The document proposes a new multicast routing protocol for mobile ad hoc networks (MANETs) that provides bandwidth guarantees while reducing total bandwidth consumption. It constructs multiple multicast trees to fully utilize residual bandwidth across paths. Randomized network coding is used so redundant packets are avoided and destinations receive innovative coded packets from different routes. The protocol estimates available bandwidth on routes using a variable bit rate to improve accuracy. Simulation results show the protocol reduces delay and retransmission rates compared to existing protocols, improving bandwidth usage in MANETs.
Many energy-efficient Receiver Initiated Asynchronous Duty-Cycle MAC protocol for wireless sensor
networks (WSNs) have been proposed. Most nodes suffer from significant performance Degradation for burst traffic,
due to randomly waking up to communicate with each other. The proposed protocol is new receiver initiated
asynchronous duty-cycle MAC protocol for burst traffic . By adaptively adjusting beacon time of the receiver and it
schedules the sender listening time based on scheduled period, by this high energy efficiency and low end-to-end packet
delivery latency for burst traffic is achieved. We have evaluated the performance of MAC through detailed ns- 2
simulation. The simulation results show that this protocol reduce end-to-end packet delivery latency and energy
consumption under various data rates in different topologies compared with RI-MAC.
Keywords— Wireless sensor networks, duty-cycle, receiver-initiated, low latency, energy-efficient
This document discusses computer networks and congestion control techniques. It provides information on routing algorithms, causes of congestion, effects of congestion, and open-loop and closed-loop congestion control methods. Specifically, it describes the leaky bucket algorithm and token bucket algorithm for traffic shaping, and how they regulate data flow rates to prevent network congestion.
This document discusses congestion control in computer networks. It begins by defining congestion as occurring when the number of packets entering a network exceeds its carrying capacity. Several open-loop and closed-loop techniques for congestion control are then described, including leaky bucket algorithms, token bucket algorithms, choke packets, and slow start. The effects of congestion like reduced throughput and increased delay are also covered. The document provides an in-depth look at strategies for detecting and mitigating congestion in computer networks.
Congestion control and quality of service focus on managing data traffic by avoiding congestion and ensuring appropriate network conditions. Traffic is characterized by descriptors like data rate and burst size. Congestion occurs when network load exceeds capacity and is controlled using open-loop prevention or closed-loop removal techniques. Quality of service provides classifications, scheduling, and resource reservation to meet flow requirements for reliability, delay, bandwidth and more. Integrated and differentiated services are QoS frameworks for IP that use signaling, admission control, and per-hop behaviors.
The document discusses congestion control in computer networks. It defines congestion as occurring when the load on a network is greater than the network's capacity. Congestion control aims to control congestion and keep the load below capacity. The document separates congestion control mechanisms into two categories: open-loop control, which aims to prevent congestion; and closed-loop control, which detects congestion and takes corrective actions through feedback. Specific open-loop techniques discussed are admission control, traffic shaping using leaky bucket and token bucket algorithms, and traffic scheduling.
This document presents an overview of computer network congestion and congestion control techniques. It defines congestion as occurring when too many packets are present in a network link, causing queues to overflow and packets to drop. It then discusses factors that can cause congestion as well as the costs. It outlines open-loop and closed-loop congestion control approaches. Specific algorithms covered include leaky bucket, token bucket, choke packets, hop-by-hop choke packets, and load shedding. The document concludes by noting the importance of efficient congestion control techniques with room for improvement.
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline
networks characterized by negligible random packet losses. This paper represents exploratory study of TCP
congestion control principles and mechanisms. Modern implementations of TCP contain four intertwined
algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition to the standard
algorithms used in common implementations of TCP, this paper also describes some of the more common
proposals developed by researchers over the years. We also study, through extensive simulations, the
performance characteristics of four representative TCP schemes, namely TCP Tahoe, New Reno and Vegas
under the network conditions of bottleneck link capacities for wired network
TCP uses congestion control to determine how much capacity is available in the network and regulate how many packets can be in transit. It uses additive increase/multiplicative decrease (AIMD) where the congestion window is increased slowly with each ACK but halved upon timeout. Slow start is used initially and after idle periods to grow the window exponentially until congestion is detected. Fast retransmit and fast recovery help detect and recover from packet loss without requiring a timeout.
Many energy-efficient Receiver Initiated Asynchronous Duty-Cycle MAC protocol for wireless sensor
networks (WSNs) have been proposed. Most nodes suffer from significant performance Degradation for burst traffic,
due to randomly waking up to communicate with each other. The proposed protocol is new receiver initiated
asynchronous duty-cycle MAC protocol for burst traffic . By adaptively adjusting beacon time of the receiver and it
schedules the sender listening time based on scheduled period, by this high energy efficiency and low end-to-end packet
delivery latency for burst traffic is achieved. We have evaluated the performance of MAC through detailed ns- 2
simulation. The simulation results show that this protocol reduce end-to-end packet delivery latency and energy
consumption under various data rates in different topologies compared with RI-MAC.
Keywords— Wireless sensor networks, duty-cycle, receiver-initiated, low latency, energy-efficient
This document discusses computer networks and congestion control techniques. It provides information on routing algorithms, causes of congestion, effects of congestion, and open-loop and closed-loop congestion control methods. Specifically, it describes the leaky bucket algorithm and token bucket algorithm for traffic shaping, and how they regulate data flow rates to prevent network congestion.
This document discusses congestion control in computer networks. It begins by defining congestion as occurring when the number of packets entering a network exceeds its carrying capacity. Several open-loop and closed-loop techniques for congestion control are then described, including leaky bucket algorithms, token bucket algorithms, choke packets, and slow start. The effects of congestion like reduced throughput and increased delay are also covered. The document provides an in-depth look at strategies for detecting and mitigating congestion in computer networks.
Congestion control and quality of service focus on managing data traffic by avoiding congestion and ensuring appropriate network conditions. Traffic is characterized by descriptors like data rate and burst size. Congestion occurs when network load exceeds capacity and is controlled using open-loop prevention or closed-loop removal techniques. Quality of service provides classifications, scheduling, and resource reservation to meet flow requirements for reliability, delay, bandwidth and more. Integrated and differentiated services are QoS frameworks for IP that use signaling, admission control, and per-hop behaviors.
The document discusses congestion control in computer networks. It defines congestion as occurring when the load on a network is greater than the network's capacity. Congestion control aims to control congestion and keep the load below capacity. The document separates congestion control mechanisms into two categories: open-loop control, which aims to prevent congestion; and closed-loop control, which detects congestion and takes corrective actions through feedback. Specific open-loop techniques discussed are admission control, traffic shaping using leaky bucket and token bucket algorithms, and traffic scheduling.
This document presents an overview of computer network congestion and congestion control techniques. It defines congestion as occurring when too many packets are present in a network link, causing queues to overflow and packets to drop. It then discusses factors that can cause congestion as well as the costs. It outlines open-loop and closed-loop congestion control approaches. Specific algorithms covered include leaky bucket, token bucket, choke packets, hop-by-hop choke packets, and load shedding. The document concludes by noting the importance of efficient congestion control techniques with room for improvement.
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline
networks characterized by negligible random packet losses. This paper represents exploratory study of TCP
congestion control principles and mechanisms. Modern implementations of TCP contain four intertwined
algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition to the standard
algorithms used in common implementations of TCP, this paper also describes some of the more common
proposals developed by researchers over the years. We also study, through extensive simulations, the
performance characteristics of four representative TCP schemes, namely TCP Tahoe, New Reno and Vegas
under the network conditions of bottleneck link capacities for wired network
TCP uses congestion control to determine how much capacity is available in the network and regulate how many packets can be in transit. It uses additive increase/multiplicative decrease (AIMD) where the congestion window is increased slowly with each ACK but halved upon timeout. Slow start is used initially and after idle periods to grow the window exponentially until congestion is detected. Fast retransmit and fast recovery help detect and recover from packet loss without requiring a timeout.
Congestion occurs when routers receive packets faster than they can forward them, causing their queues to fill up. There are two ways routers deal with congestion - by preventing additional packets from entering the congested region until packets can be processed, or by discarding queued packets to make room for new ones. Congestion control techniques like warning bits, choke packets, and load shedding help detect and recover from congestion on a global scale across an entire subnet, while flow control operates on a point-to-point basis between individual senders and receivers.
This document discusses admission control in internet networks. It provides an overview of quality of service (QoS) and how organizations can achieve QoS through tools like jitter buffering and traffic shaping. It then discusses several techniques used for admission control, including scheduling, traffic shaping, and resource reservation. Specific admission control systems are also outlined, such as asynchronous transfer mode (ATM), audio video bridging (AVB), IEEE 1394, integrated services, and the public switched telephone network (PSTN).
This document discusses congestion in computer networks and how TCP controls congestion. It begins by listing group members and an agenda covering learning about congestion, network performance, and TCP congestion control. It then defines congestion as occurring when network load exceeds capacity. Various causes of and issues resulting from congestion are described. The document outlines open-loop and closed-loop congestion control techniques before focusing on TCP, explaining how it uses a congestion window and the slow start, congestion avoidance, and congestion detection algorithms to control transmission rates and respond to lost packets or congestion.
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
The document analyzes the performance of different TCP variants (New Reno, Reno, Tahoe) with MANET routing protocols (AODV, DSR, TORA) through simulation. It finds that in scenarios with 3 and 5 nodes, AODV has better throughput than DSR and TORA for all TCP variants. Throughput decreases for all variants as node count increases. New Reno provides multiple packet loss recovery and is the best choice for AODV in MANETs due to its consistent performance with changes in node count. Further analysis of additional protocols and TCP variants is recommended.
Congestion control aims to prevent network overload by regulating data transmission. It is concerned with bottlenecks in packet-switched networks and sometimes there is no way to route around congested routers. Common congestion control techniques include flow control, router-based approaches like queue management algorithms, and host-based approaches where end hosts adjust their behavior in response to network conditions. Fair queuing algorithms like weighted fair queuing assign weights to flows to control bandwidth allocation.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document discusses improving transport layer performance in data communication networks by delaying transmissions. It proposes a Queue Length Based Pacing (QLBP) algorithm that delays packets based on the length of the local packet buffer to reduce burstiness.
2) It reviews several related works on using pacing, small buffers, and forward error correction to improve performance in small buffer networks and optical packet switched networks.
3) The document analyzes problems like packet loss from bit errors and congestion that degrade transport layer performance, and how QLBP aims to reduce packet loss through traffic pacing.
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
This document discusses congestion control in computer networks. It begins by defining common traffic descriptors like average data rate and peak data rate. It then explains different traffic profiles such as constant bit rate and variable bit rate traffic. The document discusses how congestion occurs when network load exceeds capacity. It describes open-loop and closed-loop congestion control techniques, including choke packets and hop-by-hop choke packets. The document also discusses the Internet Control Message Protocol and how it is used for error reporting and source quenching to control congestion.
The document summarizes the SPEED routing protocol for wireless sensor networks. SPEED aims to provide soft real-time communication by maintaining a consistent delivery speed across the network. It uses stateless non-deterministic geographic forwarding and neighborhood feedback to route packets while balancing energy consumption and avoiding congestion. Simulation results using MATLAB show that SPEED achieves low miss ratios and end-to-end delays while balancing energy usage across nodes in the network.
The document discusses several algorithms used for congestion control in TCP/IP networks, including slow start, congestion avoidance, fast retransmit, fast recovery, random early discard (RED), and traffic shaping using leaky bucket and token bucket algorithms. Slow start and congestion avoidance control the transmission rate by adjusting the congestion window size. Fast retransmit and fast recovery allow quicker retransmission of lost packets without waiting for timeouts. RED proactively discards packets before buffer overflow. Leaky bucket and token bucket algorithms shape traffic flow through use of buffers and tokens to smooth bursts and control transmission rates.
This document provides an overview of congestion control presented by a group. It defines congestion as occurring when there is too much traffic on a subnet causing it to go out of buffer. The main causes of congestion are identified as insufficient memory, slow processors, high packet arrival rates, and low bandwidth lines. Several principles for preventing congestion are discussed, including load shedding, choke packets, traffic shaping using leaky bucket and token bucket algorithms, and random early detection. The presentation concludes with the group welcoming questions.
This document summarizes a presentation on congestion control in TCP/IP networks. It discusses basics of congestion and how it can be catastrophic if not handled. It then describes the basic strategies used by TCP to combat congestion, including slow start, congestion avoidance, detection, and illustration of algorithms like fast retransmit and recovery. Issues with wireless networks and variants of TCP like New Reno, Vegas, and Westwood are also summarized. The presentation proposes a new congestion control algorithm and discusses plans to simulate and test it.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is analyzed that incorporates these delay metrics to validate compliance with smart grid delay constraints defined in standards. Path loss, interference
This document discusses various techniques for congestion control in computer networks. It describes:
1. The difference between congestion control, which deals with overall traffic levels across a network, and flow control, which regulates traffic between two endpoints.
2. Common congestion control techniques like leaky bucket and token bucket algorithms, which shape traffic to prevent bursts that could cause congestion.
3. Other approaches like choke packets, where routers notify sources to reduce their transmission rates if a link becomes congested, and load shedding as a last resort if congestion cannot be avoided.
This document provides an overview of TCP congestion control algorithms. It describes the basic additive increase/multiplicative decrease approach and key mechanisms like slow start, fast retransmit, and fast recovery. It also discusses algorithms for setting the retransmission timeout value and adaptations made in protocols like New Reno and Cubic.
The document proposes a rapid and reliable receiver-based approach for delivering warning messages in vehicular ad-hoc networks. It selects the best receiver node based on both location and energy to ensure timely propagation of warnings without delay. The approach ranks potential receiver nodes based on their distance to an ideal forwarding location and remaining energy. It also uses epidemic routing to further improve performance, where messages are replicated across mobile nodes to increase the probability of reaching destinations. Simulation results showed the proposed method achieved high reliability, enhanced timeliness, and higher delivery ratios with lower overhead compared to existing solutions.
The document discusses various topics related to congestion control and quality of service in computer networks. It defines congestion and explains congestion control techniques like open-loop prevention using policies around retransmission, windows, acknowledgements, and admission. It also covers closed-loop removal techniques like back pressure, choke points, and implicit/explicit signaling. Quality of service techniques like scheduling, shaping, and reservation are explained. Integrated services and differentiated services models for providing QoS in IP networks are summarized.
This document discusses internet congestion and congestion control techniques. It defines internet congestion as reduced quality of service that occurs when a network is carrying more data than it can handle, causing effects like queueing delays and packet loss. Congestion control techniques aim to prevent or remove congestion. Open loop techniques prevent congestion proactively using policies around retransmissions, windows, acknowledgements, and routing. Closed loop techniques detect and remove congestion reactively using methods like backpressure, choke packets, and implicit or explicit signaling between nodes and sources. In conclusion, as internet usage increases, efficient congestion control is important, though no single algorithm can fully solve the problem.
This document analyzes the impact of packet size on the performance of IEEE 802.11 MAC protocol in wireless sensor networks. It discusses how packet size influences energy consumption patterns and finds that neither too long nor too short packets are optimal. The document describes simulations conducted to evaluate how packet delivery ratio, end-to-end delay, and energy consumption of sensor nodes vary with different packet sizes. The results show that performance can be improved by selecting an optimum packet size.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is described that incorporates these delay metrics to validate compliance with smart grid delay constraints and determine the maximum cell range based on
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
Congestion occurs when routers receive packets faster than they can forward them, causing their queues to fill up. There are two ways routers deal with congestion - by preventing additional packets from entering the congested region until packets can be processed, or by discarding queued packets to make room for new ones. Congestion control techniques like warning bits, choke packets, and load shedding help detect and recover from congestion on a global scale across an entire subnet, while flow control operates on a point-to-point basis between individual senders and receivers.
This document discusses admission control in internet networks. It provides an overview of quality of service (QoS) and how organizations can achieve QoS through tools like jitter buffering and traffic shaping. It then discusses several techniques used for admission control, including scheduling, traffic shaping, and resource reservation. Specific admission control systems are also outlined, such as asynchronous transfer mode (ATM), audio video bridging (AVB), IEEE 1394, integrated services, and the public switched telephone network (PSTN).
This document discusses congestion in computer networks and how TCP controls congestion. It begins by listing group members and an agenda covering learning about congestion, network performance, and TCP congestion control. It then defines congestion as occurring when network load exceeds capacity. Various causes of and issues resulting from congestion are described. The document outlines open-loop and closed-loop congestion control techniques before focusing on TCP, explaining how it uses a congestion window and the slow start, congestion avoidance, and congestion detection algorithms to control transmission rates and respond to lost packets or congestion.
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
The document analyzes the performance of different TCP variants (New Reno, Reno, Tahoe) with MANET routing protocols (AODV, DSR, TORA) through simulation. It finds that in scenarios with 3 and 5 nodes, AODV has better throughput than DSR and TORA for all TCP variants. Throughput decreases for all variants as node count increases. New Reno provides multiple packet loss recovery and is the best choice for AODV in MANETs due to its consistent performance with changes in node count. Further analysis of additional protocols and TCP variants is recommended.
Congestion control aims to prevent network overload by regulating data transmission. It is concerned with bottlenecks in packet-switched networks and sometimes there is no way to route around congested routers. Common congestion control techniques include flow control, router-based approaches like queue management algorithms, and host-based approaches where end hosts adjust their behavior in response to network conditions. Fair queuing algorithms like weighted fair queuing assign weights to flows to control bandwidth allocation.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document discusses improving transport layer performance in data communication networks by delaying transmissions. It proposes a Queue Length Based Pacing (QLBP) algorithm that delays packets based on the length of the local packet buffer to reduce burstiness.
2) It reviews several related works on using pacing, small buffers, and forward error correction to improve performance in small buffer networks and optical packet switched networks.
3) The document analyzes problems like packet loss from bit errors and congestion that degrade transport layer performance, and how QLBP aims to reduce packet loss through traffic pacing.
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
On these slides i describe all the detail about Connection Establishment & Flow and Congestion Control. For more detail visit: https://chauhantricks.blogspot.com/
Congestion avoidance mechanisms aim to predict impending congestion and reduce data transmission rates before packet loss occurs. Three main methods are DEC bit, Random Early Detection (RED), and source-based approaches. DEC bit uses routers to explicitly notify sources of congestion. RED drops packets probabilistically based on average queue length to implicitly notify sources. Source-based methods monitor round-trip times and window sizes to detect congestion and adjust transmission rates accordingly.
This document discusses congestion control in computer networks. It begins by defining common traffic descriptors like average data rate and peak data rate. It then explains different traffic profiles such as constant bit rate and variable bit rate traffic. The document discusses how congestion occurs when network load exceeds capacity. It describes open-loop and closed-loop congestion control techniques, including choke packets and hop-by-hop choke packets. The document also discusses the Internet Control Message Protocol and how it is used for error reporting and source quenching to control congestion.
The document summarizes the SPEED routing protocol for wireless sensor networks. SPEED aims to provide soft real-time communication by maintaining a consistent delivery speed across the network. It uses stateless non-deterministic geographic forwarding and neighborhood feedback to route packets while balancing energy consumption and avoiding congestion. Simulation results using MATLAB show that SPEED achieves low miss ratios and end-to-end delays while balancing energy usage across nodes in the network.
The document discusses several algorithms used for congestion control in TCP/IP networks, including slow start, congestion avoidance, fast retransmit, fast recovery, random early discard (RED), and traffic shaping using leaky bucket and token bucket algorithms. Slow start and congestion avoidance control the transmission rate by adjusting the congestion window size. Fast retransmit and fast recovery allow quicker retransmission of lost packets without waiting for timeouts. RED proactively discards packets before buffer overflow. Leaky bucket and token bucket algorithms shape traffic flow through use of buffers and tokens to smooth bursts and control transmission rates.
This document provides an overview of congestion control presented by a group. It defines congestion as occurring when there is too much traffic on a subnet causing it to go out of buffer. The main causes of congestion are identified as insufficient memory, slow processors, high packet arrival rates, and low bandwidth lines. Several principles for preventing congestion are discussed, including load shedding, choke packets, traffic shaping using leaky bucket and token bucket algorithms, and random early detection. The presentation concludes with the group welcoming questions.
This document summarizes a presentation on congestion control in TCP/IP networks. It discusses basics of congestion and how it can be catastrophic if not handled. It then describes the basic strategies used by TCP to combat congestion, including slow start, congestion avoidance, detection, and illustration of algorithms like fast retransmit and recovery. Issues with wireless networks and variants of TCP like New Reno, Vegas, and Westwood are also summarized. The presentation proposes a new congestion control algorithm and discusses plans to simulate and test it.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is analyzed that incorporates these delay metrics to validate compliance with smart grid delay constraints defined in standards. Path loss, interference
This document discusses various techniques for congestion control in computer networks. It describes:
1. The difference between congestion control, which deals with overall traffic levels across a network, and flow control, which regulates traffic between two endpoints.
2. Common congestion control techniques like leaky bucket and token bucket algorithms, which shape traffic to prevent bursts that could cause congestion.
3. Other approaches like choke packets, where routers notify sources to reduce their transmission rates if a link becomes congested, and load shedding as a last resort if congestion cannot be avoided.
This document provides an overview of TCP congestion control algorithms. It describes the basic additive increase/multiplicative decrease approach and key mechanisms like slow start, fast retransmit, and fast recovery. It also discusses algorithms for setting the retransmission timeout value and adaptations made in protocols like New Reno and Cubic.
The document proposes a rapid and reliable receiver-based approach for delivering warning messages in vehicular ad-hoc networks. It selects the best receiver node based on both location and energy to ensure timely propagation of warnings without delay. The approach ranks potential receiver nodes based on their distance to an ideal forwarding location and remaining energy. It also uses epidemic routing to further improve performance, where messages are replicated across mobile nodes to increase the probability of reaching destinations. Simulation results showed the proposed method achieved high reliability, enhanced timeliness, and higher delivery ratios with lower overhead compared to existing solutions.
The document discusses various topics related to congestion control and quality of service in computer networks. It defines congestion and explains congestion control techniques like open-loop prevention using policies around retransmission, windows, acknowledgements, and admission. It also covers closed-loop removal techniques like back pressure, choke points, and implicit/explicit signaling. Quality of service techniques like scheduling, shaping, and reservation are explained. Integrated services and differentiated services models for providing QoS in IP networks are summarized.
This document discusses internet congestion and congestion control techniques. It defines internet congestion as reduced quality of service that occurs when a network is carrying more data than it can handle, causing effects like queueing delays and packet loss. Congestion control techniques aim to prevent or remove congestion. Open loop techniques prevent congestion proactively using policies around retransmissions, windows, acknowledgements, and routing. Closed loop techniques detect and remove congestion reactively using methods like backpressure, choke packets, and implicit or explicit signaling between nodes and sources. In conclusion, as internet usage increases, efficient congestion control is important, though no single algorithm can fully solve the problem.
This document analyzes the impact of packet size on the performance of IEEE 802.11 MAC protocol in wireless sensor networks. It discusses how packet size influences energy consumption patterns and finds that neither too long nor too short packets are optimal. The document describes simulations conducted to evaluate how packet delivery ratio, end-to-end delay, and energy consumption of sensor nodes vary with different packet sizes. The results show that performance can be improved by selecting an optimum packet size.
This document proposes a methodology for incorporating uplink delay constraints into LTE cell planning for smart grid applications. It presents the following:
1) A semi-analytical approach is proposed to evaluate uplink transmission delays considering buffering delays before scheduling, packet transmission/retransmission delays over the air interface, and constraints from smart grid standards.
2) Analytical models are used to estimate buffering delays before scheduling based on queue length and service rate. Packet transmission delays are estimated considering packet segmentation, link adaptation, resource block allocation and retransmissions.
3) A cell planning algorithm is described that incorporates these delay metrics to validate compliance with smart grid delay constraints and determine the maximum cell range based on
IMPACT OF CONTENTION WINDOW ON CONGESTION CONTROL ALGORITHMS FOR WIRELESS ADH...cscpconf
TCP congestion control mechanism is highly dependent on MAC layer Backoff algorithms that
predict the optimal Contention Window size to increase the TCP performance in wireless adhoc
network. This paper critically examines the impact of Contention Window in TCP congestion
control approaches. The modified TCP congestion control method gives the stability of
congestion window which provides higher throughput and shorter delay than the traditional TCP. Various Backoff algorithms that are used to adjust Contention Window are simulatedusing NS2 along with modified TCP and their performance are analyzed to depict the influence of Contention Window in TCP performance considering the metrics such as throughput, delay, packet loss and end-to-end delay
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
This document analyzes and experimentally evaluates several TCP congestion control algorithms (variants) - TCP cubic, TCP hybla, TCP scalable, TCP Vegas, and TCP Westwood - in a wireless multihop environment. It aims to understand the throughput performance of each variant as the number of nodes increases. The analysis provides insights into how well different variants can adapt to dynamic multihop wireless networks. It experimentally tests the variants in a simulation using Network Simulator 2 and compares their throughput performance under varying node counts. The goal is to help develop more robust TCP algorithms that can effectively manage congestion in challenging wireless network conditions.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
Abstract: The widely used reliable transport protocol TCP, is an end to end protocol designed for the wireline networks characterized by negligible random packet losses. This paper represents exploratory study of TCP congestion control principles and mechanisms. Modern implementations of TCP contain four intertwined algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery. In addition to the standard algorithms used in common implementations of TCP, this paper also describes some of the more common proposals developed by researchers over the years. We also study, through extensive simulations, the performance characteristics of four representative TCP schemes, namely TCP Tahoe, New Reno and Vegas under the network conditions of bottleneck link capacities for wired network. Keywords - Congestion avoidance, Congestion control mechanisms, Newreno, Tahoe, TCP, Vegas.
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
The document presents a new Collision Based Contention (CBC) MAC protocol for mobile ad hoc networks.
The CBC protocol aims to improve throughput by dynamically adjusting the contention window size based on the current collision level, rather than using a fixed binary exponential backoff as in 802.11. Under CBC, the contention window is incremented or decremented by varying factors depending on the number of consecutive collisions or successes. This allows the window size to better reflect current network conditions compared to alternatives like MILD, MIMD, and AETF. Simulation results showed CBC outperforms 802.11 BEB and other proposals in terms of throughput, fairness, and delay.
IRJET-A Survey on congestion control with TCP networkIRJET Journal
This document summarizes various mechanisms for congestion control in computer networks. It begins with an introduction to congestion and its impacts. It then classifies congestion control schemes into several categories such as window-based vs. rate-based, unicast vs. multicast, and end-to-end vs. router-supported. Several popular congestion control protocols are described, including TCP, RAP, TFRC, and TEAR. Window-based multicast congestion control approaches like RLA and MTCP are also summarized. The document provides an overview of different congestion control techniques in computer networks.
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
In sensor networks communication by broadcast methods involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collision namely ARBP, where the best achieved success rate is 90%. We hereby propose a MAC protocol which achieves a greater success rate (Success rate is defined as the percentage of delivered packets at the source reaching the destination successfully) by reducing the number of collisions, but by trading off the average propagation delay of transmission. Our proposed protocols are also shown to be more energy efficient in terms of energy dissipation per message delivery, compared to the currently existing protocol.
Abstract The data can get lost, reordered or duplicated due to the presence of routers and buffer space over the unreliable channel in the conventional networks. The data link layer deals with frame formation, flow control, error control, and addressing and link management. All such functions will be performed only by data link protocols. The sliding window protocol will detect and correct error if the received data have enough redundant bits or repeat a retransmission of data. The paper shows the working of this duplex protocol of data link network. Keywords: ACK, GOBACK, ARQ, NACK.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transmitting urgent data using ANKM method.IRJET Journal
This document proposes a new mechanism called ANKM to transmit urgent data in wireless sensor networks. It discusses existing transport layer protocols that provide reliability but do not prioritize urgent data transmission. The ANKM mechanism uses an assured path to transmit urgent data with reliability while blocking normal data packets. It operates in three phases - selecting an assured path, transmitting urgent data along that path using reliability mechanisms, and then resuming normal network operations. The goal is to transmit urgent data with reliability and congestion control while still allowing normal data to flow when the urgent transmission is not occurring.
This document presents a proposed methodology to reduce delay in the RTS/CTS mechanism for data transfer in wireless networks. The proposed method uses RTR (Ready-To-Receive) packets to notify neighboring nodes when intended communication between two nodes is complete before timer expiration, avoiding unnecessary waiting. Simulation results show the proposed method improves throughput and reduces output jitter compared to not using RTR packets.
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
In this paper, the implementation and analysis of RTS/CTS mechanism for data transfer in wireless
network is being studied. The Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in
wireless networks to avoid collisions due to hidden nodes by reserving the channel for transmitting data from
source to destination. The collisions caused by the hidden nodes reduce the network throughput and efficiency.
In RTS/CTS mechanism, RTS/CTS packets set the timer for the neighboring nodes so that these nodes defer their
transmission for the entire data packet transmission period. But there may be the case when the intended
transmission completes before the expiration of this timer, so a kind of delay has been developed. To reduce this
delay, the proposed methodology in this paper provides RTR (Ready-To-Receive) packets along with RTS/CTS
packets. The receiving node sends RTR packets to notify all the neighboring nodes that the intended
communication has finished. The results show that this method improves the data transfer rate resulting in
higher throughput and network efficiency and the system will be more efficient. This will reflect in the overall
information transfer time.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses and compares several congestion control protocols for wireless networks, including TCP, RCP, and RCP+. It implemented an enhanced version of RCP+ in the NS-2 simulator. Simulation results showed that the proposed approach achieved higher throughput and packet delivery ratio than TCP and RCP+ in a wireless network with 10-50 nodes, with performance degrading as the number of nodes increased beyond 20 due to increased congestion. The paper analyzes the mechanisms and equations of each protocol and argues the proposed approach combines benefits of improved AIMD and RCP+ to address their individual shortcomings.
This document summarizes a survey and analysis of various host-to-host congestion control proposals for TCP data transmission. It discusses the basic principles that underlie current host-to-host algorithms, including probing available network resources, estimating congestion through packet loss or delay, and quickly detecting packet losses. The document then analyzes specific algorithms like slow start, congestion avoidance, and fast recovery. It also examines calculating retransmission timeout and round-trip time, congestion avoidance and packet recovery techniques, and data transmission in TCP. The overall goal of these proposals is to control congestion in a distributed manner without relying on explicit network notifications.
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
This document discusses transport layer protocols for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and the need for new network architectures and protocols to support new types of networks. It then provides an overview of TCP/IP and how TCP works, including congestion control mechanisms. The document discusses challenges for TCP over wireless networks, where packet losses are often due to errors rather than congestion. It covers different versions of TCP and their approaches to congestion control. The goal is to design transport layer protocols that can address the unreliable links and frequent topology changes in MANETs.
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
Abstract— Wireless sensor network in the recent trend engaged with high speed responsive real time system. This type of real time system requires reliable and compatible sensor to work in an environment where the sensor is dynamic in nature. Sensor network is to design to perform a set of high level information processing tasks such as detection, tracking or classification. Application of sensor networks is wide ranging and can vary significantly in application requirements, modes of deployment, sensing modality, power supply. Dynamic configuring of wireless sensor involves timing constraints to configure the sensor or to switch an adaptive sensor when working node failure due to energy, data rate, packet loss and range of the sensor. So the network, with such dynamic nature needs a background sensor which is able to be switched when the active sensor has a problem and improper functioning due to the network deploy environment. The background sensor lies inactive inside the range of the active sensor; ensure that the sensor is about to die and make sure the last data transfer successful find delay time to switch. Fault tolerance is achieved by switching the background sensor with the active sensor, where the background sensor self establish themselves in the network and perform similar routing metrics and configure them self with the network as soon they are switched. Once, the actual sensor retained back to the active condition then the background sensor will go to inactive state during this switching process the sensor will not loss data packet.
Similar to IRJET- QOS Based Bandwidth Satisfaction for Multicast Network Coding in Manet (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.