In this paper, we are defining techniques for reducing the isolated nodes in the Zigbee network. To reduce the isolated nodes, a connectivity improving mechanism is proposed which utilizes a connection shifting scheme to increase the join ratio of established devices.
1) ANU-MIMO is a proposed decentralized, scalable, and economical wireless network designed to provide long-range broadband connectivity using massive MIMO technology.
2) Unlike cellular networks, ANU-MIMO is non-cellular and distributes service nodes and beamforming to increase throughput and range as more nodes are added.
3) Simulations show ANU-MIMO can provide error-free broadband connectivity to over 1,000 clients within a 200km range using low power and achieving throughputs comparable to LTE but in a way that remains constant per client as the network scales.
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
This document presents a performance analysis of an IP over optical CDMA network system based on a random diagonal (RD) code. It proposes using spectral amplitude coding OCDMA to directly connect the IP layer to the optical layer, eliminating intermediate layers and reducing overhead. The system architecture, design steps, and simulation setup are described. Simulation results using OptiSystem show that bit error rate increases with the number of simultaneous users and data transmission capacity decreases with transmission distance as expected. The RD code OCDMA system provides a potential solution for next-generation networks by enabling intelligent functions and advanced services at the optical layer.
Determination of optimum fft for wi max under different fadingIAEME Publication
This document discusses determining the optimal FFT size for WiMAX systems under different fading conditions. It presents the results of simulations performed using QualNet to analyze quality of service metrics like packet delivery ratio, delay, jitter and throughput for various FFT sizes (2048, 1024, 512, 128) and data rates (200-1000kbps) under Rayleigh and Rician fading. The key findings are that under Rayleigh fading, FFT size 128 provides the maximum tradeoff index, while under Rician fading, FFT size 512 is optimal. The tradeoff index, calculated as a weighted combination of the QoS metrics, is used to determine the best configuration.
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
The Mobile WiMAX simulation model is
implemented by using MATLAB code. The simulation model
consists of different phases which will help us to model the
transmitter and receiver section. In the next phase, the data is
being modulated by using the modulation methods QPSK and
QAM followed by OFDM transmitter. These phases can be
used to show the performance of these modulation methods
under varying condition. The Multipath Rician fading model is
implemented to introduce the fading in the transmitter data.
Receiver section is used to receive data from channel will be fed
into the OFDM demodulation. In the next phase, Fast Fourier
Transform is used to disassemble OFDM frame. After that
convolution encoding is applied to data and interleaving is
carried on by using MATLAB function. BPSK method is used
to change the data in the form of bit information to be symbols.
We had used
Powerful business model for fixed wireless data using outdoor antennas - PaperAndre Fourie
Paper presented at the 2nd Africa Radio Comms Conference in Johannesburg - Nov 2015
By Andre Fourie
The revenue that can be generated by an LTE base station is influenced by the quality of the signal received by the customer premise equipment (CPE). Most CPE come with omni-directional indoor antennas, but have provision for the connection to external antennas.
Substituting the indoor antennas for directional outdoor antennas has a marked effect on the data transfer speeds of the network. There are two reasons for this. Firstly, outdoor antennas are physically larger than their indoor counterparts and thus have a higher gain. The increase in antenna gain translates directly to an increase in received signal strength. The second advantage is that the outdoor antenna sits in an environment that has much better propagating properties than the indoor antenna. Tests have shown that data speeds 3-5 times faster are possible using external antennas compared to indoor antennas.
It is shown, using a primitive financial model that fairly large financial gains can be made by equipping CPE devices with external antennas.
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
Abstract In this Paper, the objective of simulation models is presented to investigate the performance of VoIP codecs over WiMAX and
FDDI networks that specially design for Aden University. To assure if the University IP network is prepared and adequate for this
new type of traffic before adding any new components, Aden University IP network will be simulated by using OPNET simulation
software then the new VoIP service will be added to the University networks. Different parameters that represent the QoS like end
to end delay, jitter, traffic sends and traffic received, MOS are calculated and analyzed in both network scenarios.
Keywords: VoIP, Codecs, QoS, WiMAX, FDDI
1) ANU-MIMO is a proposed decentralized, scalable, and economical wireless network designed to provide long-range broadband connectivity using massive MIMO technology.
2) Unlike cellular networks, ANU-MIMO is non-cellular and distributes service nodes and beamforming to increase throughput and range as more nodes are added.
3) Simulations show ANU-MIMO can provide error-free broadband connectivity to over 1,000 clients within a 200km range using low power and achieving throughputs comparable to LTE but in a way that remains constant per client as the network scales.
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
This document presents a performance analysis of an IP over optical CDMA network system based on a random diagonal (RD) code. It proposes using spectral amplitude coding OCDMA to directly connect the IP layer to the optical layer, eliminating intermediate layers and reducing overhead. The system architecture, design steps, and simulation setup are described. Simulation results using OptiSystem show that bit error rate increases with the number of simultaneous users and data transmission capacity decreases with transmission distance as expected. The RD code OCDMA system provides a potential solution for next-generation networks by enabling intelligent functions and advanced services at the optical layer.
Determination of optimum fft for wi max under different fadingIAEME Publication
This document discusses determining the optimal FFT size for WiMAX systems under different fading conditions. It presents the results of simulations performed using QualNet to analyze quality of service metrics like packet delivery ratio, delay, jitter and throughput for various FFT sizes (2048, 1024, 512, 128) and data rates (200-1000kbps) under Rayleigh and Rician fading. The key findings are that under Rayleigh fading, FFT size 128 provides the maximum tradeoff index, while under Rician fading, FFT size 512 is optimal. The tradeoff index, calculated as a weighted combination of the QoS metrics, is used to determine the best configuration.
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
The Mobile WiMAX simulation model is
implemented by using MATLAB code. The simulation model
consists of different phases which will help us to model the
transmitter and receiver section. In the next phase, the data is
being modulated by using the modulation methods QPSK and
QAM followed by OFDM transmitter. These phases can be
used to show the performance of these modulation methods
under varying condition. The Multipath Rician fading model is
implemented to introduce the fading in the transmitter data.
Receiver section is used to receive data from channel will be fed
into the OFDM demodulation. In the next phase, Fast Fourier
Transform is used to disassemble OFDM frame. After that
convolution encoding is applied to data and interleaving is
carried on by using MATLAB function. BPSK method is used
to change the data in the form of bit information to be symbols.
We had used
Powerful business model for fixed wireless data using outdoor antennas - PaperAndre Fourie
Paper presented at the 2nd Africa Radio Comms Conference in Johannesburg - Nov 2015
By Andre Fourie
The revenue that can be generated by an LTE base station is influenced by the quality of the signal received by the customer premise equipment (CPE). Most CPE come with omni-directional indoor antennas, but have provision for the connection to external antennas.
Substituting the indoor antennas for directional outdoor antennas has a marked effect on the data transfer speeds of the network. There are two reasons for this. Firstly, outdoor antennas are physically larger than their indoor counterparts and thus have a higher gain. The increase in antenna gain translates directly to an increase in received signal strength. The second advantage is that the outdoor antenna sits in an environment that has much better propagating properties than the indoor antenna. Tests have shown that data speeds 3-5 times faster are possible using external antennas compared to indoor antennas.
It is shown, using a primitive financial model that fairly large financial gains can be made by equipping CPE devices with external antennas.
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
Abstract In this Paper, the objective of simulation models is presented to investigate the performance of VoIP codecs over WiMAX and
FDDI networks that specially design for Aden University. To assure if the University IP network is prepared and adequate for this
new type of traffic before adding any new components, Aden University IP network will be simulated by using OPNET simulation
software then the new VoIP service will be added to the University networks. Different parameters that represent the QoS like end
to end delay, jitter, traffic sends and traffic received, MOS are calculated and analyzed in both network scenarios.
Keywords: VoIP, Codecs, QoS, WiMAX, FDDI
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
[Mcq] computer communication networks lmt2raghad mejeed
The document contains 33 multiple choice questions about computer communication networks. It covers topics like the layers of the OSI model, specifically the physical layer. It also discusses different types of transmission media like twisted pair cable, coaxial cable, optical fiber and their characteristics. Network topologies like star, bus, ring and technologies like multiplexing - TDM, FDM are explained through the MCQ questions.
The document contains a set of multiple choice questions and answers about computer networks fundamentals. It covers topics such as network layers, protocols, transmission media, and more. The questions are in a multiple choice format with a single correct answer and a short explanation for each answer.
The document discusses communication protocols and the OSI model. It provides details on each of the 7 layers of the OSI model and their functions. It also summarizes IBM's Systems Network Architecture (SNA) model, which maps to the 7 layers of OSI. SNA defines physical, data link, path, transmission, data flow, presentation and transaction layers that perform similar functions to their OSI counterparts.
An IP based packet test environment for LTE-TDD and LTE-FDDS.c. Lu
In recent years, Long Term Evolution systems
have been developed to replace 3G mobile
networks. During LTE network deployment, it is
essential that mobile operators and manufacturers
conduct tests on user equipment and the
base station (eNB). Besides conformance testing
at the radio layer, it is also important to conduct
network-layer performance tests between UE
and eNB. This article develops an LTE test environment
that can be used to test the IP-based
packet performance for TD-LTE and LTE FDD.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
1 Telecommunication Switching Systems And Networksguestd436758
This document contains information about a telecommunication switching systems and networks exam for a third year engineering course. It lists 8 questions that students could answer, each with two parts carrying 8 marks each. The questions cover topics like earphone design, time division switching, telecommunication network topologies, grade of service calculations, data communication circuits, OSI model layers, ISDN protocols, SONET frame format, and more. The document provides context and details for the exam while keeping the content concise and focused on assessing student knowledge.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7944827?dq=US+7944827&hl=en&sa=X&ei=-XJSVPLjF8Kn8AXtz4G4Cw&ved=0CB8Q6AEwAA
The document contains 20 multiple choice questions about computer communication networks and the OSI model. It tests knowledge of the layers of the OSI model and TCP/IP model, including which layers are present in each and the functions of each layer. It also contains questions about protocols used at different layers like the physical layer.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
This document discusses implementing a virtual private network (VPN) over multi-protocol label switching (MPLS). It begins with an introduction to MPLS and how it works using label switching to route packets. It then discusses VPNs and how MPLS VPNs use separate routing tables called virtual routing and forwarding tables to isolate customer networks. The document demonstrates configuring an MPLS VPN using the GNS3 network simulator with two customer edge routers connecting two customer sites over an MPLS provider network. MPLS, VPNs, and the specific configuration steps are described. In the results section, the routing tables of the customer edge routers are shown to have routes from both customer sites, demonstrating that the MPLS VPN was successfully implemented to connect
Nocs performance improvement using parallel transmission through wireless linksijcsa
This document discusses improving the performance of Network-on-Chip (NoC) using parallel transmission through wireless links. It proposes a method for transmitting and receiving flits in parallel through wireless links using a parallel buffer structure. Simulation results show this approach can reduce energy consumption by up to 30% for all-to-all traffic and 15% for transpose traffic. It can also improve latency as a function of packet injection rate by up to 71% for all-to-all traffic and 19% for transpose traffic.
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced system complexity.
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced
system complexity.
Optimised wireless network using smart mobile terminal antenna SMTA system marwaeng
1) The document presents a novel smart mobile terminal antenna system (SMTA) that uses a switched radiation beam approach to optimize wireless network performance, security, and signal tracking.
2) A key innovation is the dielectrically embedded SMTA (DE-SMTA) that reduces the antenna volume by 80% through embedding in a ceramic material. Testing showed the DE-SMTA maintained consistently high wireless signal levels compared to a fixed beam approach.
3) The SMTA system software performs scans to select the optimal radiation beam every 10 seconds to adapt to the dynamic wireless environment, improving network performance and security by directing signals toward the intended receiver.
1) A system using ZigBee wireless technology is proposed to monitor the operating activities of work vehicles both indoors and outdoors.
2) The system estimates the topology of the ZigBee network to determine the relative positions of work vehicles. It also uses received signal strength indicator (RSSI) values to estimate distances between vehicles.
3) Experiments show that response time between adjacent devices on the ZigBee network increases by about 7ms per hop. RSSI decreases exponentially with distance. This information allows the system to estimate topology and detect vehicle movements.
This article is about the comparison of 5 kinds of wireless communication technologies, namely Zigbee, Bluetooth, UWB, Wi-Fi, NFC technology.
ZigBee technology in wireless communication technologies
Bluetooth technology in wireless communication technologies
UWB technology in wireless communication technologies
Wi-Fi technology in wireless communication technologies
NFC technology in wireless communication technologies
The relationship of the 5 wireless communication technologies
Designing of Advanced and Efficient Tree Routing in Zigbee Wireless Networkrahulmonikasharma
Zigbee is a distinctive communication criterions principally aimed to be deployed for wireless personal area networks with low rate. It’s an IEEE 802.15.4 based usual incurring minimal amount of complexity, cut rate and low strength consumption. Zigbee cluster-tree be good-recognized zigbee topologies especially suitable for WSN’s consuming low strength and sustaining cut rate since it supports power rescue operations. When Zigbee cluster network generates more traffic, the performance of the network tends to decline due to lack of bandwidth utilization. The earlier techniques employed for the purpose was providing supple routing and increased bandwidth utilization. But they tend to compromise on an ideally and convergence rage of bandwidth usages. Thereby we propose as Enhanced Distributed Adoptive Parent (EDAP) based structure for Zigbee cluster tree networks that manages changing traffic weight communication at any granted moment. The nodes collecting the sensed data are appropriated depending on the traffic load demands. Such a framework when applied improves bandwidth of the network and in turn improves the overall performance of the network.
The document discusses Zigbee wireless sensor networks, including describing Zigbee as a low-power wireless communication standard used for connecting sensors and devices. It explains the architecture and topologies of Zigbee networks, which can include star, tree, or mesh configurations. Applications of Zigbee technology are also covered, such as in lighting, smart homes, healthcare, transportation, manufacturing, and environmental monitoring.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
[Mcq] computer communication networks lmt2raghad mejeed
The document contains 33 multiple choice questions about computer communication networks. It covers topics like the layers of the OSI model, specifically the physical layer. It also discusses different types of transmission media like twisted pair cable, coaxial cable, optical fiber and their characteristics. Network topologies like star, bus, ring and technologies like multiplexing - TDM, FDM are explained through the MCQ questions.
The document contains a set of multiple choice questions and answers about computer networks fundamentals. It covers topics such as network layers, protocols, transmission media, and more. The questions are in a multiple choice format with a single correct answer and a short explanation for each answer.
The document discusses communication protocols and the OSI model. It provides details on each of the 7 layers of the OSI model and their functions. It also summarizes IBM's Systems Network Architecture (SNA) model, which maps to the 7 layers of OSI. SNA defines physical, data link, path, transmission, data flow, presentation and transaction layers that perform similar functions to their OSI counterparts.
An IP based packet test environment for LTE-TDD and LTE-FDDS.c. Lu
In recent years, Long Term Evolution systems
have been developed to replace 3G mobile
networks. During LTE network deployment, it is
essential that mobile operators and manufacturers
conduct tests on user equipment and the
base station (eNB). Besides conformance testing
at the radio layer, it is also important to conduct
network-layer performance tests between UE
and eNB. This article develops an LTE test environment
that can be used to test the IP-based
packet performance for TD-LTE and LTE FDD.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
1 Telecommunication Switching Systems And Networksguestd436758
This document contains information about a telecommunication switching systems and networks exam for a third year engineering course. It lists 8 questions that students could answer, each with two parts carrying 8 marks each. The questions cover topics like earphone design, time division switching, telecommunication network topologies, grade of service calculations, data communication circuits, OSI model layers, ISDN protocols, SONET frame format, and more. The document provides context and details for the exam while keeping the content concise and focused on assessing student knowledge.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7944827?dq=US+7944827&hl=en&sa=X&ei=-XJSVPLjF8Kn8AXtz4G4Cw&ved=0CB8Q6AEwAA
The document contains 20 multiple choice questions about computer communication networks and the OSI model. It tests knowledge of the layers of the OSI model and TCP/IP model, including which layers are present in each and the functions of each layer. It also contains questions about protocols used at different layers like the physical layer.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
This document discusses implementing a virtual private network (VPN) over multi-protocol label switching (MPLS). It begins with an introduction to MPLS and how it works using label switching to route packets. It then discusses VPNs and how MPLS VPNs use separate routing tables called virtual routing and forwarding tables to isolate customer networks. The document demonstrates configuring an MPLS VPN using the GNS3 network simulator with two customer edge routers connecting two customer sites over an MPLS provider network. MPLS, VPNs, and the specific configuration steps are described. In the results section, the routing tables of the customer edge routers are shown to have routes from both customer sites, demonstrating that the MPLS VPN was successfully implemented to connect
Nocs performance improvement using parallel transmission through wireless linksijcsa
This document discusses improving the performance of Network-on-Chip (NoC) using parallel transmission through wireless links. It proposes a method for transmitting and receiving flits in parallel through wireless links using a parallel buffer structure. Simulation results show this approach can reduce energy consumption by up to 30% for all-to-all traffic and 15% for transpose traffic. It can also improve latency as a function of packet injection rate by up to 71% for all-to-all traffic and 19% for transpose traffic.
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced system complexity.
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced
system complexity.
Optimised wireless network using smart mobile terminal antenna SMTA system marwaeng
1) The document presents a novel smart mobile terminal antenna system (SMTA) that uses a switched radiation beam approach to optimize wireless network performance, security, and signal tracking.
2) A key innovation is the dielectrically embedded SMTA (DE-SMTA) that reduces the antenna volume by 80% through embedding in a ceramic material. Testing showed the DE-SMTA maintained consistently high wireless signal levels compared to a fixed beam approach.
3) The SMTA system software performs scans to select the optimal radiation beam every 10 seconds to adapt to the dynamic wireless environment, improving network performance and security by directing signals toward the intended receiver.
1) A system using ZigBee wireless technology is proposed to monitor the operating activities of work vehicles both indoors and outdoors.
2) The system estimates the topology of the ZigBee network to determine the relative positions of work vehicles. It also uses received signal strength indicator (RSSI) values to estimate distances between vehicles.
3) Experiments show that response time between adjacent devices on the ZigBee network increases by about 7ms per hop. RSSI decreases exponentially with distance. This information allows the system to estimate topology and detect vehicle movements.
This article is about the comparison of 5 kinds of wireless communication technologies, namely Zigbee, Bluetooth, UWB, Wi-Fi, NFC technology.
ZigBee technology in wireless communication technologies
Bluetooth technology in wireless communication technologies
UWB technology in wireless communication technologies
Wi-Fi technology in wireless communication technologies
NFC technology in wireless communication technologies
The relationship of the 5 wireless communication technologies
Designing of Advanced and Efficient Tree Routing in Zigbee Wireless Networkrahulmonikasharma
Zigbee is a distinctive communication criterions principally aimed to be deployed for wireless personal area networks with low rate. It’s an IEEE 802.15.4 based usual incurring minimal amount of complexity, cut rate and low strength consumption. Zigbee cluster-tree be good-recognized zigbee topologies especially suitable for WSN’s consuming low strength and sustaining cut rate since it supports power rescue operations. When Zigbee cluster network generates more traffic, the performance of the network tends to decline due to lack of bandwidth utilization. The earlier techniques employed for the purpose was providing supple routing and increased bandwidth utilization. But they tend to compromise on an ideally and convergence rage of bandwidth usages. Thereby we propose as Enhanced Distributed Adoptive Parent (EDAP) based structure for Zigbee cluster tree networks that manages changing traffic weight communication at any granted moment. The nodes collecting the sensed data are appropriated depending on the traffic load demands. Such a framework when applied improves bandwidth of the network and in turn improves the overall performance of the network.
The document discusses Zigbee wireless sensor networks, including describing Zigbee as a low-power wireless communication standard used for connecting sensors and devices. It explains the architecture and topologies of Zigbee networks, which can include star, tree, or mesh configurations. Applications of Zigbee technology are also covered, such as in lighting, smart homes, healthcare, transportation, manufacturing, and environmental monitoring.
This document summarizes a research paper on a gas management and disaster system using ZigBee wireless technology. The system uses ZigBee sensors and controllers to monitor gas flow, pressure, temperature, smoke, and methane leaks. If any hazardous levels are detected, the ZigBee controller automatically shuts off the gas and triggers a warning. The system establishes a wireless network using ZigBee standards to automate safety devices and protect against gas leaks or fires. It provides both economic and health benefits for residential environments through remote monitoring capabilities.
This document discusses the design and simulation of wireless sensor networks using the ZigBee standard. It presents the architecture of ZigBee networks, which consists of sensor nodes, coordinators, and routers. It also examines different network topologies - star, mesh, and tree - and a methodology for simulating these topologies to evaluate metrics like energy efficiency, reliability, and connectivity. The results provide insights into the strengths and weaknesses of each topology to identify the most suitable one for different application scenarios.
ZigBee defines the application and security layer specifications enabling interoperability between products from different manufacturers.ZigBee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless M2M networks.It is very useful in this communication world.
Wireless zigbee communication technology 141215052616-conversion-gate01M srinivasu
ZigBee defines the application and security layer specifications enabling interoperability between products from different manufacturers.ZigBee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless M2M networks.It is very useful in this communication world
Impact of Frequency Offset on Interference between Zigbee and Wifi for Smart ...IOSR Journals
Abstract: The Zigbee is a low cost communication technology used for low data rate communication system such as industrial automation etc. Because of its low complexity it is widely adopted for many applications. But the utilization of the same spectrum band by the WLAN system causes interference between both the systems. The proposed approach presents an analysis of this interference effect on Zigbee system when operated with WLAN sources at different distances and different power. It also analyzes the effect when a frequency offset is established between both systems. The simulation results shows that a small offset can provide sufficient improvement in the performance. Keywords: Smart Grids, Zigbee Network, Mesh Network, Wireless LAN (WLAN), BER
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
The document discusses simulations of Zigbee-based wireless sensor networks using different topologies with static and dynamic positioning of the Zigbee coordinator node. The simulations analyzed the effect on throughput and end-to-end delay. Results showed that a tree topology with a mobile coordinator had the highest throughput. A mesh topology, whether with static or dynamic coordinator, produced the lowest end-to-end delay. The document concludes that making the coordinator node mobile generally provides better network performance than a static coordinator configuration.
- Zigbee is a wireless mesh networking standard used for low-power wireless personal area networks. It operates on the IEEE 802.15.4 standard and defines the higher layers for reliable transmission of data between devices.
- 6LoWPAN is an adaptation layer that allows IPv6 packets to be sent over IEEE 802.15.4 low-power wireless networks. It provides compression mechanisms to encapsulate IPv6 datagrams into frames compatible with the IEEE 802.15.4 standard.
- Both Zigbee and 6LoWPAN are commonly used in wireless sensor networks and Internet of Things applications where many devices need to communicate wirelessly over short distances with low power consumption. However, Z
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
This document compares the performance of two mobile ad hoc network (MANET) routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The protocols were evaluated using the Network Simulator 2 (NS2) across three simulation scenarios with varying time durations. The results showed that AODV had lower initial packet loss compared to DSR. However, at longer simulation times both protocols performed similarly with comparable packet delivery ratios. In conclusion, AODV is more suitable when the MANET needs to be established quickly, while both protocols can be used for longer-term MANETs as their performance converges over time.
Zigbee is an open standard wireless protocol used for creating low-power, low-cost personal area networks. It operates on the IEEE 802.15.4 standard and is commonly used in home automation and industrial control applications. A Zigbee network consists of end devices, routers, and a single coordinator node. It uses mesh networking topologies to route data between devices to extend network coverage. Key features include low power consumption, short range, low data rates, security, and reliability through redundant paths. Common applications are in home automation, medical data collection, industrial control, and smart metering.
This paper analyzes the impact of network scalability on various physical attributes of Zigbee networks. Simulations were conducted using Qualnet to evaluate the performance of the Zigbee physical layer based on energy consumption and throughput. Energy consumption was analyzed for different modulation schemes (ASK, BPSK, OQPSK), network sizes (2-50 nodes), and clear channel assessment modes. The results showed that OQPSK and ASK had lower energy consumption than BPSK. Throughput was highest for OQPSK. While carrier sense had slightly higher throughput than other CCA modes, the energy consumption differences between CCA modes were minor.
This document provides a comparison of the short-range wireless technologies ZigBee and Bluetooth. It begins with an introduction and overview of ZigBee, including how ZigBee works, its network topologies, operating modes, and applications. It then provides information on Bluetooth, including its introduction, how it creates connections, operates using frequency hopping, and forms personal area networks (PANs) or piconets. Finally, it compares the key differences between ZigBee and Bluetooth, such as their data rates, intended applications, and power consumption.
This report summarizes the key components of networking, including different types of cables, IP addresses, network protocols, topologies, standards, and cabling categories. It discusses the basic elements used to establish a network, such as switches, routers, and client computers. It also explains concepts like TCP/IP, UDP, DHCP, LANs, WANs, the OSI model and more. Tables and diagrams are provided to illustrate networking concepts and components.
The document discusses the Web Sensor Gateway Architecture for Zigbee wireless networks. It describes Zigbee as a low-cost, low-power wireless protocol intended for networking inexpensive devices. It then outlines the basic functionalities of a gateway as providing query distribution, data aggregation, and message conversion between different networks. Finally, it proposes a gateway architecture that connects Zigbee and TCP/IP networks to allow for control and data exchange between heterogeneous wireless sensor and internet networks.
The document describes the hardware needed to connect standalone computers into a local area network. It discusses network adapters, hubs, switches, and wireless access points. It explains the roles of computers in client-server and peer-to-peer networks. It also defines the ring, bus, and star network topologies.
Zigbee is a wireless networking technology built on the IEEE 802.15.4 standard. It was created to satisfy the need for a low-cost, low-power wireless solution for monitoring and control applications. Zigbee devices can operate for years on inexpensive batteries and support a variety of network topologies. While it has a lower data rate than Bluetooth, Zigbee consumes less power and is better suited for remote control and sensor applications requiring long battery life.
This document is a project proposal for implementing wireless data communication using Zigbee technology. It discusses using Zigbee modules to encrypt data from a keypad, transmit it wirelessly between two PCs up to 70 meters away, then decrypt and display the data. The objectives are to provide reliable and secure data transmission with low power consumption. Zigbee is suitable because it supports mesh networking, low data rates, long battery life, and security. The proposal reviews related work using Zigbee in wireless sensor networks for agriculture and discusses how Zigbee can benefit applications in hospitals, homes, and industry. The scope is limited to transmitting encrypted data between two PCs using Zigbee modules.
Cooperative Communication for Multi-Hop Routing in ZigBee NetworkIJERA Editor
In this paper, we propose multi-hop routing scheme using RSSI to improve the reliability of ZigBee network. By using RSSI for the routing, the transmitted signal is less affected by the fading in each link on the routing path. If the proposed routing scheme is applied to relaying, the demodulation error is reduced in each relay node and the performance is significantly improved as the number of hops increases. Also, if the proposed scheme is applied to the cooperative communication, the improved diversity gain is additionally obtained.
Similar to A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS (20)
DEVELOPMENT OF A RANKING ALGORITHM FOR SEARCH ENGINE OPTIMIZATIONIJCSIT Journal
The paper include implementation of an ranking algorithm. It help to keep track of who is clicking by tracking their IP
address ,date-time and number of clicks .so owner’s can’t
click to his site many times as clicks from single IP address will be consider as only once.
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
In recent years, Wireless Sensor Networks have gained growing attention from both the research community and actual users. As sensor nodes are generally battery-energized devices, so the network lifetime can be widespread to sensible times.
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
In this paper, we are defining techniques for reducing the isolated nodes in the Zigbee network. To reduce the isolated nodes, a connectivity improving mechanism is proposed which utilizes a connection shifting scheme to increase the join ratio of established devices.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
RECOGNITION OF CHEISING IYEK/EEYEK-MANIPURI DIGITS USING SUPPORT VECTOR MACHINESIJCSIT Journal
This paper describes the recognition of Cheising Iyek-Manipuri digits; handwritten as well as printed and comparison of recognition accuracy using Support Vector Machines (SVM). The paper also presents the steps starting right from binarization of scanned images in pre-processing till recognition of the digits using a trained model.
Improved Ad-Hoc Networks Using Cooperative DiversityIJCSIT Journal
In this paper an ad-hoc network having source, a
destination and a third station which is a relay is analyzed.
The channels used here are modeled having thermal noise,
Rayleigh fading and path loss. Different methods for
combining and diversity protocols are compared.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
1. www.ijcsit-apm.com International Journal of Computer Science & Information Technology 1
IJCSIT, Vol. 1, Issue 3 (June 2014) e-ISSN: 1694-2329 | p-ISSN: 1694-2345
A REVIEW ON TECHNIQUES FOR
INCREASING CONNECTIVITY AND LIFE
OF ZIGBEE NETWORKS1
Roop kamal kaur, 2
Dr. Dinesh Arora
1,2
Gurukul Vidyapeeth Institute of Engg. & Technology, Banur, Punjab, India
1
roopkamal7@gmail.com, 2
drdinesh169@gmail.com
Abstract: Zigbee is a wireless communication standard
based on IEEE 802.15.4. Zigbee standard is designed for
wireless sensor network and control networks with low
power consumption, low data rate and low cost. Sensor
devices are randomly established in some applications and
some of these devices may become isolated from the
network due to the constraints of configuration parameters
in Zigbee networks. Due to the isolated nodes, an expected
network operation become unreached. In this paper, we
are defining techniques for reducing the isolated nodes in
the Zigbee network. To reduce the isolated nodes, a
connectivity improving mechanism is proposed which
utilizes a connection shifting scheme to increase the join
ratio of established devices. Another approach to reduce
isolated node is Extended joining procedure which can
efficiently reconstructs the part of the network. We also
introduce a swapping method which extends the life of the
network and balance the energy consumption of the
nodes. This paper also proposes an optimized connectivity
scheme which decreases the isolated nodes and prolongs
the life of the network. In this paper we are describing
these approaches in detail.
Keywords: Zigbee network, connectivity, isolated,
wireless sensor networks.
I. INTRODUCTION
Zigbee is a wireless communication standard based on
IEEE 802.15.4. Zigbee standard is designed for wireless
sensor network and control networks with low power
consumption, low data rate and low cost. Zigbee is used in
various applications: Electrical meters with in home
displays, traffic management systems, industrial
automation, building automation, lighting control, energy
automation etc.
Zigbee includes two layers specified by 802.15.4 : PHY
and MAC. The PHY layer defines the physical and
electrical characteristics of the network. The basic task of
the PHY layer is data transmission and reception. The
MAC layer is responsible for beacon generation if device
is a coordinator, implementing carrier sense multiple
access with collision avoidance (CSMA-CA), handling
guaranteed time slot (GTS) mechanism, data transfer
services for upper layers.
Zigbee Stack
This gives an overview of Zigbee specification. ZigBee is
built on top of the IEEE 802.15.4 standard. ZigBee
provides routing and multi-hop functions to the packet-
based radio protocol.
Fig. 1 Zigbee stack
Zigbee stack resides on a Zigbee logical device and there
are three logical device types:
a. Coordinator
b. Router
c. End device
Wireless standards comparasion
Wireless
parameter
Bluetooth Wi-fi Zigbee
Frequency 2.5GHz 2.5GHz 2.5GHz
Physical/MA
C layers
IEEE
802.15.1
IEEE
802.11b
IEEE
802.15.4
Range 9m 75 to 90m Indoors:
upto 30 m
Outdoors(li
ne of
sight): upto
100m
Current
Consumption
60 mA
(Tx mode)
400 mA
(Tx mode)
20 mA
(Standby
mode)
25-35 mA
(Tx mode)
3 µA
(Standby
mode)
Raw data rate 1 Mbps 11 Mbps 250 Kbps
Protocol stack
size
250 KB 1 MB
32 KB
4 KB (for
limited
function
end
devices)
Typical >3 sec variable, 1 30 ms
2. International Journal of Computer Science & Information Technology 2 www.ijcsit-apm.com
network join
time
sec
typically
typically
Interference
avoidance
method
FHSS(Fre
quency
hopping
spread
spectrum)
DSSS(Dire
ct sequence
spread
spectrum)
DSSS(Dire
ct sequence
spread
spectrum)
Minimum
quiet
bandwidth
required
15
MHz(dyn
amic)
22
MHz(static
)
3MHz(stati
c)
Maximum
number of
nodes per
network
7
32 per
access
point
64 K
Number of
channels
19 13 16
Zigbee Features
Throughput: 250 Kbps at 2.4 Ghz with 16 Channels/40
Kbps at 915 Mhz with 10 Channels.
Battery life: Low power design ,Around 1000 Days.
Scalability: Highly scalable network that can accomodate
up to 64,000 nodes using a single coordinator.
Cost: As compared to Wi-Fi,Zigbee Routers and sensors
cost very less and hence are more suitable for bulk
deployment.
Network Topology: Zigbee uses Mesh Topology, Star
Topology and Peer-to-peer Topology and and can work
any one of them.
Zigbee Network Joining Scheme
Three types of devices are defined by Zigbee are: Zigbee
Coordinator (ZC), Zigbee Router (ZR), Zigbee End
Device (ZED). In Zigbee Neworks only one ZC and
multiple ZRs are used. In Zigbee only ZC and ZRs are
responsible for packet
forwarding and can accepts join request. Every device can
join to one device at most. Zigbee can support three types
of topologies: Star , Mesh, Tree. Hardware requirement of
a device is very simple to join in a network with tree
topology. Figure shows Zigbee network with tree
topology.
Fig. 2 Zigbee Network with tree topology
A mechanism that is Distributed Address Assignment is
designed which is also known as Cskip, to allocate
network addresses for the joined node in Zigbe networks.
To allocate their child nodes, each device has an address
space. Three configuration parameters defined by Zigbee
to control the network are nwkMaxChildren,
nwkMaxDepth and nwkMaxRouters.
[I] Connectivity Improving Mechanism
Figure 3 shows an example of Zigbee network. The
network configuration parameters described in the
previous section will cause some join failures is shown in
Fig 3(a). Now assume that three parameters
nwkMaxChildren, nwkMaxRouters, nwkMaxDepth are
equal to 3, 2, and 3 respectively. Through node A or B
node will get ZR node will get failures to join the network
due to the excesses of the children of A or B even though A
and B are both in the communication range of D.Due to
the excess of depth limitation, D will still get failure to
join to C. Due to this reason, node D becomes an isolated
node of the Zigbee network.Because only the joined nodes
are allowed to accept the join requests of other unjoined
nodes in the network so it is unable to accept any join
request comes from other nodes. So the ZR device M and
ZED device N will become isolated nodes, too. The node
P will become isolated from the network because of the
similar situation. Fig 3(b) shows the network connectivity
improvement. Node G has a capacity of one ZR children,
in fact, the ZR child E of node A does not have to join the
network through A.An other choice can be node G to
which allows ZR node E to join. Node A will become
joinable for the isolated node D, if node E selects G rather
than node A to join. Then ZR node M and ZED node N
will be allowed to join to D. After the ZED node R
performed the change of join target from Z to G, similarly
ZED node P can successfully join to node Z. Connection
change of node E from node A to G and connection
change of node R from Z to G is called shifting. Shifting
node E and R will make the Zigbee network an increase of
four nodes. By this improvement not only the reduction of
isolated sensors and wasted costs is improved but the
performance growth of the Zigbee sensor network is also
improved.
Fig. 3 Illustration of Zigbee connectivity issue
Zigbee MAC Beacon Format
Figure 4 shows the format of Zigbee MAC beacon. MAC
payload consists of four fields: Superframe specification,
GTS Field, Pending address field and Beacon payload.
And beacon payload is further divided into 10 fields.
Every fields do different tasks. Figure 4(a) shows that
reserved field consists of tw parts. Each part is of one bit.
One bit is for swapping and one bit is for shifting
information.
3. www.ijcsit-apm.com International Journal of Computer Science & Information Technology 3
Fig. 4 Payload format of zigbee MAC beacon
Fig. 4(a) The MAC beacon payload with the shiftable flag
[II] Extended Joining Scheme
Extended joining scheme consists of two methods. First
method is to reconstructs the part of the network to
connect more devices (Enhancement Connectivity
Scheme) and the second method is swapping to improve
the connectivity. If a potential parent receives join requests
from multiple isolated nodes then its selection cannot
achieve the best connectivity of the network while using
the method in the previous scheme.
Description
Extended joining process is shown in the figure 5. In this
example there are five isolated nodes that contains B and I
as ZRs and J, K and R as ZEDs. In Fig. 5, node G has a
capacity to accept one more child so children C of
potential parent A and children M of potential parent L
can connect to G. In this method, beacons are used to
announce the acceptance of th child. So nodes A and L use
beacons to announce the acceptance of more children.If
node B wants to join to its potential parent A and node I
wants to join to its potential parent L then they have to
scan how many isolated nodes come within their
communication range. Now, From an example, node B has
one child and node I has two children. Due to network
parameters, node G has capacity to accept one more child.
After the joining of So node M to node G, node L accepts
node I as its child and isolated nodes J and K can
successfully join in the network through node I but nodes
B and R cannot join in the network. Our Extended Joining
Procedure decreases three isolated nodes. After the first
part of Extended Joining Process, Fig. 6 shows the Zigbee
Network of Fig. 5.
Fig. 5 An example of Extended Joining Process
Fig. 6 The Zigbee Network of Fig. 5 after our Extended Joining
Process
[a] Swapping Process
In the Swapping process, swapping of nodes will be done
so that connectivity and life of the Zigbee Networks can
be improved. In Fig. 5, node P announces the acceptance
of more ZRs as its children. When node P receives the
joining request from the node B then node P disconnects
its child node Q and connects a new node B as its child.
Now, node B is successfully connected with a node P and
node B has capacity to accept more nodes as its child. So,
node Q and node R will be connected to node B as its
child. Figure 7 shows our Swapping process.
Fig. 7 Zigbee Network of Fig. 5 after our Swapping process
The Swapping Process is stopped when two
situations occur. First, when all residual energies of leaf
ZRs are lower than that of internode ZR, then the
swapping process is stopped. Second, it is necessary that
the communication range of the selected node has to reach
to all those nodes that connects to the internode ZR. If this
condition is not satisfied by all children then the swapping
process is stopped. The process of swapping is as follows:
Step 1. The ZR sets the swapping flag as TRUE, if the
residual electric voltage of the battery in an internode ZR
4. International Journal of Computer Science & Information Technology 4 www.ijcsit-apm.com
is lower than the threshold and announces that its energy is
exhausted.
Step 2. The internode ZR selects highest residual electric
voltage leaf ZR after receiving statuses of residual electric
voltages from all leaf ZRs. Swapping process is terminated
if residual energies of all the leaf ZRs are lower than that
of internode ZR.
Step 3. The internode ZR, then notifies about the selected
leaf ZR and also then transfer the routing infomation to the
selected leaf ZR.
Step 4. After that, the selected leaf ZR announces to all the
nodes that it is the new router and wait for the replies from
all the devices.
Step 5. If the selected leaf ZR fails to receive replies from
some devices that connecs to the internode ZR then leaf
ZR has to send the transfer failure message to the
internode ZR.
Step 6. If the transfer failure message is received by the
internode ZR then the leaf ZR with the highest residual
electric voltage is selected by the internode ZR from the
remaining leaf ZRs.
Step 7. The selected leaf ZR becomes a new internode ZR
after receiving all the replies and send acknowledge to the
old internode ZR that the tranfer is successfully done.
Step 8. The old internode ZR stops routing while it
receives the successful transfer message and becomes the
leaf ZR of the new internode ZR.
[III] Optimized Connectivity Scheme
An energy depletion limitation is found in the swapping
process. When energy is depleted then the internode
Zigbee router send requests to its child nodes and then find
all the replacements bases of residual energy that should
be more than threshold. Swapping process is terminated if
energy level is less and router goes to sleep[3].
A new technique is proposed called Optimized
Connectivity Scheme.In Optimized Connectivity Scheme
the Zigbee router swapping process is updated by energy
level checking of the isolatd nodes. Energy level of each
isolated is checked. By selecting nodes having better
energy carrying capacity, the connectivity and life of the
Zigbee Networks is increases. These all techniques shows
how the connectivity and life of the Zigbee Networks
increases and isolated nodes decreases. These can be
implemented using Opnet simulator.
CONCLUSION
Zigbee is a wireless communication standard based on
IEEE 802.15.4. Zigbee standard is designed for wireless
sensor network and control networks with low power
consumption, low data rate and low cost. Zigbee is uesd is
in various applications like home automation, industrial
automation, building automation etc. This paper is based
on increasing the connectivity and life of the Zigbee
Networks by various techniques and hence improve the
network efficiency. In these techniques specific depth is
considered so that scalability can be increased. As
compared to the previous techniques, throughput is high in
optimized connecivity scheme due to the energy saving
while swapping devices.
REFERENCES
[1] ZigBee Alliance, ZigBee Specification, V1.0, Dec. 2004.
[2] ZigBee Alliance, ZigBee-2007 Specification, Oct. 2007.
[3] C.M. Wu, R.S. Chang, P.I. Lee, J.H. Yen, “An innovative
scheme for increasing connectivity and life of ZigBee networks,”
Spri Business Media, LLC 2011.
[4] Song TW, Yang CS (2008) A connectivity improving
mechanism for Zigbee wireless sensor networks, In: Proceedings
conference on embedded and ubiquitous computing, pp 495
[5] IEEE Standard Committee, IEEE Standard 802, Part 15.4:
Wireless Medium Access Control (MAC) and Physical Layer
(PHY) Specifications for Low-Rate Wireless Personal Area
Networks (LR-WPANs), Oct. 2003.
[6] K.K. Lee, S.H. Kim, and H.S. Park, “Cluster Labelbased
ZigBee Routing Protocol with High Scalability”, 2nd
International Conference on Systems and Networks
Communications (ICSNC'07), Cap Esterel, France, Aug. 25- 31,
2007, pp.12.
[7] G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang, and B. Bhargava,
“Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee
Networks”, IEEE Transactions on Mobile Computing, 5 (11),
2006, pp. 1561-1574.
[8] T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan, and
K.K. Saluja, “Sensor Deployment Strategy for Target Detection”,
1st ACM International Workshop on Wireless Sensor Networks
and Applications (WSNA'02), Atlanta, USA, Sep. 28, 2002, pp.
42-48.
[9] Antonopoulos E, Kosmatopoulos K, Laopoulos T (2009)
Reducing power consumption in pseudo-ZigBee sensor
networks. In: Proceedings of instrumentation and measurement
technology conference, Singapore, pp 300–304
[10] Casilari E, Cano-Garcia JM, Campos-Garrido G (2010)
Modeling of current consumption in 802.15.4/ZigBee sensor
motes. Trans Sens 2010(10):5443–5468. doi:10.3390/
s100605443
[11] Cook DJ, Das SK (2004)Wireless sensor networks. Smart
environments: technologies, protocols, and applications. Wiley,
New York.
[12] Dil B, Dulman S, Havinga P (2006) Range-based
localization in mobile sensor networks. In: Proceedings of third
European workshop on wireless sensor networks, Zurich,
Switzerland, pp 164–179
[13] Ding G, Sahinoglu Z, Bhargava B, Orlik P, Zhang J (2006)
Reliable broadcast in ZigBee networks. In: Proceedings of 2nd
annual IEEE communications society conference on sensor and
ad hoc communications and networks, Santa Clara, USA, pp
510–520
[14] Ding G, Sahinoglu Z, Orlik P, Zhang J, Bhargava B (2006)
Tree-based data broadcast in IEEE 802.15.4 and ZigBee
networks. IEEE Trans Mob Comput 5(11):1561–1574
[15]IEEE 802.15.4 standard (2003) Wireless medium access
control and physical layer specifications for low-rate wireless
personal area networks (LR-WPANs). IEEE Computer Society
Press, Los Alamitos
[16] Kim T, Kim D, Park N, Yoo S, Lopez TS (2007) Shortcut
tree routing in ZigBee networks. In: Proceedings of 2nd
international symposium on wireless pervasive computing
(ISWPC’07), San Juan, Puerto Rico, pp 42–47
[17] Lin S, Liu J, Fang Y (2007) ZigBee based wireless sensor
networks and its applications in industrial. In: Proceedings of the
2007 IEEE international conference on automation and logistics,
NJ USA, pp 1979–1983
[18] Pan MS, Tsai CH, Tseng YC (2009) The orphan problem in
ZigBee wireless networks. IEEE Trans Mob Comput,
8(11):1573–1584
[19] Wheeler A (2007) Commercial applications of wireless
sensor
[20] J. Zheng, J.M. Lee, Senior Member and Michael Anshel,
“Toward Secure Low Rate Wireless Personal Area Networks,”
Computing, vol. 5, no. 10, October 2006.
[21] A. Giuseppe, C. Marco, and M.D. Francesco, “A
Comprehensive Analysis of the MAC Unreliability Problem in
IEEE 802.15.4 Wireless Networks,” IEEE Transactions on
Industrial Informatics
5. www.ijcsit-apm.com International Journal of Computer Science & Information Technology 5
[22] B.Giovanni, “Experimental Investigation of the
Electromagnetic Interference of Zigbee Transmitters on
Measurement Instruments,” on Instrumentation and
Measurement, pp 172
[23] Y.H. Lin, I.C. Jan, P. C.I. KO, Y.-Y. Chen, J.M. Wong, and
G. IEEE Trans. Inf. Technol. Biome., Vol. 8, Issue. 4, pp. 439
[24] M. Dunbar, “ Plug-and-play sensors in wireless networks,”
IEEE Instrumentation and measurements Magazine, Vol. 4,
Issue. 1, pp. 19–23, Mar. 2001.
[25] J. Han, “ Global Optimization of ZigBee Parameters for
EndEnd-to-End Deadline Guarantee of Real-Time Data,” IEEE
Sensors Journal, Vol. 9, No. 5, May 2009.