In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
The increasing demand of computer networks is growing rapidly day by day. The growing need to distribute applications across multiple networks with high capacity and high-performance intermediate switching nodes and networks. This research primarily focuses on route redistribution and route summarization of different intra-domain routing protocols such as EIGRP and OSPF. Routing Protocols that use facilitate to exchange routing information between routers. Reasons such as multiple departments managed by multiple network Administrators, company mergers. In any case, having a multiple routing protocol and different autonomous system in networks then without route redistribution we cannot advertise route from source to destination. Of course Network complexity will increase with the size of routing table of routers then route summarization is necessity, to reduce traffic and complexity of network.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...IJERA Editor
The increasing demand of computer networks is growing rapidly day by day. The growing need to distribute applications across multiple networks with high capacity and high-performance intermediate switching nodes and networks. This research primarily focuses on route redistribution and route summarization of different intra-domain routing protocols such as EIGRP and OSPF. Routing Protocols that use facilitate to exchange routing information between routers. Reasons such as multiple departments managed by multiple network Administrators, company mergers. In any case, having a multiple routing protocol and different autonomous system in networks then without route redistribution we cannot advertise route from source to destination. Of course Network complexity will increase with the size of routing table of routers then route summarization is necessity, to reduce traffic and complexity of network.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
Abstract Mobile networks have received great deal of attention during last few decades due to their potential applications such as large scale, improved flexibility and reduced costs. This proposed work addresses two problems associated with mobile network such as method to reduce overhead between the nodes, and energy balanced routing of packets by Co-Operative opportunistic routing for cluster based communication. We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering (ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm. Cluster formation involves election of a mobile node as Cluster head. Each cluster comprises of cluster head and non-cluster head node that forms a cluster dynamically. Each node in the network continuously finds it neighbour by communicating with them, and nodes have consistent updated routing information in route cache by neighbourhood update algorithm. In routing process packet forwarded by the source node is updated by intermediate forwarder if topology undergo changes. This opportunistic routing scheme provides responsive data transportation and managing the node effectively, even in heavily loaded environment. Thus, our proposed routing technique helps us to reduce overhead, increases efficiency and better control of path selection. Keywords- Clustering, Forwarder, MANET, Prediction, Reactive, opportunistic routing.
Location and Mobility Optimized On-demand Geographical Multipath Routing Prot...Eswar Publications
The advancement of science and technology had made mobile ad hoc network an important tool to access network of next generation. Recently, numerous multipath routing protocols for mobile ad hoc network are reported in literature. Each routing methods works based on their salient feature, but failed to control congestion, energy efficiency, overhead packets, signal stability during data transmission which leads to edge effect, signal decay and bottleneck situation of the bandwidth consumption. In this paper a novel approach havely Geographical Distance based Ad Hoc On-demand Distance Vector Routing (GD-AOMDV), which selects the path based on transmission distance value to limit and control the congestion and control overheads has been proposed. The salient feature of the proposed model is that it establishes a relationship between path distance and MANET design parameters
including transmission range, consumption of energy and bandwidth. The accuracy of the proposed scheme is
analyzed and validated with the experimental results in respect to various flow using NS2 simulations.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
Wireless Ad-Hoc Mesh Networks are characterized by static nodes connected in a mesh topology. A routing
protocol discovers and maintains the route for successful transmission of data in a network. The routing
protocol should also provide load balancing and fault tolerance for improved network performance. In
Free Space Optical networks (FSO) line of sight (LOS) should be maintained between the two
communicating nodes. In a multihop scenario maintaining LOS during routing is a challenge. In this paper
we propose a routing protocol Quality of Service-Directional Routing Protocol (QDRP) - which assures a
certain level of performance to a data flow in terms of delay and implemented on FSO MANET. Through
simulations it is observed that QDRP chooses the path with the least delay and performs satisfactorily
under varying node densities and transmission rates achieving end to end delay of .14 s and packet delivery
percentage of 96% when simulated for an area of 1300 m *1300 m for 100 nodes. This work explores the
potential of the proposed routing protocol for free space optical mesh networks. QDRP is compared with
ORRP (Orthogonal Rendezvous Routing Protocol) and AODV (Ad-Hoc on Demand Distance Vector), a
reactive protocol which is also implemented in free space optical environment. We support our conclusions
that QDRP gains in terms of packet delivery percentage, end to end delay and goodput.
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
Wireless Ad-Hoc Mesh Networks are characterized by static nodes connected in a mesh topology. A routing
protocol discovers and maintains the route for successful transmission of data in a network. The routing
protocol should also provide load balancing and fault tolerance for improved network performance. In
Free Space Optical networks (FSO) line of sight (LOS) should be maintained between the two
communicating nodes. In a multihop scenario maintaining LOS during routing is a challenge. In this paper
we propose a routing protocol Quality of Service-Directional Routing Protocol (QDRP) - which assures a
certain level of performance to a data flow in terms of delay and implemented on FSO MANET. Through
simulations it is observed that QDRP chooses the path with the least delay and performs satisfactorily
under varying node densities and transmission rates achieving end to end delay of .14 s and packet delivery
percentage of 96% when simulated for an area of 1300 m *1300 m for 100 nodes. This work explores the
potential of the proposed routing protocol for free space optical mesh networks. QDRP is compared with
ORRP (Orthogonal Rendezvous Routing Protocol) and AODV (Ad-Hoc on Demand Distance Vector), a
reactive protocol which is also implemented in free space optical environment. We support our conclusions
that QDRP gains in terms of packet delivery percentage, end to end delay and goodput.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction normalized routing load, average end to end delay by varying speed of nodes, traffic sources and mobility.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Similar to Destination Aware APU Strategy for Geographic Routing in MANET (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Destination Aware APU Strategy for Geographic Routing in MANET
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 960
Destination Aware APU Strategy for Geographic Routing in
MANET
Yukti Abhilasha jain
M.tech Student Associate professor
Department of Computer science and engineering Department of Computer science and engineering
Giani Zail Singh- Punjab Technical University Campus Giani Zail Singh- Punjab Technical University Campus
Bathinda, Punjab, India Bathinda, Punjab, India
Abstract: In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Keywords: APU, Enhanced APU, MANET, Destination aware routing.
1. INTRODUCTION
MANET is self-configured Mobile Ad hoc network of mobile
nodes connected via random topology. The main issue in
MANET is the selection of best path between any two nodes
[1]. Routing in MANET is to find the efficient path to transfer
the data from source to destination.
Proactive Reactive Hybrid
Protocol Protocol Protocol: ZRP
DSDV WRP OLSR DSR AODV
Figure 1. Categorization of routing protocols
Main protocols used for routing in MANET are categorized as
Proactive protocols, Reactive protocols and hybrid protocols.
Proactive protocols are those which are derived from past study
and information is maintained in the form of tables so also
called table-driven (eg. DSDV, WRP, OLSR). In Reactive
protocols, instead of past approaches the nodes send the data
packets to the destination on-demand (eg. DSR, AODV).In
hybrid protocols, the combination of both the reactive and
proactive protocols, this protocol includes ZRP (Zone Routing
Protocol) [2]. These protocols are briefly explained as: In
DSDV, enhancement is done on Bellman-ford Routing
Algorithm by making it loop-free. In this, each node maintain a
routing table which contains the entries of all the devices in
network and table is updated via periodically broadcast routing
messages to its neighbor. In WRP, which also resembles the
DSDV protocol and its main idea is to find the shortest distance
to every node and it is basically a path-finding algorithm with
exception that it counters the count-to-infinity problem by
forcing each node to perform consistency checks of predecessor
information reported by all its neighbors. This eliminates
looping situations and enables faster route convergence when a
link failure occurs. In OLSR, point-to-point approach that
employs a link-state mechanism known as multipoint relying.
Two ways are there: by reducing the size of control packets or
by reducing the number of links used in forwarding the packets.
The methodology used is first the analysis of changes in the
node’s neighborhood called neighbor sensing then find the best
path to every destination using this information and store it in
table called routing table. Then the best route for destination is
computed via shortest-path algorithm. In DSR fig.2, the unique
feature is that it doesn’t use periodic updates. In this, basically
two things happen: route discovery and route maintenance.
First route is discovered on-demand i.e. it finds the route when
necessary for that sender determines the complete series of the
nodes from source to destination and lists this route in packet
header and save it in cache. If source wants to send data it first
check the cache if there is entry in cache for that destination, I
transfer the packet otherwise it broadcast a route request to all
its neighbors and wait, then the node having the route
information send the request reply to source and sender send
the packets to discovered route and also make entry in cache for
further use.
s
Source REQ Reply
Route Destination
Figure 2. DSR protocol
Routing Protocols
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 961
In AODV, the concept of DSR is used in addition; it uses the
hop-to–hop routing, sequence numbers and periodic beacons
from DSDV. It removes the drawback of WRP proactive
protocol and finds the route only if required. The main
problems in AODV are: i) gradual increase in sequence
numbers and ii) decrease in hop count and It is not secure. In
ZRP, advantages of both proactive and reactive protocols are
mixed. It works in two parts of which first uses the table-driven
approach to speed up communication and later uses the on-
demand approach to avoid unnecessary communication [3].
Further comes the concept of geographic routing which is
widely used in Mobile ad hoc networks due to its simplicity and
scalability and has low overhead compared to other protocols.
Geographic routing based on assumption that every node is
aware of its location in the network (location information
generated via GPS and schemes explained in [16]). Based on
this assumption, various protocols are derived and worked on:
DREAM, LAR, GPSR. These routing protocols are explained
as follows: In DREAM, nodes forwards data packets to all the
neighbors that lie in direction of destination and every node
updates every other node about its location. In LAR, it is
assumed that every node is aware of its location but can’t
predict location of other nodes. It basically reduces the flooding
overhead. Two LAR schemes are proposed is sending node is
only within request zone and outer area is not addressed and
second is the nodes always send the packets to node closer to
the destination [5].In GPSR, nodes forwards the data packets
based on distance. It comprises two techniques: greedy
forwarding and face routing. Till the destination reached, the
forwarding is carried out on greedy basis by selecting the
closest node to destination. If this method doesn’t work then
face routing is used. After the node is in transmission range
then again greedy forwarding is used [6].
The remaining part of the paper is organized as: In Section 2,
we discuss related work or the literature survey then in Section
3 the proposed scheme and Section 4 signifies the results and
Section 5 concludes the paper.
2. RELATED WORK (LITERATURE
SURVEY)
Many papers and articles are proposed on Mobile ad hoc
Network and the protocols defining the routing of packets
among network. There are Distance routing protocols and
Location based routing protocols and further we are using new
technique for the same. According to [1], GeRaF is the
forwarding technique based on the assumption that nodes has a
medium to detect their location and position of final destination
and transmitting node is included in the forwarding message.
Problems with the existing system
Problems in Position updates in network are costly in many
ways.
1. Each update in Position in a given network consumes
node energy, bandwidth of wireless channel, and the
risk of packet collision increases correspondingly at
the medium access control (MAC) layer.
2. Packet collisions in the network cause packet loss
which again decreases the routing performance which
results in difficulty to evaluate local topology for
transmission. It results in a heavy loss due this factor
beacon lost and a lost beacon cannot be retransmitted.
3. A lost data packet does get retransmitted as a result
end-to-end delay increases.
In the existing system, Periodical beacon broadcasting is used
to exchange the neighbor’s location that results in degradation
in performance, increases packet loss and results in longer end
to end delay. Hence a more robust update policy is required to
be discovered to overcome all these types of the costs.
3. PROPOSED WORK
An Enhanced APU strategy in the proposed system use
destination aware routing with minimum distance dynamically
adjusts the beacon update intervals based on the minimum
distance from source to destination, mobility dynamics of the
nodes and the forwarding patterns in the network.
The beacons transmitted by the nodes contain their current
position and speed. Nodes estimate their positions periodically
by employing linear kinematic equations based on the
parameters announced in the last announced beacon. If the
predicted location is different from the actual location, a new
beacon is broadcast to inform the neighbors about changes in
the node’s mobility characteristics.
An accurate representation of the local topology is particularly
desired at those nodes that are responsible for forwarding
packets. Hence, APU seeks to increase the frequency of beacon
updates at those nodes that overhear data packet transmissions.
As a result, nodes involved in forwarding packets can build an
enriched view of the local topology.
Algorithm for selection of forwarder
Step1: Find distance [d(t)] of each neighbor from source
at time T
Step2: Find distance [d(t+T)] of each neighbor from
source at time (T+t)
Step3: If {[d(t+T)] ~[d(t)] < Threshold } Select the
neighbor as high stable link
Step4: Find distance Ddes between destination and the
node having high stable link
Step5: Link having minimum Ddes is selected as next hop
Figure 3. Block Diagram representing the functions in the
proposed APU system
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 962
In the above fig.3 different modules of the proposed APU
system to update the position of beacon are represented.
Figure 4. Flowchart for the proposed APU system
The Flowchart (fig.4) represents the methdology of the work
done.Initially the nodes in the network have been deployed in
such a way that all the nodes are location aware. All location
aware nodes broadcast beacons to their neighbor nodes to
calculate the distance from source at time T. After that the
distance at time (t+T) is calculated. If the difference between
the calculated distances is less than threshold then it is
considered as stable link. Select the link having the minimum
distance by calculating the distance between destination node
and highly stable link and then data can be transferred over the
network.
4. RESULTS AND DISCUSSION
Proposed APUsystem is evaluated on the following parameters:
4.1 PDR (Packets Delivery Ratio): PDR is the
proportion to the total amount of packets reached the receiver
and amount of packet sent by source. If the amount of
malicious node increases, PDR decreases. The higher mobility
of nodes causes PDR to decrease.
PDR (%) = Number of packets successfully delivered to
destination
Number of packets generated by source node
4.2 Energy Consumption: It is the amount of energy
consumed by the sensors for the data transmission over the
network
Energy Consumption = Sum of energy consumed by each
sensor.
4.3 Overhead: It is defined as the number of messages
involved in beacon update process.
Overhead = No. of messages involved in beacon update process
Figure 5. Implementation of the proposed APU system in NS2
environment
Above snapshot (fig.5)shows each node periodically broadcast
the beacon which causes high overhead and packet collision
and high energy consumption.
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 963
Figure 6. Node selection in proposed APU system
In given fig.6 Nodes in blue color are MP nodes which are
having the actual location with larger difference from its
predicted location. Hence MP nodes update the beacon packet.
Deviation threshold is fixed as 60m. If there exists difference
between actual locations and predicted of a node is greater than
60m then beacon packet is sent by the node.
Table 1. Energy Consumption versus Time
Existing Proposed
0 0 0
2 75 40
4 150 75
6 225 120
8 310 160
10 380 190
12 460 230
14 540 275
Figure 7. graph showing energy consumption in existing
scheme and proposed APU scheme
Given fig.7 shows the energy consumption in existing scheme
and proposed APU scheme and the table1 showing the values
of graphs.
Energy consumption in existing scheme is high compared to
proposed APU since periodic beacon causes high energy
consumption in the nodes. APU saves energy by avoiding
unnecessary beacon update and do the beacon update
adaptively.
Table 2. Beacon Overhead versus Time
Existing Proposed
0 0 0
2 14 0
4 27 1
6 40 1
8 54 2
10 68 3
12 81 3
14 95 4
Figure 8. graph showing beacon overhead in existing scheme
and proposed APU scheme
Given fig.8 shows the beacon overhead in existing scheme and
proposed APU scheme and the table2 showing the values of
graphs.
Beacon overhead in existing scheme is high compared to
proposed APU due to periodic beacon. APU reduces the beacon
overhead by avoiding unnecessary beacon update and only does
the beacon update process adaptively.
5. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 964
Table 3. Packet Delivery Ratio versus Time
Existing Proposed
0 0 0
2 5 12
4 9 23
6 14 35
8 19 47
10 23 59
12 27 72
14 37 83
Figure 9. graph showing beacon overhead in existing scheme
and proposed APU scheme
Given fig.9 shows the packet delivery ratio in existing scheme
and proposed APU scheme and the table3 showing the values
of graphs.
Packet delivery ratio of proposed APU is high compared to
existing scheme. Since network traffic in APU is reduced due
to adaptive beacon update instead of periodic beacons in the
case of periodic beacon scheme. In PB data gets dropped due to
high traffic in the network.
5. CONCLUSION AND FUTURE WORK
In this paper, the need to adapt the beacon update is identified
and the corresponding policy is employed in geographic routing
protocols to the node mobility dynamics and the traffic load.
The Adaptive Position Update (APU) strategy is proposed to
address these problems. The APU scheme employs two
mutually exclusive rules. The MP rule uses mobility prediction
to estimate the accuracy of the location estimate and adapts the
beacon update interval accordingly, instead of using periodic
beaconing. The ODL rule allows nodes along the data
forwarding path to maintain an accurate view of the local
topology by exchanging beacons in response to data packets
that are overheard from new neighbors. Performance of APU is
evaluated using extensive NS-2 simulations for varying node
speeds and traffic load. Proposed APU strategy leads to cost
reduction in beacon update due to destination aware routing
and increase in performance over existing system. Results
indicate that the APU strategy generates less or similar amount
of beacon overhead as other beaconing schemes but achieve
better packet delivery ratio, less overhead and energy
consumption.
Future work will be the exploring the new techniques to the
proposed work to reduce the overhead and energy consumption
further in the network.
6. REFERENCES
[1]Sangeeta, Kirti Singh(2011),”Energy Efficient Routing in
MANET using OLSR”, International Journal on Computer Science
and Engineering, vol. 3, no. 4.
[2] Smita Singh, Shradha Singh, Soniya jain, S.R. Birdar(2012),
“Comparison and study of AOMDV and DSDV Routing Protocols
in MANET using NS-2”, International Journal on Computer
Science and Engineering, vol. 4, no. 3.
[3]Anuj K.Gupta, Harsh Sadawarti, Anil K.Verma(2011),“Review
of Various Routing Protocols for MANETs”, International Journal
of Information and Electronics Engineering, vol. 1, no. 3.
[4]Gaurav Sachan, D.K.Sharma, Karishma Tyagi, Abhimanyu
Parsad(2013), “Enhanced Energy Aware geographic Routing
Protocol in MANET: A Review”, International Journal of Modern
Engineering Research,vol. 3, pp. 845-848, Issue 2.
[5]Divya Wadhwa, Deepika, Vimmi Kochher, Rajesh Kumar
Tyagi(2014), ”A Review of Comparison of Geographic Routing
Protocols in Mobile Adhoc Network”, Advance in Electronic and
Electric Engineering, vol.4, pp. 51-58, no.1.
[6]Varun G Menon, Joe Prathap P M(2013),” Performance
Analysis of Geographic Routing Protocol in Highly Mobile Ad hoc
Network”, Journal of Theoretical and Applied Information
Technology, vol. 54, no. 1.
[7]Michele Zorzi, Ramesh R. Rao(2003), “Geographic Random
Forwarding (GeRaF) for ad hoc and sensor networks: energy and
latency performance”, IEEE Transactions on Mobile Computing,
vol. 2, no. 4.
6. International Journal of Computer Applications Technology and Research
Volume 4– Issue 12, 960 - 965, 2015, ISSN: 2319–8656
WWW.IJCATR.COM 965
[8]Quan Jun Chen, Salil S. Kanhere, Mahbub Hassan, Kun-Chan
Lan(2005), “Adaptive Position Update in Geographic Routing”,
School of Computer Science and Engineering, The University of
New South Wales, Sydney, Australia.
[9]Dongjin Son, Ahmed Helmy, Bhaskar Krishnamachari,”The
Effect of Mobility-induced Location Errors on Geographic Routing
in Mobile Ad Hoc and Sensor Networks: Analysis and
Improvement using Mobility Prediction”, Department of Electrical
Engineering,University of Southern California, 90089.
[10] Pasupuleti Neelima, K.Bhargavi(2014), “Beaconing Strategy
for Geographic Routing in Mobile Ad Hoc Network”,International
Journal of Innovative Research in Computer and Communication
Engineering, Vol. 2, Issue 7.
[11]Ravi Kumar Poluru, T. Sunil Kumar Reddy(2014),
D.Nagaraju, “Updating the Routing Position in Ad hoc Networks
by using Adaptive Position”, International Journal of Computer
Trends and Technology (IJCTT), Vol. 10 No. 3.
[12]B. Karp and H. T. Kung., “GPSR: Greedy Perimeter Stateless
Routing for Wireless Networks”, in Proceedings of ACM
Mobicom 2000, pp. 243-254, Boston, MA, USA,2000.
[13]P. Casari, M. Nati, C. Petrioli and M.Zorzi(2007), “Efficient
Non Planar Routing around Dead Ends in Sparse Topologies using
Random Forwarding”, in Proceedings of IEEE ICC, pp.3122-3129.
Scotland,UK.
[14]Y. Kim, R. Govindan, B. Karp and S. Shenker(2005),
“Geographic routing made practical”, in Proceedings of the 2nd
Conference on Symposium on Networked Systems Design and
Implementation, pp. 217-230, Berkeley, CA, USA.
[15]Quanjun Chen, Salil S. Kanhere, Mahbub Hassan(2013),
“Adaptive Position Update for Geographic Routing in Mobile Ad
Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 12,
no. 3.
[16]J. Hightower and G. Borriello(2001), “Location System for
Ubiquitous Computing”, IEEE computer, vol. 34, pp. 57-66, no. 8.
[17]Paolo Casari, Michele Nati, Chiara Petrioli, Michele
Zorzi(2007), “Efficient Non-Planar Routing around Dead Ends in
Sparse Topologies using Random Forwarding”, IEEE
Communications Society, pp. 3122-3129.