SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 04-09
www.iosrjournals.org
DOI: 10.9790/2834-10630409 www.iosrjournals.org 4 | Page
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
Dr. Sonal J. Rane
Department of Electrical & ElectronicsEngg., ITM Vocational University, Vadodara, Gujarat, India
Abstract: IEEE 802.15.4 Standard is used for low rate, low power consumption and low cost wireless sensor
network applications. This standard has an attractive feature for real time application by providing Guaranteed
Time Slot (GTS) Mechanism. By applying this mechanism, this standard gives real time guaranty to deliver the
time critical data. The GTS is started in the Beacon-enabled mode based on the superframe structure which is
defined by PAN-Coordinator. A node has to use at least one whole GTS in a transmission. However, it is not
necessary that each node fully utilise its transmission capacity in a particular time slot if the packet arrival rate
is too small. Hence, bandwidth utilisation is reduced. This paper explores the underutilization of bandwidth in
WSN,the performance optimization of the GTS Mechanismand analyzes GTS mechanism by evaluating
throughput using conventional method and proposed adaptive method (Adaptive Neuro Fuzzy Inference System
(ANFIS)-soft computing technique) in OPNET Modeler.
Keywords: Wireless sensor network (WSN), OPNET, Adaptive Neuro Fuzzy Inference System, IEEE 802.15.4,
GTS, GTS Throughput, Packet Medium Access Delay, Wasted Bandwidth.
I. Introduction
IEEE 802.15.4 standard defines the protocol connection orientation of a personal area network (PAN).
The standard uses carrier sense multiple access with a collision avoidance medium access (CSMA/CA)
mechanism and supports varieties of topologies for the network viz. star as well as peer-to-peer topologies. The
IEEE 802.15.4 [1] Medium Access Control (MAC) protocol supports beacon enabled and non beacon mode. In
the beacon enabled mode beacon frames are sent by coordinator periodically for synchronization of sensor nodes.
The advantage of beacon enabled mode is that all nodes can wake up and sleep at the same time allowing very
low duty cycles and hence save energy. Using the optional superframe structure, time slots can be allocated by
the PAN coordinator to devices with time critical data, known as Guaranteed Time Slots (GTS) to fulfill Quality
of Service requirements [2]. The primary goal of GTS allocation is providingcommunication services to time
critical data, i.e., make certain guarantees on eventual delivery and delivery times of packets to be transmitted by
local devices to the network coordinator. In this paper mainly focus is on uplink scenario, which is more relevant
for WSNs applications. Adaptive Neuro-Fuzzy Inference System (ANFIS) is used here to decide the number of
packets to be transmitted for optimization of throughput of GTS mechanism based on Packet Interarrival time and
Data rate.
The remainder of this article is organized as follows. Section II and section III give a brief overview of
the IEEE 802.15.4 protocol, its MAC layer specifications and Superframe Structure. In section IV, Soft GTS
mechanism is organized. Simulation results are discussed in section V. Finally it is concluded in conclusion.
II. Ieee 802.15.4 Mac Layer
IEEE 802.15.4 MAC layer protocol [3] can work in two modes viz. non beacon enabled and beacon
enabled mode. The non beacon enabled mode is same as non slotted CSMA/CA which provides scalability and
self organization to the network while beacon enabled mode uses the superframe structure which defines a time
interval during the frames are exchanged between PAN coordinator and associated nodes for the synchronization
purpose. Beacon enabled mode works as a slotted CSMA/CA and it enables the allocation of time slots in
superframe which is known as Guaranteed Time Slots (GTSs) for the nodes which guaranteed the data frames.
Each superframe is divided into Contention Access Period (CAP), where nodes contend among each
other to send packets, and a Contention Free Period (CFP), where nodes have GTSs to send packets without
contention and thus with guaranteed transmission. The Beacon Order (BO) and Superframe Order (SO) decide
the length of the superframe structure and its active period.
Real-time guarantees can be achieved by using the GTS mechanism [4, 5] in beacon-enabled mode.
The node allocates GTS with a minimum service guarantee, enabling the prediction of the worst-case timing
performance of the network. Power-efficiency can be achieved by operating at low duty cycles (down to 0.1%)
as power efficiency and timeliness guarantees are often two opposite requirements in wireless sensor networks.
Analysis of GTS mechanism is evaluated for GTS throughput using OPNET Modeller [6], which can
be achieved due to the packet size based on data rate and Interarrival time.
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 5 | Page
III. Superframe Structure
When the PAN Coordinator selects the beacon-enabled mode [7], it forces the use of a Superframe
structure which is shown in Figure 1 to manage communication between the devices that are associated to that
PAN. The format of the superframe is defined by the PAN Coordinator. The superframe, corresponding to the
Beacon Interval (BI), is defined by the time between two consecutive beacons, and includes an active period
and, optionally, a following inactive period. The active period, corresponding to the Superframe Duration (SD),
is divided into 16 equally sized time slots, during which data transmission is allowed. Each active period can be
further divided into a Contention Access Period (CAP) and an optional Contention Free Period (CFP). Slotted
CSMA/CA is used within the CAP. The CFP is activated by the request sent from a device to the PAN
Coordinator. Upon receiving this request, the PAN Coordinator checks whether there are sufficient resources
and, if possible, allocates the requested time slots. This requested group of time slots is called Guaranteed Time
Slot (GTS) and is dedicated exclusively to a given device. A CFP support up to 7 GTSs and each GTS may
contain multiple time slots. The allocation of the GTS cannot reduce the lengthof the CAP to less than the value
specified by aMinCAPLength constant.
Figure 1:The IEEE 802.15.4 Super frame structure [6]
The structure of the superframe is defined by two parameters, the Beacon Order (BO) and the
Superframe Order (SO), which determine the length of the superframe and its active period. The setting of BO
and SO must satisfy the relationship 0 ≤ SO ≤ BO ≤ 14. The length of the superframe (BI) and the length of its
active period (SD) are defined as follows:
BI = aBaseSuperframeDuration x 2BO
,
SD = aBaseSuperframeDuration x 2SO
.
The aBaseSuperframeDuration constant denotes the minimum length of the superframe when BO is
equal to 0. The IEEE 802.15.4 standard fixes this duration to 960 symbols. If SO = BO then SD = BI and the
superframe is always active. According to the standard, if SO = 15, the Superframe will not be active following
the beacon. If BO = 15, then the superframe shall not exist and the network will operate in the non beacon-
enabled mode. In this case, the value of SO is ignored. As a result, a PAN that wishes to use the superframe
structure must set Beacon Order to a value between 0 and 14 and Superframe Order to a value between 0 and the
value of Beacon Order. Each independent PAN selects a unique identifier. This PAN identifier (PAN ID) allows
communication between devices within a network using short addresses and enables transmissions between
devices across independent networks. Thus, all networks can operate independently from all others currently in
operation.
The PAN Coordinator may accept or reject the GTS allocation request from the End Device according
to the value of the user defined attribute GTS Permit [8]. The End Device can specify the time when the GTS
allocation and deallocation requests are sentto the PAN Coordinator (Start Time and Stop Time attributes). This
allocation request also includes the number of required time slots (GTS Length attribute) and their direction,
transmit or receive (GTS Direction attribute).
The GTS mechanism packet flow structure is shown in Figure 2. When the requested GTS is assigned
to a given device, its application layer starts generating data blocks that correspond to the MAC frame payload
(i.e. MAC Service Data Unit (MSDU)). The size of the frame payload is specified by the probability distribution
function of the MSDU Size attribute.
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 6 | Page
Figure 2: Packet flow structure in GTS enabled mode [8]
The probability distribution function, specified in the MSDU Interarrival Time attribute, defines the
inter-arrival time between two consecutive frame payloads. Then, the frame payload is wrapped in the MAC
header and stored as a frame in the buffer with a given capacity (Buffer Capacity attribute). The default size of
the MAC header (MAC_HEADER_SIZE) is 104 bits, since only 16-bit short addresses are used for
communication (according to standard specification). The maximum allowed size of the overall frame (i.e.
frame payload plus the MAC header) is equal to aMaxPHYPacketSize (1016 bits). The generated frames
exceeding the buffer capacity are dropped. When the requested GTS is active, the frames are removed from the
buffer, wrapped in the PHY headers and dispatched to the network with an outgoing data rate equal to physical
data rate WPAN_DATA_RATE (250 kbps).
IV. Proposed Soft Computing Method
Soft Computing is an innovative approach to constructing computationally intelligent systems, which
tries to mimic natural creatures. In this sense soft computing is the name of a family of problem-solving methods
that have analogy with biological reasoning and problem solving and sometimes referred to as cognitive
computing. The basic methods included in cognitive computing are fuzzy logic (FL), neural networks (NN),
Artificial Neuro Fuzzy Inference System (ANFIS) and genetic algorithms (GA).
ANFIS (Adaptive Neuro-Fuzzy Inference System) is the combination of Neural Network and Fuzzy
inference System (FIS) [9,10]. In ANFIS Neural Network can be trained by FIS and having characteristic of both.
Here ANFIS is used to determine the MSDU packet size based on the data rate and MSDU Interarrival time. Here
best Packet Size is decided depending upon two inputs, given to ANFIS for optimizing the GTS throughputas
shown in Figure 3.
ANN+FIS
=ANFIS
Interarrival
Rate
Data rate
Packet
Size
Figure 3: Internal architecture of ANN with respective inputs and outputs
A packet Interarrival time and data rate input decides the best packet size output through trained
ANFIS. ANFIS(using a feed forward ANN with multi layers Perception model, with 2 nodes in the input Layer,
10 nodes in hidden layer and 1 node in the output layer) is used offline with OPNET modeler for IEEE
802.15.4GTS mechanism and evaluated the performance. Total (53x53) 2809 pairs are used to minimize the error
between trained output and desired output as shown in Figure 4.
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 7 | Page
Figure 4: ANFIS training
ANFIS architecture was trained with Number of nodes are 131 with training data pairs of 2809 using 49
fuzzy rules.
V. Simulation Setup & Results
The Simulation Setup consists of one PAN Coordinator and one associated devices (GTS enabled)
within it coverage. There is no medium access contention so devices would not have any influence on the
simulation results due to that two devices are enough to evaluate the performance of GTS mechanism. For the
sake of simplicity, and without loss of generality, it is assume that only one time slot of GTS is occupied by any
node and the duty cycle of a superframe is 100% (SO = BO).
Figure 5: Wireless Sensor Network for GTS Mechanism
Figure 5 shows the simulation setup of the Conventional GTS Mechanism. For the evaluation of the
GTS throughput, GTS is set to 1 time slot and acknowledgement traffic is disabled. The buffer capacity is 4kbits
for simulation and simulation time is 5 sec. The simulation was carried out by varying packet size and keeping
packet Interarrival time constant (0.001824 sec). The distance between the two nodes is 25meters.
INTERARRIVAL
TIME
PACKET SIZE
DATA
RATE
ANFIS FROM
MATLAB
IEEE 802.15.4
WSN for GTS
MECHANISM
GTS
THROUGHPUT
EVALUATION
Figure 6: System Setup for ANFIS based GTS Mechanism
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 8 | Page
The system setup for evaluation of performance of GTS mechanism for WSN using ANFIS in OPNET
and MATLAB [11-14] is shown in Figure 6.
The impact of data Rate, Packet Size , Packet Interarrival Time, Buffer Size is evaluated on GTS
throughput using conventional and soft computing method for different values of SO (=BO). The intense of this
section is to optimize the GTS throughput during one time slot of GTS when inter arrival time is set to
0.001824sec and for different values of the SO. Since the frames are transmitted without acknowledgements, the
underutilized bandwidth can only result from IFS or from intermittent data arrival at the buffer.
Figure 7: GTS Throughput v/s Superframe Order
Figure 7 describes the GTS throughput for conventional GTS mechanism and Proposed Soft GTS
mechanism for packet size of 50 bits. In these graphs, the GTS Throughput has reached its saturation throughput
when the curve reaches its maximum peak value and plateaus. Throughput gradually decreases after reaching
certain SO. The higher the SO, the larger the SD is. This creates unproductive service in time slot window
duration with the corresponding buffer size and packet generation. This can be observed for SO beyond 7.
High values of SO values are not suitable for WSN application because as the SO value is high, SD
also will be higher. This will provide more time duration to transmit the data but simultaneously delay will
increase and throughput will decrease.
Figure 8: Packet Medium Access Delay (PMAD) v/s Superframe Order
Figure 8 plots the packet medium access delay (sec). When SO increases, 0.001824 s inter-arrival time
records a bigger range of Packet Medium Access Delay (PMAD). This indicates the significant relationship of
inter-arrival time, packet size and buffer size. As shown in Figure 8 initially PMAD is somewhat stable and
then starts to decrease slightly. The point at which the PMAD decreases slightly indicates that the PMAD
contribution originates from the long SD produced by the SO. The PMAD measurement is similar for the same
SO regardless of the buffer size until it reaches that slightly decreased point. Also for higher SO values, all
frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of
SO, delay will increase.
For SO values higher or equal to 5, all frames stored in the buffer and transmitted during one GTS and
the delay grows with SO. For higher values of SO, delay will increase.
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
DOI: 10.9790/2834-10630409 www.iosrjournals.org 9 | Page
Figure 9: Wasted Bandwidth v/s Superframe Order
From Figure 9, it is observed that wasted bandwidth is less in proposed method compare to
conventional method. A device with a low arrival rate that has been allocated one time slot of GTS, may use it
only partially. This leads to underutilization of the GTS band width resources. Due to the prefixed time slot
duration in a superframe, it is practically impossible to balance the arrival rate of a device and its guaranteed
GTS bandwidth. The amount of wasted bandwidth increases with the variance between the guaranteed
bandwidth and the arrival rate. However, wasted bandwidth decreases in proposed adaptive method by applying
ANFIS soft computing technique.
VI. Conclusion
In this paper, GTS Mechanism in the IEEE 802.15.4 Standard is evaluated in beacon enabled mode,
widely used in WSN application. The evaluation was performed using IEEE 802.15.4 OPNET simulation model
and soft computing technique (ANFIS). Higher SO values i.e., greater than 7 are not supported by WSN
application. Selection of SO must be done carefully to ensure that the GTS in a superframe can accommodate at
least one packet size. The GTS throughput is increased and Packet Medium Access Delay, Wasted bandwidth
are decreased for the proposed Adaptive GTS mechanism (ANFIS) for different values of packet size and SO
values. The evaluation results that were obtained provide excellent statistics to pursue our future work. The
performance of GTS mechanism can be more improved by applying fuzzy as well as genetic algorithm.
Acknowledgment
Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda for
technical help in doing this work.
References:
[1]. IEEE Std 802.15.4-2996, September, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE, 2006. [Online]. Available:
http://www.ieee802.org/15
[2]. Holger Karl and Andreas Willig, “Protocolsand Architectures for Wireless Sensor Networks.” John Wiley & Sons, Ltd. ISBN: 0-
470-09510-5.
[3]. Anis Koubâa, Mário Alves, Eduardo Tovar, “IEEE 802.15.4 for Wireless Sensor Networks: A Technical
Overview”.www.hurray.isep.ipp.pt. Technical Report.
[4]. Pangun Park, Carlo Fischione, Karl Henrik Johansson, “Performance analysis of GTS allocation in Beacon Enabled IEEE
802.15.4”, Proceeding SECON‟09 Proceedings of th 6th Annaul IEEE communications society conference on Sensor,Mesh and Ad
Hoc communications and Networks Pages 431-439.
[5]. Anis Koubâa, Mário Alves, Eduardo Tovar,André Cunha, “An implicit GTS allocation mechanism in IEEE 802.15.4 for time-
sensitive wireless sensor networks: theory and practice”, Real-Time Syst (2008) 39: 169–204, DOI 10.1007/s11241-007-9038-x.
[6]. OPNET Technologies, Inc., Opnet Modeler Wireless Suite –ver. 11.5A, http:// www.opnet.com.
[7]. Per P. Jurcık and A.Koubaa, The IEEE 802.15.4 OPNET Simulation Model: Reference Guide v2.0. Technical Report HURRAY-
TR-070509, CISTER-ISEP research unit, Porto, Portugal, May 2007. (http://www.open-zb.net).
[8]. M.N. Hassan and Robert Stewart, “Analysis of buffer size dimensioning in GTS enabled IEEE 802.15.4 WSN for real-time
applications”, Int. J. Mobile Network Design and Innovation, Vol. 3, No. 4, 2011.
[9]. Jurcik, P., Koubaa, A., Alves, M., Tovar, E. and Hanzalek, Z. (2007) „A simulation model for the IEEE 802.15.4 : delay/throughput
evaluation of the GTS mechanism‟, in 15th IEEE International Symposium on Modelling, Analysis, and Simulation of Computer
and Telecommunication Systems(MASCOTS 2007), October, pp.109–116, Istanbul, Turkey.
[10]. Brown M., Harris C.J., “Neuro fuzzy adaptive modeling and control”, Prentice Hall, 1994.
[11]. Haykin, S. Neural Networks: A Comprehensive Foundation; Macmillian College Publishing: New York, NY, USA, 1994.
[12]. Using Neural Network: User Guide, theMathworks Inc.
[13]. Website: WWW.MATHWORKS.COM The Mathworks In.
[14]. Ms. Sonal J. Rane, Prof. Satish K. Shah, Ms. Dharmistha D Vishwakarma,” Soft Computing Technique Based Throughput
Optimization of GTS mechanism for IEEE 802.15.4 Standard” in International Journal of Soft Computing and Software
Engineering [JSCSE], Vol. 3, No. 3, 2013.

More Related Content

What's hot

IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFICIMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
ijwmn
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
IJMER
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
A. Sufian
 
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
A. Sufian
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
TELKOMNIKA JOURNAL
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
eSAT Publishing House
 
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3Robert Chang
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
IJECEIAES
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
eSAT Publishing House
 
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
IJCNCJournal
 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithm
journalBEEI
 
Tdt4260 miniproject report_group_3
Tdt4260 miniproject report_group_3Tdt4260 miniproject report_group_3
Tdt4260 miniproject report_group_3
Yulong Bai
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
ijwmn
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Editor IJCATR
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
journal ijrtem
 

What's hot (18)

IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFICIMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
CHANG-RAHIMI-POURNAGHSHBAND_DIFFERENTIATED-SERVICE-QUEUING-DISCIPLINES-IN-NS3
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting ...
 
Optimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithmOptimal resource allocation in networked control systems using viterbi algorithm
Optimal resource allocation in networked control systems using viterbi algorithm
 
Tdt4260 miniproject report_group_3
Tdt4260 miniproject report_group_3Tdt4260 miniproject report_group_3
Tdt4260 miniproject report_group_3
 
EESRDA
EESRDAEESRDA
EESRDA
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 

Similar to Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn

A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
pijans
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
ijwmn
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-new
swatisabnis87
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ijac journal
 
B010340611
B010340611B010340611
B010340611
IOSR Journals
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515IJRAT
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
ijscmcj
 
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
inventionjournals
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
IJCNCJournal
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
Amal Academy
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ijngnjournal
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
csandit
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
cscpconf
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
Elizabeth Williams
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
IJERA Editor
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
IJCSEA Journal
 

Similar to Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn (20)

A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-new
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
B010340611
B010340611B010340611
B010340611
 
MyThesis
MyThesisMyThesis
MyThesis
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
IEEE 806.16
IEEE 806.16IEEE 806.16
IEEE 806.16
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
 
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICESMEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
MEDIUM ACCESS CONTROL WITH SCHEDULED GROUP CONTENTION FOR MASSIVE M2M DEVICES
 
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
iosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
iosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
iosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
iosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
iosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
iosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
iosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
iosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 04-09 www.iosrjournals.org DOI: 10.9790/2834-10630409 www.iosrjournals.org 4 | Page Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn Dr. Sonal J. Rane Department of Electrical & ElectronicsEngg., ITM Vocational University, Vadodara, Gujarat, India Abstract: IEEE 802.15.4 Standard is used for low rate, low power consumption and low cost wireless sensor network applications. This standard has an attractive feature for real time application by providing Guaranteed Time Slot (GTS) Mechanism. By applying this mechanism, this standard gives real time guaranty to deliver the time critical data. The GTS is started in the Beacon-enabled mode based on the superframe structure which is defined by PAN-Coordinator. A node has to use at least one whole GTS in a transmission. However, it is not necessary that each node fully utilise its transmission capacity in a particular time slot if the packet arrival rate is too small. Hence, bandwidth utilisation is reduced. This paper explores the underutilization of bandwidth in WSN,the performance optimization of the GTS Mechanismand analyzes GTS mechanism by evaluating throughput using conventional method and proposed adaptive method (Adaptive Neuro Fuzzy Inference System (ANFIS)-soft computing technique) in OPNET Modeler. Keywords: Wireless sensor network (WSN), OPNET, Adaptive Neuro Fuzzy Inference System, IEEE 802.15.4, GTS, GTS Throughput, Packet Medium Access Delay, Wasted Bandwidth. I. Introduction IEEE 802.15.4 standard defines the protocol connection orientation of a personal area network (PAN). The standard uses carrier sense multiple access with a collision avoidance medium access (CSMA/CA) mechanism and supports varieties of topologies for the network viz. star as well as peer-to-peer topologies. The IEEE 802.15.4 [1] Medium Access Control (MAC) protocol supports beacon enabled and non beacon mode. In the beacon enabled mode beacon frames are sent by coordinator periodically for synchronization of sensor nodes. The advantage of beacon enabled mode is that all nodes can wake up and sleep at the same time allowing very low duty cycles and hence save energy. Using the optional superframe structure, time slots can be allocated by the PAN coordinator to devices with time critical data, known as Guaranteed Time Slots (GTS) to fulfill Quality of Service requirements [2]. The primary goal of GTS allocation is providingcommunication services to time critical data, i.e., make certain guarantees on eventual delivery and delivery times of packets to be transmitted by local devices to the network coordinator. In this paper mainly focus is on uplink scenario, which is more relevant for WSNs applications. Adaptive Neuro-Fuzzy Inference System (ANFIS) is used here to decide the number of packets to be transmitted for optimization of throughput of GTS mechanism based on Packet Interarrival time and Data rate. The remainder of this article is organized as follows. Section II and section III give a brief overview of the IEEE 802.15.4 protocol, its MAC layer specifications and Superframe Structure. In section IV, Soft GTS mechanism is organized. Simulation results are discussed in section V. Finally it is concluded in conclusion. II. Ieee 802.15.4 Mac Layer IEEE 802.15.4 MAC layer protocol [3] can work in two modes viz. non beacon enabled and beacon enabled mode. The non beacon enabled mode is same as non slotted CSMA/CA which provides scalability and self organization to the network while beacon enabled mode uses the superframe structure which defines a time interval during the frames are exchanged between PAN coordinator and associated nodes for the synchronization purpose. Beacon enabled mode works as a slotted CSMA/CA and it enables the allocation of time slots in superframe which is known as Guaranteed Time Slots (GTSs) for the nodes which guaranteed the data frames. Each superframe is divided into Contention Access Period (CAP), where nodes contend among each other to send packets, and a Contention Free Period (CFP), where nodes have GTSs to send packets without contention and thus with guaranteed transmission. The Beacon Order (BO) and Superframe Order (SO) decide the length of the superframe structure and its active period. Real-time guarantees can be achieved by using the GTS mechanism [4, 5] in beacon-enabled mode. The node allocates GTS with a minimum service guarantee, enabling the prediction of the worst-case timing performance of the network. Power-efficiency can be achieved by operating at low duty cycles (down to 0.1%) as power efficiency and timeliness guarantees are often two opposite requirements in wireless sensor networks. Analysis of GTS mechanism is evaluated for GTS throughput using OPNET Modeller [6], which can be achieved due to the packet size based on data rate and Interarrival time.
  • 2. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn DOI: 10.9790/2834-10630409 www.iosrjournals.org 5 | Page III. Superframe Structure When the PAN Coordinator selects the beacon-enabled mode [7], it forces the use of a Superframe structure which is shown in Figure 1 to manage communication between the devices that are associated to that PAN. The format of the superframe is defined by the PAN Coordinator. The superframe, corresponding to the Beacon Interval (BI), is defined by the time between two consecutive beacons, and includes an active period and, optionally, a following inactive period. The active period, corresponding to the Superframe Duration (SD), is divided into 16 equally sized time slots, during which data transmission is allowed. Each active period can be further divided into a Contention Access Period (CAP) and an optional Contention Free Period (CFP). Slotted CSMA/CA is used within the CAP. The CFP is activated by the request sent from a device to the PAN Coordinator. Upon receiving this request, the PAN Coordinator checks whether there are sufficient resources and, if possible, allocates the requested time slots. This requested group of time slots is called Guaranteed Time Slot (GTS) and is dedicated exclusively to a given device. A CFP support up to 7 GTSs and each GTS may contain multiple time slots. The allocation of the GTS cannot reduce the lengthof the CAP to less than the value specified by aMinCAPLength constant. Figure 1:The IEEE 802.15.4 Super frame structure [6] The structure of the superframe is defined by two parameters, the Beacon Order (BO) and the Superframe Order (SO), which determine the length of the superframe and its active period. The setting of BO and SO must satisfy the relationship 0 ≤ SO ≤ BO ≤ 14. The length of the superframe (BI) and the length of its active period (SD) are defined as follows: BI = aBaseSuperframeDuration x 2BO , SD = aBaseSuperframeDuration x 2SO . The aBaseSuperframeDuration constant denotes the minimum length of the superframe when BO is equal to 0. The IEEE 802.15.4 standard fixes this duration to 960 symbols. If SO = BO then SD = BI and the superframe is always active. According to the standard, if SO = 15, the Superframe will not be active following the beacon. If BO = 15, then the superframe shall not exist and the network will operate in the non beacon- enabled mode. In this case, the value of SO is ignored. As a result, a PAN that wishes to use the superframe structure must set Beacon Order to a value between 0 and 14 and Superframe Order to a value between 0 and the value of Beacon Order. Each independent PAN selects a unique identifier. This PAN identifier (PAN ID) allows communication between devices within a network using short addresses and enables transmissions between devices across independent networks. Thus, all networks can operate independently from all others currently in operation. The PAN Coordinator may accept or reject the GTS allocation request from the End Device according to the value of the user defined attribute GTS Permit [8]. The End Device can specify the time when the GTS allocation and deallocation requests are sentto the PAN Coordinator (Start Time and Stop Time attributes). This allocation request also includes the number of required time slots (GTS Length attribute) and their direction, transmit or receive (GTS Direction attribute). The GTS mechanism packet flow structure is shown in Figure 2. When the requested GTS is assigned to a given device, its application layer starts generating data blocks that correspond to the MAC frame payload (i.e. MAC Service Data Unit (MSDU)). The size of the frame payload is specified by the probability distribution function of the MSDU Size attribute.
  • 3. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn DOI: 10.9790/2834-10630409 www.iosrjournals.org 6 | Page Figure 2: Packet flow structure in GTS enabled mode [8] The probability distribution function, specified in the MSDU Interarrival Time attribute, defines the inter-arrival time between two consecutive frame payloads. Then, the frame payload is wrapped in the MAC header and stored as a frame in the buffer with a given capacity (Buffer Capacity attribute). The default size of the MAC header (MAC_HEADER_SIZE) is 104 bits, since only 16-bit short addresses are used for communication (according to standard specification). The maximum allowed size of the overall frame (i.e. frame payload plus the MAC header) is equal to aMaxPHYPacketSize (1016 bits). The generated frames exceeding the buffer capacity are dropped. When the requested GTS is active, the frames are removed from the buffer, wrapped in the PHY headers and dispatched to the network with an outgoing data rate equal to physical data rate WPAN_DATA_RATE (250 kbps). IV. Proposed Soft Computing Method Soft Computing is an innovative approach to constructing computationally intelligent systems, which tries to mimic natural creatures. In this sense soft computing is the name of a family of problem-solving methods that have analogy with biological reasoning and problem solving and sometimes referred to as cognitive computing. The basic methods included in cognitive computing are fuzzy logic (FL), neural networks (NN), Artificial Neuro Fuzzy Inference System (ANFIS) and genetic algorithms (GA). ANFIS (Adaptive Neuro-Fuzzy Inference System) is the combination of Neural Network and Fuzzy inference System (FIS) [9,10]. In ANFIS Neural Network can be trained by FIS and having characteristic of both. Here ANFIS is used to determine the MSDU packet size based on the data rate and MSDU Interarrival time. Here best Packet Size is decided depending upon two inputs, given to ANFIS for optimizing the GTS throughputas shown in Figure 3. ANN+FIS =ANFIS Interarrival Rate Data rate Packet Size Figure 3: Internal architecture of ANN with respective inputs and outputs A packet Interarrival time and data rate input decides the best packet size output through trained ANFIS. ANFIS(using a feed forward ANN with multi layers Perception model, with 2 nodes in the input Layer, 10 nodes in hidden layer and 1 node in the output layer) is used offline with OPNET modeler for IEEE 802.15.4GTS mechanism and evaluated the performance. Total (53x53) 2809 pairs are used to minimize the error between trained output and desired output as shown in Figure 4.
  • 4. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn DOI: 10.9790/2834-10630409 www.iosrjournals.org 7 | Page Figure 4: ANFIS training ANFIS architecture was trained with Number of nodes are 131 with training data pairs of 2809 using 49 fuzzy rules. V. Simulation Setup & Results The Simulation Setup consists of one PAN Coordinator and one associated devices (GTS enabled) within it coverage. There is no medium access contention so devices would not have any influence on the simulation results due to that two devices are enough to evaluate the performance of GTS mechanism. For the sake of simplicity, and without loss of generality, it is assume that only one time slot of GTS is occupied by any node and the duty cycle of a superframe is 100% (SO = BO). Figure 5: Wireless Sensor Network for GTS Mechanism Figure 5 shows the simulation setup of the Conventional GTS Mechanism. For the evaluation of the GTS throughput, GTS is set to 1 time slot and acknowledgement traffic is disabled. The buffer capacity is 4kbits for simulation and simulation time is 5 sec. The simulation was carried out by varying packet size and keeping packet Interarrival time constant (0.001824 sec). The distance between the two nodes is 25meters. INTERARRIVAL TIME PACKET SIZE DATA RATE ANFIS FROM MATLAB IEEE 802.15.4 WSN for GTS MECHANISM GTS THROUGHPUT EVALUATION Figure 6: System Setup for ANFIS based GTS Mechanism
  • 5. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn DOI: 10.9790/2834-10630409 www.iosrjournals.org 8 | Page The system setup for evaluation of performance of GTS mechanism for WSN using ANFIS in OPNET and MATLAB [11-14] is shown in Figure 6. The impact of data Rate, Packet Size , Packet Interarrival Time, Buffer Size is evaluated on GTS throughput using conventional and soft computing method for different values of SO (=BO). The intense of this section is to optimize the GTS throughput during one time slot of GTS when inter arrival time is set to 0.001824sec and for different values of the SO. Since the frames are transmitted without acknowledgements, the underutilized bandwidth can only result from IFS or from intermittent data arrival at the buffer. Figure 7: GTS Throughput v/s Superframe Order Figure 7 describes the GTS throughput for conventional GTS mechanism and Proposed Soft GTS mechanism for packet size of 50 bits. In these graphs, the GTS Throughput has reached its saturation throughput when the curve reaches its maximum peak value and plateaus. Throughput gradually decreases after reaching certain SO. The higher the SO, the larger the SD is. This creates unproductive service in time slot window duration with the corresponding buffer size and packet generation. This can be observed for SO beyond 7. High values of SO values are not suitable for WSN application because as the SO value is high, SD also will be higher. This will provide more time duration to transmit the data but simultaneously delay will increase and throughput will decrease. Figure 8: Packet Medium Access Delay (PMAD) v/s Superframe Order Figure 8 plots the packet medium access delay (sec). When SO increases, 0.001824 s inter-arrival time records a bigger range of Packet Medium Access Delay (PMAD). This indicates the significant relationship of inter-arrival time, packet size and buffer size. As shown in Figure 8 initially PMAD is somewhat stable and then starts to decrease slightly. The point at which the PMAD decreases slightly indicates that the PMAD contribution originates from the long SD produced by the SO. The PMAD measurement is similar for the same SO regardless of the buffer size until it reaches that slightly decreased point. Also for higher SO values, all frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of SO, delay will increase. For SO values higher or equal to 5, all frames stored in the buffer and transmitted during one GTS and the delay grows with SO. For higher values of SO, delay will increase.
  • 6. Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn DOI: 10.9790/2834-10630409 www.iosrjournals.org 9 | Page Figure 9: Wasted Bandwidth v/s Superframe Order From Figure 9, it is observed that wasted bandwidth is less in proposed method compare to conventional method. A device with a low arrival rate that has been allocated one time slot of GTS, may use it only partially. This leads to underutilization of the GTS band width resources. Due to the prefixed time slot duration in a superframe, it is practically impossible to balance the arrival rate of a device and its guaranteed GTS bandwidth. The amount of wasted bandwidth increases with the variance between the guaranteed bandwidth and the arrival rate. However, wasted bandwidth decreases in proposed adaptive method by applying ANFIS soft computing technique. VI. Conclusion In this paper, GTS Mechanism in the IEEE 802.15.4 Standard is evaluated in beacon enabled mode, widely used in WSN application. The evaluation was performed using IEEE 802.15.4 OPNET simulation model and soft computing technique (ANFIS). Higher SO values i.e., greater than 7 are not supported by WSN application. Selection of SO must be done carefully to ensure that the GTS in a superframe can accommodate at least one packet size. The GTS throughput is increased and Packet Medium Access Delay, Wasted bandwidth are decreased for the proposed Adaptive GTS mechanism (ANFIS) for different values of packet size and SO values. The evaluation results that were obtained provide excellent statistics to pursue our future work. The performance of GTS mechanism can be more improved by applying fuzzy as well as genetic algorithm. Acknowledgment Authors are thankful to Dept. of Elect. Engg., Faculty of Tech. & Engg., M.S.University of Baroda for technical help in doing this work. References: [1]. IEEE Std 802.15.4-2996, September, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE, 2006. [Online]. Available: http://www.ieee802.org/15 [2]. Holger Karl and Andreas Willig, “Protocolsand Architectures for Wireless Sensor Networks.” John Wiley & Sons, Ltd. ISBN: 0- 470-09510-5. [3]. Anis Koubâa, Mário Alves, Eduardo Tovar, “IEEE 802.15.4 for Wireless Sensor Networks: A Technical Overview”.www.hurray.isep.ipp.pt. Technical Report. [4]. Pangun Park, Carlo Fischione, Karl Henrik Johansson, “Performance analysis of GTS allocation in Beacon Enabled IEEE 802.15.4”, Proceeding SECON‟09 Proceedings of th 6th Annaul IEEE communications society conference on Sensor,Mesh and Ad Hoc communications and Networks Pages 431-439. [5]. Anis Koubâa, Mário Alves, Eduardo Tovar,André Cunha, “An implicit GTS allocation mechanism in IEEE 802.15.4 for time- sensitive wireless sensor networks: theory and practice”, Real-Time Syst (2008) 39: 169–204, DOI 10.1007/s11241-007-9038-x. [6]. OPNET Technologies, Inc., Opnet Modeler Wireless Suite –ver. 11.5A, http:// www.opnet.com. [7]. Per P. Jurcık and A.Koubaa, The IEEE 802.15.4 OPNET Simulation Model: Reference Guide v2.0. Technical Report HURRAY- TR-070509, CISTER-ISEP research unit, Porto, Portugal, May 2007. (http://www.open-zb.net). [8]. M.N. Hassan and Robert Stewart, “Analysis of buffer size dimensioning in GTS enabled IEEE 802.15.4 WSN for real-time applications”, Int. J. Mobile Network Design and Innovation, Vol. 3, No. 4, 2011. [9]. Jurcik, P., Koubaa, A., Alves, M., Tovar, E. and Hanzalek, Z. (2007) „A simulation model for the IEEE 802.15.4 : delay/throughput evaluation of the GTS mechanism‟, in 15th IEEE International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS 2007), October, pp.109–116, Istanbul, Turkey. [10]. Brown M., Harris C.J., “Neuro fuzzy adaptive modeling and control”, Prentice Hall, 1994. [11]. Haykin, S. Neural Networks: A Comprehensive Foundation; Macmillian College Publishing: New York, NY, USA, 1994. [12]. Using Neural Network: User Guide, theMathworks Inc. [13]. Website: WWW.MATHWORKS.COM The Mathworks In. [14]. Ms. Sonal J. Rane, Prof. Satish K. Shah, Ms. Dharmistha D Vishwakarma,” Soft Computing Technique Based Throughput Optimization of GTS mechanism for IEEE 802.15.4 Standard” in International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, 2013.