IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
This paper analyzes the performance of three routing protocols (AODV, DSDV, OLSR) for mobile WiMAX networks using the random direction mobility model in NS3 simulator. The protocols are evaluated based on routing overhead, packet delivery ratio, throughput, end-to-end delay, and packet loss. The results found that OLSR protocol outperformed AODV and DSDV, with lower routing overhead and higher packet delivery ratio, demonstrating improved efficiency for WiMAX networks.
This document summarizes the key aspects of an optimized MAC protocol for power efficiency in mobile ad-hoc networks. It discusses issues like hidden and exposed nodes in wireless networks. It describes the CSMA/CA mechanism used in IEEE 802.11 and classifications of MAC protocols for ad-hoc networks. It provides details on the operation of DCF in IEEE 802.11, including inter-frame spacing, virtual carrier sensing using NAV, and a basic power control protocol. However, this basic protocol is deficient as it does not prevent interference between concurrent transmissions.
This document summarizes a study on the hidden node problem in IEEE 802.15.4/ZigBee wireless sensor networks. The study used an OPNET simulation model to evaluate the impact of hidden nodes on network performance. The results showed that as traffic load increased, goodput ratio and packet delivery time decreased while energy consumption per bit increased, due to more frequent packet collisions from hidden nodes. The hidden node problem caused significant packet loss and degraded network performance. Further work to address this problem by implementing RTS/CTS handshaking was proposed.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
This document summarizes a research paper that proposes a new routing algorithm for mobile ad hoc networks using fuzzy logic. The algorithm considers three input variables - signal power, mobility, and delay. It defines fuzzy sets and membership functions to map crisp normalized values of these variables to linguistic values. Rules are written to relate the input and output linguistic variables. The output represents the optimal route. The algorithm aims to address routing problems related to bandwidth, signal power, mobility, and delay in a distributed manner without relying on centralized control. It is designed to quickly adapt to changes in network topology.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
This paper analyzes the performance of three routing protocols (AODV, DSDV, OLSR) for mobile WiMAX networks using the random direction mobility model in NS3 simulator. The protocols are evaluated based on routing overhead, packet delivery ratio, throughput, end-to-end delay, and packet loss. The results found that OLSR protocol outperformed AODV and DSDV, with lower routing overhead and higher packet delivery ratio, demonstrating improved efficiency for WiMAX networks.
This document summarizes the key aspects of an optimized MAC protocol for power efficiency in mobile ad-hoc networks. It discusses issues like hidden and exposed nodes in wireless networks. It describes the CSMA/CA mechanism used in IEEE 802.11 and classifications of MAC protocols for ad-hoc networks. It provides details on the operation of DCF in IEEE 802.11, including inter-frame spacing, virtual carrier sensing using NAV, and a basic power control protocol. However, this basic protocol is deficient as it does not prevent interference between concurrent transmissions.
This document summarizes a study on the hidden node problem in IEEE 802.15.4/ZigBee wireless sensor networks. The study used an OPNET simulation model to evaluate the impact of hidden nodes on network performance. The results showed that as traffic load increased, goodput ratio and packet delivery time decreased while energy consumption per bit increased, due to more frequent packet collisions from hidden nodes. The hidden node problem caused significant packet loss and degraded network performance. Further work to address this problem by implementing RTS/CTS handshaking was proposed.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
This document summarizes a research paper that proposes a new routing algorithm for mobile ad hoc networks using fuzzy logic. The algorithm considers three input variables - signal power, mobility, and delay. It defines fuzzy sets and membership functions to map crisp normalized values of these variables to linguistic values. Rules are written to relate the input and output linguistic variables. The output represents the optimal route. The algorithm aims to address routing problems related to bandwidth, signal power, mobility, and delay in a distributed manner without relying on centralized control. It is designed to quickly adapt to changes in network topology.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
This document summarizes an intermediate guardianship based routing protocol proposed to improve the performance of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad hoc networks. The proposed protocol aims to balance energy consumption among nodes by only allowing nodes with sufficient energy to participate in route requests. It also designates intermediate nodes as "guardians" to relay messages when the source or destination nodes have low energy or link failures occur, in order to increase the probability of message delivery. The document provides background on AODV and related work, and describes how the intermediate guardianship approach extends AODV to address energy efficiency and reliability issues in intermittent and low-power ad hoc networks.
The document discusses simulation of relay modes in IEEE 802.16j mobile multi-hop relay (MMR) WiMAX networks. It describes two relay modes defined in IEEE 802.16j - transparent mode and non-transparent mode. Transparent mode is used to increase capacity within the base station coverage area using two hops, while non-transparent mode extends base station coverage using two or more hops. The document outlines the simulation setup and parameters used to simulate both transparent and non-transparent relay modes in an IEEE 802.16j MMR network using the NCTUns simulation tool.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
This document proposes using self-organizing maps (SOMs), an unsupervised artificial neural network technique, to categorize sensory data from wireless sensor networks (WSNs) in order to conserve battery power. The proposed system trains a 2x3 SOM on a base station node to categorize data from active sensor nodes. After training, the SOM defines categories that sensor nodes then transmit instead of raw data, reducing transmissions and saving up to 48.5% of battery power. Evaluation of the approach considers battery savings versus number of training samples and transmission interval.
The document discusses the Transparent Interconnection of Lots of Links (TRILL) protocol. It begins by describing some problems with the existing Spanning Tree Protocol (STP), such as inefficient paths, underutilized bandwidth, lack of multipath forwarding, and slow convergence. It then introduces TRILL as a solution, which uses routing bridges and IS-IS routing to calculate optimal layer 2 paths. Key benefits of TRILL include shortest path forwarding, multipath forwarding for better bandwidth utilization, reduced forwarding table sizes, loop mitigation, and VLAN support. TRILL headers are also described.
This document summarizes a study on the performance of real-time and non-real-time traffic in IEEE 802.11 wireless local area networks (WLANs) using the network simulator NS2. The study evaluates the impact of the distributed coordination function (DCF) on throughput, packet loss, and delay. It describes simulations with various traffic types, including voice, video, and data, under different load conditions. The results show the packet loss, throughput, and delay for each simulation case.
Performance evaluation of decode and forward cooperative diversity systems ov...IJECEIAES
Incremental relaying (IR) was developed to overcome the problems facing regular cooperative relaying methods. Out of the regular methods there is fixed relaying, in which, the relay transmits the source’s signal to the destination without considering the state of the channel. On the contrary, adaptive relaying techniques, including IR, are becoming popular among researchers nowadays; since they efficiently utilize the channel. In this paper, we studied the performance of a two-hop IR system that has decode and forward (DF) relays. Moreover, this system was analyzed over Nakagami-m fading channels, with the presence of various interferers positioned near the destination. As a result, the system suffered from co-channel interference. Remarkably, in this work, formulas were driven for the outage probability (OP) and the bit error rate (BER), and the assumptions were checked numerically.
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
This document summarizes a research paper that proposes and evaluates a cross-layer optimization approach for the Dynamic Source Routing (DSR) protocol and the 802.11 MAC layer in mobile ad hoc networks. The approach tracks signal strengths of neighboring nodes to distinguish between packet losses due to mobility versus congestion. This information is provided to DSR to avoid unnecessary route error and maintenance processes when losses are due to congestion rather than broken links. Simulations evaluate the approach under different static and mobile scenarios and traffic patterns, showing improvements in routing overhead, packet losses and throughput compared to the conventional DSR protocol.
1. The document discusses relay technologies in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks.
2. It describes two relay modes (transparent and non-transparent), three relay transmission schemes (amplify and forward, selective decode and forward, demodulation and forward), and two relay pairing schemes (centralized and distributed).
3. The document also discusses characteristics of relay-based networks such as throughput enhancement, coverage increase, and cost reduction. It covers relay placement optimization and relaying techniques including time/frequency domain and cooperative relaying.
This document describes an adaptive energy-efficient MAC protocol called T-MAC for wireless sensor networks. T-MAC introduces an adaptive duty cycle that dynamically ends the active part to reduce idle listening and energy waste while maintaining reasonable throughput. It is compared to CSMA, which has no duty cycle, and S-MAC, which has a fixed duty cycle, through simulations. T-MAC and S-MAC achieve similar energy savings of up to 98% compared to CSMA under homogeneous loads. In a scenario with variable load, T-MAC outperforms S-MAC by a factor of 5 due to its adaptive duty cycle.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
The document evaluates data drop performance in wireless LANs using Time-to-Live (TTL) and packet fragmentation. It simulates wireless network traffic with and without TTL/fragmentation using OPNET. The results show that using TTL and fragmenting large packets into smaller chunks significantly reduces data dropped compared to not using these techniques. Specifically, data drop is reduced when packets are fragmented into 1024 byte chunks and a TTL is applied, leading to higher throughput and less buffer overflow.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
This document summarizes an intermediate guardianship based routing protocol proposed to improve the performance of the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad hoc networks. The proposed protocol aims to balance energy consumption among nodes by only allowing nodes with sufficient energy to participate in route requests. It also designates intermediate nodes as "guardians" to relay messages when the source or destination nodes have low energy or link failures occur, in order to increase the probability of message delivery. The document provides background on AODV and related work, and describes how the intermediate guardianship approach extends AODV to address energy efficiency and reliability issues in intermittent and low-power ad hoc networks.
The document discusses simulation of relay modes in IEEE 802.16j mobile multi-hop relay (MMR) WiMAX networks. It describes two relay modes defined in IEEE 802.16j - transparent mode and non-transparent mode. Transparent mode is used to increase capacity within the base station coverage area using two hops, while non-transparent mode extends base station coverage using two or more hops. The document outlines the simulation setup and parameters used to simulate both transparent and non-transparent relay modes in an IEEE 802.16j MMR network using the NCTUns simulation tool.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
This document provides an introduction and overview of mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring networks formed by mobile nodes without a fixed infrastructure. The key characteristics of MANETs include using wireless communication, nodes acting as both hosts and routers, limited bandwidth and variable capacity links, energy-constrained operation, and dynamic network topology. The document also outlines some common applications of MANETs and provides an overview of different routing protocols used in MANETs, including proactive, reactive, and hybrid protocols. It gives a brief description of distance-vector and link-state routing approaches.
This document proposes using self-organizing maps (SOMs), an unsupervised artificial neural network technique, to categorize sensory data from wireless sensor networks (WSNs) in order to conserve battery power. The proposed system trains a 2x3 SOM on a base station node to categorize data from active sensor nodes. After training, the SOM defines categories that sensor nodes then transmit instead of raw data, reducing transmissions and saving up to 48.5% of battery power. Evaluation of the approach considers battery savings versus number of training samples and transmission interval.
The document discusses the Transparent Interconnection of Lots of Links (TRILL) protocol. It begins by describing some problems with the existing Spanning Tree Protocol (STP), such as inefficient paths, underutilized bandwidth, lack of multipath forwarding, and slow convergence. It then introduces TRILL as a solution, which uses routing bridges and IS-IS routing to calculate optimal layer 2 paths. Key benefits of TRILL include shortest path forwarding, multipath forwarding for better bandwidth utilization, reduced forwarding table sizes, loop mitigation, and VLAN support. TRILL headers are also described.
This document summarizes a study on the performance of real-time and non-real-time traffic in IEEE 802.11 wireless local area networks (WLANs) using the network simulator NS2. The study evaluates the impact of the distributed coordination function (DCF) on throughput, packet loss, and delay. It describes simulations with various traffic types, including voice, video, and data, under different load conditions. The results show the packet loss, throughput, and delay for each simulation case.
Performance evaluation of decode and forward cooperative diversity systems ov...IJECEIAES
Incremental relaying (IR) was developed to overcome the problems facing regular cooperative relaying methods. Out of the regular methods there is fixed relaying, in which, the relay transmits the source’s signal to the destination without considering the state of the channel. On the contrary, adaptive relaying techniques, including IR, are becoming popular among researchers nowadays; since they efficiently utilize the channel. In this paper, we studied the performance of a two-hop IR system that has decode and forward (DF) relays. Moreover, this system was analyzed over Nakagami-m fading channels, with the presence of various interferers positioned near the destination. As a result, the system suffered from co-channel interference. Remarkably, in this work, formulas were driven for the outage probability (OP) and the bit error rate (BER), and the assumptions were checked numerically.
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
This document summarizes a research paper that proposes and evaluates a cross-layer optimization approach for the Dynamic Source Routing (DSR) protocol and the 802.11 MAC layer in mobile ad hoc networks. The approach tracks signal strengths of neighboring nodes to distinguish between packet losses due to mobility versus congestion. This information is provided to DSR to avoid unnecessary route error and maintenance processes when losses are due to congestion rather than broken links. Simulations evaluate the approach under different static and mobile scenarios and traffic patterns, showing improvements in routing overhead, packet losses and throughput compared to the conventional DSR protocol.
1. The document discusses relay technologies in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks.
2. It describes two relay modes (transparent and non-transparent), three relay transmission schemes (amplify and forward, selective decode and forward, demodulation and forward), and two relay pairing schemes (centralized and distributed).
3. The document also discusses characteristics of relay-based networks such as throughput enhancement, coverage increase, and cost reduction. It covers relay placement optimization and relaying techniques including time/frequency domain and cooperative relaying.
This document describes an adaptive energy-efficient MAC protocol called T-MAC for wireless sensor networks. T-MAC introduces an adaptive duty cycle that dynamically ends the active part to reduce idle listening and energy waste while maintaining reasonable throughput. It is compared to CSMA, which has no duty cycle, and S-MAC, which has a fixed duty cycle, through simulations. T-MAC and S-MAC achieve similar energy savings of up to 98% compared to CSMA under homogeneous loads. In a scenario with variable load, T-MAC outperforms S-MAC by a factor of 5 due to its adaptive duty cycle.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
The document evaluates data drop performance in wireless LANs using Time-to-Live (TTL) and packet fragmentation. It simulates wireless network traffic with and without TTL/fragmentation using OPNET. The results show that using TTL and fragmenting large packets into smaller chunks significantly reduces data dropped compared to not using these techniques. Specifically, data drop is reduced when packets are fragmented into 1024 byte chunks and a TTL is applied, leading to higher throughput and less buffer overflow.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The document proposes two new authentication schemes for PDAs that use session passwords. Session passwords are one-time passwords generated for each login. The first scheme generates passwords based on pairs of letters from a secret text password and their intersections on a grid. The second scheme has users rate colors during registration, and session passwords are generated by the intersections of those colors on a color grid and number grid displayed during login. Both schemes aim to be resistant to dictionary attacks, brute force attacks, and shoulder surfing by changing the grids each time. The techniques were proposed to provide authentication for PDAs but require further testing for usability and effectiveness.
This document describes the design and development of a microcontroller-based system for measuring blood glucose levels. The system uses an amperometric method that relies on glucose oxidase enzymes and a mediator compound to transfer electrons from blood glucose to an electrode, generating an electrical signal. A PIC 18F4520 microcontroller processes, amplifies and converts the signal to a display on an LCD module. The system is intended to be low-cost, portable, and provide frequent blood glucose monitoring to help control diabetes and reduce complications. It works by measuring the current produced from the reaction of blood glucose with glucose oxidase and a mediator compound.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document discusses the performance analysis and minimization of black hole attacks in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and discusses how they are vulnerable to black hole attacks. The document then describes the AODV routing protocol and how black hole attacks exploit vulnerabilities in the route discovery process. Existing detection and prevention techniques are outlined. The document proposes modifying the AODV protocol to implement an intrusion detection system (IDSAODV) that can detect and discard fraudulent route replies from black hole nodes, improving packet delivery. Simulation scenarios of varying node counts with and without black holes are used to analyze black hole behavior and evaluate the effectiveness of the IDSAODV approach.
This document summarizes a research paper that proposes a machine learning approach for detecting phishing websites. It discusses using heuristic features from CANTINA to train machine learning models. A new domain top-page similarity feature is introduced to improve accuracy. Various modules are described, including site training, site capturing, a phishing dictionary, and image correlation to measure similarity. Experimental results show the approach achieves up to 92.5% f-measure and a 7.5% error rate for phishing detection.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes using a genetic algorithm to generate high-quality association rules for measuring data quality. The genetic algorithm evaluates rules based on four metrics: confidence, completeness, comprehensibility, and interestingness. It aims to discover high-level prediction rules that perform better than traditional greedy rule induction algorithms at handling attribute interactions. The genetic algorithm represents rules as chromosomes and uses the four metrics as an objective fitness function to evaluate the quality of each rule.
The document describes a genetic algorithm approach to optimizing the design of steel-concrete composite plane frames to minimize cost. The algorithm uses design variables like beam and column cross-sectional properties to represent potential solutions. It evaluates solutions based on structural analysis and design constraints like moments, shear, buckling and axial forces. The best solution from each generation is preserved to guide the evolution toward an optimal, cost-effective frame design. The approach is demonstrated on example frames.
This document summarizes and compares four routing algorithms for mobile ad hoc networks: Disjoint Multipath Routing, Trust based Multipath Routing, Message Trust based Multipath Routing, and a new proposed algorithm called Friend Based Ad-hoc Routing. It describes the key mechanisms of each algorithm, including how they establish routes, incorporate trust levels, and handle packet routing. The proposed FACES algorithm aims to improve security and efficiency by using friend, unauthenticated, and question mark lists to identify trusted routes and avoid malicious nodes.
This document discusses software security metrics and validating UML diagrams using metrics. It provides background on using metrics to measure quality attributes of object-oriented designs. Traditional code-level security metrics are insufficient and evaluating security at the design level is important. The paper proposes a system that applies design-level security metrics using genetic algorithms to generate secure design options from a UML diagram. It then implements code from the designs and applies the same metrics at the code level to validate that the code matches the intended secure design. This allows discovering and fixing security issues earlier in the development process.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document presents a study on using color texture feature analysis to detect surface defects on pomegranates. The researchers developed a method involving cropping images of pomegranates, converting them to HSI color space, generating SGDM matrices to extract 18 texture features for each image, and using support vector machines (SVM) classification to identify the best features for detecting infections. The optimal features identified were cluster shade, product moment, and mean intensity, achieving classification accuracy of 99.88%, 99.88%, and 99.81% respectively.
The document discusses the characterization and numerical optimization of chromium-free nickel alloy filler materials for dissimilar welding between stainless steel SS304. Eight alloys with compositions ranging from 40-43.5% Ni, 4-20% Mo, 0-16% Co, 10% Cu, 22-25% Fe, 0.5% Al, 1% Ti, and 0.001% C were analyzed. JMatPro software was used to simulate phases present at different temperatures. Welding simulations using ANSYS evaluated residual stresses in the welds. The alloy with 43.499% Ni, 0.5% Al, 14% Co, 6% Mo, 10% Cu, 23% Fe, 2% Mn, 1
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes research on congestion and fairness issues in wireless mesh networks. The researchers found that:
1) Wireless mesh networks using CSMA/CA MAC protocols can experience "starvation", where one-hop flows receive most bandwidth while competing multi-hop flows receive almost nothing.
2) Through experiments on an operational urban mesh network, they confirmed starvation occurs and isolated that only a one-hop TCP flow coupled with a two-hop TCP flow is needed to induce it.
3) They developed an analytical model to understand the causes of starvation as the interaction of MAC-layer biases, congestion control loops, and penalties of switching between network states.
4) Their model suggests a "
A novel pause count backoff algorithm for channel accessambitlick
The document summarizes a proposed novel backoff algorithm called Pause Count Backoff (PCB) for channel access in IEEE 802.11 wireless networks. PCB observes the number of pauses in a node's backoff procedure to estimate the number of active stations and set an appropriate contention window size. Simulation results show PCB outperforms other algorithms like DCF, EIED, and AEDCF in terms of goodput, fairness index, and end-to-end delay under different network conditions.
This document summarizes a research paper that evaluates the performance of wired and wireless local area networks using simulation. It describes simulating Ethernet and IEEE 802.11 wireless LANs in OPNET with varying numbers of users. Key performance metrics for wired networks like collision count, throughput, and delay were analyzed. For wireless, metrics like data dropped, throughput, and access delay were studied. As the number of users increased, throughput decreased more for wireless than wired due to transmission limitations in wireless. The paper concludes wireless performs better than wired for small user numbers but degrades more with increasing loads.
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
This document summarizes a research article that analyzed the performance of three MAC layer protocols (IEEE 802.11, IEEE 802.15.4, and TDMA) in a wireless sensor network considering the effects of the hidden node problem. Six performance metrics were evaluated: goodput, throughput, packet delivery ratio, residual energy, average delay, and node lifetime. The results showed that TDMA provided the best energy conservation and highest delay, while IEEE 802.11 gave the best throughput and goodput as well as lowest delay. IEEE 802.15.4 and TDMA were better than IEEE 802.11 at mitigating the hidden node problem.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Computer Communication Networks-Wireless LANKrishna Nanda
Wireless LANs allow hosts to connect to a network without being physically connected via cables. They use radio waves to transmit data through the air. Some key differences between wired and wireless LANs include the mobility of hosts in wireless LANs and the use of access points to connect wireless LANs to wired networks. Wireless LANs also face challenges from signal attenuation, interference, and multipath propagation that wired LANs do not. The IEEE 802.11 standard defines the specifications for wireless LANs, including using basic service sets and extended service sets to connect multiple wireless networks, and employing carrier sense multiple access with collision avoidance for medium access control.
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
This document analyzes the performance of Wi-Fi networks under three conditions: no fading, flat fading, and dispersive fading. It simulates these conditions using an IEEE 802.11a WLAN physical layer model in Matlab. The simulation measures packet error rate and bit rate as the signal-to-noise ratio and maximum Doppler shift are varied. With no fading, there is no packet error and bit rate increases with SNR. Under flat and dispersive fading, packet error and bit rates are affected differently based on the maximum Doppler shift. The best performance occurs under flat fading with a lower maximum Doppler shift of 100Hz.
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networksambitlick
This document proposes analytical models to analyze the performance of the IEEE 802.11 protocol under unsaturated traffic conditions in multi-hop wireless networks. It presents a two-dimensional Markov chain model to describe the behavior of IEEE 802.11 under different offered traffic loads, showing the effect of load on transmission probability. It also proposes a three-dimensional model to describe multi-hop 802.11 networks, modeling not only data sources but also relay stations forwarding traffic. The models are validated through ns-2 simulations with different network configurations for metrics like throughput, delay, queue length, and energy consumption.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
1) The document analyzes the quality of service capabilities of the IEEE 802.11e standard through simulation.
2) It simulates four access categories (voice, video, data, background) on the EDCA mechanism and finds that voice and video have higher throughput and lower delay, showing that 802.11e provides service differentiation.
3) A comparison of 802.11e EDCA and legacy DCF shows that while DCF has slightly higher overall throughput, EDCA experiences less variable data dropping due to its prioritized access scheme.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
This document provides an overview of queuing theory models used to analyze the performance of IEEE 802.11 wireless networks. It discusses how queuing models can measure metrics like throughput, delay, and packet loss. It also reviews the IEEE 802.11 standard, including the distributed coordination function (DCF) used for medium access control and quality of service enhancements in 802.11e. The goal is to identify the most accurate queuing or probability models for designing wireless LANs that consider performance and meet QoS requirements.
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
The recent standard for broadband wireless
access networks, IEEE 802.16, which resulted in the
development of metropolitan area wireless networks,
includes two network organization modes: Point to Multi
Point and Mesh. The mesh mode provides distributed
channel access operations of peering nodes and uses TDMA
technique for channel access modulation. According to
IEEE 802.16 MAC protocol, there are two scheduling
algorithms for assigning TDMA slots to each network node:
centralized and distributed. In distributed scheduling
algorithm, network nodes have to transmit scheduling
message in order to inform other nodes about their transfer
schedule. In this paper a new approach is proposed to
improve distributed scheduling efficiency in IEEE 802.16
mesh mode, with respect to network condition in every
transferring opportunity. For evaluating the proposed
algorithm efficiency, several extensive simulations are
performed in various network configurations and the most
important system parameters which affect the network
performance are analyzed.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.1392-1400
Efficient Throughput MAC Protocol in Ad-hoc Network’s
Rahul Mukherjee,
HOD and Assistant Professor, Electronics & Communication Department,
St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi Technical University, India
Abstract –
This research aims at improving the throughput II. HIDDEN AND EXPOSED NODE PROBLEMS
in distributed cooperative wireless ad-hoc The transmission range of stations in
networks by use of stations equipped with a new wireless network is limited by the transmission power;
MAC. The main focus of this research is to show therefore, all the station in a LAN cannot listen to each
that several existing schemes can degrade network other. This means that normal carrier sense
throughput and can result in higher energy mechanism which assumes that all stations can listen
consumption than when using IEEE 802.11 to each other, fails. In particular, this gives rise to
without power control. This work proposes a new hidden node and exposed node problem. Consider
power controlled MAC protocol based on IEEE stations A, B, C and D as shown in figure.
802.11.It saves considerable amount of power and
achieves the performance matching with that of
IEEE 802.11.
Keywords – MANET, MAC (Media Access
Control), DCF (Distributed Coordination
Function), CSMA (Carrier Sense Multiple Access)
I. INTRODUCTION
Cooperative ad-hoc networks are formed by
several homogeneous wireless stations. All the
stations cooperate with each other, i.e., the traffic for
the stations that are more than one hop away is routed
by the intermediate stations. The intermediate stations Figure .2. Hidden & Exposed node problem
are called relaying stations.
In the 802.11 protocol, the fundamental
mechanism to access the medium is called Distributed III. CSMA/CA
Coordination Function (DCF). This is a random The most important part of a MAC protocol
access scheme, based on the Carrier Sense Multiple is Channel Access Mechanism. The channel access
Access with Collision Avoidance (CSMA/CA) mechanism is way of regulating the use of physical
protocol. Retransmission of collided packets is channel among the stations present in the network. It
managed according to binary exponential back off specifies when a station can send or receive data on
rules. In this research work we limit our investigation the channel.
to the DCF scheme. DCF describes two techniques to
employ for packet transmission. The default scheme is CSMA/CA (Carrier Sense Multiple Access)
a two-way handshaking technique called Basic is derived from CSMA/CD (Collision Detection)
Access Mechanism. which is the channel access mechanism used in wired
Figure .1. Wireless Ad-hoc Network Ethernets. Since the transmission range of wireless
stations is limited, collision cannot be detected
directly. This protocols tries to avoid the collision. On
arrival of a data packet from LLC, a station senses the
channel before transmission and if found idle, starts
transmission. If another transmission is going on, the
station waits for the length of current transmission,
and starts contention. Since the contention is a
random time, each station get statistically equal
chance to win the contention.
1392 | P a g e
2. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.
IV. IEEE 802.11 OPERATION
The IEEE 802.11 MAC offers two kinds of
medium access methods, namely Distributed
Coordination Function (DCF), and Point
Coordination Function (PCF). DCF is the basic access
method in 802.11 and requires no infrastructure.
The IEEE 802.11 MAC offers two kinds of
medium access methods, namely Distributed
Coordination Function (DCF), and Point
Coordination Function (PCF). DCF is the basic access
method in 802.11 and requires no infrastructure.
When wireless stations are within transmit range of
each other, they form a Basic Service Set (BSS), and
can communicate to each other using DCF. If the BSS
contains only two stations, it is called Independent
Figure .3. CSMA Channel Access Mechanism Basic Service Set (IBSS). Many BSSs may be
connected by a Distribution System (DS) to form an
CSMA/CA is asynchronous mechanism for Extended Service Set (ESS). An access point (AP) is
medium access and does not provide any bandwidth the station that provides access to DS services.
guarantee. It’s a best effort service and is suited for
packetized applications like TCP/IP. It adapts quite
well to the variable traffic conditions and is quite
robust against interference.
Figure .5. MAC Architecture
The IEEE 802.11 MAC is designed for
wireless LANs. The requirements of multi-hop ad-hoc
networks are more challenging than those of wireless
LANs. In this research, we investigate the operation
of IEEE 802.11 MAC in centralized multi-hop ad-hoc
networks. The terms station and node are used
interchangeably throughout the thesis. Multi-hop
cooperative wireless ad-hoc networks will be simply
referred to as multi-hop networks.
Figure .6. Multi-hop Scenario
Figure .4. Flow chart of CSMA/CA Consider a multi-hop centralized scenario, as
shown in the figure. For convenience, the stations
1393 | P a g e
3. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.1392-1400
inside the network are classified into following contention can be decreased by using polling MAC
categories: where central station acts as polling station.
Central station : is the central controlling station.
Most of the traffic in the network is directed towards
it.
Inner stations : are within one hop boundary of the
central station.
Boundary stations : are at one hop boundary of
the central station. These stations act as relaying
stations for the stations outside the reach of central
node. Outer stations are outside the communication
range of central node. Figure .8. Hybrid PCF-DCF operation
IEEE 802.11 SCHEME SPECIFICATION
IEEE 802.11 specifies two medium access control
protocols, PCF (Point Coordination Function) and
DCF (Distributed Coordination Function). PCF is a
centralized scheme, whereas DCF is a fully
distributed scheme. We consider DCF in this paper.
Transmission range : When a node is within
transmission range of a sender node, it can receive
and correctly decode packets from the sender
node. In our simulations, the transmission range is
250 m when using the highest transmit power
level.
Carrier sensing range : Nodes in the carrier
sensing range can sense the sender’s transmission.
Carrier sensing range is typically larger than the
transmission range, for instance, two times larger
than the transmission range. In our simulations, the
Figure .7. IEEE 802.11 Architecture carrier sensing range is 550 m when using the
highest power level. Note that the carrier sensing
range and transmission range depend on the
V. IEEE 802.11 OPERATION IN MULTI-HOP transmit power level.
NETWORKS
Carrier sensing zone : When a node is within the
The 802.11 MAC with DCF mode of carrier sensing zone, it can sense the signal but
operation is the simplest choice in multi-hop ad hoc cannot decode it correctly. Note that, as per our
networks. The reason for the choice of DCF is that it definition here, the carrier sensing zone does not
does not require any prior infrastructure. Two or more include transmission range. Nodes in the
stations can come together and form an BSS. This transmission range can indeed sense the
nature of DCF is very suitable for ad-hoc networks as transmission, but they can also decode it correctly.
the ad-hoc networks are simply formed by as set of Therefore, these nodes will not be in the carrier
stations coming together. In this section we discuss sensing zone as per our definition. The carrier
the operation of 802.11 MAC in multi-hop networks, sensing zone is between 250 m and 550 m with the
especially centralized multi-hop ad-hoc networks. highest power level in our simulation.
Since the DCF is a contention based distributed
protocol, it performs badly in high load conditions.
The poor performance of DCF is due to fact that the
collisions increase as more and more stations try to
access the medium at the same time. It is well known
that the polling MAC performs better than pure
CSMA/CA under high load conditions. Therefore,
1394 | P a g e
4. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.
Figure .10. System Architecture of an Ad-hoc
network
Figure .9. Carrier Sensing In contrast to the ad hoc network,
infrastructure networks are established to provide
VI. MAC SUB LAYER IN IEEE 802.11 wireless users with specific services and range
The IEEE standard 802.11 specifies the most extension. Infrastructure networks in the context of
famous family of WLANs in which many products are IEEE 802.11 are established using APs. The AP is
already available. Standard belongs to the group of analogous to the base station in a cellular
802.x LAN standards, e.g., 802.3 Ethernet or 802.5 communications network. The AP supports range
Token Ring. This means that the standard specifies extension by providing the integration points
the physical and medium access layer adapted to the necessary for network connectivity between multiple
special requirements of wireless LANs, but offers the BSSs, thus forming an extended service set (ESS).
same interface as the others to higher layers to The ESS has the appearance of one large BSS to the
maintain interoperability. logical link control (LLC) sub layer of each station
(STA). The ESS consists of multiple BSSs that are
SYSTEM ARCHITECTURE integrated together using a common distribution
The basic service set (BSS) is the system (DS). The DS can be thought of as a backbone
fundamental building block of the IEEE 802.11 network that is responsible for MAC-level transport
architecture. A BSS is defined as a group of stations of MAC service data units (MSDUs).
that are under the direct control of a single
coordination function (i.e., a DCF or PCF) which is
defined below. The geographical area covered by the
BSS is known as the basic service area (BSA), which
is analogous to a cell in a cellular communications
network.
Conceptually, all stations in a BSS can
communicate directly with all other stations in a BSS.
However, transmission medium degradations due to
multipath fading, or interference from nearby BSSs
reusing the same physical-layer characteristics (e.g.,
frequency and spreading code, or hopping pattern),
can cause some stations to appear hidden from other
stations. An ad hoc network is a deliberate grouping
Figure .11. Example of infrastructure network
of stations into a single BSS for the purposes of
internetworked communications without the aid of an
infrastructure network. Given figure is an illustration VII. DCF OPERATION
of an independent BSS (IBSS), which is the formal The DCF is the fundamental access method
name of an ad hoc network in the IEEE 802.11 used to support asynchronous data transfer on a best
standard. Any station can establish a direct effort basis. The DCF is based on CSMA/CA. The
communications session with any other station in the carrier sense is performed at both the air interface,
BSS, without the requirement of channeling all traffic referred to as physical carrier sensing, and at the MAC
through a centralized access point (AP). sub layer, referred to as virtual carrier sensing.
Physical carrier sensing detects presence of other
1395 | P a g e
5. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.1392-1400
users by analyzing the activity in the channel through
the received signal strength. Where, ACK size is the length (in bytes) of an ACK
A station performs virtual carrier sense by frame, and Bit Rate is the physical layer’s lowest
examining the received MPDU (MAC Protocol Data mandatory rate. Preamble Length is 144 bits and PLCP
Unit) information in the header of RTS, CTS and Header Length is 48 bits . Using a 1 Mbps channel bit
ACK frames. The stations in BSS use this information rate, EIFS is equal to 364
to adjust their Network Allocation Vector (NAV), μs
which indicates amount of time that must elapse until
the current transmission is complete and the channel
can be sampled again for idle status.
Figure .13. NAV duration in transmission range
and carrier sensing zone
Figure .12. DCF access using RTS/CTS
VIII. BASIC POWER CONTROL PROTOCOL
A. Inter frame Spacing Different transmit powers used at different
IFS is the time interval between frames. IEEE nodes may also result in increased collisions, unless
802.11 defines four IFSs – SIFS (short inter frame some precautions are taken. Suppose nodes A and B
space), PIFS (PCF inter frame space), DIFS (DCF use lower power than nodes C and D. When A is
inter frame space), and EIFS (extended inter frame transmitting a packet to B, this transmission may not
space). The IFSs provide priority levels for accessing be sensed by C and D. So, when C and D transmit to
the channel. The SIFS is the shortest of the inter frame each other using a higher power, their transmissions
spaces and is used after RTS, CTS, and DATA frames will collide with the on-going transmission from A to
to give the highest priority to CTS, DATA and ACK, B.
respectively. In DCF, when the channel is idle, a node
waits for the DIFS duration before transmitting any
packet.
In figure, nodes in transmission range
correctly set their NAVs when receiving RTS or CTS.
However, since nodes in the carrier sensing zone
cannot decode the packet, they do not know the
duration of the packet transmission. To prevent a
collision with the ACK reception at the source node,
when nodes detect a transmission and cannot decode
it, they set their NAVs for the EIFS duration. The
main purpose of the EIFS is to provide enough time
for a source node to receive the ACK frame, so the
duration of EIFS is longer than that of an ACK Figure .14. Differences in transmit power can lead
transmission. As per IEEE 802.11, the EIFS is to increased collisions
obtained using the SIFS, the DIFS, and the length of
time to transmit an ACK frame at the physical layer’s One simple solution (as a modification to
lowest mandatory rate, as the following equation : IEEE 802.11) is to transmit RTS and CTS at the
highest possible power level but transmit DATA and
EIFS = SIFS+ DIFS+ [ (8·ACKsize) + Preamble ACK at the minimum power level necessary to
Length+ PLCP Header Length] / Bit Rate communicate.
1396 | P a g e
6. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.
Figure shows nodes A and B send RTS and using a power level equal to p desired. Similarly, the
CTS, respectively, with the highest power level so that transmit power for the ACK transmission is
node C receives the CTS and defers its transmission. determined when the destination receives the RTS.
By using a lower power for DATA and ACK packets,
nodes can conserve energy.
Figure .15. Basic Scheme.
In the Basic scheme, the RTS–CTS
Figure .16. Basic Power Control Protocol.
handshake is used to decide the transmission power
for subsequent DATA and ACK packets. This can be
done in two different ways as described below. Let IX. DEFICIENCY OF THE BASIC PROTOCOL
pmax denote the maximum possible transmit power
level. In the Basic scheme, RTS and CTS are sent
using pmax, and DATA and ACK packets are sent
Suppose that node A wants to send a packet to using the minimum necessary power to reach the
destination. When the neighbour nodes receive an
node B. Node A transmits the RTS at power
level pmax. When B receives the RTS from A RTS or CTS, they set their NAVs for the duration of
with signal level pr, B can calculate the the DATA–ACK transmission. When D and E
minimum necessary transmission power level, transmit the RTS and CTS, respectively, B and C
pdesired, for the DATA packet based on receive the RTS, and F and G receive the CTS, so
received power level pr, the transmitted power these nodes will defer their transmissions for the
level, pmax, and noise level at the receiver B. duration of the D–E transmission. Node A is in the
carrier sensing zone of D (when D transmits at pmax)
We can borrow the procedure for estimating so it will only sense the signals and cannot decode the
pdesired from. This procedure determines pdesired packets correctly. Node A will set its NAV for EIFS
taking into account the current noise level at node B. duration when it senses the RTS transmission from D.
Node B then specifies pdesired in its CTS to node A. Similarly, node H will set its NAV for EIFS duration
After receiving CTS, node A sends DATA using following CTS transmission from E.
power level pdesired. Since the signal-to-noise ratio at When transmit power control is not used, the
the receiver B is taken into carrier sensing zone is the same for RTS–CTS and
consideration, this method can be accurate in DATA–ACK since all packets are sent using the
estimating the appropriate transmit power level for same power level. However, in Basic, when a source
DATA. and destination pair decides to reduce the transmit
power for DATA–ACK, the transmission range for
DATA–ACK is smaller than that of RTS–CTS;
In the second alternative, when a destination similarly, the carrier sensing zone for DATA–ACK is
node receives an RTS, it responds by sending a also smaller than that of RTS–CTS.
CTS as usual (at power level p max). When the
source node receives the CTS, it calculates p
desired based on received power level, pr, and
transmitted power level (p max), as
P desired = p max/pr · Rxthresh · c,
where Rxthresh is the minimum necessary received
signal strength and c is a constant. We set c equal to 1
in our simulations. Then, the source transmits DATA
1397 | P a g e
7. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.1392-1400
Figure .18. PCM periodically increases
The key difference between PCM and the Basic
Figure .17. Basic Scheme. scheme is that PCM periodically increases the
transmit power to pmax during the DATA packet
transmission. With this change, nodes that can
X. PROPOSED POWER CONTROL MAC
potentially interfere with the reception of ACK at the
PROTOCOL
sender will periodically sense the channel as busy, and
Proposed power control MAC (PCM) is defer their own transmission.
similar to the Basic scheme in that it uses power level
pmax for RTS–CTS and the minimum necessary Since nodes that can sense a transmission but
transmit power for DATA–ACK transmissions. We not decode it correctly only defer for EIFS duration,
now describe the procedure used in PCM. the transmit power for DATA is increased once every
EIFS duration. Also, the interval which the DATA is
1. Source and destination nodes transmit the RTS transmitted at pmax should be larger than the time
and CTS using pmax. Nodes in the carrier sensing required for physical carrier sensing.
zone set their NAVs for EIFS duration when they
sense the signal and cannot decode it correctly. Accordingly, 15 μs should be adequate for
carrier sensing, and time required to increase output
2. The source node may transmit DATA using a power (power on) from 10% to 90% of maximum
lower power level, similar to the BASIC scheme. power (or power-down from 90% to 10% of
maximum power) should be less than 2 μs. Thus, we
3. To avoid a potential collision with the ACK (as believe 20 μs should be enough to power up (2 μs),
discussed earlier), the source node transmits DATA at sense the signal (15 μs), and power down (2 μs). In
the power level pmax, periodically, for just enough our simulation, EIFS duration is set to 212 μs using a
time so that nodes in the carrier sensing zone can 2 Mbps
sense it. bit rate. In PCM, a node transmits DATA at pmax
every 190 μs for a 20 μs duration. Thus, the interval
4. The destination node transmits an ACK using between the transmissions at pmax is 210 μs, which is
the minimum required power to reach the source shorter than EIFS duration. A source node starts
node, similar to the BASIC scheme. transmitting DATA at pmax for 20 μs and reduces the
Figure shows how the transmit power level transmit power to a power level adequate for the given
changes during the sequence of an transmission for 190 μs. Then, it repeats this process
RTS–CTS–DATA–ACK transmission. After the during DATA transmission. The node also transmits
RTS–CTS handshake using pmax, suppose the source DATA at pmax for the last 20 μs of the transmission.
and destination nodes decide to use power level p1 for
DATA and ACK. Then, the source will transmit With the above simple modification, PCM
DATA using p1 and periodically use pmax. The overcomes the problem of the BASIC scheme and can
destination uses p1 for ACK transmission. achieve throughput comparable to 802.11, but uses
less energy. However, note that PCM, just like
802.11, does not prevent collisions completely.
Specifically, collisions with DATA being received by
1398 | P a g e
8. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.
the destination can occur, as discussed earlier. Our XI. SIMULATION RESULTS
goal in this paper is to match the performance of
802.11 while reducing energy consumption. To be The given table shows all the different
more conservative in estimating the energy parameters taken into account for conducting the
consumption of PCM, we also perform our simulation in NS-2 atmosphere. In this table the
simulations where we increase the transmit power values of all the different parameters are shown, using
every 170 μs for 40 μs during DATA transmission. which the simulation for aggregate throughput and
total data delivered per joule in accordance with Data
The proposed power control protocol is modified rate per flow and Packet size is calculated for all three
such that in this the Data and ACK is transmitted at schemes namely, BASIC, 802.11 and Proposed
lower power level but after a certain duration it is protocol’s.
transmitted at higher power level for a very fraction of
time, in order to make the neighbouring nodes
understand that transmission is going on and they Parameters Values
should restrict their transmission during that period so
Number of nodes 50
that collision does not take place hence saving power
consumption. Simulation Area(m) 800x800
Topology Random
Transmission range 50,100,150,200,250
Radio Propagation model Shadowing
Traffic model CBR, TCP
Packet Size 256,512,1024 bytes
Simulation times 150 seconds,300 seconds
Bandwidth 2 Mbps
Routing DSR
A. Simulation Result for Aggregate Throughput vs
Data Rate Per Flow
Figure .19. Flow chart of Proposed Protocol
1399 | P a g e
9. Rahul Mukherjee / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue4, July-august 2012, pp.1392-1400
XII. CONCLUSION
B. Simulation Result for Aggregate Throughput vs In the past, MAC protocols that use the
Packet Size maximum transmit power for RTS–CTS and the
minimum necessary transmit power for DATA–ACK
have been proposed with the goal of achieving energy
saving. It refer to this as the Basic scheme. However,
it is shown that the Basic scheme increases collisions
and retransmissions, which can result in more energy
consumption and throughput degradation.
XIII. REFERENCES
[1] E. Pagnani and G. P. Rossi, “Providing reliable
and fault tolerant broadcast delivery in mobile
ad-hoc networks,” Mobile Networks and
Applications, 5(4), pp. 175-192, 1999.
[2] J. Gomez, A.T. Campbell, M. Naghshineh and
C. Bisdikian, Conserving transmission power in
C. Simulation Result for Data Delivered per Joule wireless ad hoc networks (November 2001).
vs Data rate per flow
[3] R. Wattenhofer, L. Li, P. Bahl and Y.-M. Wang,
Distributed topology control for power efficient
operation in multihop wireless ad hoc
networks,Vol. 3 pp. 1388–1397 (April 2001).
[4] N. Poojary, S.V. Krishnamurthy and S. Dao,
Medium access control in a network of ad hoc
mobile nodes with heterogeneous power
capabilities, in: Proc. IEEE International
Conference on Communications (ICC 2001),
Vol. 3 pp. 872–877 (2001).
[5] B. Chen, K. Jamieson, H. Balakrishnan and R.
Morris, Span: An energy-efficient coordination
algorithm for topology maintenance in ad hoc
wireless networks (July 2001).
D. Simulation Result for Data Delivered per joule vs
Packet Size
Rahul Mukherjee : H.O.D. & Asst Prof.
(EC-Deptt),
St. Aloysius Institute of Technology (SAIT),
Jabalpur, India. Pursuing P.hd in the field of Mobile
Adhoc Networks. Published research papers in three
international journals. Pursued M.Tech in
Communication Systems Engineering from KIIT
University, Bhubaneswar. His field of interests
comprises of Mobile Technology & Networking.
1400 | P a g e