks in different environments.
A bi scheduler algorithm for frame aggregation in ieee 802.11 nijwmn
IEEE 802.11n mainly aims to provide high throughput, reliability and good security over its other previous
standards. The performance of 802.11n is very effective on the saturated traffic through the use of frame
aggregation. But this frame aggregation will not effectively function in all scenarios. The main objective of
this paper is to improve the throughput of the wireless LAN through effective frame aggregation using
scheduler mechanism. The Bi-Scheduler algorithm proposed in this article aims to segregate frames based
on their access categories. The outer scheduler separates delay sensitive applications from the incoming
burst of multi-part data and also decides whether to apply Aggregated - MAC Service Data Unit (AMSDU)
aggregation technique or to send the data without any aggregation. The inner scheduler schedules
the remaining (delay-insensitive, background and best-effort) packets using Aggregated-MAC Protocol
Data unit (A-MPDU) aggregation technique.
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices
across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has
been granted and this QoS feature and there are no implementations of such feature in real networks. In
this paper,we evaluate the capacity to provide QoS of these priority bits in various scenarios. We show that
under very heavy or very low network load, these bits have a limited effect on the delay
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
The bursting aggregation assembly in edge nodes is one of the key technologies in OBS (Optical Burst Switching) network, which has a direct impact on flow characteristics and packet loss rate. An optical burst assembly technique supporting QoS is presented through this paper, which can automatically adjust the threshold along with the increasing and decreasing volume of business, reduce the operational burst, and generate corresponding BDP (Burst Data Packet) and BCP (Burst Control Packet). In addition to the burst aggregation technique a packet recovery technique by restoration method is also described. The data packet loss due to the physical optical link failure is not currently included in the QoS descriptions. This link failure is also a severe problem which reduces the data throughput of the transmitter node. A mechanism for data recovery from this link failure is vital for guaranteeing the QoS demanded by each user. So this paper will also discusses a specific protocol for reducing the packet loss by utilizing the
features of both optical circuit switching (OCS) and Optical Burst switching (OBS) techniques
Medium Access Control with Scheduled Group Contention for Massive M2M Devices csandit
In a dense Machine-to-Machine (M2M) network, a large number of stations contend to achieve
transmission opportunity and it creates a critical congestion problem. To solve this issue, a
group-based contention Medium Access Control (MAC) protocol is introduced. Stations are
divided into small numbers of groups and only one station in each group will contend as a
group leader to achieve the reserved time interval dedicated to a winner group. It can reduce
the contention overhead and lessen the congestion problem. In this paper, we propose
Scheduled Group Contention MAC (SGCMAC) protocol to enhance the group-based contention
MAC. The proposed SGCMAC protocol divides groups based on the traffic categories of
stations and schedules the contention groups to reduce the contention overhead. We also
propose an efficient resource management mechanism in the group grant time to prevent the
waste of time caused by idle stations. Simulations with IEEE 802.11ah parameters demonstrate
that our proposed SGCMAC has performance gains over other group-based contention MAC
protocols.
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICEScscpconf
In a dense Machine-to-Machine (M2M) network, a large number of stations contend to achieve transmission opportunity and it creates a critical congestion problem. To solve this issue, a group-based contention Medium Access Control (MAC) protocol is introduced. Stations are divided into small numbers of groups and only one station in each group will contend as a group leader to achieve the reserved time interval dedicated to a winner group. It can reduce the contention overhead and lessen the congestion problem. In this paper, we propose Scheduled Group Contention MAC (SGCMAC) protocol to enhance the group-based contention MAC. The proposed SGCMAC protocol divides groups based on the traffic categories of stations and schedules the contention groups to reduce the contention overhead. We also propose an efficient resource management mechanism in the group grant time to prevent the waste of time caused by idle stations. Simulations with IEEE 802.11ah parameters demonstrate that our proposed SGCMAC has performance gains over other group-based contention MAC protocols.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users; this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, we presenedt a simulation study to measure the performance of several scheduling algorithms in WiMAX, which were Strict Priority algorithm, Round-Robin (RR), Weighted Round Robin (WRR), Weighted Fair Queuing (WFQ), Self-Clocked Fair (SCF), and Diff-Serv Algorithm.
Similar to Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 04-09
www.iosrjournals.org
DOI: 10.9790/2834-10630409 www.iosrjournals.org 4 | Page
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
Dr. Sonal J. Rane
Department of Electrical & ElectronicsEngg., ITM Vocational University, Vadodara, Gujarat, India
Abstract: IEEE 802.15.4 Standard is used for low rate, low power consumption and low cost wireless sensor
network applications. This standard has an attractive feature for real time application by providing Guaranteed
Time Slot (GTS) Mechanism. By applying this mechanism, this standard gives real time guaranty to deliver the
time critical data. The GTS is started in the Beacon-enabled mode based on the superframe structure which is
defined by PAN-Coordinator. A node has to use at least one whole GTS in a transmission. However, it is not
necessary that each node fully utilise its transmission capacity in a particular time slot if the packet arrival rate
is too small. Hence, bandwidth utilisation is reduced. This paper explores the underutilization of bandwidth in
WSN,the performance optimization of the GTS Mechanismand analyzes GTS mechanism by evaluating
throughput using conventional method and proposed adaptive method (Adaptive Neuro Fuzzy Inference System
(ANFIS)-soft computing technique) in OPNET Modeler.
Keywords: Wireless sensor network (WSN), OPNET, Adaptive Neuro Fuzzy Inference System, IEEE 802.15.4,
GTS, GTS Throughput, Packet Medium Access Delay, Wasted Bandwidth.
I. Introduction
IEEE 802.15.4 standard defines the protocol connection orientation of a personal area network (PAN).
The standard uses carrier sense multiple access with a collision avoidance medium access (CSMA/CA)
mechanism and supports varieties of topologies for the network viz. star as well as peer-to-peer topologies. The
IEEE 802.15.4 [1] Medium Access Control (MAC) protocol supports beacon enabled and non beacon mode. In
the beacon enabled mode beacon frames are sent by coordinator periodically for synchronization of sensor nodes.
The advantage of beacon enabled mode is that all nodes can wake up and sleep at the same time allowing very
low duty cycles and hence save energy. Using the optional superframe structure, time slots can be allocated by
the PAN coordinator to devices with time critical data, known as Guaranteed Time Slots (GTS) to fulfill Quality
of Service requirements [2]. The primary goal of GTS allocation is providingcommunication services to time
critical data, i.e., make certain guarantees on eventual delivery and delivery times of packets to be transmitted by
local devices to the network coordinator. In this paper mainly focus is on uplink scenario, which is more relevant
for WSNs applications. Adaptive Neuro-Fuzzy Inference System (ANFIS) is used here to decide the number of
packets to be transmitted for optimization of throughput of GTS mechanism based on Packet Interarrival time and
Data rate.
The remainder of this article is organized as follows. Section II and section III give a brief overview of
the IEEE 802.15.4 protocol, its MAC layer specifications and Superframe Structure. In section IV, Soft GTS
mechanism is organized. Simulation results are discussed in section V. Finally it is concluded in conclusion.
II. Ieee 802.15.4 Mac Layer
IEEE 802.15.4 MAC layer protocol [3] can work in two modes viz. non beacon enabled and beacon
enabled mode. The non beacon enabled mode is same as non slotted CSMA/CA which provides scalability and
self organization to the network while beacon enabled mode uses the superframe structure which defines a time
interval during the frames are exchanged between PAN coordinator and associated nodes for the synchronization
purpose. Beacon enabled mode works as a slotted CSMA/CA and it enables the allocation of time slots in
superframe which is known as Guaranteed Time Slots (GTSs) for the nodes which guaranteed the data frames.
Each superframe is divided into Contention Access Period (CAP), where nodes contend among each
other to send packets, and a Contention Free Period (CFP), where nodes have GTSs to send packets without
contention and thus with guaranteed transmission. The Beacon Order (BO) and Superframe Order (SO) decide
the length of the superframe structure and its active period.
Real-time guarantees can be achieved by using the GTS mechanism [4, 5] in beacon-enabled mode.
The node allocates GTS with a minimum service guarantee, enabling the prediction of the worst-case timing
performance of the network. Power-efficiency can be achieved by operating at low duty cycles (down to 0.1%)
as power efficiency and timeliness guarantees are often two opposite requirements in wireless sensor networks.
Analysis of GTS mechanism is evaluated for GTS throughput using OPNET Modeller [6], which can
be achieved due to the packet size based on data rate and Interarrival time.
2. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 5 | Page
III. Superframe Structure
When the PAN Coordinator selects the beacon-enabled mode [7], it forces the use of a Superframe
structure which is shown in Figure 1 to manage communication between the devices that are associated to that
PAN. The format of the superframe is defined by the PAN Coordinator. The superframe, corresponding to the
Beacon Interval (BI), is defined by the time between two consecutive beacons, and includes an active period
and, optionally, a following inactive period. The active period, corresponding to the Superframe Duration (SD),
is divided into 16 equally sized time slots, during which data transmission is allowed. Each active period can be
further divided into a Contention Access Period (CAP) and an optional Contention Free Period (CFP). Slotted
CSMA/CA is used within the CAP. The CFP is activated by the request sent from a device to the PAN
Coordinator. Upon receiving this request, the PAN Coordinator checks whether there are sufficient resources
and, if possible, allocates the requested time slots. This requested group of time slots is called Guaranteed Time
Slot (GTS) and is dedicated exclusively to a given device. A CFP support up to 7 GTSs and each GTS may
contain multiple time slots. The allocation of the GTS cannot reduce the lengthof the CAP to less than the value
specified by aMinCAPLength constant.
Figure 1:The IEEE 802.15.4 Super frame structure [6]
The structure of the superframe is defined by two parameters, the Beacon Order (BO) and the
Superframe Order (SO), which determine the length of the superframe and its active period. The setting of BO
and SO must satisfy the relationship 0 ≤ SO ≤ BO ≤ 14. The length of the superframe (BI) and the length of its
active period (SD) are defined as follows:
BI = aBaseSuperframeDuration x 2BO
,
SD = aBaseSuperframeDuration x 2SO
.
The aBaseSuperframeDuration constant denotes the minimum length of the superframe when BO is
equal to 0. The IEEE 802.15.4 standard fixes this duration to 960 symbols. If SO = BO then SD = BI and the
superframe is always active. According to the standard, if SO = 15, the Superframe will not be active following
the beacon. If BO = 15, then the superframe shall not exist and the network will operate in the non beacon-
enabled mode. In this case, the value of SO is ignored. As a result, a PAN that wishes to use the superframe
structure must set Beacon Order to a value between 0 and 14 and Superframe Order to a value between 0 and the
value of Beacon Order. Each independent PAN selects a unique identifier. This PAN identifier (PAN ID) allows
communication between devices within a network using short addresses and enables transmissions between
devices across independent networks. Thus, all networks can operate independently from all others currently in
operation.
The PAN Coordinator may accept or reject the GTS allocation request from the End Device according
to the value of the user defined attribute GTS Permit [8]. The End Device can specify the time when the GTS
allocation and deallocation requests are sentto the PAN Coordinator (Start Time and Stop Time attributes). This
allocation request also includes the number of required time slots (GTS Length attribute) and their direction,
transmit or receive (GTS Direction attribute).
The GTS mechanism packet flow structure is shown in Figure 2. When the requested GTS is assigned
to a given device, its application layer starts generating data blocks that correspond to the MAC frame payload
(i.e. MAC Service Data Unit (MSDU)). The size of the frame payload is specified by the probability distribution
function of the MSDU Size attribute.
3. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 6 | Page
Figure 2: Packet flow structure in GTS enabled mode [8]
The probability distribution function, specified in the MSDU Interarrival Time attribute, defines the
inter-arrival time between two consecutive frame payloads. Then, the frame payload is wrapped in the MAC
header and stored as a frame in the buffer with a given capacity (Buffer Capacity attribute). The default size of
the MAC header (MAC_HEADER_SIZE) is 104 bits, since only 16-bit short addresses are used for
communication (according to standard specification). The maximum allowed size of the overall frame (i.e.
frame payload plus the MAC header) is equal to aMaxPHYPacketSize (1016 bits). The generated frames
exceeding the buffer capacity are dropped. When the requested GTS is active, the frames are removed from the
buffer, wrapped in the PHY headers and dispatched to the network with an outgoing data rate equal to physical
data rate WPAN_DATA_RATE (250 kbps).
IV. Proposed Soft Computing Method
Soft Computing is an innovative approach to constructing computationally intelligent systems, which
tries to mimic natural creatures. In this sense soft computing is the name of a family of problem-solving methods
that have analogy with biological reasoning and problem solving and sometimes referred to as cognitive
computing. The basic methods included in cognitive computing are fuzzy logic (FL), neural networks (NN),
Artificial Neuro Fuzzy Inference System (ANFIS) and genetic algorithms (GA).
ANFIS (Adaptive Neuro-Fuzzy Inference System) is the combination of Neural Network and Fuzzy
inference System (FIS) [9,10]. In ANFIS Neural Network can be trained by FIS and having characteristic of both.
Here ANFIS is used to determine the MSDU packet size based on the data rate and MSDU Interarrival time. Here
best Packet Size is decided depending upon two inputs, given to ANFIS for optimizing the GTS throughputas
shown in Figure 3.
ANN+FIS
=ANFIS
Interarrival
Rate
Data rate
Packet
Size
Figure 3: Internal architecture of ANN with respective inputs and outputs
A packet Interarrival time and data rate input decides the best packet size output through trained
ANFIS. ANFIS(using a feed forward ANN with multi layers Perception model, with 2 nodes in the input Layer,
10 nodes in hidden layer and 1 node in the output layer) is used offline with OPNET modeler for IEEE
802.15.4GTS mechanism and evaluated the performance. Total (53x53) 2809 pairs are used to minimize the error
between trained output and desired output as shown in Figure 4.
4. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 7 | Page
Figure 4: ANFIS training
ANFIS architecture was trained with Number of nodes are 131 with training data pairs of 2809 using 49
fuzzy rules.
V. Simulation Setup & Results
The Simulation Setup consists of one PAN Coordinator and one associated devices (GTS enabled)
within it coverage. There is no medium access contention so devices would not have any influence on the
simulation results due to that two devices are enough to evaluate the performance of GTS mechanism. For the
sake of simplicity, and without loss of generality, it is assume that only one time slot of GTS is occupied by any
node and the duty cycle of a superframe is 100% (SO = BO).
Figure 5: Wireless Sensor Network for GTS Mechanism
Figure 5 shows the simulation setup of the Conventional GTS Mechanism. For the evaluation of the
GTS throughput, GTS is set to 1 time slot and acknowledgement traffic is disabled. The buffer capacity is 4kbits
for simulation and simulation time is 5 sec. The simulation was carried out by varying packet size and keeping
packet Interarrival time constant (0.001824 sec). The distance between the two nodes is 25meters.
INTERARRIVAL
TIME
PACKET SIZE
DATA
RATE
ANFIS FROM
MATLAB
IEEE 802.15.4
WSN for GTS
MECHANISM
GTS
THROUGHPUT
EVALUATION
Figure 6: System Setup for ANFIS based GTS Mechanism
5. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 8 | Page
The system setup for evaluation of performance of GTS mechanism for WSN using ANFIS in OPNET
and MATLAB [11-14] is shown in Figure 6.
The impact of data Rate, Packet Size , Packet Interarrival Time, Buffer Size is evaluated on GTS
throughput using conventional and soft computing method for different values of SO (=BO). The intense of this
section is to optimize the GTS throughput during one time slot of GTS when inter arrival time is set to
0.001824sec and for different values of the SO. Since the frames are transmitted without acknowledgements, the
underutilized bandwidth can only result from IFS or from intermittent data arrival at the buffer.
Figure 7: GTS Throughput v/s Superframe Order
Figure 7 describes the GTS throughput for conventional GTS mechanism and Proposed Soft GTS
mechanism for packet size of 50 bits. In these graphs, the GTS Throughput has reached its saturation throughput
when the curve reaches its maximum peak value and plateaus. Throughput gradually decreases after reaching
certain SO. The higher the SO, the larger the SD is. This creates unproductive service in time slot window
duration with the corresponding buffer size and packet generation. This can be observed for SO beyond 7.
High values of SO values are not suitable for WSN application because as the SO value is high, SD
also will be higher. This will provide more time duration to transmit the data but simultaneously delay will
increase and throughput will decrease.
Figure 8: Packet Medium Access Delay (PMAD) v/s Superframe Order
Figure 8 plots the packet medium access delay (sec). When SO increases, 0.001824 s inter-arrival time
records a bigger range of Packet Medium Access Delay (PMAD). This indicates the significant relationship of
inter-arrival time, packet size and buffer size. As shown in Figure 8 initially PMAD is somewhat stable and
then starts to decrease slightly. The point at which the PMAD decreases slightly indicates that the PMAD
contribution originates from the long SD produced by the SO. The PMAD measurement is similar for the same
SO regardless of the buffer size until it reaches that slightly decreased point. Also for higher SO values, all
frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of
SO, delay will increase.
For SO values higher or equal to 5, all frames stored in the buffer and transmitted during one GTS and
the delay grows with SO. For higher values of SO, delay will increase.
6. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 9 | Page
Figure 9: Wasted Bandwidth v/s Superframe Order
From Figure 9, it is observed that wasted bandwidth is less in proposed method compare to
conventional method. A device with a low arrival rate that has been allocated one time slot of GTS, may use it
only partially. This leads to underutilization of the GTS band width resources. Due to the prefixed time slot
duration in a superframe, it is practically impossible to balance the arrival rate of a device and its guaranteed
GTS bandwidth. The amount of wasted bandwidth increases with the variance between the guaranteed
bandwidth and the arrival rate. However, wasted bandwidth decreases in proposed adaptive method by applying
ANFIS soft computing technique.
VI. Conclusion
In this paper, GTS Mechanism in the IEEE 802.15.4 Standard is evaluated in beacon enabled mode,
widely used in WSN application. The evaluation was performed using IEEE 802.15.4 OPNET simulation model
and soft computing technique (ANFIS). Higher SO values i.e., greater than 7 are not supported by WSN
application. Selection of SO must be done carefully to ensure that the GTS in a superframe can accommodate at
least one packet size. The GTS throughput is increased and Packet Medium Access Delay, Wasted bandwidth
are decreased for the proposed Adaptive GTS mechanism (ANFIS) for different values of packet size and SO
values. The evaluation results that were obtained provide excellent statistics to pursue our future work. The
performance of GTS mechanism can be more improved by applying fuzzy as well as genetic algorithm.
Acknowledgment
Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda for
technical help in doing this work.
References:
[1]. IEEE Std 802.15.4-2996, September, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE, 2006. [Online]. Available:
http://www.ieee802.org/15
[2]. Holger Karl and Andreas Willig, “Protocolsand Architectures for Wireless Sensor Networks.” John Wiley & Sons, Ltd. ISBN: 0-
470-09510-5.
[3]. Anis Koubâa, Mário Alves, Eduardo Tovar, “IEEE 802.15.4 for Wireless Sensor Networks: A Technical
Overview”.www.hurray.isep.ipp.pt. Technical Report.
[4]. Pangun Park, Carlo Fischione, Karl Henrik Johansson, “Performance analysis of GTS allocation in Beacon Enabled IEEE
802.15.4”, Proceeding SECON‟09 Proceedings of th 6th Annaul IEEE communications society conference on Sensor,Mesh and Ad
Hoc communications and Networks Pages 431-439.
[5]. Anis Koubâa, Mário Alves, Eduardo Tovar,André Cunha, “An implicit GTS allocation mechanism in IEEE 802.15.4 for time-
sensitive wireless sensor networks: theory and practice”, Real-Time Syst (2008) 39: 169–204, DOI 10.1007/s11241-007-9038-x.
[6]. OPNET Technologies, Inc., Opnet Modeler Wireless Suite –ver. 11.5A, http:// www.opnet.com.
[7]. Per P. Jurcık and A.Koubaa, The IEEE 802.15.4 OPNET Simulation Model: Reference Guide v2.0. Technical Report HURRAY-
TR-070509, CISTER-ISEP research unit, Porto, Portugal, May 2007. (http://www.open-zb.net).
[8]. M.N. Hassan and Robert Stewart, “Analysis of buffer size dimensioning in GTS enabled IEEE 802.15.4 WSN for real-time
applications”, Int. J. Mobile Network Design and Innovation, Vol. 3, No. 4, 2011.
[9]. Jurcik, P., Koubaa, A., Alves, M., Tovar, E. and Hanzalek, Z. (2007) „A simulation model for the IEEE 802.15.4 : delay/throughput
evaluation of the GTS mechanism‟, in 15th IEEE International Symposium on Modelling, Analysis, and Simulation of Computer
and Telecommunication Systems(MASCOTS 2007), October, pp.109–116, Istanbul, Turkey.
[10]. Brown M., Harris C.J., “Neuro fuzzy adaptive modeling and control”, Prentice Hall, 1994.
[11]. Haykin, S. Neural Networks: A Comprehensive Foundation; Macmillian College Publishing: New York, NY, USA, 1994.
[12]. Using Neural Network: User Guide, theMathworks Inc.
[13]. Website: WWW.MATHWORKS.COM The Mathworks In.
[14]. Ms. Sonal J. Rane, Prof. Satish K. Shah, Ms. Dharmistha D Vishwakarma,” Soft Computing Technique Based Throughput
Optimization of GTS mechanism for IEEE 802.15.4 Standard” in International Journal of Soft Computing and Software
Engineering [JSCSE], Vol. 3, No. 3, 2013.