Vehicular Ad hoc Networks -VANET as a sub
class of Mobile Ad hoc Networks -MANET provides a
wireless communication among vehicles and vehicle to road
side equipment. VANET allows vehicles to form a selforganized network without the need for permanent
infrastructure. With high number of nodes and mobility,
ensuring the Quality of Service- QoS in VANET is a
challenging task. QoS is essential to improve the
communication efficiency in vehicular networks. Thus a
study of QoS in VANET is useful as a fundamental for
constructing an effective vehicular network. In this paper,
we propose Network coding Technique to improve
Bandwidth utilization on VANET. When two sources are
involved in broadcasting in the same area and at same time
, the relay will make use of Network coding to reduce the
Bandwidth consumption. While receiving the packet, a
relay has to decide whether to send the packet directly to
reduce the delay or use Network coding for effective
Bandwidth utilization. In order to make trade off, we
introduce two kind of protocols named Buffer Size Control
Scheme -BSCS and Time Control Scheme -TCS. By this
two protocols, we aim to reduce the delay that is
experienced by each packet and achieving better
bandwidth utilization.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is analyzed that incorporates these delay metrics to validate compliance with smart grid delay constraints defined in standards. Path loss, interference
The document presents the QoS-Oriented Distributed (QOD) routing protocol for hybrid wireless networks. QOD incorporates five algorithms: 1) a QoS-guaranteed neighbour selection algorithm, 2) a distributed packet scheduling algorithm, 3) a mobility-based segment resizing algorithm, 4) a soft-deadline based forwarding scheduling algorithm, and 5) a data redundancy elimination based transmission algorithm. The goal of QOD is to enhance QoS support in hybrid networks by leveraging both infrastructure networks and mobile ad hoc networks to meet stringent end-to-end QoS requirements. The document outlines the key components and objectives of the QOD protocol.
AdHoc Probe is a tool that estimates the effective end-to-end path capacity in wireless ad hoc networks. It employs a one-way active probing technique called packet pair dispersion that measures the minimum delay between two probing packets to estimate capacity without queueing effects. Simulations and testbed experiments using AdHoc Probe show it can accurately measure path capacity under different conditions such as varying topology, interference, mobility, and transmission rates in both single-hop and multi-hop wireless ad hoc network configurations.
2.5G, second and half generation, All about 2.5..Muhammad Ahad
2.5G networks like GPRS introduced packet switching capabilities to 2G networks, allowing both circuit switched and packet switched domains. GPRS uses timeslot allocation and multislot classes to efficiently utilize radio resources. It introduced new network elements like SGSN and GGSN to route data between mobile devices and external networks. GPRS supports various data applications and services through PDP contexts which contain a PDP address, QoS parameters, and GGSN address for a given session.
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
Under rich dissipating environment, Multiple Input Multiple Output (MIMO) scheme have better performance in term of reliability and increasing the throughput. Space Time Block Code (STBC) can reduce the Bit Error Rate (BER) with suitable data rate. In order to raise the amount of throughput more, high modulation order is used but it degrade the performance. To address this problem, a Convolutional Code (CC) can be support such system with various code rate to deal with different circumstances. This research is proposed a system with serial concatenation of STBC and CC with various modulation levels. Such system is tested with Rayleigh flat and selective fading channel by Matlab package R2015b with a list of modulation order and changing the code of each STBC and CC. The results show that such system can cover a range of Signal to Noise Ratio (SNR) from 0 to 21 dB of SNR for selective fading channel and -2 to 19 dBfor flat fading channel for a targeted BER of 10-4 with a various modulation index and code rate which lead to a flexible system to change the throughput depending on user conditions.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is analyzed that incorporates these delay metrics to validate compliance with smart grid delay constraints defined in standards. Path loss, interference
The document presents the QoS-Oriented Distributed (QOD) routing protocol for hybrid wireless networks. QOD incorporates five algorithms: 1) a QoS-guaranteed neighbour selection algorithm, 2) a distributed packet scheduling algorithm, 3) a mobility-based segment resizing algorithm, 4) a soft-deadline based forwarding scheduling algorithm, and 5) a data redundancy elimination based transmission algorithm. The goal of QOD is to enhance QoS support in hybrid networks by leveraging both infrastructure networks and mobile ad hoc networks to meet stringent end-to-end QoS requirements. The document outlines the key components and objectives of the QOD protocol.
AdHoc Probe is a tool that estimates the effective end-to-end path capacity in wireless ad hoc networks. It employs a one-way active probing technique called packet pair dispersion that measures the minimum delay between two probing packets to estimate capacity without queueing effects. Simulations and testbed experiments using AdHoc Probe show it can accurately measure path capacity under different conditions such as varying topology, interference, mobility, and transmission rates in both single-hop and multi-hop wireless ad hoc network configurations.
2.5G, second and half generation, All about 2.5..Muhammad Ahad
2.5G networks like GPRS introduced packet switching capabilities to 2G networks, allowing both circuit switched and packet switched domains. GPRS uses timeslot allocation and multislot classes to efficiently utilize radio resources. It introduced new network elements like SGSN and GGSN to route data between mobile devices and external networks. GPRS supports various data applications and services through PDP contexts which contain a PDP address, QoS parameters, and GGSN address for a given session.
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
Under rich dissipating environment, Multiple Input Multiple Output (MIMO) scheme have better performance in term of reliability and increasing the throughput. Space Time Block Code (STBC) can reduce the Bit Error Rate (BER) with suitable data rate. In order to raise the amount of throughput more, high modulation order is used but it degrade the performance. To address this problem, a Convolutional Code (CC) can be support such system with various code rate to deal with different circumstances. This research is proposed a system with serial concatenation of STBC and CC with various modulation levels. Such system is tested with Rayleigh flat and selective fading channel by Matlab package R2015b with a list of modulation order and changing the code of each STBC and CC. The results show that such system can cover a range of Signal to Noise Ratio (SNR) from 0 to 21 dB of SNR for selective fading channel and -2 to 19 dBfor flat fading channel for a targeted BER of 10-4 with a various modulation index and code rate which lead to a flexible system to change the throughput depending on user conditions.
This document discusses different techniques for bandwidth utilization, including multiplexing and spreading. It describes multiplexing techniques such as frequency division multiplexing (FDM), time division multiplexing (TDM), and statistical TDM. FDM combines analog signals by modulating them to different carrier frequencies. TDM combines digital channels by assigning each a time slot in a frame. Statistical TDM improves efficiency over synchronous TDM by removing empty slots. The document also discusses applications of these techniques such as telephone line multiplexing using T-1 and E-1 lines.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
1. The document proposes EMAC, an energy-efficient multi-channel MAC protocol for ad hoc networks. EMAC uses specially designated nodes called "negotiators" that maintain schedules for nodes and facilitate channel negotiation to improve throughput and energy efficiency.
2. Simulation results showed that compared to other multi-channel MAC protocols, EMAC achieved significant energy savings at high network loads while providing higher throughput. It performs better than state-of-the-art protocols by allowing nodes to sleep more through the use of negotiators.
3. The key contributions of EMAC are the use of negotiators to synchronize nodes, applying the protocol to both ad hoc and sensor networks, and simulations showing it outperforms
Delay jitter control for real time communicationMasud Rana
This document proposes a method for controlling delay jitter for real-time communication channels in a packet-switching network. It extends an existing scheme that provides bounds on maximum delay. The key aspects are:
1) Each network node contains "regulators" for each channel that reconstruct the original packet arrival pattern to preserve jitter, and a scheduler that ensures low distortion of patterns between nodes.
2) Clients specify maximum delay and jitter bounds when establishing a channel. The establishment procedure sets local jitter bounds at each node to ensure the end-to-end bound is met.
3) Regulators at each node attempt to faithfully preserve the original packet arrival pattern, so that the last node sees essentially the original
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Enhanced Protocol for Wireless Content-Centric Network csandit
Recently, Content-Centric Networking (CCN) was intr
oduced and is expected as a new concept
of future internet architecture. Even though CCN is
initially studied for wired networks,
recently, it is also studied for wireless environme
nt. In this paper, we discuss improvement
method for efficient content flooding over wireless
CCNs. The proposed scheme of this paper
use MAC Address of nodes when Interest and Data Pac
ket are forwarded in order to limit the
area of flooding of packets. The proposed protocol
not only reduces the spread of Data packets,
but also offers priority of forwarding to nodes of
shortest path. As a consequence, it reduce
content download time which is proved by extensive
simulations.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
This document summarizes 13 different approaches that have been proposed to improve the selection of Multi Point Relays (MPRs) in the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks (MANETs). The standard OLSR MPR selection algorithm is limited as it only considers connectivity and does not account for other important node characteristics and metrics. The summarized approaches aim to select MPRs based on additional criteria like energy level, bandwidth, mobility, link quality, location, and trust to make the routing process more efficient and robust. Simulation results indicate that considering multiple metrics can reduce overhead, improve throughput, extend network lifetime, and secure the routing protocol from malicious nodes.
Digital and Analog--Bachelor of Computer ApplicationAjay Kumar
1) The document discusses key concepts in analog and digital communications including data, signals, channels, bit rates, bandwidth, modulation techniques, and transmission media.
2) It defines analog signals as continuous signals representing other varying quantities, while digital signals represent discrete values or sequences through techniques like pulse code modulation.
3) A channel refers to a transmission path, with examples including telephone lines, radio frequencies, fiber optic wavelengths, and computer networks. Channel capacity is determined by its bandwidth.
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
The document proposes strategies for efficient streaming in delay-tolerant multimedia applications. It discusses three transcoder deployment strategies: (1) Source Transcoding (ST) where transcoding only occurs at the source, (2) Anywhere Transcoding (AT) where transcoding can occur at any node, and (3) Selected Node Transcoding (SNT) where transcoding only occurs at selected nodes. It formulates the problem of determining optimal stream rates as an optimization problem and proposes heuristic algorithms to approximate the optimal solution due to complexity. A case study demonstrates the effectiveness of the strategies.
Route Reservation In Adhoc Wireless NetworksIJRES Journal
this paper deals with whether and when Reservation Based (RB) communication can yield better delay performance than NRB Communication in Ad hoc Wireless Networks. In addition to posing this fundamental question (in terms of route discovery, MAC protocol and pipelining etc), the requirements for making RB switching superior to NRB switching are also identified. While the conventional wisdom in current adhoc wireless networking research favours NRB switching, when and under which conditions RB switching might be preferable. Even under these strict and futuristic conditions, while RB switching provide a better delay performances, NRB switching can generally achieve higher network good put and throughput. It is important to understand that if these conditions are not satisfied, then NRB switching will be probable preferable. A novel analytical framework is developed and the network performance under both schemes is quantified. This advantage comes at the expense of lower throughput and goodput compared to NRB schemes.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
The document proposes a multi-hop relay algorithm to improve broadcasting efficiency in mobile ad hoc networks (MANETs). It aims to optimize end-to-end delay, packet delivery ratio (PDR), and energy consumption during broadcasting. The algorithm uses source, broadcast, and relay queues at each node to facilitate multi-hop transmissions. It transmits packets using either single-hop, two-hop, or multi-hop relaying depending on the location of the destination node. The algorithm is shown to reduce average end-to-end delay by 3.37%, increase PDR by 1.36%, and reduce average energy consumption per node by 10% compared to previous techniques through simulation experiments.
This document analyzes the performance of a three hop reliability model for wireless sensor networks in nuclear power plants. Reliability is crucial for sensor data in nuclear plants since time-critical safety information must be delivered accurately and without loss. Existing single and two hop models have packet loss issues. The proposed three hop model maintains three copies of data packets to increase reliability without extra network costs. It uses zone routing and increments a step value with each hop to ensure three copies are held before removing the original. Simulation results show this three hop acknowledgment model has higher delivery ratio and throughput while avoiding packet loss compared to earlier approaches.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
This document discusses different techniques for bandwidth utilization, including multiplexing and spreading. It describes multiplexing techniques such as frequency division multiplexing (FDM), time division multiplexing (TDM), and statistical TDM. FDM combines analog signals by modulating them to different carrier frequencies. TDM combines digital channels by assigning each a time slot in a frame. Statistical TDM improves efficiency over synchronous TDM by removing empty slots. The document also discusses applications of these techniques such as telephone line multiplexing using T-1 and E-1 lines.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6) both are the mobility management solutions proposed by the Internet Engineering Task Force (IETF) to support IP Mobility. It’s been an important issue, that upon certain condition, out of MIPv6 and HMIPv6 which one is better. In this paper an Optimum Efficient Mobility Management (OEMM) scheme is described on the basis of analytical model which shows that OEMM Scheme is better in terms of performance and applicability of MIPv6 and HMIPv6. It shows that which one is better alternative between MIPv6 and HMIPv6 and if HMIPv6 is adopted it chooses the best Mobility Anchor Point (MAP). Finally it is illustrated that OEMM scheme is
better than that of MIPv6 and HMIPv6.
1. The document proposes EMAC, an energy-efficient multi-channel MAC protocol for ad hoc networks. EMAC uses specially designated nodes called "negotiators" that maintain schedules for nodes and facilitate channel negotiation to improve throughput and energy efficiency.
2. Simulation results showed that compared to other multi-channel MAC protocols, EMAC achieved significant energy savings at high network loads while providing higher throughput. It performs better than state-of-the-art protocols by allowing nodes to sleep more through the use of negotiators.
3. The key contributions of EMAC are the use of negotiators to synchronize nodes, applying the protocol to both ad hoc and sensor networks, and simulations showing it outperforms
Delay jitter control for real time communicationMasud Rana
This document proposes a method for controlling delay jitter for real-time communication channels in a packet-switching network. It extends an existing scheme that provides bounds on maximum delay. The key aspects are:
1) Each network node contains "regulators" for each channel that reconstruct the original packet arrival pattern to preserve jitter, and a scheduler that ensures low distortion of patterns between nodes.
2) Clients specify maximum delay and jitter bounds when establishing a channel. The establishment procedure sets local jitter bounds at each node to ensure the end-to-end bound is met.
3) Regulators at each node attempt to faithfully preserve the original packet arrival pattern, so that the last node sees essentially the original
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Enhanced Protocol for Wireless Content-Centric Network csandit
Recently, Content-Centric Networking (CCN) was intr
oduced and is expected as a new concept
of future internet architecture. Even though CCN is
initially studied for wired networks,
recently, it is also studied for wireless environme
nt. In this paper, we discuss improvement
method for efficient content flooding over wireless
CCNs. The proposed scheme of this paper
use MAC Address of nodes when Interest and Data Pac
ket are forwarded in order to limit the
area of flooding of packets. The proposed protocol
not only reduces the spread of Data packets,
but also offers priority of forwarding to nodes of
shortest path. As a consequence, it reduce
content download time which is proved by extensive
simulations.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
This document summarizes 13 different approaches that have been proposed to improve the selection of Multi Point Relays (MPRs) in the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks (MANETs). The standard OLSR MPR selection algorithm is limited as it only considers connectivity and does not account for other important node characteristics and metrics. The summarized approaches aim to select MPRs based on additional criteria like energy level, bandwidth, mobility, link quality, location, and trust to make the routing process more efficient and robust. Simulation results indicate that considering multiple metrics can reduce overhead, improve throughput, extend network lifetime, and secure the routing protocol from malicious nodes.
Digital and Analog--Bachelor of Computer ApplicationAjay Kumar
1) The document discusses key concepts in analog and digital communications including data, signals, channels, bit rates, bandwidth, modulation techniques, and transmission media.
2) It defines analog signals as continuous signals representing other varying quantities, while digital signals represent discrete values or sequences through techniques like pulse code modulation.
3) A channel refers to a transmission path, with examples including telephone lines, radio frequencies, fiber optic wavelengths, and computer networks. Channel capacity is determined by its bandwidth.
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
This document presents a novel rebroadcast technique called Neighbor Coverage based Probabilistic Rebroadcast (NCPR) protocol to reduce routing overhead in mobile ad hoc networks. The NCPR protocol calculates a rebroadcast delay based on the number of common neighbors between nodes to prioritize dissemination of neighbor information. It also calculates a rebroadcast probability based on additional neighbor coverage ratio and connectivity factor to reduce unnecessary rebroadcasts while maintaining network connectivity. The protocol is implemented by enhancing the AODV routing protocol in NS-2 to reduce overhead from hello packets and neighbor lists in route requests. Its performance is evaluated under varying network sizes, traffic loads, and packet loss conditions.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
The document proposes strategies for efficient streaming in delay-tolerant multimedia applications. It discusses three transcoder deployment strategies: (1) Source Transcoding (ST) where transcoding only occurs at the source, (2) Anywhere Transcoding (AT) where transcoding can occur at any node, and (3) Selected Node Transcoding (SNT) where transcoding only occurs at selected nodes. It formulates the problem of determining optimal stream rates as an optimization problem and proposes heuristic algorithms to approximate the optimal solution due to complexity. A case study demonstrates the effectiveness of the strategies.
Route Reservation In Adhoc Wireless NetworksIJRES Journal
this paper deals with whether and when Reservation Based (RB) communication can yield better delay performance than NRB Communication in Ad hoc Wireless Networks. In addition to posing this fundamental question (in terms of route discovery, MAC protocol and pipelining etc), the requirements for making RB switching superior to NRB switching are also identified. While the conventional wisdom in current adhoc wireless networking research favours NRB switching, when and under which conditions RB switching might be preferable. Even under these strict and futuristic conditions, while RB switching provide a better delay performances, NRB switching can generally achieve higher network good put and throughput. It is important to understand that if these conditions are not satisfied, then NRB switching will be probable preferable. A novel analytical framework is developed and the network performance under both schemes is quantified. This advantage comes at the expense of lower throughput and goodput compared to NRB schemes.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
The document proposes a multi-hop relay algorithm to improve broadcasting efficiency in mobile ad hoc networks (MANETs). It aims to optimize end-to-end delay, packet delivery ratio (PDR), and energy consumption during broadcasting. The algorithm uses source, broadcast, and relay queues at each node to facilitate multi-hop transmissions. It transmits packets using either single-hop, two-hop, or multi-hop relaying depending on the location of the destination node. The algorithm is shown to reduce average end-to-end delay by 3.37%, increase PDR by 1.36%, and reduce average energy consumption per node by 10% compared to previous techniques through simulation experiments.
This document analyzes the performance of a three hop reliability model for wireless sensor networks in nuclear power plants. Reliability is crucial for sensor data in nuclear plants since time-critical safety information must be delivered accurately and without loss. Existing single and two hop models have packet loss issues. The proposed three hop model maintains three copies of data packets to increase reliability without extra network costs. It uses zone routing and increments a step value with each hop to ensure three copies are held before removing the original. Simulation results show this three hop acknowledgment model has higher delivery ratio and throughput while avoiding packet loss compared to earlier approaches.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
This document provides a summary of serial and parallel connections, as well as protocols used for wide area networks (WANs) such as HDLC, PPP, and others. It discusses how serial connections transmit data one bit at a time over one wire, while parallel connections transmit multiple bits simultaneously over multiple wires. It also covers concepts such as clock skew, interference, and WAN encapsulation protocols including HDLC, PPP, Frame Relay, and ATM.
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
The domain of wireless Local Area Networks (WLANs) is growing speedily as a consequence of
developments in digital communications technology. The early adopters of this technology have mainly
been vertical application that places a premium on the mobility offered by such systems. Examples of these
types of applications consist of stocking control in depot environments, point of sale terminals, and rental
car check-in. Furthermore to the mobility that becomes possible with wireless LANs; these systems have
also been used in environments where cable installation is expensive or impractical. Such environments
include manufacturing floors, trading floors on stock exchanges, conventions and trade shows, and historic
buildings. With the increasing propagation of wireless LANs comes the need for standardization so as to
allow interoperability for an increasingly mobile workforce. Despite all the advantages and facilities that
Wi-FI offers, there is still the delay problem that is due to many reasons that are introduced in details in
our case study which also presents the solutions and simulation that can reduce this delay for better
performance of the wireless networks
The document discusses the evaluation of reliability in wireless sensor networks. It analyzes the effect of reporting rate and packet size on reliability parameters like packet delivery ratio and packet loss ratio. The key findings from simulation graphs are: (1) packet delivery ratio decreases and packet loss ratio increases with increasing reporting rate due to more congestion, (2) initially packet delivery ratio increases with packet size but starts decreasing after a threshold as larger packets lead to more information loss. The paper concludes that packet size and reporting rate impact network reliability and increasing delivery ratio while minimizing energy and congestion can enhance reliability.
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...Nexgen Technology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
NEXGEN TECHNOLOGY provides bulk ieee projects to its regular clients and satisfies all their requirements on time, Also it provides 24/7 supports to all its clients in delivering the resources which is including source code delivery ,Documents delivery, Algorithms delivery etc...,NEXGEN TECHNOLOGY is also having around 100 clients throughout India and across the World.
Disruption Tolerant Network Coding scenarios often rises from mobile wireless networks where due to limited transmission power, fast node mobility,sparse node density, and frequent equipment failures, there is often no contemporaneous path from the source to destination nodes. Before going to the depth of DTN, it is recommended to review traditional non-coding routing schemes for broadcast and unicast applications in DTNs, and the basic operations of Random Linear Coding (RLC).
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
Circuit switched networks establish dedicated connections for each call, allowing digitized voice to be transmitted without packetization. Packet switched networks share bandwidth through packetization, sending voice and data together in packets over the same links. While packet switched networks improve bandwidth utilization, circuit switched networks are better suited for real-time communications like voice due to guaranteed bandwidth without delay. A full transition from circuit switched to packet switched networks would require telecom providers to build out IP backbones matching their existing public switched telephone networks.
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
This document provides solutions to review questions and exercises related to network models and data link control. It begins with solutions to review questions on network models, including definitions of the OSI and Internet models. It then provides solutions to exercises on typical network examples like telephone and cable networks. Finally, it discusses data link control protocols like Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective-Repeat ARQ, and provides solutions to related exercises.
The document describes the design and implementation of an on-chip system-on-chip (SOC) interconnect using an i-SLIP scheduling algorithm. The interconnect uses a crossbar switch architecture to connect 8 devices on the chip. Each device has an input and output block that can store up to 32 packets to send and receive. The scheduler block implements the i-SLIP algorithm to determine which packets from the input blocks will be sent to the output blocks. The goal is to provide an efficient communication mechanism between the on-chip devices using a packet-based protocol over the interconnect.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
This document summarizes a study that simulated voice communication over wired networks using the NS-2 network simulator. The study modeled VoIP traffic between nodes using the SCTP protocol and added background traffic to evaluate its effects. Key findings from the simulation included:
1) Average latency was 0.98 seconds and 98 packets were dropped, indicating degraded performance when background traffic was added.
2) Average jitter (packet delay variation) was calculated to be 0.006 seconds, showing instability in the network with changing traffic patterns.
3) A graph of latency over time demonstrated increased delays and bottlenecks as background traffic overloaded network links.
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
In wireless system allocation is a necessary purpose and show industry expensive dependability in message protocol design. In multihop wireless networks, equally, imposition by a node by reason of immediate transmissions as its neighbors makes it nontrivial to graph a minimum-latency transmit algorithm, which is known to be NP-complete. A simple ballpark figure algorithm for the one-to-all transmit problem that improves all previously documented guarantees for this problem. In All-to-all transmit problem where every node sends its own consequence to all complementary nodes. In the all-to-all transmit problem, we current two algorithms with ballpark figure ratios of 20 and 34, civilizing the greatest result. A communication wants to be transmitted establishment its resource to all the previous nodes in the network. There may be different messages to be broadcasted from several sources. Two or more nodes broadcast a communication to an ordinary neighbor at the same time; the frequent node will not collect any of this communication. We say that collide has occurred at the ordinary node. So any message protocol for wireless networks must dispute with the distress of difficulty in the wireless intermediate.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
Similar to Improving QoS of VANET using Network Coding (20)
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Dr. Amarjeet Singh
In the present paper, we have employed modified Khare-BEB method [Atoms, (2019)] to evaluate total ionization cross sections by the electron impact for ammonia in energy range from the ionization threshold to 10 MeV. The theoretical ionization cross sections have been compared to the available previous theoretical and experimental results. The collision parameters dipole matrix squared M_j^2 and CRP also have been calculated. The present calculations were found in remarkable agreement with the available experimental results.
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladDr. Amarjeet Singh
Adequately trained Manpower is a problem that affects the IT industry as a whole, but it is particularly acute for Enjay IT Solution. Enjay's location in a semi-urban or rural area makes it even more difficult to find a talented employee with the right skills. As the competition for skilled workers grows, it becomes more difficult to attract and keep those workers who have the requisite training and experience.
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Dr. Amarjeet Singh
Pink bollworm and Lepidoptera development quickly in numbers which is a typical animal group that produces around 100 youthful ones inside certain days or weeks. This assault influences the harvests broadly in the tropical and sub-tropical temperature areas. Thus, to keep up with the yield of harvests the vermin ought to be kept away by utilizing pesticides. The unnecessary measure of the purpose of pesticides influences the dirt, land, and as well as human well-being, and contaminates the climate. Thus, an ozone-accommodating biopesticide is extracted from the stems of the Gossypium arboreum. Thus, the extraction of biopesticide from the stems of Gossypium arboreum demonstrated that the quantity of pink bollworm and Lepidoptera is diminished step by step in the wake of showering the arrangement on the impacted region of the plant because of the presence of the gossypol.
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Dr. Amarjeet Singh
This document discusses the potential applications of artificial intelligence techniques in e-commerce in Saudi Arabia. It begins with an introduction to e-commerce and AI, and how AI is being used increasingly in e-commerce applications worldwide. It then reviews literature on how AI can be integrated into e-commerce systems and the various applications of AI in e-commerce. Some key applications discussed include AI assistants, personalized recommendations, demand forecasting, supply chain management, fraud detection and more. The document concludes that Saudi Arabia is well positioned to benefit from using AI to boost its growing e-commerce sector.
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Dr. Amarjeet Singh
This document summarizes a research study that analyzed the factors influencing ownership patterns of selected Indian companies and the impact of ownership patterns on corporate performance. The study used data from 5 industries over 5 years from 2017 to 2021. Multiple regression, ANOVA, and correlation analyses were conducted. The results found that the percentage of independent directors on the board and the size of the company had a significant impact on Indian promoter holdings. Additionally, non-institutional ownership was found to have a significant impact on corporate performance measures like asset utilization ratio. The study concluded that ownership patterns can influence corporate performance and companies should work to optimize factors like debt-equity ratio and board independence to improve financial outcomes.
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...Dr. Amarjeet Singh
Every country with a well-developed transportation network has a well-developed economy. The automobile industry is a critical engine of the nation's economic development. The automobile industry has significant backward and forward links with every area of the economy, as well as a strong and progressive multiplier impact. The automotive industry and the auto component industry are both included in the vehicle industry. It includes passenger waggons, light, medium, and heavy commercial vehicles, as well as multi-utility vehicles such as jeeps, three-wheelers, military vehicles, motorcycles, tractors, and auto-components such as engine parts, batteries, drive transmission parts, electrical, suspension and chassis parts, and body and other parts. In the last several years, India's automobile sector has seen incredible growth in sales, production, innovation, and exports. India's car industry has emerged as one of the best in the world, and the auto-ancillary sector is poised to assist the vehicle sector's expansion. Vehicle manufacturers and auto-parts manufacturers account for a significant component of global motorised manufacturing. Vehicle manufacturers from across the world are keeping a close eye on the Indian auto sector in order to assess future demand and establish India as a global manufacturing base. The current research focuses on three automotive behemoths: TATA Motors, MRF, and Mahindra & Mahindra.
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...Dr. Amarjeet Singh
The growth of a country's banking sector has a significant impact on its economic development. The banking sector plays a critical role in determining a country's economic future. A well-planned, structured, efficient, and viable banking system is an essential component of an economy's economic and social infrastructure. In modern society, a strong banking system is required because it meets the financial needs of the modern society. In a country's economy, the banking system plays a crucial role. Because it connects surplus and deficit economic agents, the bank is the most important financial intermediary in the economy. The banking system is regarded as the economy's lifeline. It meets the financial needs of commerce, industry, and agriculture. As a result, the country's development and the banking system are intertwined. They are critical in the mobilisation of savings and the distribution of credit to various sectors of the economy. India's private sector banks play a critical role in the country's economic development. So The financial performance of private sector banks must be evaluated carefully.
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...Dr. Amarjeet Singh
After the United States, China, and Japan, India was the world's fourth biggest consumer of oil and petroleum products. The nation is significantly reliant on crude oil imports, the majority of which come from the Middle East. The Indian oil and gas business is one of the country's six main sectors, with important forward links to the rest of the economy. More than two-thirds of the country's overall primary energy demands are met by the oil and gas industry. The industry has played a key role in placing India on the global map. India is now the world's sixth biggest crude oil user and ninth largest crude oil importer. In addition, the country's portion of the worldwide refining market is growing. India's refining industry is now the world's sixth biggest. With plans for Reliance Petroleum Limited to commission another refinery with a capacity of 29 MTPA next 16 to its 33 MTPA refinery in Jamnagar, Gujarat, this position is projected to be enhanced. As a consequence, the Reliance refinery would be the biggest single-site refinery in the world. Based on secondary data gathered from CMIE, the current research examines the ratios influencing the profitability of selected oil exploration and production businesses in India during a 10-year period.
Since 1991, thanks to economic policy liberalization, the Indian economy has entered an era in which Indian businesses can no longer disregard global markets. Prior to the 1990s, the prices of a variety of commodities, metals, and other assets were carefully regulated. Others, which were not rolled, were primarily dependant on regulated input costs. As a result, there was no uncertainty and, as a result, no price fluctuations. However, in 1991, when the process of deregulation began, the prices of most items were deregulated. It has also resulted in the exchange being partially deregulated, easing trade restrictions, lowering interest rates, and making significant advancements in foreign institutional investors' access to the capital markets, as well as establishing market-based government securities pricing, among other things. Furthermore, portfolio and securities price volatility and instability were influenced by market-determined exchange rates and interest rates. As a result, hedging strategies employing a variety of derivatives were exposed to a variety of risks. The Indian capital market will be examined in this study, with a focus on derivatives.
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Dr. Amarjeet Singh
This document discusses theoretical estimates for the costs of compressing and transporting CO2 from a hypothetical carbon capture and storage project at the Saline Joniche Power Plant in Italy. It first provides background on the power plant project from 2008 that proposed converting the site to coal power. It then details the methodology used to size the compression system, estimating power needs for multi-stage compression up to pipeline pressures. Costs are considered for constructing, operating, and maintaining both the compression plant and pipeline to a potential offshore storage site. The aim is to evaluate retrofitting the existing plant with carbon capture and storage as a way to enable continued coal power production consistent with climate goals.
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidDr. Amarjeet Singh
In this paper, the behavior of MR particles has been systematically investigated within the scope of analytical mechanics. . A magnetorheological fluid belongs to a class of smart materials. In magnetorheological fluids, the motion of magnetic particles is controlled by the action of internal and external forces. This paper presents analytical mechanics for the interaction of system of particles in MR fluid. In this paper, basic principles of Analytical Mechanics are utilized for the construction of equations.
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureDr. Amarjeet Singh
Solid waste is health hazard and cause damage to the environment due to improper handling. Solid waste comprises of Industrial Waste (IW), Hazardous Waste (HW), Municipal Solid Waste (MSW), Electronic waste (E-waste), Bio-Medical Waste (BMW) which depend on their supply & characteristics. Food waste or Bio-waste composting and its role in sustainable development is explained in food waste is a growing area of concern with many costs to our community in terms of waste collection, disposal and greenhouse gases. When rotting food ends up in landfill it turns into methane, a greenhouse gas that is particularly damaging to the environment. Composting is biochemical process in which organic materials are biologically degraded, resulting in the production of organic by products and energy in the form of heat. Heat is trapped within the composting mass, leading to the phenomenon of self-heating. This overall process provide us Bio-Manure.
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Dr. Amarjeet Singh
The purpose of this study is to examine investors’ perceptions about investing in crypto-currencies. We think that investors trust in crypto-currencies is largely driven by crypto-currency comprehension, trust in government, and transaction speed. This is the first study to examine crypto-currencies from the investor’s perspective. Following that, we discover important antecedents of crypto-currency confidence. Second, we look at the government's role in crypto-currencies. The importance of this study is: first, crypto-currencies have the potential to disrupt the current economic system as the debate is all about impact of decentralization of transactions; thus, further research into how it affects investors trust is essential; and second, access to crypto-currencies. Finally, if Fin-Tech companies or banks want to enter the bitcoin industry may not attract huge advertising costs as well as marketing to soothe clients' concerns about investing in various digital currencies The research sheds light on indecisiveness in the context of marketing aspects adopted by demonstrating investors are aware about the crypto.
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Dr. Amarjeet Singh
The Island Province of Catanduanes is prone to all types of natural hazards that includes torrential and heavy rains, strong winds and surge, flooding and landslide or slope failures as a result of its geographical location and topography. RA 10121 mandates local DRRM bodies to “encourage community, specifically the youth, participation in disaster risk reduction and management activities, such as organizing quick response groups, particularly in identified disaster-prone areas, as well as the inclusion of disaster risk reduction and management programs as part of youth programs and projects. The study aims to determine the awareness to disaster of the student of the Catanduanes State University. The disaster-based questionnaire was prepared and distributed among 636 students selected randomly from different Colleges and Laboratory Schools in the University
The Catanduanes State University students understood some disaster-related concepts and ideas, but uncertain on issues on preparedness, adaptation, and awareness on the risks inflicted by these natural hazards. Low perception on disaster risks are evidently observed among students. The responses of the students could be based on the efficiency and impact of the integration of DRR education in the senior high school curriculum. Specifically, integration of the concepts about the hazards, hazard maps, disaster preparedness, awareness, mitigation, prevention, adaptation, and resiliency in the science curriculum possibly affect the knowledge and understanding of students on DRR. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM.
The study further recommends that teachers and instructor must also be capacitated in handling disaster as they are the prime movers in the implementation of the DRRM in education. Preparedness drills and other forms of capacity building must be done to improve awareness of the student towards DRRM. Core subjects in Earth Sciences must be reinforced with geologic hazards. Learning competencies must also be focused on hazard identification and mapping, and coping with different geologic disaster.
The 1857 war was a watershed moment in the history of the Indian subcontinent. The battle has sparked academic debate among historians and sociologists all around the world. Despite the fact that it has been more than 150 years, this battle continues to pique the interest of historians. The war's causes and events that occurred throughout the conflict, persons who backed the British and anti-British fighters, and the results and ramifications, are all aspects of this conflict. In terms of outcomes, many academics believe that the war was a failure for those who started it. It is often assumed that the Indians who battled the British in this conflict were unable to achieve their goals. Many gains accrued to Indians as a result of the conflict, but these achievements are overshadowed by the dispute over the war's failure. This research effort focuses on the war's achievements for India, and the significance of those achievements.
Haryana's Honour Killings: A Social and Legal Point of ViewDr. Amarjeet Singh
Life is unpredictably unpredictable. Nobody knows what will happen in the next minute of their lives. In this circumstance, every human being has the right and desire to conduct their lives according to their own desires. No one should be forced to live a life solely for the benefit and reputation of others. Honour killing is defined as the assassination of a person, whether male or female, who refuses to accept the family's arranged marriage or decides to move her or his marital life according to her or his wishes solely because it jeopardizes the family's honour. The family's supreme authority looks after the family's name but neglects to consider the love and affection shared among family members. I have discussed honour killing in India in my research work. This sort of murder occurs as a result of particular triggers, which are also examined in relation to the role of the law in honour killing. No one can be released free if they break the law, and in this case, it is a felony that violates various regulations designed to safeguard citizens. This crime is similar to many others, but it is distinct enough to be differentiated in the report. When the husband is of low social standing, it lowers the position and caste of the female family, prompting the male family members to murder the girl. But they forget that the girl is their kid and that while rank may be attained, a girl's life can never be replaced, and that caste is less valuable than the girl's life and love spent with them.
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Dr. Amarjeet Singh
This document summarizes a research article about optimizing digital-based MSME e-commerce during the COVID-19 pandemic. The article discusses how the pandemic severely impacted MSMEs, with many going out of business. However, digitalization and e-commerce provide opportunities for MSMEs to transform their business models. The article reviews literature showing how technologies like websites, social media, and mobile applications can help MSMEs reach more customers online. Case studies of MSMEs in different countries found that those utilizing digital tools through e-commerce were more successful compared to those relying only on offline sales. The article concludes digitalization is both a challenge and opportunity for MSMEs to adapt their traditional business models and survive or grow
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Dr. Amarjeet Singh
This paper presents the Modal space decoupled control for a hydraulically driven parallel mechanism has been presented. The approach is based on singular values decomposition to the properties of joint-space inverse mass matrix, and mapping of the control and feedback variables from the joint space to the decoupling modal space. The method transformed highly coupled six-input six-output dynamics into six independent single-input single-output (SISO) 1 DOF hydraulically driven mechanical systems. The novelty in this method is that the signals including control errors, control outputs and pressure feedbacks are transformed into decoupled modal space and also the proportional gains and dynamic pressure feedback are tuned in modal space. The results indicate that the conventional controller can only attenuate the resonance peaks of the lower eigenfrequencies of six rigid modes properly, and the peaking points of other relative higher eigenfrequencies are over damped, The further results show that it is very effective to design and tune the system in modal space and that the bandwidth increased substantially except surge (x) and sway (y) motions, each degree of freedom can be almost tuned independently and their bandwidths can be increased near to the undamped eigenfrequencies.
It is a known fact that a large number of Steel Industry Expansion projects in India have been delayed due to regulatory clearances, environmental issues and problems pertaining to land acquisition. Also, there are challenges in the tendering phase that affect viability of projects thus delaying implementation, construction phase is beset with over-runs and disputes and last but not the least; provider skills are weak all across the value chain. Given the critical role of Steel Sector in ensuring a sustained growth trajectory for India, it is imperative that we identify the core issues affecting completion of infrastructure projects in India and chalk out initiatives that need to be acted upon in short term as well as long term.
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.