This document summarizes three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Zone Routing Protocol (ZRP), and Destination-Sequenced Distance-Vector Routing (DSDV). It compares reactive and proactive routing protocols, and classifies ZRP as a hybrid protocol. The document provides an overview of the challenges of routing in mobile ad hoc networks and categorizes common routing protocols as proactive, reactive, or hybrid.
The International Journal of Engineering and Sciencetheijes
The document summarizes a study on three routing protocols for mobile ad hoc networks: DSR, ZRP, and DSDV. It describes how ad hoc networks operate without fixed infrastructure and classify routing protocols as proactive, reactive, or hybrid. Proactive protocols continuously evaluate routes and maintain up-to-date network maps, while reactive protocols determine routes on demand when needed. ZRP is a hybrid protocol that takes advantages of both approaches. The document then compares the characteristics of reactive and proactive protocols and analyzes the three protocols studied in terms of these characteristics.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
This document reviews and compares 8 different routing protocols for ad hoc mobile wireless networks. It first divides routing protocols into two categories: table-driven protocols that aim to maintain consistent and up-to-date routing information between all nodes, and source-initiated on-demand protocols that only create routes when needed. It then describes 4 table-driven protocols - DSDV, WRP, CGSR, and GSR - and 4 on-demand protocols - AODV, DSR, LMR, and ABR. Finally, it qualitatively compares the protocols based on characteristics like routing overhead, packet delivery ratio, and scalability.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with
each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation
and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive &
hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the
Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed
simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed &
battery consumption. It has been observed that RIP has better network lifetime than other
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
This document provides an overview of mobile ad hoc networks (MANETs), including their characteristics, applications, routing protocols, attacks, and performance metrics. Some key points:
- MANETs are temporary networks formed without centralized administration between mobile nodes. Routing is challenging due to frequent topology changes from node mobility.
- Common routing protocols include proactive (table-driven), reactive (on-demand), and hybrid. Proactive maintains routing tables even without need, while reactive establishes routes on demand.
- Attacks on MANETs include location disclosure, black holes, replays, wormholes, and denial of service. Performance is evaluated using metrics like throughput, packet delivery ratio, and end-to
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
This document summarizes and compares two multicast routing protocols for mobile ad hoc networks: PUMA and ODMRP. It begins with an introduction to ad hoc networks and multicast routing. It then provides details on PUMA, a receiver-initiated protocol where receivers elect a core node to reduce flooding. PUMA establishes a mesh structure along shortest paths from the core to group members. ODMRP is a mesh-based protocol that maintains multiple paths between sources and receivers through periodic control messages. It is more resilient to failures but has higher overhead than PUMA. The document analyzes the algorithms, advantages, and disadvantages of each protocol.
This document summarizes and compares three routing protocols for mobile ad hoc networks (MANETs): AODV, DSR, and DSDV. It describes that MANETs are infrastructureless wireless networks without centralized administration. Routing in MANETs is complex due to frequent changes in network topology as nodes move. The document then provides an overview of AODV as a reactive routing protocol that establishes routes on demand, DSR as another reactive source-initiated protocol using source routing, and DSDV as a proactive table-driven protocol that maintains routing tables. It notes that AODV routing messages require little processing to minimize overhead and allows quick reaction to link breaks.
The International Journal of Engineering and Sciencetheijes
The document summarizes a study on three routing protocols for mobile ad hoc networks: DSR, ZRP, and DSDV. It describes how ad hoc networks operate without fixed infrastructure and classify routing protocols as proactive, reactive, or hybrid. Proactive protocols continuously evaluate routes and maintain up-to-date network maps, while reactive protocols determine routes on demand when needed. ZRP is a hybrid protocol that takes advantages of both approaches. The document then compares the characteristics of reactive and proactive protocols and analyzes the three protocols studied in terms of these characteristics.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
This document reviews and compares 8 different routing protocols for ad hoc mobile wireless networks. It first divides routing protocols into two categories: table-driven protocols that aim to maintain consistent and up-to-date routing information between all nodes, and source-initiated on-demand protocols that only create routes when needed. It then describes 4 table-driven protocols - DSDV, WRP, CGSR, and GSR - and 4 on-demand protocols - AODV, DSR, LMR, and ABR. Finally, it qualitatively compares the protocols based on characteristics like routing overhead, packet delivery ratio, and scalability.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with
each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation
and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive &
hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the
Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed
simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed &
battery consumption. It has been observed that RIP has better network lifetime than other
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
This document provides an overview of mobile ad hoc networks (MANETs), including their characteristics, applications, routing protocols, attacks, and performance metrics. Some key points:
- MANETs are temporary networks formed without centralized administration between mobile nodes. Routing is challenging due to frequent topology changes from node mobility.
- Common routing protocols include proactive (table-driven), reactive (on-demand), and hybrid. Proactive maintains routing tables even without need, while reactive establishes routes on demand.
- Attacks on MANETs include location disclosure, black holes, replays, wormholes, and denial of service. Performance is evaluated using metrics like throughput, packet delivery ratio, and end-to
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
This document summarizes and compares two multicast routing protocols for mobile ad hoc networks: PUMA and ODMRP. It begins with an introduction to ad hoc networks and multicast routing. It then provides details on PUMA, a receiver-initiated protocol where receivers elect a core node to reduce flooding. PUMA establishes a mesh structure along shortest paths from the core to group members. ODMRP is a mesh-based protocol that maintains multiple paths between sources and receivers through periodic control messages. It is more resilient to failures but has higher overhead than PUMA. The document analyzes the algorithms, advantages, and disadvantages of each protocol.
This document summarizes and compares three routing protocols for mobile ad hoc networks (MANETs): AODV, DSR, and DSDV. It describes that MANETs are infrastructureless wireless networks without centralized administration. Routing in MANETs is complex due to frequent changes in network topology as nodes move. The document then provides an overview of AODV as a reactive routing protocol that establishes routes on demand, DSR as another reactive source-initiated protocol using source routing, and DSDV as a proactive table-driven protocol that maintains routing tables. It notes that AODV routing messages require little processing to minimize overhead and allows quick reaction to link breaks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
This paper analyzes the performance of three routing protocols (AODV, DSDV, OLSR) for mobile WiMAX networks using the random direction mobility model in NS3 simulator. The protocols are evaluated based on routing overhead, packet delivery ratio, throughput, end-to-end delay, and packet loss. The results found that OLSR protocol outperformed AODV and DSDV, with lower routing overhead and higher packet delivery ratio, demonstrating improved efficiency for WiMAX networks.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as wireless networks without fixed infrastructure where nodes are free to move and dynamically self-organize. Key points:
- MANETs are formed spontaneously as nodes connect via wireless links without centralized administration.
- Each node acts as a router, forwarding data for other nodes. Network topology changes frequently as nodes move.
- Examples of MANET applications include military operations, emergency response, classroom environments, and home/office networks.
- Challenges for MANET routing protocols include dynamic topology, limited resources, and network security. Common routing approaches include proactive, reactive, and geographic routing.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes modeling and analysis of a self-excited slip ring induction generator (SESRIG) using the Newton-Raphson method. Key points:
1) A SESRIG uses a rotor resistance controller and external capacitance to self-excite without a grid connection. This allows independent control of voltage and frequency over a wide speed range by varying the rotor resistance.
2) An equivalent circuit model of the SESRIG is developed. The Newton-Raphson method is then applied to solve the model equations for the frequency and voltage characteristics as a function of rotor resistance.
3) Experimental results are presented to verify the control method. A closed-loop scheme using
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document summarizes two algorithms for XML tree pattern matching: TwigStack and TwigStackList. TwigStack avoids generating unnecessary intermediate results and scanning irrelevant data, but maintains redundancy. TwigStackList combines TwigStack with lists to reduce intermediate results and redundancy for large queries. It operates in two phases, first generating partial solutions and then merging them. Experimental results show TwigStackList improves efficiency over TwigStack, especially for complex queries.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes a system to control a robotic arm wirelessly using gestures detected by an accelerometer. The system uses an ADXL335 accelerometer attached to a human arm to capture gestures. An Arduino microcontroller digitizes the analog accelerometer and flex sensor data and sends the data wirelessly to an LPC1768 Cortex M3 microcontroller board. The LPC1768 controls the movements of a 5-axis robotic arm through motor drivers based on the received gesture character commands. The goal is to allow more intuitive control of industrial robots through wireless gesture recognition compared to traditional teach pendants.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes research on the motion analysis of a band release system used in aerospace vehicles. Modal analysis was conducted on the band and wedge block to determine modal frequencies. Ten mode shapes were extracted. Motion analysis was then conducted in ADAMS software to analyze displacement, velocity, and acceleration of the wedge block and band after actuation of a pyro-thruster. Analytical methods were also used to calculate strain energy stored in the band and its conversion to kinetic energy upon release to understand system behavior. The goal was to assess whether a clean separation occurs between components after band release.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a real-time vehicle license plate identification system (RTVLPIS) developed using image processing techniques in MATLAB. The system takes an image of a vehicle, extracts the license plate region using edge detection and segmentation, isolates the characters, and performs optical character recognition to identify the license plate numbers. The key steps involve image acquisition, thresholding, edge detection, noise elimination, segmentation, and character recognition. The system has applications in areas like parking management, border control, toll collection and traffic monitoring.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes an experiment studying the influence of Exhaust Gas Recirculation (EGR) on engine components and lubricating oil condition. Engine tests were conducted with and without EGR to evaluate its effects. Tests included measuring properties of engine components initially and after 410 hours of operation, and collecting lubricating oil samples every 50 hours. An EGR system was installed on the test engine including exhaust piping, EGR valves, sensors to monitor engine speed and coolant temperature, and an electronic control unit. The goal was to compare friction and wear characteristics with EGR to the normal operating engine and validate test parameters.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes multiple circuit topologies for voltage controlled oscillators (VCOs) that can operate across multiple communication standards. It discusses switched capacitor VCOs, conventional LC tank VCOs, and active inductor VCOs. It also reviews applications of VCOs and background topics like wideband receivers, double-driven coupled resonators, switched capacitor circuits, and low-voltage VCO design. The document aims to present circuit topologies that can enable multi-standard functionality in VCOs used in wireless devices.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
This paper analyzes the performance of three routing protocols (AODV, DSDV, OLSR) for mobile WiMAX networks using the random direction mobility model in NS3 simulator. The protocols are evaluated based on routing overhead, packet delivery ratio, throughput, end-to-end delay, and packet loss. The results found that OLSR protocol outperformed AODV and DSDV, with lower routing overhead and higher packet delivery ratio, demonstrating improved efficiency for WiMAX networks.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
This document provides an overview of mobile ad hoc networks (MANETs). It defines MANETs as wireless networks without fixed infrastructure where nodes are free to move and dynamically self-organize. Key points:
- MANETs are formed spontaneously as nodes connect via wireless links without centralized administration.
- Each node acts as a router, forwarding data for other nodes. Network topology changes frequently as nodes move.
- Examples of MANET applications include military operations, emergency response, classroom environments, and home/office networks.
- Challenges for MANET routing protocols include dynamic topology, limited resources, and network security. Common routing approaches include proactive, reactive, and geographic routing.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes modeling and analysis of a self-excited slip ring induction generator (SESRIG) using the Newton-Raphson method. Key points:
1) A SESRIG uses a rotor resistance controller and external capacitance to self-excite without a grid connection. This allows independent control of voltage and frequency over a wide speed range by varying the rotor resistance.
2) An equivalent circuit model of the SESRIG is developed. The Newton-Raphson method is then applied to solve the model equations for the frequency and voltage characteristics as a function of rotor resistance.
3) Experimental results are presented to verify the control method. A closed-loop scheme using
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document summarizes two algorithms for XML tree pattern matching: TwigStack and TwigStackList. TwigStack avoids generating unnecessary intermediate results and scanning irrelevant data, but maintains redundancy. TwigStackList combines TwigStack with lists to reduce intermediate results and redundancy for large queries. It operates in two phases, first generating partial solutions and then merging them. Experimental results show TwigStackList improves efficiency over TwigStack, especially for complex queries.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes a system to control a robotic arm wirelessly using gestures detected by an accelerometer. The system uses an ADXL335 accelerometer attached to a human arm to capture gestures. An Arduino microcontroller digitizes the analog accelerometer and flex sensor data and sends the data wirelessly to an LPC1768 Cortex M3 microcontroller board. The LPC1768 controls the movements of a 5-axis robotic arm through motor drivers based on the received gesture character commands. The goal is to allow more intuitive control of industrial robots through wireless gesture recognition compared to traditional teach pendants.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes research on the motion analysis of a band release system used in aerospace vehicles. Modal analysis was conducted on the band and wedge block to determine modal frequencies. Ten mode shapes were extracted. Motion analysis was then conducted in ADAMS software to analyze displacement, velocity, and acceleration of the wedge block and band after actuation of a pyro-thruster. Analytical methods were also used to calculate strain energy stored in the band and its conversion to kinetic energy upon release to understand system behavior. The goal was to assess whether a clean separation occurs between components after band release.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes a real-time vehicle license plate identification system (RTVLPIS) developed using image processing techniques in MATLAB. The system takes an image of a vehicle, extracts the license plate region using edge detection and segmentation, isolates the characters, and performs optical character recognition to identify the license plate numbers. The key steps involve image acquisition, thresholding, edge detection, noise elimination, segmentation, and character recognition. The system has applications in areas like parking management, border control, toll collection and traffic monitoring.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes an experiment studying the influence of Exhaust Gas Recirculation (EGR) on engine components and lubricating oil condition. Engine tests were conducted with and without EGR to evaluate its effects. Tests included measuring properties of engine components initially and after 410 hours of operation, and collecting lubricating oil samples every 50 hours. An EGR system was installed on the test engine including exhaust piping, EGR valves, sensors to monitor engine speed and coolant temperature, and an electronic control unit. The goal was to compare friction and wear characteristics with EGR to the normal operating engine and validate test parameters.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes multiple circuit topologies for voltage controlled oscillators (VCOs) that can operate across multiple communication standards. It discusses switched capacitor VCOs, conventional LC tank VCOs, and active inductor VCOs. It also reviews applications of VCOs and background topics like wideband receivers, double-driven coupled resonators, switched capacitor circuits, and low-voltage VCO design. The document aims to present circuit topologies that can enable multi-standard functionality in VCOs used in wireless devices.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document discusses using the Radon transform to estimate scaling and rotation between two images of the same object. It first extracts features from both images using active contours and level sets. Control points are identified from the extracted features. Triangles are formed by connecting control points and Radon transforms are applied to determine scaling. Lines between control points are used with Radon transforms to determine rotation by finding the angle difference that produces maximum correlation. The method is demonstrated on images of a building that is scaled and rotated. Scaling of 1.8251 and rotation of 37 degrees are accurately estimated when features are well extracted.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Survey of Reactive Routing Protocols for MANETIOSR Journals
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator. Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses the characteristics of MANETs and challenges in routing. It classifies routing protocols into three categories: proactive, reactive, and hybrid. Proactive protocols continuously maintain up-to-date routing information through periodic updates. Reactive protocols find routes on demand via route discovery. Hybrid protocols incorporate aspects of both proactive and reactive routing. Examples of protocols from each category are described and compared, including DSDV, AODV, DSR, ZRP, and CEDAR. The document concludes routing in MANET is an active area of research with the goal of protocols responding rapidly to topological changes.
This document provides a summary of routing protocols in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and their characteristics. It then discusses why traditional routing protocols are not suitable for MANETs and describes some common MANET routing protocols, classifying them as proactive (table-driven) or reactive (on-demand). Specifically, it provides detailed descriptions of the reactive protocols DSR and AODV, covering topics like route discovery, maintenance, and deletion. Finally, it compares these protocols and discusses which may be better suited under different network conditions.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
This document summarizes a research paper that analyzes the performance of the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks (MANETs) in terms of energy consumption. It proposes an Energy Secure DSR (ESDSR) protocol that modifies DSR to optimize energy consumption by not including nodes with low energy in route selection. Simulations using the NS-3 network simulator show that ESDSR has better performance than DSR in terms of energy consumption, delay, throughput, and packet delivery ratio.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
Abstract: A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive & hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed & battery consumption. It has been observed that RIP has better network lifetime than other.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
This document reviews secure routing techniques for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses their decentralized nature and infrastructureless architecture. It then describes different routing protocols for MANETs including proactive, reactive, and hybrid protocols. The document outlines various attacks possible in MANETs such as active and passive attacks. It provides details about the jellyfish attack, which aims to reduce network performance by disrupting TCP connections. The literature survey presented summarizes several papers analyzing and comparing the performance of various MANET routing protocols under different attacks such as the jellyfish attack. The conclusion is that secure and efficient routing techniques are needed to detect and isolate malicious nodes in MANETs.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
This document summarizes a research paper that proposes a new routing algorithm for mobile ad hoc networks using fuzzy logic. The algorithm considers three input variables - signal power, mobility, and delay. It defines fuzzy sets and membership functions to map crisp normalized values of these variables to linguistic values. Rules are written to relate the input and output linguistic variables. The output represents the optimal route. The algorithm aims to address routing problems related to bandwidth, signal power, mobility, and delay in a distributed manner without relying on centralized control. It is designed to quickly adapt to changes in network topology.
This document analyzes and compares the performance of three mobile ad hoc network (MANET) routing protocols - Dynamic MANET On-demand (DYMO), Landmark Ad hoc routing (LANMAR), and Source Tree Adaptive routing (STAR) - under varying network sizes using simulation. The protocols were evaluated based on average jitter, average end-to-end delay, throughput, and packet delivery ratio. The simulation results showed that DYMO generally had the best performance in terms of throughput and packet delivery ratio across different network sizes, while STAR performed best in terms of average jitter and end-to-end delay for most network sizes. LANMAR's performance degraded significantly for larger network sizes according to the metrics analyzed.
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSJYoTHiSH o.s
Every protocol has its advantages and disadvantages in different scenarios. The choice of a routing protocol should be made carefully after considering every aspect we provided in this section (and possibly more).
Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
IJERD (www.ijerd.com) International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 7 (August 2012), PP. 45-51
Energy Efficient Routing Protocols in Mobile Ad hoc Networks
Ajay Shah1, Hitesh Gupta2, Mukesh Baghel3
1,2,3
PCST, Bhopal
Abstract—In wireless network can classified in two way one is infrastructure network and another is infrastructure less.
Infrastructure less wireless network is known as Ad-hoc network. Instead of relying on a base station to coordinate the
flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
"Adhoc" is a Latin word its means "for this purpose." It is used to explain solutions that are developed for a specific
purpose. In computer networking, an ad-hoc networks all nodes are mobile and can be connected dynamically in an
arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to
other nodes in the network.In this paper, the three routing protocols are studied i.e. DSR, ZRP, DSDV
Keywords—Mobile ad hoc network, ad hoc network, DSR, ZRP, DSDV
I. INTRODUCTION
A mobile ad-hoc network (MANET) group has been formed within IETF. The primary focus of this working group
is to develop and evolve MANET specifications and introduce them to the Internet standard track. The goal is to support
mobile ad-hoc networks with hundreds of routers and solve challenges in this kind of network. Some challenges that ad-hoc
networking faces are limited wireless transmission range, hidden terminal problems, packet losses due to transmission errors,
mobility induced route changes, and battery constraints. Mobile ad-hoc networks could enhance the service area of access
networks and provide wireless connectivity into areas with poor or previously no coverage Connectivity to wired
infrastructure will be provided through multiple gateways with possibly different capabilities and utilization. To improve
performance, the mobile host should have the ability to adapt to variation in performance and coverage and to switch
gateways when beneficial. To enhance the prediction of the best overall performance, a network layer metric has a better
overview of the network. Ad-hoc networking brings features like easy connection to access networks, dynamic multihop
network structures, and direct peer-to-peer communication. The multihop property of an ad-hoc network needs to be bridged
by a gateway to the wired backbone. The gateway must have a network interface on both types of networks and be a part of
both the global routing and the local ad-hoc routing. Users could benefit from ubiquitous networks in several ways. User
mobility enables users to switch between devices, migrate sessions, and still get the same personalized services. Host
mobility enables the users’ devices to move around the networks and maintain connectivity and reachability. Wireless
networks can be classified in two types: First, infrastructure network which consists of a network with fixed and wired
gateways. A mobile host communicates with a bridge in the network (called base station) within its communication radius.
When it goes out of the range of one base station, it connects with a new fixed base station and starts communicating through
it.
Fig 1. Infrastructure less Wireless Network
Second, infrastructure less (ad-hoc) networks fig. 1: In ad-hoc networks all nodes are mobile and can be connected
dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and
maintenance of routes to other nodes in the network.
45
2. Energy Efficient Routing Protocols in Mobile Ad hoc Networks
Fig 2. Simple ad hoc Network
In this simple ad hoc network in fig 2. We take three nodes A,B,C. In this they create adhoc network for some time
for connecting to each other through this mobile adhoc network. They do not use any base station and router in this network.
There are number of routing protocols for ad hoc networks, they are categorized into two: Proactive Routing and Reactive
routing.
A. Classification Of Routing Protocols:
The routing protocols can be classified into two parts: 1. Proactive (Table driven), 2. Reactive (Source or Demand
driven) and 3. Hybrid Routing Protocols while depending on the network structure these are classified as flat routing,
hierarchical routing and geographic position assisted routing. Flat routing covers both routing protocols based on routing
strategy. The three ad hoc routing protocols are used, DSR, ZRP and DSDV. ZRP is Hybrid Routing Protocols DSR is
Reactive Protocol (Source driven) and DSDV is Proactive (Table driven) Routing protocol.
Fig 3. Adhoc Networking Protocols
A.1 Pro-active vs. reactive
The IETF MANET Working Group has researched and developed a number of protocols for mobile ad-hoc
networks, which have been described. These protocols can generally be categorized into two groups: pro-active and reactive
protocols. Pro-active protocols follow an approach similar to the one used in wired routing protocols. By continuously
evaluating the known and attempting to discover new routes, they try to maintain the most up-to-date map of the network.
This allows them to efficiently forward packets, as the route is known at the time when the packet arrives at the node. Pro-
active or table-driven protocols, in order to maintain the constantly changing network graph due to new, moving or failing
nodes, require continuous updates, which may consume large amounts of bandwidth – clearly a disadvantage in the wireless
world, where bandwidth is often sparse. Even worse so, much of the accumulated routing information is never used, since
routes may exist only for very limited periods of time. The family of Distance-Vector protocols, including Destination-
Sequenced Distance-Vector Routing, fall into the category of pro-active protocols. In contrast, reactive protocols determine
the proper route only when required, that is, when a packet needs to be forwarded. In this instance, the node floods the
network with a routerequest and builds the route on demand from the responses it receives. This technique does not require
constant broadcasts and discovery, but on the other hand causes delays since the routes are not already available.
Additionally, the flooding of the network may lead to additional control traffic, again putting strain on the limited
bandwidth. These reactive (or on-demand) protocols include Dynamic Source Routing (DSR) and Ad-hoc On demand
Distance Vector Routing (AODV), as well as the classical flooding algorithms.
A.2. HYBRID ROUTING PROTOCOL
Hybrid protocols are the combinations of reactive and proactive protocols and takes advantages of these two
protocols and as a result, routes are found quickly in the routing zone.
46
3. Energy Efficient Routing Protocols in Mobile Ad hoc Networks
Example Protocol: ZRP (Zone Routing Protocol), TORA (Temporally-Ordered Routing Algorithm)
II. RELATED WORK
The problem of routing in MANETs has received attention among researchers, and many routing protocols
devoted to MANETs have been proposed. According to their approaches for creating and maintaining routes, these protocols
can be divided into two main categories; proactive protocols and reactive ones. The proactive protocols, also called table
driven, establish routes in advance, and permanently maintain them, basing on the periodic routing table exchange.
Table 1: Comparison of Reactive and Proactive routing protocols
Reactive protocols Proactive Protocols
A route is built only when Attempt to maintain
required. consistent, up-to-date
Routing information from
each node to every other
node in the network.
No periodic updates. Control Constant propagation of
information is not routing information
propagated unless there is a periodically even when
change inthe topology topology change does not
occur.
First-packet latency is more First packet latency is less
when compared with table- when comparedwith on-
driven protocols because a demand protocols
route need to be built
Not available A route to every other node
in ad-hocnetwork is always
available
Table 2: Comparison of different routing protocols
III. DESCRIPTION OF SELECTED ROUTING PROTOCOLS
A. Dynamic Source Routing (DSR)
Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks and is based on a method known
as source routing. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one.
Except that each intermediate node that broadcasts a route request packet adds its own address identifier to a list carried in
the packet. The destination node generates a route reply message that includes the list of addresses received in the route
request and transmits it back along this path to the source. Route maintenance in DSR is accomplished through the
confirmations that nodes generate when they can verify that the next node successfully received a packet. These
confirmations can be link-layer acknowledgements, passive acknowledgements or network-layer acknowledgements
specified by the DSR protocol. However, it uses sourcerouting instead of relying on the routing table at each intermediate
device. When a node is not able to verify the successful reception of a packet it tries to retransmit it. When a finite number of
retransmissions fail, the node generates a route error message that specifies the problematic link, transmitting it to the source
node. When a node requires a route to a destination, which it doesn’t have in its route cache, it broadcasts a Route Request
(RREQ) message, which is flooded throughout the network. The first RREQ message is a broadcast query on neighbors
without flooding. Each RREQ packet is uniquely identified by the initiator’s address and the request id. A node processes a
route request packet only if it has not already seen the packet and its address is not present in the route record of the packet.
This minimizes the number of route requests propagated in the network. RREQ is replied by the destination node or an
intermediate node, which knows the route, using the Route Reply (RREP) message. The return route for the RREP message
may be one of the routes that exist in the route cache (if it exists) or a list reversal of the nodes in the RREQ packet if
47
4. Energy Efficient Routing Protocols in Mobile Ad hoc Networks
symmetrical routing is supported. In other cases the node may initiate it owns route discovery mechanism and piggyback the
RREP packet onto it. Thus the route may be considered unidirectional or bidirectional. DSR doesn’t enforce any use of
periodic messages from the mobile hosts for maintenance of routes. Instead it uses two types of packets for route
maintenance: Route Error (RERR) packets and ACKs. Whenever a node encounters fatal transmission errors so that the
route becomes invalid, the source receives a RERR message.
ACK packets are used to verify the correct operation of the route links. This also serves as a passive
acknowledgement for the mobile node. DSR enables multiple routes to be learnt for a particular destination. DSR does not
require any periodic update messages, thus avoiding wastage of bandwidth.
A. Advantages and Disadvantages
DSR uses a reactive approach which eliminates the need to periodically flood the network with table update
messages which are required in a table-driven approach. The intermediate nodes also utilize the route cache information
efficiently to reduce the control overhead. The disadvantage of DSR is that the route maintenance mechanism does not
locallyrepair a broken down link. The connection setup delay is higher than in table-driven protocols. Even though the
protocol performs well in static and low-mobility environments, the performance degrades rapidly with increasing mobility.
Also,considerable routing overhead is involved due to the source-routing mechanism employed in DSR. This routing
overhead is directly proportional to the path length.
B. Zone Routing Protocol (ZRP)
The Zone Routing Protocol, or ZRP, as described in this document combines the advantages of both into a hybrid
scheme, taking advantage of pro-active discovery within a node’s local neighborhood, and using a reactive protocol for
communication between these neighborhoods. As mentioned earlier, the ZRP is not so much a distinct protocol as it provides
a framework for other protocols. The separation of a nodes local neighborhood from the global topology of the entire
network allows for applying different approaches – and thus taking advantage of each technique’s features for a given
situation. These local neighborhoods are called zones (hence the name); each node may be within multiple overlapping
zones, and each zone may be of a different size. The “size” of a zone is not determined by geographical measurement, as one
might expect, but is given by a radius of length, where is the number of hops to the perimeter of the zone.
By dividing the network into overlapping, variable-size zones, ZRP avoids a hierarchical map of the network and
the overhead involved in maintaining this map. Instead, the network may be regarded as flat, and route optimization is
possible if overlapping zones are detected. While the idea of zones often seems to imply similarities with cellular phone
services, it is important to point out that each node has it’s own zone, and does not rely on fixed nodes (which would be
impossible in MANETs).
C. Destination-Sequenced Distance-Vector Routing (DSDV)
Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile
networks based on the Bellman-Ford algorithm. It eliminates route looping, increases convergence speed, and reduces
control message overhead.
48
5. Energy Efficient Routing Protocols in Mobile Ad hoc Networks
Fig 8: Illustration of DSDV.
In DSDV, each node maintains a next-hop table, which it exchanges with its neighbors. There are two types of
next-hop table exchanges: periodic full-table broadcast and event-driven incremental updating. The relative frequency of the
full-table broadcast and the incremental updating is determined by the node mobility. In each data packet sent during a next-
hop table broadcast or incremental updating, the source node appends a sequence number. This sequence number is
propagated by all nodes receiving the corresponding distance-vector updates, and is stored in the next-hop table entry of
these nodes. A node, after receiving a new next-hop table from its neighbor, updates its route to a destination only if the new
sequence number is larger than the recorded one, or if the new sequence number is the same as the recorded one, but the new
route is shorter. In order to further reduce the control message overhead, a settling time is estimated for each route. A node
updates to its neighbors with a new route only if the settling time of the route has expired and the route remains optimal.
Table 3: Parameter comparison for DSR,DSDV, ZRP
Table 4: Property comparison for DSR,DSDV, ZRP
IV. SIMULATION BASED ANALYSIS USING NETWORK SIMULATOR (NS-2.34)
A. Simulation Tool
The simulation tool used for analysis is NS-2.34 which is highly preferred by research communities. NS is a
discrete event simulator targeted at networking research. NS provides substantial support for simulation of TCP, routing, and
multicast protocols over wired and wireless (local and satellite) networks. NS2 is an object oriented simulator, written in
49
6. Energy Efficient Routing Protocols in Mobile Ad hoc Networks
C++, with an OTcl interpreter as a frontend. This means that most of the simulation scripts are created in Tcl (Tool
Command Language). If the components have to be developed for ns2, then both Tcl and C++ have to be used.
Fig 9. Packet delivery fraction vs. Pause time for 50-node model with 15 sources.
Fig 10. Average End-to-End Delay vs. Pause time forthe 50-node model with 15 sources.
V. CONCLUSION
It is difficult for the quantitative comparison of the most of the ad hoc routing protocols due to the fact that
simulations have been done independent of one another using different metrics and using different simulators. This paper
does the realistic comparison of three routing protocols AODV, TORA and DSDV. The significant observation is,
simulation results agree with expected results based on theoretical analysis. As expected, reactive routing protocol DSR
performance is the best considering its ability to maintain connection by periodic exchange of information, which is required
for ZRP and DSDV based traffic. DSDV performs predictably. Meanwhile DSDV was very good at all mobility rates and
movement speeds. Compared the On-Demand (DSR) , Table-Driven (DSDV) routing protocols and hybrid routing protocol
(ZRP) by varying the number of nodes and measured the metrics like end-end delay, dropped packets, As far as packet
delay and dropped packets ratio are concerned, DSR performs better than DSDV and ZRP with large number of nodes.
Hence for real time traffic DSR is preferred over ZRP and DSDV. For less number of nodes and less mobility, DSDV and
ZRP’s performance is superior.
VI. FUTURE SCOPE
The application developed can be further enhanced to include some new features that changes with time and new
technologies some of them includes the following features:
1. It can be used to transfer the larger packets, length by fragmenting at the sender side and de-fragmenting at the
receiver side.
2. The protocols which are having poor behaviors and correcting it is not simple. It is more than complex that of
writing a new protocol so in future the performance, quality gets enhanced.
REFERENCES
[1]. Prof. SaquibRazak, Providing explanation on how ad hoc network works and problem that we currently face, 2010.
[2]. Vivekkumar, Simulation and comparison of AODV and DSR Routing Protocols in MANETs, July 2009.
50