This document summarizes research on clock synchronization techniques in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining why time synchronization is important. It then discusses challenges in time synchronization due to clock imperfections and variable network delays. The document reviews existing clock synchronization methods like burst transmission and clock sampling. It also covers characteristics of MANETs like dynamic topology. Finally, it surveys previous research on time synchronization algorithms for MANETs, including a decentralized algorithm that achieves fast convergence times and high accuracy.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
A MANET is an autonomous group of mobile users that communicate over reasonably slow
wireless links. The network topology may vary rapidly and unpredictably over time, because the nodes
are mobile. The network is decentralized, where all network activity, including discovering the topology
and delivering messages must be executed by the nodes themselves. Hence routing functionality will
have to be incorporated into the mobile nodes. MANET is a kind of wireless ad-hoc network and it is a
self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union
of which forms an arbitrary topology. Such a network may operate in a standalone fashion, or may be
connected to the larger Internet Problems in Ad Hoc Networks.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints
of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated
using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible
for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be
evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
The main problem of QoS routing is to setup a multicast hierarchy that may meet particular QoS constraint. In order to reduce the constraints of the earlier work a new improved technique is proposed in this work. In the proposed technique the issue of multi-cast tree is eliminated using clustering based technique. First of all multi-radio and multichannel based clustering is deployed and these cluster head are responsible for the multicasting. It will diminish the overall energy consumption of nodes and complexity of intelligent algorithms. The path will be evaluated based upon the ant colony optimization. Thus it has produced better results than other techniques.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Ad hoc networks are the special networks formed for specific applications. Operating in ad-hoc mode
allows all wireless devices within range of each other to discover and communicate in a peer-to-peer
fashion without involving central access points. Many routing protocols like AODV, DSR etc have been
proposed for these networks to find an end to end path between the nodes. These routing protocols are
prone to attacks by the malicious nodes. There is a need to detect and prevent these attacks in a timely
manner before destruction of network services.
A REFERENCE BASED, TREE STRUCTURED TIME SYNCHRONIZATION APPROACH AND ITS ANAL...ijasuc
Time synchronization for wireless sensor networks (WSNs) has been studied in recent years as a
fundamental and significant research issue. Many applications based on these WSNs assume local clocks
at each sensor node that need to be synchronized to a common notion of time. Time synchronization in a
WSN is critical for accurate time stamping of events and fine-tuned coordination among the sensor nodes
to reduce power consumption. This paper proposes a bidirectional, reference based, tree structured time
synchronization service for WSNs along with network evaluation phase. This offers a push mechanism for
(i) accurate and (ii) low overhead for global time synchronization. Analysis study of proposed approach
shows that it is lightweight as the number of required broadcasting messages is constant in one
broadcasting domain.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
Mobile ad hoc networks (MANET) are characterized by multi-hop wireless links and
resource constrained nodes. One of the major challenges in mobile ad hoc networks (MANETs) is
link failures due to mobility. Because nodes in a MANET act as routers for any ongoing packet
communication and have limited transmission ranges, the communication links are broken, and
packet losses occur. To improve network lifetime, energy balance is an important concern in such
networks. This paper concentrates on routing techniques which is the most challenging issue due to
the dynamic topology of ad hoc networks. There are different strategies proposed for efficient
routing which claimed to provide improved performance. There are different routing protocols
proposed for MANETs which makes it quite difficult to determine which protocol is suitable for
different network conditions .This paper provides an overview of different routing protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance and statistical analysis of ant colony route in mobile ad-hoc ne...IJECEIAES
Research on mobile ad-hoc networks (MANETs) is increasing in popularity due to its rapid, budget-friendly, and easily altered implementation, and relevance to emergencies such as forest firefighting and health care provisioning. The main concerns that ad-hoc networks face is dynamic topology, energy usage, packet drop rate, and throughput. Routing protocol selection is a critical point to surmount alterations in topology and maintain quality in MANET networks. The effectiveness of any network can be vastly enhanced with a well-designed routing protocol. In recent decades, standard MANET protocols have not been able to keep pace with growing demands for MANET applications. The current study investigates and contrasts ant colony optimization (ACO) with various routing protocols. This paper compares ad-hoc on-demand multi-path distance vector (AOMDV), dynamic source routing protocol (DSR), ad-hoc on-demand distance vector routing (AODV), and AntHocNet protocols regarding the quality of service (QoS) and statistical analysis. The current research aims to study the behavior of the state-of-the-art MANET protocols with the ACO technique. The ACO technique is a hybrid technique, integrating a reactive route maintaining technique with a proactive method. The reason and motivation for including the ACO algorithm in the current study is to improve by using optimization algorithms proved in other domains. The ACO algorithm appears to have substantial use in large-scale MANET simulation.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Investigation of Clock Synchronization Techniques and its Performance Impact in MANET
1. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
183
Investigation of Clock Synchronization Techniques and its Performance
Impact in MANET
Prof. Mithlesh Kumar Sigaroli 1
Department of CSE
TITE, Bhopal M.P., (India)
patelmithlesh219@gmail.com
Manish Nagar 2
M. Tech. Scholar Department of DCE
B.U.I.T., Barkatullah University
Bhopal M.P. (India)
manish14bpl@gmail.com
Mahendra Kumar Jhariya 3
Department of CSE
B.U.I.T., Barkatullah University
Bhopal M.P. (India)
mahendra_jhariya@rediffmail.com
Abstract— Mobile ad hoc Network (MANET) is an assortment of
mobile nodes that area unit needed to transmit packets on behalf
of every alternative. The mobile nodes maintain the topology
data during a dynamic network among a selected vary. All nodes
should remember of its neighbors that area unit directly
approachable. The every node in network maintained next hop
data of close neighbor nodes. The routing protocols area unit
routed knowledge packets in between sender and receiver during
a specific time instant. The time synchronization is maintained
the communication clock cycle between the nodes. Time
synchronization is an important element of a MANET. Time
synchronization during a network aims at providing a typical
duration for local clocks of nodes within the network. Since all
hardware clocks area unit imperfect, local clocks of nodes could
alienate from one another in time, thus determined time or
durations of your time intervals could differ for every node
within the network. However, for several applications or
networking protocols, it's needed that a typical read of your time
exists and is obtainable to everybody or variety of the nodes
within the network at any specific instant. This work presents a
survey of existing analysis on time synchronization within the
field of Mobile unintended Network. This survey is provides the
initiative data during a field of synchronization by that the
innovative approach is feasible to planned in MANET.
Index Terms—Time Synchronization, MANET, survey,
Routing.
I. INTRODUCTION
Mobile Ad hoc Network (MANET) Ad hoc networks [1]
are networks of mobile wireless computing devices. Due to the
limited communication range of wireless technology, nodes of
the network form spontaneous connections when they are
brought within the communication range of each other,
providing typically a symmetrical communication link where
message exchange is possible in both directions. The limited
communication range and the mobility of the nodes lead to
frequent reconfiguration of the network topology. Each node
participates in an ad hoc routing protocol that allows it to
discover ‘multi-hop’ paths through the network to any other
node [1]. Time synchronization [2] is also useful for
estimating proximity of and distances between smart things by
taking into account the points in time when a certain
phenomenon in the environment (e.g., sound, light, air
pressure) is sensed by different smart things. Although ad-hoc
networks have the potential for use in a wide range of
application scenarios as diverse as battlefield communications
and smart home environments, they also have some drawbacks.
In addition to the general challenges of wireless
communications such as interference, path loss, and fading that
are also present in infrastructure wireless networks, the unique
characteristics of ad-hoc networks lead to some unique
challenges. While a lack of centralization can be seen as an
advantage, it can also be a disadvantage as there is no means of
2. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
184
ensuring all devices are operating using the same standards
(especially if they are all under the control of different entities).
Similarly, MANET are typically more dynamic, being formed
to fulfill a particular goal and terminated when that goal has
been achieved. In addition, most ad-hoc networks allow nodes
to join and leave the network at will, so that the topology is
constantly changing.
In this diagram the thick black circles represent nodes, the
red lines represent the route of the packet and the blue circles
represent the transmission range of the present node. It should
be noted that despite the use of circles to represent transmission
ranges of nodes participating communication process.
Fig. 1 Example of MANET
II. TIME SYNCHRONIZATION OVERVIEW
The synchronization of geographically separated clocks has
intrigued researchers for a long time. The first accurate clocks
started to appear in the 17th century after the scientific work
pioneered by Galileo and expanded by Christian Huygens [2].
These scientists helped develop a better clock based on their
theories of the motion of pendulums. More recent advances in
the area of clocks include the development of the atomic clocks
that are used in numerous applications including the Global
Positioning System (GPS) and in the digital telephone
communication network in order to provide timing reference
[3]. In the area of clock synchronization we will present a
summary of some important related works later on this section,
but first some background on the basic theory of clocks.
A. General requirements on time synchronization protocols
are:
Provision of a small and/or bounded clock offset, i.e.
an accurate time basis
Fast and/or bounded convergence, i.e. a short and
ideally predictable delay until (re-) synchronization is
achieved
Low and/or bounded complexity concerning, e.g.,
computation, communication, storage, energy, and
structure
High robustness against topology changes such as
node movements and node failures
More specific requirements on time synchronization
protocols depend on concrete application requirements and
network topology. For instance, data fusion applications
require a small average clock offset for time stamping of sensor
values. On the other hand, a small and bounded clock offset is
needed for duty cycling or network-wide medium slotting.
B. Challenges in Time Synchronization
When a node in the network generates a timestamp to send
to another node for synchronization, the packet carrying the
timestamp will face a variable amount of delay until it reaches
and is decoded at its intended receiver. We can basically
decompose the sources of error in network time
synchronization methods into four basic components:
Send Time: This is the time spent to construct a message at
the sender. It includes the overhead of operating system (such
as context switches), and the time to transfer the message to the
network interface for transmission.
Access Time: Each packet faces some delay at the MAC
(Medium Access Control) layer before actual transmission.
The sources of this delay depend on the MAC scheme used,
but some typical reasons for delay are waiting for the channel
to be idle or waiting for the TDMA slot for transmission.
Propagation Time: This is the time spent in propagation of
the message between the network interfaces of the sender and
the receiver.
3. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
185
Receive Time: This is the time needed for the network
interface of the receiver to receive the message and transfer it
to the host.
III. MANET CHARACTERISTICS
Ad hoc network has its own characteristics that are
different from those of fixed networks [4]:
(1) Dynamic topologies: Node mobility in an ad hoc
network causes frequent changes of network topology.
Adjusting transmission and reception parameters such as power
can also affect the topology. Thus, the management station
needs to collect connectivity information from nodes
periodically. An implication of this is an increased message
overhead in collecting topology information.
(2) Bandwidth-constrained, variable capacity, possibly
asymmetric links: wireless links will continue to have
significantly lower capacity than their hardwired counterparts.
One effect of these relatively low to moderate link capacities is
that congestion happens more often than wired networks.
(3) Energy-constrained operation: Most of the ad hoc
nodes run on batteries. That is, we need to ensure that network
overhead is kept to minimum so that energy is conserved.
Moreover, in order to conserve energy, nodes may power
themselves off. This requirement is contradictory to the need
for topology update messages.
(4) Wireless vulnerabilities and limited physical
security: Mobile wireless networks are generally more prone
to information and physical security threats than fixed,
hardwired networks. Nodes roaming in a hostile environment
such as a battlefield have non negligible probability of being
compromised. That is, a malicious attack may be launched
from within the network by compromised nodes.
A. Time Synchronization in MANET
In this paper we are interested in synchronizing clocks
located in geographically separated nodes of a Mobile Ad Hoc
network. Network synchronization is a difficult task
particularly due to the real characteristics of the oscillators in
the clocks as described previously, and also due to the delay
and delay variation in the links used to transfer the timing
information among the nodes comprising the network.
There are two commonly known approaches for clock
synchronization [5], centralized, and decentralized. The
centralized synchronization approach is also known as master-
slave synchronization and it is the most common method
encountered in practice in civilian applications, there is one or
more accurate clocks (the master(s)) to which all the rest of the
clocks listen and adjust their frequency and phases accordingly.
The decentralized synchronization approach is also known
as mutual synchronization, in this approach there is no master
clock, but instead all clocks cooperate to achieve
synchronization in a distributed manner. In mutual
synchronization the clock of a node tries to achieve
synchronization by reducing its phase or timing error with
respect to a weighted average of the other clock's phases.
In practice it is necessary to exchange timing information
messages among the different nodes comprising the network.
There are several approaches for doing this and some of the
most important are:
Burst position measurement
Continuous correlation of timing signals and,
Clock-sampling
In the burst position method each node schedules the
periodic transmission of a burst or pulse. At each receiving
node the positions of the incoming bursts are compared with
the position of the local burst and the difference is used to
correct the local clock period according to a many-to-one
mapping. This mapping usually takes the form of a weighted
average of the errors. The transmission of pulses has the
disadvantage of requiring a large bandwidth and possibly a
dedicated channel if a wireless medium is used.
In the continuous correlation method each node
continuously transmits a signal that is tracked at the receiving
node. At each receiving node the sequence is compared with a
replica generated by the local clock and a sliding correlation is
performed in order to compute the phase offset. For instance, a
clock can drive a pseudo-noise (PN) sequence generator, and
4. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
186
this sequence can be transmitted to other nodes. As in previous
cases a many-to-one mapping is needed to extract the
correction term used to adjust the local clock.
In the clock-sampling method each node reads the time of
its clock and transmits it to other neighbor nodes. At each
receiving node the timing errors are computed as the difference
between the local and neighbor nodes' clocks. The errors are
used in a many-to-one mapping rule to determine the
correction applied to the local clock. The main advantage of
the clock-sampling technique is its relative simplicity of
implementation. The TSF in the IEEE 802.11 standard is a
clock-sampling method. In all these methods the timing
information exchanged can be corrupted during the time it
travels from transmitter to receiver. Some of the most
detrimental factors include link delay, signal fading, signal
delay spread, and collision of timing messages due to the
broadcasting nature of the wireless medium.
IV. PROBLEM IN TIME SYNCHRONIZATION
Due to unpredictability and imperfect measurability of
message delays, physical clock synchronization is always
imperfect. Therefore one has to take care to avoid false
statements when reasoning about temporal ordering and real–
time issues based on synchronized computer clocks.
Timing synchronization can be viewed as the following
problem: A person, e.g., John Doe, is a normal commuter. John
hates being late for work and wishes to always catch the train
his wants. To achieve this, John obtains the reference time that
is available at the train station and adjusts his watch to show
the same time. Due to the imperfections in John's watch, it does
not measure time intervals accurately and therefore tends to
drift away from the reference time at the train station. To
maintain synchronization with the time at the train station, John
must periodically synchronize his watch with the reference
time. Using this example, we see that time synchronization is
more accurate the more often a local clock (i.e., John's watch)
is synchronized, i.e., synchronization is an ongoing process.
Since there is a sole resource for measuring time (the train
station clock), John and any other person can achieve
synchronization implicitly. But if that resource is unavailable,
synchronization can only be achieved by communication
between two or more entities, e.g." if John and Jane only have
access to personal times and are able to communicate by some
means. In such a scenario, synchronization can be achieve if
John were to send Jane the reading on his watch, and Jane then
adjusts her own watch based on either the time or the time
offset between their clocks. Here too, periodic synchronization
would be needed, since both John's and Jane's watches may
drift at different rates, to ensure a specific synchronization:
error level.
V. ROUTING IN MANET
Routing is an essential function in MANETs. The routing
procedure is exchange data/ routing packets between mobile
nodes. Therefore, a routing protocol is required to achieve this
objective either proactively or reactively. A routing protocol is
said to be proactive when mobile nodes broadcast their routing
information periodically to keep consistency in their routing
table entries. It is reactive when routes between mobile nodes
are built on an on-demand basis. MANET routing protocols
must be simple and robust, and minimizes control message
exchanges. It needs to be simple because it is performed by
generic mobile hosts that may have only limited resources and
power. Routing algorithms that consume excessive bandwidth
for routing control message exchanges is not appropriate for
such wireless networks. The topology of an ad hoc network is
inherently volatile and routing algorithms must be robust
against frequent topology changes caused by host movements
[6].
MANET routing protocols can be classified into three
categories, namely proactive, reactive and hybrid routing
protocols. Proactive routing protocols, such as the destination-
sequenced distance vector (DSDV) protocol [7], help mobile
nodes maintain one or multiple tables, which include routing
information to all MANET nodes in the network. To maintain
5. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
187
consistency of these tables, MANET nodes update their routing
information periodically and whenever there is a change in the
network topology. Network topology changes occur due to
node mobility and/or link and node failure. When a change in
the network topology is detected, mobile nodes exchange
messages throughout the network to maintain correct routing
tables. Proactive routing protocols differ in the way update
messages are exchanged between all nodes and the number of
their routing tables. Proactive routing protocols are also called
table-driven routing protocols. As can be seen, routes exist
between all pair of nodes in the network although a given pair
of nodes might not be communicating with each other. Also,
message exchange floods the network and introduces
significant overhead. In contrary to proactive routing protocols,
mobile nodes do not maintain routing information to all nodes
in the network.
When using reactive routing protocols, such as the ad hoc
on-demand distance vector (AODV) protocol [8]. Routes are
created only when needed. This is the reason why these
protocol are also called on-demand routing protocols. To find a
route to a destination, a mobile node needs to run a route
discovery procedure. A route between a source node and a
destination is said to be valid only when the destination is
reachable and is needed by the source node. As can be seen,
routes between MANET nodes are not always available and
have to be established on an on-demand basis. While this kind
of routing protocol significantly reduces routing overhead, it
may introduce additional delay in data transmission.
Hybrid routing protocols are takes advantage of both
schemes have attracted a lot of attention. This is combination
of best features of above two protocols. Node within certain
distance from the node concerned, or within a particular
geographical region, are said to be in routing zone. By
exploiting the strength and avoiding the weakness of each type,
hybrid topological routing protocols are proposed, for example,
Zone Routing Protocol (ZRP) [6].
VI. PREVIOUS WORK ACCOMPLISHED
In this paper [9] proposed a new time synchronization
algorithm. Nodes do not depend on a specific node, and they
use all the received beacon signals and perform the time
synchronization on their own. We validated the method with
simulation results, which show that time synchronization is
performed effectively with short process time. The proposed
Time Synchronization Procedure toward Average (TSPTA)
which does not give priority to a particular node. Each node
gathers time information through the received beacon signal,
and using this information self correcting is accomplished.
Through the decentralized processing method, we obtain short
convergence time and high accuracy.
In this paper [10] Kay Romer identified the problem of
physical time synchronization in sparse ad hoc networks giving
two reasons why classical clock synchronization algorithms
fail in this environment. We then presented a synchronization
algorithm suitable for a certain class of applications of sparse
ad hoc networks, which transforms time stamps exchanged
between nodes inside messages to the local time of the receiver
instead of adjusting the clocks. The algorithm has a low
resource and message overhead and therefore is well suited for
resource restricted distributed sensor networks.
In this work [11], extend BBS by an algorithm for time
synchronization called Black Burst Clock Synchronization
(BBCS). The idea is to use global ticks as reference points in
time, and to propagate the time values of these global ticks in
special time frames. For this purpose, we introduce two
different frame encodings with black bursts called cooperative
and arbitrating encoding. Both encodings are resistant against
collisions, and guarantee upper bounds for convergence delay.
Being based on BBS, BBCS preserves the properties regarding
offset, complexity, and robustness. Neither BBS nor BBCS
rely on static network topology.
In this paper [12], proposed an automatic self-time-
correcting procedure (ASP) to achieve clock synchronization in
a multihop environment. Our ASP has two features. Firstly, a
faster host has higher priority to send its timing information out
6. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
188
than a slower one. Secondly, after collecting enough timing
information, a slower host can synchronize to the faster one by
self-correcting its timer periodically (which makes it becoming
a faster host).
This paper [13] proposed a GMAC (Gossip based MAC
Protocol) with energy awareness is a primary goal. GMAC is
designed to run on higher constrained sensor nodes and it
therefore has very low processing requirement and a small
footprint. This serve to reduce energy consumption, but
GMAC’s chief mechanism for energy conservation is duty
cycle.
This paper [14] considers clock synchronization in
multihop Ad hoc networks from a new angle, relating the
energy constraint on the clock synchronization algorithm with
the optimal skew it may obtain. Given individual energy
remaining is indicated how much time a node spend for each
message transmission. Synchronization we, give exact of the
optimal skew that can be achieved as a function of
the uncertainty in message delay. As they show the optimal
skew is the minimal depth of a particular spanning Forest
whose trees are rooted at the time sources of the topology
graph induced by respecting the energy budget.
In this paper [15] concentrates on the clock synchronization
and routing overhead protocol for MANET. It is very much
clear that any network which does not have any clock
synchronization, would get crash and is of no issue. The main
concept of the GCSMBHCD method is it’s concept of global
clock synchronization. in this proposed work all the nodes of
the adhoc network gets synchronized based on the global
highest divergence value of clock of all clocks available in the
all nodes of network.
VII. EXPECTED PROPOSAL
In this proposal is the selection of a global clock for all
nodes in the presence of multiple clocks advertising
themselves as being stable. We term this problem time
information routing to form an analogy with network routing,
which addresses a similar issue - that of selecting the next hop
to forward a packet toward its final destination based on
wireless link estimations. In time information routing, the
“next hop” for a slave node is the master clock it synchronizes
to and the final destination is always the root clock in the
system. To achieve more accurate global time
synchronization, we proposed for a selection of minimum
mobility node and average the time of all nodes in a particular
zone. Today’s time synchronization protocols liberally
integrate timing information offered by neighboring nodes
into their own estimates. The following steps are done to
synchronize the clock of mobile nodes in network:-
1. The sender has sends the Route Establishment
packets to neighbor nodes that are in radio range
forward the request to for establishment of
connection.
2. The time synchronization procedure is initiated if the
routing procedure is started.
3. The clock synchronization condition is based on the
average of current clock time of mobile nodes and
minimum mobility of mobile device.
Z1 = (S1 (CLK) +I1 (CLK) +I2 (CLK) + I3 (CLK)
+............D1 (CLK))/5 // here total is 5
Z1 = Average of CLK is the synchronized
clock
'Election Node (EN)' = select minimum
mobility (S1, I1, I2, I3 ...D1)
4. In a particular zone only the 'election node' time is
considered for synchronization because it follows the
step 3 conditions.
5. In a particular zone according to 'election node'
clock of mobile devices are synchronized.
6. In case of zone communication i.e. intra zone
communication same procedure of step 3 is applied
on all zones of network i.e.
Global Synchronized CLK (GSC) = Average of ((Z1
(EN (CLK)) + Z2 (EN (CLK))/2) U (Minimum mobility
of Z1 and Z2) // Number of zones are 2.
7. International Journal of Current Trends in Engineering & Technology
Volume: I, Issue: VII (Nov. - Dec. 2015)
189
7. Now the clock of all mobile nodes is synchronized
through this GSC value.
8. Data delivery in network is started to established
path.
VIII. CONCLUSION
In this paper study about the various clock synchronization
under MANET and identifies the problem and its resolution
with different techniques. In the above section our proposed
work are given that is based on global clock synchronization
for reliable inter communication under MANET. In future we
create simulation experiments and takes expected output in the
form of network parameter.
REFERENCES
[1] Broch J, Maltz D, Johnson D, Hu Y-C, Jetcheva J. ,“A
Performance Comparison Of Multi-Hop Wireless Ad Hoc
Network Routing Protocols”, The fourth Annual ACM/IEEE
International Conference on Mobile Computing and
Networking, Dallas, TX, U.S.A., 85–97, 1998.
[2] Douglas M. Considine, Editor, .Van No strands scientific
encyclopedia, Eight ed. 1995.
[3] Kartaschoff, P, .Synchronization in digital communications
networks, Proceedings of the IEEE, Volume: 79, Issue: 7, July
1991.
[4] Congzhe Zhang, MengChu Zhou, Ming Yu, "Ad hoc network
routing and security: A review", International Journal of
Communication Systems, pp.909–925, Published online 22
September 2006 in Wiley Inter Science.
[5] W.C Lindsey, F. Ghazvinian, W. Hagmann, and K. Dessouky,
.Network synchronization”, Proceedings of the IEEE, vol. 73,
No. 10, October 1985
[6] E. M Royer, C.K Toh, “A Review of Current Routing Protocols
for Ad Hoc Mobile Wireless Networks”, IEEE Personal
Communications, 6(2):46–55, 1999.
[7] 4. Perkins C, Bhagwat P. Highly dynamic destination-sequenced
distance vector (DSDV) routing for mobile computers.
Proceedings of the ACM SIGCOMM Conference on
Communications, Architectures, Protocols and Applications
(SIGCOMM 1994), London, U.K., August 1994.
[8] 5. Perkins C, Belding-Royer EM, Das SR. Ad hoc on-demand
distance vector (AODV) routing. RFC 3561, July 2003.
[9] Yun-Jae Shin, Jung-Ryun Lee "Time Synchronization Protocol in
Ad hoc network" ICOIN 2013.
[10] Kay Romer, "Time Synchronization in Ad Hoc Networks",
Proceeding MobiHoc '01 Proceedings of the 2nd ACM
international symposium on Mobile ad hoc networking &
computing Pages 173-182, 2001.
[11] Dennis Christmann, Reinhard Gotzhein, Thomas Kuhn, "Multi-
hop Clock Synchronization in Wireless Ad-Hoc Networks",
Electronic Communications of the EASST Volume 17, pp.2-13,
2009
[12] Jang-Ping Sheu, Chih-Min Chao, Ching -wen Sun, "A clock
synchronization algorithm for multi-hop wireless ad hoc
networks", IEEE 24th International Conference on Distributed
Computing Systems, 574 - 581, 2004.
[13] Matthew Dobson, Spyros Voulgaris, Maarten van Steen,
"Network level Synchronization in Decentralized Social Ad-
Hoc Networks", IEEE 5th International Conference on Pervasive
Computing, and Applications (ICPCA), , pp. 206 - 212, 1-3 Dec.
2010.
[14] Hagit Attiya, DavidHay and Jennifer L. Welch, “ Optimal Clock
Synchronization under energy Constraints in Wireless Ad hoc
Network”, LNCS 3974, pp. 221–234, Springer Verlag Berlin
Heidelberg 2006.
[15] Md. Naim Ansari#, Hemant Kumar Soni, “Global Clock
Synchronization Method based on Highest Clock Divergence in
MANET”, International Journal of Application or Innovation in
Engineering & Management (IJAIEM), pp273-278, Volume 3,
Issue 10, October 2014.