Abstract—In ad hoc networks, the data packets can be mainly classified into two categories – real time and
non-real time. Definitely the scheduling of real time data packets is going to be different from non-real time
ones. The deadline of delivery is a very important criterion to be met in case of real time packets. The other
requirements like velocity and energy concerns are enforced by the inherent dynamic nature of ad hoc
networks. Sometimes it becomes completely unnecessary to forward a real time data packet when the deadline
is impossible to meet or when the destination is on the verge of death. Also if the source nodes start sending
real time packets at a very high rate, then it will not only increase congestion in the network but also hamper
the forwarding of non real time packets since non real times have priority lesser than the real time packets.
The present algorithm FSRP is designed considering all these factors and the performance improvement it
produces is very significant compared to other state of the art scheduling protocols.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Design and implementation of low latency weighted round robin (ll wrr) schedu...ijwmn
Today’s wireless broadband networks are required to provide QoS guarantee as well as fairness to
different kinds of traffic. Recent wireless standards (such as LTE and WiMAX) have special provisions at
MAC layer for differentiating and scheduling data traffic for achieving QoS. The main focus of this paper is
concerned with high speed packet queuing/scheduling at central node such as base station (BS) or router to
handle network traffic. This paper proposes novel packet queuing scheme termed as Low Latency
Weighted Round Robin (LL-WRR) which is simple and effective amendment to weighted round robin (WRR)
for achieving low latency and improved fairness. Proposed LL-WRR queue scheduling scheme is
implemented in NS-2 considering IEEE 802.16 network [1] with real time video and Constant Bit Rate
(CBR) audio traffic connections. Simulation results show improvement obtained in latency and fairness
using LL-WRR. The proposed scheme introduces extra complexity of computing coefficient but its overall
impact is very small.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
This document summarizes a research paper that proposes a reinforcement learning approach called prioritized sweeping confidence based dual reinforcement learning (PSCDR) for adaptive routing in mobile ad hoc networks. The PSCDR approach uses a prioritized sweeping technique to optimize confidence based dual reinforcement routing. Simulation results on 50 node mobile ad hoc networks and fixed grid networks show that the proposed PSCDR approach significantly increases throughput compared to conventional routing protocols like DSDV, AODV and DSR, especially under medium to high traffic loads. The PSCDR approach dynamically selects routes in real-time based on current network traffic to minimize packet delivery time and avoid congestion.
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
The delay sensitive packet scheduling and routing algorithm to effectively deliver delay sensitive data’s over a multihop
networks. First packet urgency, node urgency, route urgency are calculated on the basis of end-to-end delay requirements.
Based on these urgency metrics, the proposed packet scheduling algorithm determines the transmission order of each packet to
minimize the node urgency without unnecessary packet drop, and the proposed routing algorithm establishes a route to minimize
the derivatives of route urgency in order to maximize the number of packets delivered within the required end-to-end delay.
Finally experimental results are presented to evaluate the performance of the proposed joint working algorithms.
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
Nodes in ad hoc networks have limited battery power. Hence they require energy-efficient technique to improve average
network performance. Maintaining energy-efficiency in ad hoc networks is really challenging because highest energyefficiency
is achieved if all the nodes are always switched off and energy-efficiency will be minimum if all the nodes are
fully operational i.e. always turned-on. Energy preservation requires redirection of data packets through some other routes
having good performance. This improves data packet delivery ratio and number of alive nodes decreasing cost of messages.
Fuzzy-Controlled Scheduling of Route-Request Packets (FSRR) in Mobile Ad Hoc ...A. Sufian
In ad hoc networks, the scheduling of route-request packets should be different from that of message packets, because during
transmission of message packets the location of the destination is known whereas in route discovery this is not known in
most of the cases. The router has to depend upon the last known location, if any, of the destination to determine the center
and radius of the circle that embeds all possible current position of the destination. Route-request packets generated from
the source are directed towards this circle i.e., directional route discovery can be applied. Otherwise, when no earlier location
of the destination is known the route-requested has to be broadcast in the whole network consuming a significant amount of
time than directional route discovery. The present article proposes a fuzzy controlled scheduling of route-request packets inparticular that greatly reduces the average delay in route discovery in ad hoc networks.
Design and implementation of low latency weighted round robin (ll wrr) schedu...ijwmn
Today’s wireless broadband networks are required to provide QoS guarantee as well as fairness to
different kinds of traffic. Recent wireless standards (such as LTE and WiMAX) have special provisions at
MAC layer for differentiating and scheduling data traffic for achieving QoS. The main focus of this paper is
concerned with high speed packet queuing/scheduling at central node such as base station (BS) or router to
handle network traffic. This paper proposes novel packet queuing scheme termed as Low Latency
Weighted Round Robin (LL-WRR) which is simple and effective amendment to weighted round robin (WRR)
for achieving low latency and improved fairness. Proposed LL-WRR queue scheduling scheme is
implemented in NS-2 considering IEEE 802.16 network [1] with real time video and Constant Bit Rate
(CBR) audio traffic connections. Simulation results show improvement obtained in latency and fairness
using LL-WRR. The proposed scheme introduces extra complexity of computing coefficient but its overall
impact is very small.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Maximizing Throughput using Adaptive Routing Based on Reinforcement LearningEswar Publications
This document summarizes a research paper that proposes a reinforcement learning approach called prioritized sweeping confidence based dual reinforcement learning (PSCDR) for adaptive routing in mobile ad hoc networks. The PSCDR approach uses a prioritized sweeping technique to optimize confidence based dual reinforcement routing. Simulation results on 50 node mobile ad hoc networks and fixed grid networks show that the proposed PSCDR approach significantly increases throughput compared to conventional routing protocols like DSDV, AODV and DSR, especially under medium to high traffic loads. The PSCDR approach dynamically selects routes in real-time based on current network traffic to minimize packet delivery time and avoid congestion.
Analysis of FSR, LANMAR and DYMO under MANETidescitation
A movable ad hoc system (MANET) is a self-configuring communications set of
connections of mobile procedure associated by wireless. Each mechanism in a MANET is
free to move independently in some way, and will therefore modify its relations to other
devices frequently [2]. The primary purpose of any ad-hoc network routing protocol is to
meet the challenges of the dynamically changing topology and establish an efficient route
connecting every two nodes. In this paper three protocols FSR, LANMAR and DYMO are
compared by using random waypoint mobility in few nodes with varying packet sizes in
CBR traffic. The parameters or metrics are used to assess the performance of protocols with
and without Black Hole attack, that are data Packet Delivery ratio and Average Jitter with
varying data traffic CBR (Constant Bit Ratio) using Qual Net 5.0.2 simulator.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
The delay sensitive packet scheduling and routing algorithm to effectively deliver delay sensitive data’s over a multihop
networks. First packet urgency, node urgency, route urgency are calculated on the basis of end-to-end delay requirements.
Based on these urgency metrics, the proposed packet scheduling algorithm determines the transmission order of each packet to
minimize the node urgency without unnecessary packet drop, and the proposed routing algorithm establishes a route to minimize
the derivatives of route urgency in order to maximize the number of packets delivered within the required end-to-end delay.
Finally experimental results are presented to evaluate the performance of the proposed joint working algorithms.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
1) LEACH is a hierarchical routing protocol for wireless sensor networks that aims to lower energy consumption by forming clusters of nodes and rotating cluster head roles among nodes.
2) The document discusses several enhancements made to the original LEACH protocol to improve network lifetime, throughput, and coverage area, including E-LEACH, EHE-LEACH, and multi-level LEACH.
3) Simulation results show that the enhanced protocols increase network lifetime by 40-49% compared to the original LEACH protocol.
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
Wireless sensor network consider as real time embedded system deployed in a particular region to sense various types of
environmental parameters such as temperature, pressure, gas, humidity etc. The huge applications of WSN like habitant monitoring,
forest fire detection, surveillances, transport monitoring etc. have created a lot of interest among the researcher community in recent
past. Typically, WSNs are densely deployed in hazardous places where battery recharge or replacement is nearly impossible and
human monitoring scheme is highly risky.
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
Multilevel priority packet scheduling scheme for wireless networksijdpsjournal
Scheduling different types of packets such as real
-
time and non
-
real time data packets in wireless links is
necessary to reduce energy consumption of the wireless device. Most of the existing packet schedulin
g
mechanism uses opportunistic transmission sche
duling, in which communication is postponed upto an
acceptable time deadline until the best expected channel conditions to transmit are found. This algo
rithm
incurs a large processing overhead and more energy consumption. In this paper we propose a Dynamic
Multilevel Queue Scheduling algorithm. In the proposed scheme, the ready queue is partitioned into t
hree
levels of priority queues. Real
-
time packets are placed into the highest priority queue and non
-
real time
data packets are placed into two other queue
s. We evaluate the performance of the proposed Dynamic
Multilevel Queue Scheduling scheme through simulations for real
-
time and non
-
real time data. Simulation
results illustrate that the Multilevel Priority packet scheduling scheme overcomes the convention
al methods
interms of average data waiting time and end
-
to
-
end delay
One of Machine Type Communication (MTC) applications is Wireless Sensor Network
(WSN). WSN is an intelligent network application system to collect, integrate, and transmit data
autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium
and collaborate to accomplish a common task, such as enviroment monitoring, military
surveillance and industrial process control. The constraining aspect of WSN usage is the
limited power of each sensor node, so energy efficiency becomes an important issue in WSN.
Routing is a function in WSN, which consumes a substantial amount of energy. One of the
routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive
Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace
Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then
WSN over HAP using the LEACH routing protocol evaluated its performance. Performance
indicators that we evaluated are engergy consumption, number of dead nodes and total average
packets which is sent to HAP. From a series of simulations conducted, the results obtained that
the higher the laying of HAP, then the coverage area will be greater. So that the energy
consumption will be smaller, the number of dead node less and the avarage of total packet
delivered to the HAP will be greater.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
Abstract DTN (Delay Tolerant Network) is a new concept in the field of wireless networks. It enables communication in challenged environment where traditional network fails. Unlike other ad hoc wireless network it does not demand for end to end node connectivity. DTN is based on store carry and forward principle. This mechanism is implemented using bundle protocol. DTN nodes have capabilities such as radio interface, movement, persistent storage, message routing and energy consumption .Here a node might accumulate a message in its buffer and carry it for limited time, waiting till a suitable forwarding opportunity is acquired. Multiple message duplication into the network is done to increase delivery probability. The main objective of DTN Routing is to build a powerful network between various nodes (mobile devices, planetary vehicles etc) so that good delivery probability and less delay are obtained. This unique mechanism poses a security challenge. A sophisticated attack observed is black hole attack in which malicious intermediate node are present in network that can provide attacked forged metrics to another node. The aim of this work is to simulate and analyze routing protocol of DTN when nodes enter in environment with black hole attack. The work has been carried out with ONE (opportunistic network environment) simulator. The performance of routing protocols (RAPID and Spray and Wait) are tested for different number of attacking nodes. The analysis indicates there is decrease in delivery probability, hop count average and buffer time average. But latency average first increases and then start decreasing. The overhead ratio increases using Spray and Wait Protocol but with RAPID protocol, it decreases with increasing black hole attacking nodes. Index Terms: DTN, ONE, etc.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
The Link Quality Indicator (LQI) and Residual Energy have a fundamental impact on the network
performance in Wireless Sensor Networks (WSNs) and affects as well in the life time of nodes. This paper
will provide a comparative of Link Quality Estimator, the Link Quality Estimator with Link Quality
Indicator and Link Quality Estimator with Residual Energy. In this paper we develop a Collect Tree
Protocol (CTP) and compare the performance of LQI and Residual Energy, and show their effect on the
packet delivery ratio and throughput, covering the characteristics of low-power links, and their
performance to the best of our knowledge, we believe that our efforts would have implementations on
embedded application.
1. The document proposes a low-overhead uplink scheduling method for real-time services in WiMAX networks using load prediction to reduce scheduling overhead. It uses an Earlier Deadline First (EDF) scheduling algorithm and adaptive bandwidth scheduling scheme.
2. The method includes three modules: an information module to collect data on connection delays and bandwidth requirements, a scheduling database module to store this information, and a service assignment module to determine uplink subframe allocation.
3. Simulation results show the proposed method achieves better performance than weighted fair queuing (WFQ) and weighted round-robin (WRR) in terms of frame utilization, average throughput, average queuing delay, and packet loss
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
The document proposes a multi-hop relay algorithm to improve broadcasting efficiency in mobile ad hoc networks (MANETs). It aims to optimize end-to-end delay, packet delivery ratio (PDR), and energy consumption during broadcasting. The algorithm uses source, broadcast, and relay queues at each node to facilitate multi-hop transmissions. It transmits packets using either single-hop, two-hop, or multi-hop relaying depending on the location of the destination node. The algorithm is shown to reduce average end-to-end delay by 3.37%, increase PDR by 1.36%, and reduce average energy consumption per node by 10% compared to previous techniques through simulation experiments.
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch.
I am Bernard. I am a Computer Networking Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, University of Leeds, UK. I have been helping students with their assignments for the past 12 years. I solve assignments related to Computer Networking.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Computer Networking Assignment.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
1) LEACH is a hierarchical routing protocol for wireless sensor networks that aims to lower energy consumption by forming clusters of nodes and rotating cluster head roles among nodes.
2) The document discusses several enhancements made to the original LEACH protocol to improve network lifetime, throughput, and coverage area, including E-LEACH, EHE-LEACH, and multi-level LEACH.
3) Simulation results show that the enhanced protocols increase network lifetime by 40-49% compared to the original LEACH protocol.
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
Wireless sensor network consider as real time embedded system deployed in a particular region to sense various types of
environmental parameters such as temperature, pressure, gas, humidity etc. The huge applications of WSN like habitant monitoring,
forest fire detection, surveillances, transport monitoring etc. have created a lot of interest among the researcher community in recent
past. Typically, WSNs are densely deployed in hazardous places where battery recharge or replacement is nearly impossible and
human monitoring scheme is highly risky.
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
Multilevel priority packet scheduling scheme for wireless networksijdpsjournal
Scheduling different types of packets such as real
-
time and non
-
real time data packets in wireless links is
necessary to reduce energy consumption of the wireless device. Most of the existing packet schedulin
g
mechanism uses opportunistic transmission sche
duling, in which communication is postponed upto an
acceptable time deadline until the best expected channel conditions to transmit are found. This algo
rithm
incurs a large processing overhead and more energy consumption. In this paper we propose a Dynamic
Multilevel Queue Scheduling algorithm. In the proposed scheme, the ready queue is partitioned into t
hree
levels of priority queues. Real
-
time packets are placed into the highest priority queue and non
-
real time
data packets are placed into two other queue
s. We evaluate the performance of the proposed Dynamic
Multilevel Queue Scheduling scheme through simulations for real
-
time and non
-
real time data. Simulation
results illustrate that the Multilevel Priority packet scheduling scheme overcomes the convention
al methods
interms of average data waiting time and end
-
to
-
end delay
One of Machine Type Communication (MTC) applications is Wireless Sensor Network
(WSN). WSN is an intelligent network application system to collect, integrate, and transmit data
autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium
and collaborate to accomplish a common task, such as enviroment monitoring, military
surveillance and industrial process control. The constraining aspect of WSN usage is the
limited power of each sensor node, so energy efficiency becomes an important issue in WSN.
Routing is a function in WSN, which consumes a substantial amount of energy. One of the
routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive
Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace
Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then
WSN over HAP using the LEACH routing protocol evaluated its performance. Performance
indicators that we evaluated are engergy consumption, number of dead nodes and total average
packets which is sent to HAP. From a series of simulations conducted, the results obtained that
the higher the laying of HAP, then the coverage area will be greater. So that the energy
consumption will be smaller, the number of dead node less and the avarage of total packet
delivered to the HAP will be greater.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
Abstract DTN (Delay Tolerant Network) is a new concept in the field of wireless networks. It enables communication in challenged environment where traditional network fails. Unlike other ad hoc wireless network it does not demand for end to end node connectivity. DTN is based on store carry and forward principle. This mechanism is implemented using bundle protocol. DTN nodes have capabilities such as radio interface, movement, persistent storage, message routing and energy consumption .Here a node might accumulate a message in its buffer and carry it for limited time, waiting till a suitable forwarding opportunity is acquired. Multiple message duplication into the network is done to increase delivery probability. The main objective of DTN Routing is to build a powerful network between various nodes (mobile devices, planetary vehicles etc) so that good delivery probability and less delay are obtained. This unique mechanism poses a security challenge. A sophisticated attack observed is black hole attack in which malicious intermediate node are present in network that can provide attacked forged metrics to another node. The aim of this work is to simulate and analyze routing protocol of DTN when nodes enter in environment with black hole attack. The work has been carried out with ONE (opportunistic network environment) simulator. The performance of routing protocols (RAPID and Spray and Wait) are tested for different number of attacking nodes. The analysis indicates there is decrease in delivery probability, hop count average and buffer time average. But latency average first increases and then start decreasing. The overhead ratio increases using Spray and Wait Protocol but with RAPID protocol, it decreases with increasing black hole attacking nodes. Index Terms: DTN, ONE, etc.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
The Link Quality Indicator (LQI) and Residual Energy have a fundamental impact on the network
performance in Wireless Sensor Networks (WSNs) and affects as well in the life time of nodes. This paper
will provide a comparative of Link Quality Estimator, the Link Quality Estimator with Link Quality
Indicator and Link Quality Estimator with Residual Energy. In this paper we develop a Collect Tree
Protocol (CTP) and compare the performance of LQI and Residual Energy, and show their effect on the
packet delivery ratio and throughput, covering the characteristics of low-power links, and their
performance to the best of our knowledge, we believe that our efforts would have implementations on
embedded application.
1. The document proposes a low-overhead uplink scheduling method for real-time services in WiMAX networks using load prediction to reduce scheduling overhead. It uses an Earlier Deadline First (EDF) scheduling algorithm and adaptive bandwidth scheduling scheme.
2. The method includes three modules: an information module to collect data on connection delays and bandwidth requirements, a scheduling database module to store this information, and a service assignment module to determine uplink subframe allocation.
3. Simulation results show the proposed method achieves better performance than weighted fair queuing (WFQ) and weighted round-robin (WRR) in terms of frame utilization, average throughput, average queuing delay, and packet loss
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
The document proposes a multi-hop relay algorithm to improve broadcasting efficiency in mobile ad hoc networks (MANETs). It aims to optimize end-to-end delay, packet delivery ratio (PDR), and energy consumption during broadcasting. The algorithm uses source, broadcast, and relay queues at each node to facilitate multi-hop transmissions. It transmits packets using either single-hop, two-hop, or multi-hop relaying depending on the location of the destination node. The algorithm is shown to reduce average end-to-end delay by 3.37%, increase PDR by 1.36%, and reduce average energy consumption per node by 10% compared to previous techniques through simulation experiments.
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch.
I am Bernard. I am a Computer Networking Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, University of Leeds, UK. I have been helping students with their assignments for the past 12 years. I solve assignments related to Computer Networking.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Computer Networking Assignment.
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
This document compares the ATTEMPT and SIMPLE protocols for wireless body area networks (WBANs). ATTEMPT is an opportunistic protocol that relies on relay nodes when the sink node moves out of range, increasing power consumption and packet loss. SIMPLE aims to balance energy usage and improve throughput by selecting low-cost forwarder nodes to route data to the sink in a multi-hop fashion using TDMA scheduling. The document provides detailed descriptions of the initialization, routing, scheduling and data transmission phases of the ATTEMPT and SIMPLE protocols and discusses their advantages and disadvantages for energy efficiency in WBAN applications.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses and compares several congestion control protocols for wireless networks, including TCP, RCP, and RCP+. It implemented an enhanced version of RCP+ in the NS-2 simulator. Simulation results showed that the proposed approach achieved higher throughput and packet delivery ratio than TCP and RCP+ in a wireless network with 10-50 nodes, with performance degrading as the number of nodes increased beyond 20 due to increased congestion. The paper analyzes the mechanisms and equations of each protocol and argues the proposed approach combines benefits of improved AIMD and RCP+ to address their individual shortcomings.
Improve Convergecasting in Collection Tree Protocol(CTP)IRJET Journal
This document proposes improvements to the Collection Tree Protocol (CTP) for wireless sensor networks. CTP is a tree-based routing protocol that selects paths based on expected transmission count but does not consider node energy. The proposed modifications 1) include node energy levels in parent selection to avoid rapidly draining high-energy nodes, and 2) add a "recovery packet" for low-energy nodes to notify neighbors earlier of impending failure to reduce latency and packet losses. Simulation results show the modified CTP provides improved packet delivery ratio and fewer duplicate packets received compared to the original CTP.
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
This document summarizes several queue management mechanisms for congestion control in wireless networks, including Random Early Detection (RED) and variants. RED detects congestion by tracking average queue length and dropping packets probabilistically. Variants like Fuzzy Logic RED (FLRED) and Hemi-Rise Cloud Model (CRED) aim to improve RED by addressing its sensitivity to parameters and nonlinearity. Explicit Congestion Control (ECC) and Explicit Non-Congestion Notification (ENCN) modify TCP headers to signal congestion or non-congestion. Three section Random Early Detection (TRED) divides the queue into three sections to calculate dropping probability nonlinearly. These variants aim to more effectively control congestion and improve performance
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
A Heuristic Algorithm For The Resource Assignment Problem In Satellite Teleco...Elizabeth Williams
The document proposes a heuristic algorithm for solving the resource assignment problem in satellite telecommunication networks using Demand Assigned Multiple Access (DAMA) protocol. The algorithm allows processing capacity requests with message expiration times and maximum packet loss rates using minimum bandwidth. It models the problem as a two-dimensional strip packing problem and adapts the Best Fit Decreasing heuristic to provide candidate solutions within hundreds of milliseconds, meeting the real-time response needs of such networks.
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...Christo Ananth
Christo Ananth et al. discussed because of various appealing focal points, agreeable correspondences have been broadly viewed as one of the promising systems to enhance throughput and scope execution in remote interchanges. The hand-off hub (RN) assumes a key part in helpful interchanges, and RN determination may considerably influence the execution pick up in a system with agreeable media get to control (MAC). In this paper, we address the issue of RN choice while considering MAC overhead, which is brought about by handshake motioning as well as casing retransmissions because of transmission disappointment too. We outline a helpful MAC component with our ideal RN determination calculation, which is called ideal hand-off choice MAC, and utilize a hypothetical model. To investigate the collaboration execution picks up. We direct recreation tests in view of Network Simulator To assess our proposed agreeable MAC. Numerical outcomes approve the adequacy of our investigative model and demonstrate that our composed MAC fundamentally outflanks existing agreeable MAC components that don't consider retransmission MAC overhead.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
Design A Congestion Aware Routing Algorithm for Synchronous Cam Designijtsrd
The effect of process variation (PV) on delay is a major reason to decay the performance in advanced technologies. The performance of front routing algorithms is determined with or without PV for different traffic patterns. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. PV decreases the saturation throughput and increases the average message delay. Adaptive routing algorithm should be manipulated with the PV. A novel PV delay and congestion aware routing (PDCR) algorithm is presented for asynchronous network-on-chip (NOC) design. The routing algorithm performs various adaptive routing algorithms in the average delay and saturation throughput for different traffic patterns. A low-power content-addressable memory (CAM) by a new algorithm is proposed for associativity between the input tag and the corresponding address of the output data. The proposed architecture is depends on a recently developed sparse clustered network by utilizing binary connections that on-average eliminates most of the parallel comparisons performed during a search. P. Mounica | R. Umamaheswari | R. Madhavi | R. Nischala | N. Ramesh Babu"Design A Congestion Aware Routing Algorithm for Synchronous Cam Design" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11547.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11547/design-a-congestion-aware-routing-algorithm-for-synchronous-cam-design/p-mounica
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
This document summarizes and compares existing routing protocols for delay tolerant networks. It presents routing protocols such as first contact, direct delivery, PROPHET, spray and wait, and epidemic routing. It also proposes a new dynamic spray and wait protocol that considers the quality of nodes based on their activity level. Simulation results show that the proposed algorithm that considers message size, number of copies, and time to live performs better than the traditional drop front approach in terms of delivery probability, buffer time average, overhead ratio, packets dropped, and hop count average.
This document summarizes a research paper that proposes a new cooperative channel load aware VoIP routing topology for 802.11 WLAN networks. It introduces the concept of cooperative channel transmitting technology for 802.11 WLAN networks and discusses some of the challenges in providing quality of service guarantees. It then presents a linear programming model and scheduling algorithm to implement cooperative channel transmissions while considering queue status and transitive node relationships to maximize throughput. Simulation results show that the proposed scheduling algorithm improves throughput and fairness compared to alternatives.
This document summarizes research on reference broadcast time synchronization in wireless sensor networks. It discusses how previous protocols like flooding time synchronization and gradient time synchronization have drawbacks like slow propagation speed and inability to maintain synchronization when nodes crash. It then introduces the reference broadcast synchronization protocol which chooses a reference node using an agreement algorithm and broadcasts time information to synchronize the network. It presents the system architecture and algorithm for how reference broadcast synchronization works to flood time information, perform synchronization based on messages from the parent node, and timestamp events in the network. Evaluation results showing the protocol implemented on line and distributed topologies are also included.
Similar to Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc Networks (20)
Open Source Contributions to Postgres: The Basics POSETTE 2024ElizabethGarrettChri
Postgres is the most advanced open-source database in the world and it's supported by a community, not a single company. So how does this work? How does code actually get into Postgres? I recently had a patch submitted and committed and I want to share what I learned in that process. I’ll give you an overview of Postgres versions and how the underlying project codebase functions. I’ll also show you the process for submitting a patch and getting that tested and committed.
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
"Financial Odyssey: Navigating Past Performance Through Diverse Analytical Lens"sameer shah
Embark on a captivating financial journey with 'Financial Odyssey,' our hackathon project. Delve deep into the past performance of two companies as we employ an array of financial statement analysis techniques. From ratio analysis to trend analysis, uncover insights crucial for informed decision-making in the dynamic world of finance."