Dual polarized directional communication reduces the problem of interference, exposed nodes and deafness in wireless networks. This presentation provides an insight to our research in this field.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
Dynamic Sub-Channel Allocation in Multiuser OFDM Systems to Achieve Variable ...IDES Editor
This paper investigates the problem of dynamic
multiuser subchannel allocation in the downlink OFDM
systems. In traditional TDMA or FDMA systems, resource
allocation for each user is non-adaptively fixed. Since the
subchannel allocations among the users are not optimized, a
group of users is likely to suffer from poor channel gains
resulting from large path loss and random fading. To resolve
this problem a low-complexity adaptive subchannel allocation
algorithm is proposed in this paper. By adaptively assigning
frequency subchannels, n take advantage of channel diversity
among users in different locations, which is called Multiuser
diversity. The capacity of MU-OFDM is maximized when each
subchannel is assigned to the user with the best channel-to-
noise ratio for that subchannel. However, fairness among the
users cannot generally be achieved with such a scheme. In this
paper, a set of proportional fairness constraints is imposed to
assure that each user achieve a required data rate, that ensures
quality of service. In the proposed algorithm, subchannel
allocation is performed by assuming an equal power
distribution.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
Dynamic Sub-Channel Allocation in Multiuser OFDM Systems to Achieve Variable ...IDES Editor
This paper investigates the problem of dynamic
multiuser subchannel allocation in the downlink OFDM
systems. In traditional TDMA or FDMA systems, resource
allocation for each user is non-adaptively fixed. Since the
subchannel allocations among the users are not optimized, a
group of users is likely to suffer from poor channel gains
resulting from large path loss and random fading. To resolve
this problem a low-complexity adaptive subchannel allocation
algorithm is proposed in this paper. By adaptively assigning
frequency subchannels, n take advantage of channel diversity
among users in different locations, which is called Multiuser
diversity. The capacity of MU-OFDM is maximized when each
subchannel is assigned to the user with the best channel-to-
noise ratio for that subchannel. However, fairness among the
users cannot generally be achieved with such a scheme. In this
paper, a set of proportional fairness constraints is imposed to
assure that each user achieve a required data rate, that ensures
quality of service. In the proposed algorithm, subchannel
allocation is performed by assuming an equal power
distribution.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
With the next-generation cellular networks making a transition toward smaller cells, two-hop
orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory
component in the 4G standards (WiMAX802.16j, 3GPP LTE-Adv.). Here we are using the multicasting strategy
Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the
latter forms the focus of this project. The main aim of this project is to improve the performance of the OFDMA
based relay networks. The OFDMA transmission Scheme is a widely accepted scheme for improving the quality
and speed of communication over the 4G cellular network. There are two different models designed for OFDMA
relay networks .Distributed (DP) and Contiguous (CP) permutations. We are checking the performance of two
algorithms The linear programming algorithm and the greedy algorithm by using two models of OFDMA for
multicast scheduling and after performance evaluation we select the best model and the algorithm for
transmission. We further improve the throughput via retransmission of lost packets during data transfer over the
specified network. We can detect the packet loss by packet synchronization technique and a request will be sent
by the destination for re-sending the lost packets which is called as Re-Transmission.[1]
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
Supporting efficient and scalable multicastingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Energy efficient and reliable communication in IEEE 802.15.6 IR UWB WBANaravind m t
This paper presents an exhaustive study on the use of one-relay and two-relay cooperative communication schemes and 2-hop communication scheme for improving the energy efficiency and reliability of ultra-wideband based wireless body area networks (UWB WBANs). Various investigations have been performed to study the impact of the parameters like packet size, hop distance, transmit power and channel error rate on the energy efficiency and reliability. An optimal packet size is obtained for the maximization of energy efficiency for both on-body communication and in-body communication. The analytical and simulation results show enhanced reliability with cooperative communication than direct communication and 2-hop communication, for all values of source to destination distances. The results also depict a threshold behaviour for energy efficiency which separates the hoplength for direct transmission from the hoplength where cooperation and 2-hop communication will be useful. The simulation results reveal that if the channel conditions are poor, when the source to destination distance is larger than the threshold value, 2-hop communication gives higher energy efficiency compared with direct and cooperative communications.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
With the next-generation cellular networks making a transition toward smaller cells, two-hop
orthogonal frequency-division multiple access (OFDMA) relay networks have become a dominant, mandatory
component in the 4G standards (WiMAX802.16j, 3GPP LTE-Adv.). Here we are using the multicasting strategy
Given the growing importance of multimedia broadcast and multicast services (MBMS) in 4G networks, the
latter forms the focus of this project. The main aim of this project is to improve the performance of the OFDMA
based relay networks. The OFDMA transmission Scheme is a widely accepted scheme for improving the quality
and speed of communication over the 4G cellular network. There are two different models designed for OFDMA
relay networks .Distributed (DP) and Contiguous (CP) permutations. We are checking the performance of two
algorithms The linear programming algorithm and the greedy algorithm by using two models of OFDMA for
multicast scheduling and after performance evaluation we select the best model and the algorithm for
transmission. We further improve the throughput via retransmission of lost packets during data transfer over the
specified network. We can detect the packet loss by packet synchronization technique and a request will be sent
by the destination for re-sending the lost packets which is called as Re-Transmission.[1]
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Kumar Goud
Abstract: - Multiple Inputs and Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM) system have the potential to attain high capability on the propagation setting. The aim of this paper is that the adaptive resource allocation in MIMO-OFDM system uses the water filling formula. Water filling answer is enforced for allocating the ability so as to extend the data rate. The overall system capability is maximised subject to the constraints on total power, signal to noise quantitative relation, and proportionality. Channel is assumed as a flat attenuation channel and therefore the comparison is created for various 2×2, 2×3, 3×2 and 4×4 MIMO-OFDM systems and water filling formula with allotted power. Supported the capability contribution from the relaying terminal, a brand new parameter referred to as cooperation constant is introduced as an operate of the relaying sub channel. This parameter is employed to switch the target parameter of the subcarrier allocation procedure. Fairness-oriented [Fading Channel] and throughput-oriented [Near finish Channel] algorithms square measure elite from the literature to check the planned technique. Each algorithms square measure changed to use the mean of cooperation constant within the objective parameter of the subcarrier allocation procedure and shown to own a much better total turnout with none sacrifice.
Keywords - MIMO-OFDM; Water filling Algorithm; Subcarrier Resource Allocation
Supporting efficient and scalable multicastingingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Energy efficient and reliable communication in IEEE 802.15.6 IR UWB WBANaravind m t
This paper presents an exhaustive study on the use of one-relay and two-relay cooperative communication schemes and 2-hop communication scheme for improving the energy efficiency and reliability of ultra-wideband based wireless body area networks (UWB WBANs). Various investigations have been performed to study the impact of the parameters like packet size, hop distance, transmit power and channel error rate on the energy efficiency and reliability. An optimal packet size is obtained for the maximization of energy efficiency for both on-body communication and in-body communication. The analytical and simulation results show enhanced reliability with cooperative communication than direct communication and 2-hop communication, for all values of source to destination distances. The results also depict a threshold behaviour for energy efficiency which separates the hoplength for direct transmission from the hoplength where cooperation and 2-hop communication will be useful. The simulation results reveal that if the channel conditions are poor, when the source to destination distance is larger than the threshold value, 2-hop communication gives higher energy efficiency compared with direct and cooperative communications.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the
performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the
literature. In this investigation, we consider both deterministic and random channel models to investigate their effects on ad hoc networks. We consider two different types of routing protocols namely single path and multipath routing protocols. We choose Destination Sequence Distance Vector (DSDV), Dynamic Source Routing Protocol (DSR), and Ad-hoc On-Demand Distance Vector (AODV) as the single path routing protocols. On the other hand, we choose Ad-hoc On-Demand Multiple Path Distance Vector (AOMDV) as the multipath routing protocol. The results show that some single path routing protocol can outperform multipath routing protocol under both deterministic and random channel conditions. These results surprisingly contradict the popular claim that multipath routing protocol always outperforms single path routing protocol. A guideline for choosing an appropriate routing protocol for adhoc network has also been provided in this work.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
The telecommunication system includes the
transmission of a data bearing electromagnetic signal
through a physical medium that differentiates the
transmitter from the receiver. The relative effect of these
elements on reliable communication relies on upon the rate
of data transmission, on the craved loyalty upon gathering,
and on whether communication must happen in "real
time", for example as in phone conversations and video
teleconferencing. Moreover, microwaves are generally
utilized for point-to-point communications. Doubtlessly,
the telecom area has got a considerable measure of profit
from that communication technology additionally causes
some exception issues. Working with equipment that
works in this district obliges exceptional knowledge and
skills impressively unique in relation to those required for
traditional electronic equipment. Be that as it may, this
paper has examined for the issues of microwave
installation and demonstrates the accurate solutions for
the successful mobile communication world.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS cscpconf
A wireless ad-hoc network is a collection of nodes which are selfconfiguring,
connected by wireless links. The nodes are free to move randomly and
organize themselves arbitrarily; thus, the network's topology may change rapidly and
unpredictably. These kinds of networks are very flexible and they do not require any
existing infrastructure. Therefore, ad-hoc wireless networks are suitable for temporary
communication links. The biggest challenge in these kinds of networks is to find a path
between the communication end points of nodes that are mobile. Due to the limited
transmission range of wireless interfaces, the communication traffic has to be relayed
over several intermediate nodes to enable the communication between two nodes.
Therefore, these kinds of networks are also called multi-hop ad-hoc networks. The
proposed model is designed to improve the problems of real-time event-based
communication. It improves the packet delivery ratio by prior prediction and reduces
end-to-end packet delay. This in turn improves performance of the routing process
significantly and increases the Quality of Service (QoS).
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
Abstract : Earlier work on routing MANETs developed several routing protocols, which finds available route from source to destination without taking into the consideration of Band width availability for data transfer, and they frequently fails to discover stable routes between source and destination. As a result of that there is a large numbers of discarding of data packets as well as overloading of packets as the consequences of that large wastage of band width. EUBLAR (Efficient Utilization of band width in Location Aided Routing) protocol is introduced in this proposed work, which is capable of calculating the available band width of all the intermediate nodes between source and destination. In this proposed protocol find the minimum available band width of all the intermediate nodes between source and destination and then according to that band width sends the data packets over that path. The EUBLAR can effectively utilized the wastage of band width and every single band width can be used for data transfer can be used over entirely configured network. In this way we can increase the quality of service of the Ad- hoc network in terms of bandwidth. Keywords: Ad Hoc Networks, Global Positioning System, Maximum & Minimum slopes, Minimum available Bandwidth, Time to Live
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Rate Adaptation for Time Varying Channels Using Distributed Relay Selectionpaperpublications3
Abstract: Fixed systems used in cooperative communication suffer from multiplexing loss and low spectral efficiency due to the half duplex constraint of relays. To improve the multiplexing gain, successive relaying is proposed. This allows concurrent transmission of the source and relays. However, the severe inter-relay interference becomes a key challenge. Here Rate Adaptation for Time Varying Channels Using Distributed Relay Selection is proposed, which is capable of adapting the relay’s rate using distributed relay selection.
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
Efficient utilization of radio resources in wireless networks is crucial and has been investigated extensively. This letter considers a wireless relay network where multiple user pairs conduct bidirectional communications via multiple relays based on orthogonal frequency-division multiplexing (OFDM) transmission. The joint optimization of channel and relay assignment, including subcarrier pairing, subcarrier allocation as well as relay selection, for total throughput maximization is formulated as a combinatorial optimization problem. Using a graph theoretical approach, we solve the problem optimally in polynomial time by transforming it into a maximum weighted bipartite matching (MWBM) problem. Simulation studies are carried out to evaluate the network total throughput versus transmit power per node and the number of relay nodes
Similar to Dual polarised directional antenna based communication (20)
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
When stars align: studies in data quality, knowledge graphs, and machine lear...
Dual polarised directional antenna based communication
1. Dual Polarized Directional
Antenna based Communication
Authors: Dr. Rinki Sharma, Dr. Govind R. Kadambi, Dr. Yuri Vershinin, Mr.
Mukundan K. N.
1
2. Overview of the Presentation
Outline
• Motivation of Research Topic
• Academic Gaps
• Research Questions and Answers
• Original Contributions
• Research outcome of thesis
• Recommendations for Future Work
2
3. Motivation of the Research
Enabling
Technology
•Mobile Ad-hoc Networks (MANETs) allow network
establishment during emergency and rescue operations during
natural disasters
•Popular due to ease of deployment without investing in
infrastructure
MANET
Challenges
•Limitation of throughput in communication over MANETs [1]
•Route breakages [2]
•Limited lifetime of participating nodes [3]
3
4. Motivation of the Research
Attributed to
•Limited bandwidth of wireless channel
•Interference and exposed nodes due to omnidirectional
communication [4]
•Deafness and directional exposed nodes due to directional
communication [5]
•Node mobility
•Hidden nodes Packet collision loss of information
•Limited battery power reduced node lifetime inactive
nodes 4
5. Motivation of the Research
•Define a method to overcome bandwidth limitation and
interference in wireless channel: Orthogonal polarisations of
antenna as separate channels for simultaneous
communication
•Overcome interference and exposed nodes: Through
directional communication
•Overcome deafness and directional exposed nodes: Dual
Polarised Directional Antenna based Medium Access Control
(DPDA-MAC) protocol and exchange of Link ID
information [6]
5
Arising Need
To
6. Motivation of the Research
•Achieve efficient routing of information in the presence of
node mobility: Dual Polarised Directional Antenna based
Multipath Routing Protocol (DPDA-MRP) [7]
•Define a method to handle collision of broadcast packet due
to hidden node problem: Transmission of Collision Detection
Pulse
•Provision for energy efficient communication among nodes:
Dynamic power control [8]
6
Arising Need
To
8. Academic Gaps and Significance
8
Gaps Identified Research Significance
Simultaneous data transfer over
orthogonal polarisations has not been
studied in MANETs
Enhanced throughput and bandwidth
utilization, reduced interference
Space reuse (directional antenna) leads
to deafness
Overcoming deafness to enhance network
throughput
Degradation of network throughput
over multihop communication
Throughput enhancement despite multihop
communication
9. Research Question 1
9
Question
What are the modifications needed in the existing Physical layer of conventional MANET protocol
stack to incorporate the concept of Dual Polarised Directional Antenna (DPDA) based communication
to mitigate the interference and realize better space reuse?
• Objective 3: To study the
effects of dual polarisation
on the efficiency of
simulated MANET system
by minimizing the
problem of interference
Solution Significance
• Simultaneous use of orthogonal polarisations of
antenna for data communication between nodes
• Capability of simultaneous directional
communication over orthogonal polarisations to
mitigate interference and achieve better space reuse
10. Research Question 2
10
Question
With the modified physical layer to support DPDA based concept of communication, will it be
possible to develop a DPDA-MAC protocol in MAC layer to mitigate the problems of exposed nodes,
directional exposed nodes and deafness?
Solution
• Objective 4: To study the
effects of dual polarisation
on the efficiency of
simulated MANET system
by avoiding the problem of
exposed nodes
• Objective 5: To study the
effects of the exchange of
link ID information on the
problem of deafness of a
node caused by the
directional antenna
Significance
• Dual Polarised Directional Antenna based Medium Access Control
(DPDA-MAC) protocol is developed to overcome problems of:
• Exposed nodes
• Directional exposed nodes
• Deafness
• Exchange of Link ID broadcast while carrying out dual polarized
directional communication
• Exchange of Link ID broadcasts facilitates maintenance of neighbour
tables for efficient operation of DPDA-MAC protocol
11. 11
Research Question 3
Question
Solution Significance
Is it possible to develop a method for efficient handling of collision of broadcast packets caused
due to hidden node problem, to develop a well populated neighbor table and routing table to
facilitate efficient routing of information from source to destination nodes?
Objective 5: To study the effects of
the exchange of link ID information
on the problem of deafness of a node
caused by the directional antenna
Objective 7: To arrive at an
appropriate protocol for robust and
efficient multipath routing system
• Hidden node problem leads to collision of packets
• Collisions of Link ID broadcasts and RREQ frames deter
efficient discovery of neighbour nodes and multiple
routes
• Collision Detection Pulse (CDP) based method to handle
collisions of Link ID broadcasts and RREQ frames
12. 12
Research Question 4
Question
Solution Significance
With the modified physical and MAC layers, can a DPDA based Multipath Routing Protocol (DPDA-MRP)
be developed in network layer to facilitate the discovery of multiple routes between the source and destination
nodes to route information in accordance with the DPDA based communication, to arrive at a cross layer
solution in MANETs?
Objective 7: To arrive at
an appropriate protocol for
robust and efficient
multipath routing system
• Dual Polarised Directional Antenna based Multipath Routing
Protocol (DPDA-MRP) for multihop communication in MANETs
• DPDA-MRP supports routing of information in accordance with
dual polarized directional communication at physical layer and
MAC layer, thus providing a cross layer solution
13. 13
Research Question 5
Question
Is it possible to develop a scheme to impart the feature of dynamic transmission power
control to the arrived cross-layer solution of MANET for energy efficient dual polarized
directional communication?
Solution Significance
Objective 6: To study the effects
of the exchange of Received
Signal Strength Indicator (RSSI)
information among nodes for
efficient use of system power
• Presented cross-layer solution allows the control of
transmission power based on stored RSSI and
location information
14. 14
Research Question 6
Question
Will it be possible for the arrived cross-layer solution to handle the conceptual
constraints of hidden node, exposed node, deafness, density of nodes and mobility of
nodes to result in reliable routing of information from source and destination nodes of
a realistic MANET scenario?
Solution Significance
All the Objectives • Performance of the proposed cross-layer solution is
studied for different values of density and mobility of
nodes since, density and mobility of nodes affect the
performance of realistic MANET scenarios
17. Performance over Single Hop Communication
17
• Throughput comparison of DPDA-MAC and SPDA-MAC (Single Hop)
• At packet rate of 1 and 5 packets per second throughput of DPDA-MAC = SPDA-MAC
• At packet rate of 15 and 25 packets per second throughput of DPDA-MAC > SPDA-
MAC
• DPDA-MAC can handle high traffic loads of 25 packet per second by virtue of
availability of orthogonal polarisations for data communication
18. Performance over Multihop Communication
18
◼ Throughput comparison of DPDA-MRP and SPDA-MRP (Multihop)
• Throughput of DPDA-MRP > SPDA-MRP for
• All rates of packet transmission
• All values of node density
19. Original Contributions
• Physical Layer
• Dual polarised directional communication in MANETs [9]
• MAC Layer
• Dual Polarized Directional Antenna based Medium Access Control (DPDA-MAC)
protocol for single hop communication [6]
• Exchange of Link ID broadcasts and use of dual polarisation to mitigate deafness
[10]
• Collision Detection Pulse (CDP) based method to overcome loss of broadcast
information due to collisions [11]
• Network Layer
• Dual Polarised Directional Antenna based Multipath Routing Protocol (DPDA-
MRP) for multihop communication [7]
• Cross Layer
• Integrated layered solution to support dual polarised directional communication in
MANETs [9, 12]
19
20. Research Outcome of this Work
20
Sl.No Issue Before This Research After This Research
1 Data communication Limited to single
polarisation
Simultaneous use of orthogonal
polarisations made possible
2 Interference mitigation Directional communication
(space reuse)
Interference mitigation extended to
both space and polarisation reuse
3 Exposed nodes Exposed nodes mitigated
through space reuse, but
directional exposed nodes
prevailed
Space and polarisation reuse to
mitigate exposed node and directional
exposed node problem
4 Deafness Limited mitigation Wider mitigation
5 Hidden node Lack of collision detection
mechanism -> Unreliable
communication
Enhanced reliability of communication
6 Routing Directional routing with
single polarisation
Directional routing with dual
polarisation leading to better
throughput
7 Throughput Enhancement Space reuse
Per-hop:
Multihop:
Space and Polarisation reuse
Per-hop:
Multihop:
21. Recommendations for Future Work
Physical Layer:
• Simultaneous communication over multiple channels in orthogonal polarizations [13]
• Antenna design to enable dynamic switching between channels and polarizations
• Avoidance of deafness, hidden nodes and exposed nodes in dual polarization based
multichannel communication
• Routing of information in dual polarization based multichannel communication
MAC Layer:
• Solution to avoid delays in transmission of data packets in horizontal polarization caused
due to transmission of broadcasts only in vertical polarization in DPDA-MAC
Network Layer:
• Support for load sharing over multiple paths discovered by DPDA-MRP between source
and destination nodes
21
22. References
[1] Gopinath, T., Kumar, A. R., & Sharma, R. (2013, April). Performance evaluation of TCP and UDP over
wireless ad-hoc networks with varying traffic loads. In 2013 International Conference on Communication
Systems and Network Technologies (pp. 281-285). IEEE.
[2] Thriveni, H. B., Kumar, G. M., & Sharma, R. (2013, April). Performance evaluation of routing protocols in
mobile ad-hoc networks with varying node density and node mobility. In 2013 International Conference on
Communication Systems and Network Technologies (pp. 252-256). IEEE.
[3] Chilukuri, S., Sharma, R., Borade, D. R., & Kadambi, G. R. (2012). Simulation studies on an energy
efficient multipath routing protocol using directional antennas for manets. International Journal of Wireless
& Mobile Networks, 4(4), 123.
[4] Adere, K., & Murthy, G. R. (2010, September). Solving the hidden and exposed terminal problems using
directional-antenna based MAC protocol for wireless sensor networks. In 2010 Seventh International
Conference on Wireless and Optical Communications Networks-(WOCN) (pp. 1-5). IEEE.
[5] Sharma, R., Kadambi, G., Vershinin, Y. A., & Mukundan, K. N. (2016). A survey of MAC layer protocols to
avoid deafness in wireless networks using directional antenna. In Mobile Computing and Wireless
Networks: Concepts, Methodologies, Tools, and Applications (pp. 1758-1797). IGI Global.
[6] Sharma, R., Kadambi, G. R., Vershinin, Y. A., & Mukundan, K. N. (2015, April). Dual Polarised Directional
Communication based Medium Access Control Protocol for Performance Enhancement of MANETs.
In 2015 Fifth International Conference on Communication Systems and Network Technologies (pp. 185-
189). IEEE.
22
23. References
[7] Sharma, R., Kadambi, G. R., Vershinin, Y. A., & Mukundan, K. N. (2015, April). Multipath Routing Protocol to Support
Dual Polarised Directional Communication for Performance Enhancement of MANETs. In 2015 Fifth International
Conference on Communication Systems and Network Technologies (pp. 258-262). IEEE.
[8] Sandhya, C. H., Borade, D. R., Sharma, R., & Kadambi, G. R. (2012). Multi-dimensional Performance Characterization of
Directional Antennas for Applications in Energy Efficient Ad-Hoc Network. In Advances in Computing and Information
Technology (pp. 575-585). Springer, Berlin, Heidelberg.
[9] Rinki, S. (2014). Simulation studies on effects of dual polarisation and directivity of antennas on the performance of
MANETs (Doctoral dissertation, Ph. D. thesis, Coventry University, UK).
[10] Sharma, R., Kadambi, G. R., Vershinin, Y. A., & Mukundan, K. N. (2015, April). Deafness Avoidance in MANETs through
Exchange of Link ID Broadcasts. In 2015 Fifth International Conference on Communication Systems and Network
Technologies (pp. 159-163). IEEE.
[11] Sharma, R., Kadambi, G. R., & Mukundan, K. N. (2013). Method for handling collisions of broadcast packets due to
hidden node problem. ACM SIGBED Review, 10(2), 6-10.
[12] Kadambi, Govind Rangaswamy, Rinki Sharma, and Shiva Kumar Ponnuraj. "Ad hoc network." U.S. Patent 9,408,242,
issued August 2, 2016.
[13] Sandhya, C. H., Borade, D. R., Sharma, R., & Kadambi, G. R. (2012). Multi-dimensional Performance Characterization of
Directional Antennas for Applications in Energy Efficient Ad-Hoc Network. In Advances in Computing and Information
Technology (pp. 575-585). Springer, Berlin, Heidelberg
23