A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Modulation aware connection admission control and uplink scheduling algorithm...ijwmn
Mobile WiMAX standard defines air interface for mobile broadband wireless access (BWA) systems and aimed to provide high data rate with seamless mobility while maintaining the quality of service (QoS). However, QoS of real-time applications depends on the link quality, which necessitate the channel-aware connection admission control (CAC) and scheduling schemes. In this paper Modulation aware CAC scheme and base station (BS) uplink scheduling algorithm are proposed to improve the system capacity and QoS performance respectively. The proposed CAC scheme aims to increase the admission of higher priority real time services by degrading the bandwidth of admitted lower priority connections on the basis of their channel status without deteriorating their QoS performance much. The performances of proposed algorithms are evaluated through simulation by considering the metrics like throughput, delay and number of connections admitted.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
Modulation aware connection admission control and uplink scheduling algorithm...ijwmn
Mobile WiMAX standard defines air interface for mobile broadband wireless access (BWA) systems and aimed to provide high data rate with seamless mobility while maintaining the quality of service (QoS). However, QoS of real-time applications depends on the link quality, which necessitate the channel-aware connection admission control (CAC) and scheduling schemes. In this paper Modulation aware CAC scheme and base station (BS) uplink scheduling algorithm are proposed to improve the system capacity and QoS performance respectively. The proposed CAC scheme aims to increase the admission of higher priority real time services by degrading the bandwidth of admitted lower priority connections on the basis of their channel status without deteriorating their QoS performance much. The performances of proposed algorithms are evaluated through simulation by considering the metrics like throughput, delay and number of connections admitted.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
Interference Aware Multi-path Routing in Wireless Sensor NetworksRakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...IJERA Editor
In this paper, we propose a new simple relaying strategy based on bit-interleaved convolutionally coded starquadrature amplitude modulation (QAM) along with coherent/ noncoherent detection. Exploiting this property, a hard limiter is used to enhance power amplifier (PA) efficiency at the relay. Here we are using the higher order modulation for improving relay communication, and also employ the accurate relay technique. Moreover, we show that the proposed approach retains differential detectability, which results in a significant reduction of receiver complexity with robustness against phase ambiguity, by analyzing our proposed method in terms of asymptotic pairwise error probability (PEP), Furthermore, the effectiveness of the proposed scheme in terms of PA efficiency is confirmed by comparing the statistical distributions of the corresponding instantaneous signal power. And also implement the PEP in MIMO systems for improving the powerefficiency. All the theoretical results agree with those obtained by computer simulations.
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...Eswar Publications
Networking is a trending research area where the various research took place. Diversified filed of the Network is Sensor Network, which is a centrally adopted due to features and flexibility of sensors. Various disciplines like a military, medical, forest, Industries, Health monitoring and more, where WSN is established. Sensors have various pitfalls like limited lifetime and Storage, installed in misanthropic environments. Frequently power up or replace an energy source is a crucial task. Data communication in WSN is possible in the MAC layer. MAC is responsible for node schedule and sensing task. Collision and retransmission also lead to waste of energy. Variety of MAC protocols are developed for various qualities of service factors like energy, latency, reliability, delay, jitter, etc., however, none of them are given a satisfactory result for various QoS parameters. To overcome some of the pitfalls we need to achieve various QoS parameters. In this Research MAC is designed with a priority mechanism over clusters. Data with the highest priority are sent without or with a very negligible amount of delay. Higher priority packets are transmitted before a no prioritized packet. Using various priorities, the node energy, low delay and high throughput are achieved over standard MAC Protocols.
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSIJCNCJournal
IEEE 802.11 networks have a great role to play in supporting and deploying of the Internet of Things (IoT). The realization of IoT depends on the ability of the network to handle a massive number of stations and transmissions and to support Quality of Service (QoS). IEEE 802.11 networks enable the QoS by applying the Enhanced Distributed Channel Access (EDCA) with static parameters regardless of existing network capacity or which Access Category (AC) of QoS is already active. Our objective in this paper is to improve the efficiency of the uplink access in 802.11 networks; therefore we proposed an algorithm called QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE) which adapts Contention Window (CW) size, and Arbitration Inter-Frame Space Number (AIFSN) values depending on the number of associated Stations (STAs) and considering the presence of each AC. For different traffic scenarios, the simulation results confirm the outperformance of the proposed algorithm in terms of throughput (increased on average 23%) and retransmission attempts rate (decreased on average 47%) considering acceptable delay for sensitive delay services.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYcscpconf
Wireless sensor networks can be termed as a new generation of distributed embedded systems
that has a capability of meeting broad range of real-time applications. Examples include
radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few.
Wireless sensor networks that are deployed in time/mission-critical applications with highly
dynamic environments have to interact with the physical phenomenon under stringent timing
constraints and severe resource limitations. For such real-time wireless sensor networks,
designing and developing a real-time routing protocol that meets the required real-time
guarantee of data packets communication is a stimulating field of study that raised many
challenges and research issues. In this paper, we present a comprehensive survey of real-time
routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.
In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay
selection based on the quality of services diversity. To address this problem, we focus on the reliable
adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a
Markov chain model, in consideration of different packet states and error control algorithm assignment.
The mathematical analyses and MATLAB simulation results show that the proposed relay selection
approach could perform better in terms of saturation throughput, reliability, and energy efficiency,
compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming
is improved significantly, in terms of decodable frame ratio and delay.
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
Mobile AdHoc Network (MANET) is a wireless network with a set of mobile nodes that can communicate with
each other with no access point and without any fixed infrastructure. But mobile devices usually have limited
resources (battery power, memory, CPU) which limit their transmission range. Hence, in order to conserve the
limited resource, it is highly desirable that transmission should be as efficient as possible. MANET can be
implemented in any environment because of its dynamic nature. For routing of information packets queuing is
done at the buffer and transferred through intermediate nodes to the destination on priority basis which help to
improve the overall network performance. This paper provides a review of various buffer management schemes
for packet queues in wired & wireless networks (specialy MANET).
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Hybrid networks is integrate MANETs and infrastructure wireless networks
It have proven to be a better network structure for the next generation networks
It can act Base station and Ad hoc according to the environment conditions
The widespread use of mobile devices the increasing demand for mobile multimedia streaming services
The future of real time need of high Quality of Service (QoS) support in wireless and mobile networking environments
The QoS support reduces end to end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures
Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically establish self-organizing networks, extending the coverage of the infrastructure networks
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Interference Aware Multi-path Routing in Wireless Sensor NetworksRakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...IJERA Editor
In this paper, we propose a new simple relaying strategy based on bit-interleaved convolutionally coded starquadrature amplitude modulation (QAM) along with coherent/ noncoherent detection. Exploiting this property, a hard limiter is used to enhance power amplifier (PA) efficiency at the relay. Here we are using the higher order modulation for improving relay communication, and also employ the accurate relay technique. Moreover, we show that the proposed approach retains differential detectability, which results in a significant reduction of receiver complexity with robustness against phase ambiguity, by analyzing our proposed method in terms of asymptotic pairwise error probability (PEP), Furthermore, the effectiveness of the proposed scheme in terms of PA efficiency is confirmed by comparing the statistical distributions of the corresponding instantaneous signal power. And also implement the PEP in MIMO systems for improving the powerefficiency. All the theoretical results agree with those obtained by computer simulations.
Design and Implementation of QoS Aware Priority based MAC for Delay Sensitive...Eswar Publications
Networking is a trending research area where the various research took place. Diversified filed of the Network is Sensor Network, which is a centrally adopted due to features and flexibility of sensors. Various disciplines like a military, medical, forest, Industries, Health monitoring and more, where WSN is established. Sensors have various pitfalls like limited lifetime and Storage, installed in misanthropic environments. Frequently power up or replace an energy source is a crucial task. Data communication in WSN is possible in the MAC layer. MAC is responsible for node schedule and sensing task. Collision and retransmission also lead to waste of energy. Variety of MAC protocols are developed for various qualities of service factors like energy, latency, reliability, delay, jitter, etc., however, none of them are given a satisfactory result for various QoS parameters. To overcome some of the pitfalls we need to achieve various QoS parameters. In this Research MAC is designed with a priority mechanism over clusters. Data with the highest priority are sent without or with a very negligible amount of delay. Higher priority packets are transmitted before a no prioritized packet. Using various priorities, the node energy, low delay and high throughput are achieved over standard MAC Protocols.
QOS CATEGORIES ACTIVENESS-AWARE ADAPTIVE EDCA ALGORITHM FOR DENSE IOT NETWORKSIJCNCJournal
IEEE 802.11 networks have a great role to play in supporting and deploying of the Internet of Things (IoT). The realization of IoT depends on the ability of the network to handle a massive number of stations and transmissions and to support Quality of Service (QoS). IEEE 802.11 networks enable the QoS by applying the Enhanced Distributed Channel Access (EDCA) with static parameters regardless of existing network capacity or which Access Category (AC) of QoS is already active. Our objective in this paper is to improve the efficiency of the uplink access in 802.11 networks; therefore we proposed an algorithm called QoS Categories Activeness-Aware Adaptive EDCA Algorithm (QCAAAE) which adapts Contention Window (CW) size, and Arbitration Inter-Frame Space Number (AIFSN) values depending on the number of associated Stations (STAs) and considering the presence of each AC. For different traffic scenarios, the simulation results confirm the outperformance of the proposed algorithm in terms of throughput (increased on average 23%) and retransmission attempts rate (decreased on average 47%) considering acceptable delay for sensitive delay services.
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...IJCNCJournal
Opportunistic Routing (OR) scheme increases the transmission reliability despite the lossy wireless radio links by exploiting the broadcast nature of the wireless medium. However, OR schemes in low power Wireless Sensor Network (WSN) leads to energy drain in constrained sensor nodes due to constant
overhearing, periodic beaconing for Neighbourhood Management (NM) and increase in packet header length to append priority wise sorted Forwarding Candidates Set (FCS) prior to data transmission. The timer-based coordination mechanism incurs the least overhead to coordinate among the FCS that has successfully received the data packet for relaying the data in a multi-hop manner. This timer-based mechanism suffers from duplicate transmissions if the FCS is either not carefully selected or coordinated. The focus of this work is to propose a hybrid opportunistic energy efficient routing design for large scale, low power and lossy WSN. This design avoids periodic 'hello' beacons for NM, limits constant overhearing and increase in packet header length. There are two modes of operation i) opportunistic ii) unicast mode. The sender node adopts opportunistic forwarding for its initial data packet transmission and instead of pre-computing the FCS, it is dynamically computed in a completely distributed manner. The
eligible nodes to be part of FCS will be neighbour nodes at lower corona level than the sender with respect to the sink and remaining energy above the minimum threshold. The nodes part of FCS based on crosslayered multi-metrics and fuzzy decision logic determines its priority level to compute Dynamic Holding
Delay (DHD) for effective timer coordination. The differentiated back off implementation along with DHD enables the higher priority candidate that had received data packet to forward the packet first and facilitates others to cancel its timer upon overhearing. The sender node switches to unicast mode of
forwarding for successive transmissions by choosing the forwarding node with maximum trust value as it
denotes the stability of the temporally varying link with respect to the forwarder. The sender node will revert to opportunistic mode to increase transmission reliability in case of link-level transmission error or no trustworthy forwarders. Simulation results in NS2 show significant increase in Packet Delivery Ratio (PDR),decrease in both average energy consumption per node and Normalized Energy Consumption (NEC) per packet in comparison with existing protocols.
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYcscpconf
Wireless sensor networks can be termed as a new generation of distributed embedded systems
that has a capability of meeting broad range of real-time applications. Examples include
radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few.
Wireless sensor networks that are deployed in time/mission-critical applications with highly
dynamic environments have to interact with the physical phenomenon under stringent timing
constraints and severe resource limitations. For such real-time wireless sensor networks,
designing and developing a real-time routing protocol that meets the required real-time
guarantee of data packets communication is a stimulating field of study that raised many
challenges and research issues. In this paper, we present a comprehensive survey of real-time
routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.
In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay
selection based on the quality of services diversity. To address this problem, we focus on the reliable
adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a
Markov chain model, in consideration of different packet states and error control algorithm assignment.
The mathematical analyses and MATLAB simulation results show that the proposed relay selection
approach could perform better in terms of saturation throughput, reliability, and energy efficiency,
compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming
is improved significantly, in terms of decodable frame ratio and delay.
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
Mobile AdHoc Network (MANET) is a wireless network with a set of mobile nodes that can communicate with
each other with no access point and without any fixed infrastructure. But mobile devices usually have limited
resources (battery power, memory, CPU) which limit their transmission range. Hence, in order to conserve the
limited resource, it is highly desirable that transmission should be as efficient as possible. MANET can be
implemented in any environment because of its dynamic nature. For routing of information packets queuing is
done at the buffer and transferred through intermediate nodes to the destination on priority basis which help to
improve the overall network performance. This paper provides a review of various buffer management schemes
for packet queues in wired & wireless networks (specialy MANET).
21 9149 simulation analysis for consistent path identification edit septianIAESIJEECS
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Hybrid networks is integrate MANETs and infrastructure wireless networks
It have proven to be a better network structure for the next generation networks
It can act Base station and Ad hoc according to the environment conditions
The widespread use of mobile devices the increasing demand for mobile multimedia streaming services
The future of real time need of high Quality of Service (QoS) support in wireless and mobile networking environments
The QoS support reduces end to end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures
Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically establish self-organizing networks, extending the coverage of the infrastructure networks
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wirel...ijasuc
This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that
satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed
QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in
recent past. Simulation results show that the proposed scheduling scheme can provide a tight QoS
guarantee in terms of delay, delay violation rate and throughput for all types of traffic as defined in the
WiMAX standard, thereby maintaining the fairness and helps to eliminate starvation of lower priority
class services. Bandwidth utilization of the system and fairness index of the resources are also
encountered to validate the QoS provided by our proposed scheduling scheme.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Technological Considerations and Constraints in the Manufacture of High Preci...IJERA Editor
Rolling element bearings for application in Aircraft systems are to be manufactured to higher accuracy levels.
Various technology details like raw material, processing stages and facilities such as machining, heat treatment,
grinding, super finishing, assembly and inspection are to be considered for manufacture. However the facilities
available presently in India are inadequate to produce high precision bearings. This paper deals with the
prototype manufacture of bearings for some typical applications.
Studying and Comparing Sensing Capability of Single Walled Carbon Nanotubes f...IJERA Editor
In this study sensing capability of single walled carbon nanotubes (SWCNTs), of both zigzag (5, 0) and
armchair (4, 4) models were investigated for adsorption of O2 and N2 molecules were investigated using density
functional theory (DFT) method. Using this computational method, it is possible to obtain much more data to
apply in medical science and industrial technologies. Geometrical optimization have carried out using standard
set and B3LYP/6-311G* basis set of Gaussian 98 program. Those parts of SWCNT which have demonstrated
more contribution in adsorption energy, ΔEads (eV) were studied and compared. Electronic configurations were
discussed and the results were interpreted
Improving Power Efficiency in Cooperative Diversity and Mimo Systems by Using...IJERA Editor
In this paper, we propose a new simple relayingstrategy based on bit-interleaved convolutionally coded starquadrature amplitude modulation (QAM) along with coherent/ noncoherent detection. Exploiting this property, a hard limiter is used to enhance power amplifier (PA) efficiency at the relay.here we are using the higher order modulation for improving relay communication and also employ the accurate relay technique.Moreover, we show that the proposedapproach retains differential detectability, which results in a significant reduction of receiver complexity with robustness against phase ambiguityBy analyzing our proposed method in terms of asymptotic pairwise error probability(PEP),Furthermore, theeffectiveness of the proposed scheme in terms of PA efficiency is confirmed by comparing the statistical distributions of the corresponding instantaneous signal power.and also implement the PEP in MIMO systems for improving the power efficiency.All the theoretical results agree with those obtained by computer simulations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Constellation Based Attribute Selection Method for High Dimension...IJERA Editor
Attribute Selection is an important topic in Data Mining, because it is the effective way for reducing dimensionality, removing irrelevant data, removing redundant data, & increasing accuracy of the data. It is the process of identifying a subset of the most useful attributes that produces compatible results as the original entire set of attribute. Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group called a cluster are more similar in some sense or another to each other than to those in other groups (Clusters). There are various approaches & techniques for attribute subset selection namely Wrapper approach, Filter Approach, Relief Algorithm, Distributional clustering etc. But each of one having some disadvantages like unable to handle large volumes of data, computational complexity, accuracy is not guaranteed, difficult to evaluate and redundancy detection etc. To get the upper hand on some of these issues in attribute selection this paper proposes a technique that aims to design an effective clustering based attribute selection method for high dimensional data. Initially, attributes are divided into clusters by using graph-based clustering method like minimum spanning tree (MST). In the second step, the most representative attribute that is strongly related to target classes is selected from each cluster to form a subset of attributes. The purpose is to increase the level of accuracy, reduce dimensionality; shorter training time and improves generalization by reducing over fitting.
Software Based Traffic Separation at the Access LayerIJERA Editor
Access Network is the subscriber part of the telecommunications network or the network connecting the subscribers to the Internet Service Providers (ISP) [1]. In many countries including Tanzania access network is still predominantly made up of the copper cable based or other point to point wireless connections. This has kept the network in large proportions passive, inflexible and relatively unreliable [2]. This traditional network has long been tailored to the services generally provided i.e. voice, leased lines, Internet, corporate data and video conference, sometimes each provided by separate equipment and networks. This paper presents the study on approaches used by ISP in Tanzania to separate traffic in the access network. The paper also presents the effective way of traffic separation, whereby multiple hardware used to separate traffic currently has been replaced with single hardware. The traffic separation technique is based on creating logical links (software based) for each traffic type inside single physical link, providing a differentiated QoS support for each type of traffic according to its individual QoS requirements.
CFD Analysis on the Effect of Injection Timing for Diesel Combustion and Emis...IJERA Editor
This paper describes the effect of injection timing in diesel combustion. Ansys Fluent a computational fluid dynamics tool is used to study the combustion of diesel with three different injection timing. The fuel is injected before TDC, at TDC and after TDC. The parameters such as temperature, pressure, velocity, density, soot and NOx emission are compared. The specie transport model is used for modelling the combustion. Standard k-e (2 equ) is used for modelling the turbulence. The analysis is carried out by only considering the compression and expansion strokes. The pressure reaches the maximum when the fuel is injected before TDC and the maximum temperature is when injected at TDC. The NOx emission is less when the fuel is injected at TDC and the soot formation is when fuel injected before TDC.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Vehicular adhoc network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). The communication in VANET are generally classified into following three categories such as Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V) and Hybrid network which is a combination of V2V and V2I network. VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. As more and more services is been provided for V2V based VANET network. It is a challenging task to provide QoS to end user, due to wireless medium that has limited channel availability for transmission. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMACexperiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
Two-level scheduling scheme for integrated 4G-WLAN network IJECEIAES
In this paper, a novel scheduling scheme for the Fourth Generation (4G)-Wireless Local Area Network (WLAN) network is proposed to ensure that end to end traffic transaction is provisioned seamlessly. The scheduling scheme is divided into two stages; in stage one, traffic is separated into Actual Time Traffic (ATT) and Non-Actual-Time Traffic (NATT), while in stage two, complex queuing strategy is performed. In stage one, Class-Based Queuing (CBQ) and Deficit Round Robin(DRR) are used for NATT and ATT applications, respectively to separate and forward traffic themselves according to source requirements. Whereas in the stage, two Control Priority Queuing (CPQ) is used to assign each class the appropriate priority level. Evaluation of the performance of the integrated network was done according to several metrics such as end-to-end delay, jitter, packet loss, and network’s throughput. Results demonstrate major improvements for AT services with minor degradation on NAT applications after implementing the new scheduling scheme.
In this project, we proposed a framework to support heterogenous traffic with different QoS demand in
WiMAX. This framework dynamically changes the bandwidth allocation (BA) for ongoing and new arrival
connections based on network condition and service demand. The objective is to efficiently use the
available bandwidth and provide QoS support in a fair manner. Dynamic allocation of spectrum prior to
transmission can mitigate the starvation problem of Non Real time application. The WFQ based dynamic
bandwidth allocation framework uses architecture that has packet scheduler scheme (PS), call admission
policy and a dynamic bandwidth allocation mechanism. By the simulation result we have showed that this
architecture could provide QoS support by being fair to all classes of services.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Quality of service adaptive modulation and coding scheme for IEEE 802.11acIJECEIAES
Nowadays, the rising demand for digital communication technologies has contributed to the increase in the volume of traffic. This continuous trend of internet traffic has led to the deterioration of the quality of service (QoS) with reduced throughput and increased latency. This also is due to the proliferation of new broadband applications which require low latency and high throughput such as virtual reality and real-time gaming. Therefore, considering the aforementioned challenge in QoS of wireless networks, a link adaptation method is suggested in this study, in order to enhance the performance of the QoS in IEEE 802.11ac amendment wireless local-area network (WLAN). The proposed technique adaptively changes the transmission data rate by increasing or decreasing the modulation and coding scheme (MCS) level according to the traffic conditions. With the use of an OMNeT++ computer-aided design (CAD)-based simulation model, the effectiveness of the suggested approach is examined. Simulated findings were compared with the link adaptation approach of the default condition. The results of the simulation demonstrate that the proposed technique significantly increases throughput (36.48%) and decreases latency in comparison to the default situation. These findings demonstrate the technique's potential to improve WLAN QoS efficiency, notably in regard to throughput and latency.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate.
In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important
role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative
study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to
solve problems like prioritization, timeliness, reliability etc. The study mainly focuses on some priority
based QoS protocols used in WSN and a comparison among them. The study reveals that among the five
mentioned protocols; QMAC, PRIMA, DB-MAC, RAP, GTS; PRIMA shows the best performance in the
category of Packet Prioritization, Scheduling Scheme, Queue Type, Energy Awareness and QoS.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Large Language Model (LLM) and it’s Geospatial Applications
D044021420
1. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 2), April 2014, pp.14-20
www.ijera.com 14 | P a g e
Traffic Differentiation and Scheduling In Vehicular Sensor
Network Using 802.15.4
K. Sindhu*, Dr. T. P. Saravanabava**
*(Department of Embedded System Technologies, College of Engineering, Guindy, Chennai-25)
** (Deputy Director- Knowledge Data Centre, Anna University, Chennai-25)
ABSTRACT
The IEEE 802.15.4 is the widely used next generation standard protocol in many applications utilizing wireless
sensor networks (WSN) especially in vehicular sensor network (VSN). However, currently differentiation and
scheduling mechanisms are not provided in IEEE 802.15.4 specification to improve the quality of service (QOS)
for delay sensitive and critical events. In this paper, multiple scheduling algorithms using FIFO, Priority queue,
RED, WRR and DRR are integrated in compliance with IEEE 802.15.4 to improve the throughput, enhance
bandwidth utilization rate, perform fast processing and delivery of urgent data traffic. NS2.35 has been used for
simulating the VSN and different types of traffic like CBR, poisson and exponential traffic have been
simulated.
Keywords – Vehicular sensor network, scheduling, quality of service, differentiation, IEEE 802.15.4, zigbee.
I. INTRODUCTION
Sensor networks are recently rapidly
growing research area in wireless sensor networks.
Wireless sensors are of small size and low cost are
deployed to establish a sensor network. Vehicular
networks are considered as mobile sensor networks
and characterized by several basic and special
characteristics such as no limited energy and storage
capacity, high node mobility and fast topology
changes. The vehicular sensor network can sense
several types of data in its surrounding area to
provide wide variety of services like traffic
monitoring, crowded streets identifying, speed
controlling, lost vehicle locating and environmental
monitoring since it covers permanently a wide
geographical area [1,2,3].
For wireless sensor networks (WSNs), IEEE
802.15.4 is used as de-facto standard. However, the
behaviour of CSMA/CA results in collision at heavy
load which reduces the throughput and energy
consumption performance of WSN. These problems
demand MAC layer solutions to be proposed to
achieve the better performance of WSN.
Scheduling aids in providing quality of
service (QoS) support to the prioritized and
categorized communication in wireless sensor
networks.This research aims to enhance QoS in a
Vehicular Sensor Networks (VSN) by integrating
traffic differentiation and scheduling mechanisms in
order to reduce the end-to-end delay, improve the
throughput, enhance the bandwidth utilization rate
and perform fast processing and delivery for urgent
data traffic..
The rest of this paper is structured as
follows. Section 2 gives a summary of related works
and Section 3 gives a brief overview of service
differentiation and prioritization methodology used in
our scenario. Hence research constraints used by our
model and generated simulation results are provided
in Section 4. Finally, concluding remarks and future
work are presented in Section 5.
II. PREVIOUS WORK
The MAC layer includes a very important
processing level. since it rules the sharing of the
medium which affects the performance of all the
upper layer protocols. MAC protocol support QoS
provisioning and determining the QoS support
performance by solving the medium sharing
problems and reliable communication.
[4] Proposed a service differentiation
algorithm with slight modification on the protocol to
enhance the achievement of slotted CSMA/CA for
time-critical events. The service differentiation
algorithms were particularly based on various
parameters such as the macHinE, aMaxBE and the
Contention Window (CW). They differently process
the command and data frames since they are affected
by high and low priority levels (service class),
respectively. In other terms, different attributes have
been defined and assigned for different service
classes. This algorithm keeps slotted CSMA/CA in
its original form and focuses on tuning related
parameters effectively in keeping the criticality of
messages. Some existing works [5,6,7] are interested
in controlling over CW depending on the changes in
the network status. In [5], the Sensing Back off
Algorithm (SBA) has been addressed to maximize
RESEARCH ARTICLE OPEN ACCESS
2. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.
www.ijera.com 15 | P a g e
channel throughput with impartial access to shared
channel. When packet collision occurs, it multiplies
its back off interval by α while on a successful
transmission, both sending and receiving wireless
sensors multiply their back off interval by β, and the
others overhearing(sensing) a successful transmission
decreases their back off intervals by θ. α, β and θ are
defined in [5]. However, on the basis of p-persistent
CSMA/CA protocol, [6,7] addresses dynamic IEEE
802.11 wireless networks. Their approaches assume
having a precise number of the active wireless
sensors, to estimate the network state, while they do
not consider QoS for real-time traffic.
[8] Uses CSMA/CA as access protocol to
provide service differentiation in WSN. The Collect
then Send burst Scheme (CoSenS) is developed to
facilitate implementation of scheduling policies and
primarily to handle its weaknesses. A earliest
deadline first and fixed priority are implemented on
the top of CoSenS. The results present that the
proposed solution enhances reliability and end-to-end
delay by adapting traffic variations automatically.
Authors claim that proposed solution does not affect
best effort traffic while meeting deadline
requirements for urgent traffic. Moreover, motes are
used for testing and implementation of CoSenS.
Diff-MAC is a QoS aware MAC protocol
based on CSMA/CA access method to support hybrid
prioritization and differentiated services. Diff-MAC
integrates an effective service differentiation
algorithm in order to increase the channel utilization
and provide fair and fast data delivery. Diff-MAC is
needed in WSN supporting QoS-constrained
heterogeneous traffic such as multimedia
applications. To provide QoS, Diff-MAC consists of
(1) Reducing the retransmission using fragmentation
of the long frames into small manageable packets and
transmitting them in form of burst, (2) Decreasing
collisions and minimizing the packet latencies by
adjusting its contention window size as per traffic
requirements and (3) Providing fair and reliable data
delivery among sensor nodes based on intra-queue
prioritization feature [9].
In [10], author has proposed a system called
VASNET (Vehicular Adhoc and Sensor Networks)
which provides safety on highway roads, since many
accidents and injuries have occurred due to car
accidents. Two types of sensor nodes are suggested in
VASNET, one is embedded inside the vehicle called
Vehicular Nodes(VN) and other is deployed in
predetermined intervals on roads called Road Side
Sensor Nodes(RSS). There is a Base Station(BS) acts
as police traffic station, firefighting group and rescue
team. The VN collect the vehicles velocity and send
it to BS via RSS.
[11] Developed a novel cross-layer
integrating an asynchronous Energy Efficient and
Fast Forwarding (EEFF) protocol for WSNs is
resulting to energy efficiency and low latency. EEFF
implements new approaches improving dynamic
routing selection and low power listening which leads
to reducing the latency.
Node-based scheduling and level based
scheduling, proposed in [12], are two centralized
heuristic scheduling algorithms. The first algorithm is
inspired from the classical multi-hop scheduling
using direct scheduling of the nodes given in an ad
hoc mode. The second algorithm uses a routing tree
to schedule the levels before scheduling the nodes.
This algorithm is more suitable for wireless sensor
networks since it supports many-to-one
communication model. A nodes distribution across
levels affects the performance of these algorithms.
In [13], the authors proposed at the MAC
level a scheduling algorithm that is able to support
assorted connections with different QoS necessities.
At the physical (PRY) layer, each connection utilize
an adaptive modulation and coding (AMC) scheme
over wireless fading channels. The scheduling
algorithm assigns a certain priority level based on the
QoS requirements of each connection. Then, it
adjusts dynamically the priority level according to the
channel and service status.
[14] Proposed a Real-Time Query
Scheduling (RTQS) algorithm for conflict-free
transmission scheduling in order to support real-time
queries in WSNs. In this context, in conflict- free
query scheduling [14] showed relatedness between
prioritization and throughput. Then, it proposed non-
preemptive, preemptive and slack stealing query
scheduling algorithms as novel approaches for real-
time scheduling. As a result, the first algorithm
achieves a better throughput by inverting priority.
This problem has been solved by the second
algorithm with trade-off of reduced throughput.
Finally, the third algorithm combined the
remuneration of preemptive and non-preemptive
scheduling algorithms to improve the throughput and
meet query targets.
Current WSN applications generate different
types of traffic with various requirements such as
delay-bounded, bandwidth and reliable data delivery.
Consequently, Quality- of-Service (QoS)-based
mechanisms can improve efficiently the traffic
delivery in WSNs. This work introduces new
differentiated service approaches and tasks
accomplished by scheduling disciplines and
highlighting the impact of these techniques on the
QoS support in mobile sensor networks.
III. SERVICE DIFFERENTIATION
AND PRIORITIZATION
METHODOLOGY
Different types of traffic with various
3. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.
www.ijera.com 16 | P a g e
requirements such as delay-bounded, bandwidth and
reliable data delivery are generated. Consequently,
Quality-of-Service (QoS)-based mechanisms can
decrease end-to-end delay and improve efficiently the
traffic delivery in a wireless sensor networks. We
used differentiated service approach with scheduling
mechanism to improve the overall network
throughput.
3.1 PROBLEM FORMULATION
A specific problem that arises as a result of
the collected traffic diversity is how to differentiate
and process the diversified traffic in a suitable way to
their requirements. The traffic diversity is caused by
multidisciplinary supported applications. It is
controlled at the roadside unit (or base station) acting
as routers and coordinators. Traffic diversity poses
challenges that need to be resolved by integrating
new mechanisms to (a) classify packets according to
their types of service and (b) schedule them
appropriately to their requirements.
Grade of service is one of crucial parts of
QoS in mobile communications which involves
outage probability and blocking probability and
scheduling starvation. Various mechanisms such as
mobility management, fair scheduling, radio resource
management, channel-dependent scheduling etc are
affected to measure the above said performance
measures.
3.2 POSSIBLE SOLUTIONS
It includes the use of message relay boxes
for collection, classification and scheduling messages
and specific roadside gateways for proper data
propagation. Moreover, maintaining Quality-of-
Service (QoS) in VSNs is challenging while nodes
are mobile. IEEE 802.15.4 defines unslotted
CSMA/CA channel access protocol which enables
contending wireless sensors to access the shared
channel without providing service differentiation at
the MAC layer. This lack of providing service
differentiation has hindered the development of
service differentiation model for rate-sensitive
applications.
In this paper, a suitable scheduling scheme
among various scheduler schemes is selected at MAC
layer for assorted connections with varied QoS
requirements. Therefore, a priority or weighted
function is requested for every link established in the
system and depending on wireless channel quality,
service priority across layers and QoS satisfaction
every connection is updated dynamically. The
proposed scheduling model is flexible, scalable,
easily implementable, guarantees QoS and utilizes
the wireless bandwidth efficiently.
MAC layer controls medium sharing and all upper
layer protocols related to that for QoS provisioning.
QoS cannot be achieved at network, transport or
higher layers without support of MAC protocol. The
aim of this research consists of supporting Quality of
Service (QoS) in a vehicular sensor environment by
integrating traffic differentiation and scheduling
mechanisms. To address QoS provisioning, the
research uses the model of Service Differentiation.
Service differentiation has two stages: (i) assigning
priority, and (ii) differentiation between priority
levels. The QoS is ensured using Queue Scheduling.
A better performance is achieved by assigning
appropriate priority to the traffic since higher priority
is always served first.
3.3 DIFFERENTIATION IN VSN
The first step for supporting Quality-of-
Service (QoS) in VSNs consists of including
differentiation mechanism in theMAC layer, since
several types of events with different significance and
severity may happen in the roads. Moreover, other
non-related road traffic is to be supported by the
sensor network such as pollution control, urban
application etc. The differentiation mechanism will
not retransmit packets as they arrive but it consists of:
Collecting and classifying data from cars and
other neighbor platforms
Marking and storing data in different queues
characterized with different priority levels.
3.4 SCHEDULING IN VSN
The scheduling in VSN is achieved and
tested using the queuing methods such as FIFO,
priority queue, RED, WRR, DRR. The proposed
solution is evaluated by multiple scenarios using
NS2.35 simulation. The simulation results show the
proposed system improves the QoS when compared
with standard system. The proposed system can
achieve fast categorization of incoming traffic at
RSU from the vehicles and treat them according to
their prioritization assigned for each traffic type. The
extensive simulation results further justify the
usefulness of proposed system to get better QoS in
VSN.
IV. SERVICE DIFFERENTIATION
AND PRIORITIZATION
4.1 METHODOLOGY
A low-cost and energy efficient IEEE
802.15.4 radio technology is used in nodes. These
nodes communicate with road side units positioned
over small distances along road side. In this
simulation, FIFO, priority queue, RED, WRR, DRR
scheduling algorithms are used to determine how
quality of service can be enhanced.
4.2 RESEARCH CONSTRAINTS
The research has been simulated using
4. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.
www.ijera.com 17 | P a g e
NS2.35 on 6 lanes with 2 Coordinators and 4 Routers
along the road. For simplicity, straight roads are
considered and turns, comers and exits are omitted in
our proposed high-way model. Each vehicle in the
system is assumed to be equipped with a vehicle
sensor system to send vehicle's information request to
the RSU. For thorough testing the proposed scheme
has been applied on packets of different sizes such as
500, 1024, 500, 2500 as shown in Table. 1It is
assumed that vehicles running on the road with
constant driving behaviors, such as lane change,
acceleration, and overtaking, deceleration. Vehicles
are moving in constant speed and moving in their
lane. After the distance d1, d2, d3 is reached, the
vehicle may wait for constant time period for signals
on the road. Multiple scenarios are simulated
concurrently and compared.
Table 1
If mobile node is out of its parent
transmission range, then it connects to the closer
node and it continues with transmission. The network
structure simulated using NS2.35 is shown in figure
1.
Figure 1. Network Scenario
4.3 END-TO-END DELAY
End-to-end delay is used to measure
network delay faced by every packet. It is measured
as time interval from message transmission to the
message complete delivery at receiving end. Figure 2
shows the end-to-end delay result of the simulated
scenario using differentiation and sheduling
mechanisms. The DRR and WRR queue have less
end-to-end delay as compared to others in this
simulation.
Figure 2. End-end delay.
4.4 DELAY:
Delay is measured when packets of data take
more time than expected to reach destination. Figure
3 shows the measurement for overall global delay for
FIFO, priority queue, RED, WRR and DRR
scheduling schemes. Multiple factors contribute to
delay such as network congestion and packet
processing at each link till the final destination
arrives. Their effects can be minimized by selecting a
proper scheduling scheme. It is observed that DRR
and WRR have a minimum values compared to RED,
priority queue and FIFO. FIFO has the maximum
delay as simulated in the scenario.
PARAMETERS VALUES
Transmission band 2.4 Ghz
No.of routers 4
No. of coordinators 2
Traffic types CBR, Poission,
Exponential.
Packet size 512, 1024, 1500,2500.
5. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.
www.ijera.com 18 | P a g e
Figure 3
4.5 DATA TRAFFIC SENT
Data traffic sent is expressed as the total
number of bits sent from source to destination per
unit time. Data traffic sent includes all data bits
irrespective of the condition whether these bits reach
the destination or not. Figure 4 indicates the data
traffic sent for FIFO, priority queue, RED, WRR and
DRR scheduling schemes. It is noticed that data sent
is maximum in case of DRR scheduling scheme as
packets are held back those exceed from the packet
length for the next round of scheduler. Those packets
exceeds from packet length can be calculated by
subtracting maximum packet size number from
packet length. Also DRR scheduling scheme can
handle variable packet size without knowledge of
their mean size. It achieves a better generalized
processor sharing (GPS) approximation without prior
knowledge of mean packet size of each connection
Also it has been noticed that data traffic sent is
minimum in FIFO because it works as first in first
out.
Figure 4
4.6 DATA TRAFFIC RECEIVED
Data traffic received can be expressed as
"number of bits of the data received per unit time".
Figure 5 depicts the data traffic received for the
FIFO, priority queue, RED, WRR and DRR
scheduling methodologies respectively in vehicular
sensor network. It noticeably point out that the data
traffic received is maximum in case of WRR
scheduling scheme because each packet flow or
connection has its own packet queue in a network
interface card. WRR serves the amount of packets for
every nonempty queue.
Also it is noted that data traffic received is
minimum in case of DRR scheduling scheme as
packets are held back those exceed from the packet
length for the next round of the scheduler. Those
packets exceeds from packet length can be calculated
by subtracting maximum packet size number from
packet length. Although DRR scheduling scheme can
handle variable packet size without knowledge of
their mean size.
6. K. Sindhu et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.
www.ijera.com 19 | P a g e
Figure 5
4.7 THROUGHPUT
Throughput is the actual amount of data
transmitted starting from the source to the destination
within a given time (seconds). The importance of
analyzing this QoS parameter is because the
increased numbers of users of the wireless medium is
the reason for increased possibility of interference.
Throughput is quantified with various factors
including packet collisions, barrier between nodes
and the differentiation and scheduling mechanism
used. It gives a general idea of the overall throughput
of the system. Figure 6 shows that the maximum
throughput is achieved using DRR scheduling
mechanism, the WRR has second highest throughput
and the priority queue has third highest throughput
while FIFO and RED scheduling mechanism has the
lowest throughput. The reason for this is because
DRR scheduling mechanism is communicating more
efficiently as compared to other mechanisms. Also in
DRR mechanism distributed total load of the network
among the ZigBee Routers as a result of which
collisions and packet drops are decreased.
Figure 6
V. CONCLUSION
This work introduces new differentiated
service Approaches and tasks accomplished by
scheduling disciplines and highlights the impact of
these techniques on the QoS support in mobile sensor
networks. We compared the use of different quality
control algorithms for prioritizing and scheduling of
traffic received from vehicles in ZigBee environment.
On the basis of our measurements and results, DRR
and WRR have increased QoS by decreasing the
collision, packet drop rate and delay. This research
can be further extended by implementing existing
modern priority and scheduling mechanism or by
presenting innovative new algorithm for particular
scenario of vehicular sensor networks.
REFERENCES
[1] K.C. Rahman, "A Survey on Sensor
Network", Journal of Convergence
Information Technology (JCIT),vol.Ol,Issue
01,2010,pp.76-87.
[2] Yick, B. Mukherjee, and D. Ghosal,
"Wireless Sensor Network Survey",
Computer Networks: The International
Journal of Computer and
Telecommunications Networking, vol. 52,
no. 12, 2008, pp. 2292-2330.
[3] K. Lin, "Research on adaptive target
tracking in vehicle sensor networks",
Journal of Network and Computer
Applications, 2012.
[4] A. Koubaa, M. Alves, B. efzi, and Y.Q.
Song, "Improving the IEEE 802.15.4 Slotted