1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...IJERA Editor
Wireless sensor network are increasingly used in data-intensive applications such as micro-climate monitoring,
precision agriculture and audio/video surveillance. A key challenges faced by data-intensive wsn’s is to transmit
all the data generated with an application’s lifetime to the base station despite the fact that sensor nodes have
limited power supply. We propose using low-cost disposable mobile really and our work in the following
aspects First, it does not require complex motion planning of mobile nodes. Second we integrate the energy
consumption due to both mobility and wireless transmission. Our framework consists of first algorithm
computes an optimal routing tree. The second, we integrate the energy consumption due to both mobility and
wireless transmissions .The second algorithm improves the topology of the routing tree by greedily adding new
nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology.
Frequently forming a network topology without the use of any existing network infrastructure. We compare the
performance of the three prominent routing protocols for the mobile relay is Adhoc on Demand Distance Vector
(ADVO), Destination Sequenced Distance Vector (DSDV) and Temporally Ordered Routing Protocols (TORA).
We have chosen four performance metrics such as Average Delay, Packet Delivery Fraction, Routing load and
varying Mobility nodes, simulation for the popular routing protocols AODV, DSDV, and TORA. The
simulation is carried out on NS-2. The performance differentials are analyzed using varying network size and
simulations times. The simulation results confirm that ADVO performs well in terms of Average Delay, Packet
Delivery Fraction. As far as routing load concers TORA performs well.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...IJERA Editor
Wireless sensor network are increasingly used in data-intensive applications such as micro-climate monitoring,
precision agriculture and audio/video surveillance. A key challenges faced by data-intensive wsn’s is to transmit
all the data generated with an application’s lifetime to the base station despite the fact that sensor nodes have
limited power supply. We propose using low-cost disposable mobile really and our work in the following
aspects First, it does not require complex motion planning of mobile nodes. Second we integrate the energy
consumption due to both mobility and wireless transmission. Our framework consists of first algorithm
computes an optimal routing tree. The second, we integrate the energy consumption due to both mobility and
wireless transmissions .The second algorithm improves the topology of the routing tree by greedily adding new
nodes. The third algorithm improves the routing tree by relocating its nodes without changing its topology.
Frequently forming a network topology without the use of any existing network infrastructure. We compare the
performance of the three prominent routing protocols for the mobile relay is Adhoc on Demand Distance Vector
(ADVO), Destination Sequenced Distance Vector (DSDV) and Temporally Ordered Routing Protocols (TORA).
We have chosen four performance metrics such as Average Delay, Packet Delivery Fraction, Routing load and
varying Mobility nodes, simulation for the popular routing protocols AODV, DSDV, and TORA. The
simulation is carried out on NS-2. The performance differentials are analyzed using varying network size and
simulations times. The simulation results confirm that ADVO performs well in terms of Average Delay, Packet
Delivery Fraction. As far as routing load concers TORA performs well.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...IJCI JOURNAL
In Adhoc Network, prime issues which affects the deployment, design and performance of an Adhoc
Wireless System are Routing, MAC Scheme, TCP, Multicasting, Energy management, Pricing Scheme &
self-organization, Security & Deployment consideration. Routing protocols are designed in such a way that
it should have improvement of throughput and minimum loss of packets. Another aspect is efficient
management of energy and the requirement of protracted connectivity of the network. The routing
algorithm designed for this network should monitor the energy of the node and route the packet
accordingly. Adhoc Network in general has many limitations such as bandwidth, memory and
computational power. In Adhoc Network there are frequent path break due to mobility. Also time
synchronization is difficult & consumes more Bandwidth. Bandwidth reservations requires complex
Medium Access Control protocol. In this field the work of quantitative and qualitative metrics analysis has
been done. The analysis of protocol performance for improving the capacity of adhoc network using
probabilistic approaches of the network is yet to be proposed. Our probabilistic approach will cover
analysis of various computational parameters for different mobility structures. In our proposed method we
have distributed mobile nodes using Pareto distribution & formulated various energy models using
regression statistic.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
Abstract The increased uses of mobile phones have raised public interest in possible health issues associated with exposure to electromagnetic energy. For the speedy transmission and avoiding the construction of more towers, the single tower can be shared by multiple network operators. The simultaneous exposure to multiple frequency fields, the sum of all the radiation must be taken into consideration so the radiation intensity level exceeds by several times than the prescribed guideline. Hence, the public is being exposed to continuous, low intensity radiations from these towers. Present Survey has been designed to identify signal strength among the people dwelling near the base station. Signal Strength predicted by integration of NDVI methodology is taken into account for factors like trees, trunks, leaves, branches, their density and their heights relative to the antenna heights and also it has been calculated by both theoretical and practical. In this regard the present study, practical field investigations of existing towers have been done by using SCEPTOR (Mobile GIS/GPS receiver). These GPS data fed to GIS for creating a new layer along with DEM file and satellite image for creating virtual model.3D city model has been performed for the study area. Finally the radiation hotspot area has been identified by using viewshed analysis. Keywords: RF Coverage, Signal Strength, GIS, Remote Sensing, GPS, and Antenna
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...IJCI JOURNAL
In Adhoc Network, prime issues which affects the deployment, design and performance of an Adhoc
Wireless System are Routing, MAC Scheme, TCP, Multicasting, Energy management, Pricing Scheme &
self-organization, Security & Deployment consideration. Routing protocols are designed in such a way that
it should have improvement of throughput and minimum loss of packets. Another aspect is efficient
management of energy and the requirement of protracted connectivity of the network. The routing
algorithm designed for this network should monitor the energy of the node and route the packet
accordingly. Adhoc Network in general has many limitations such as bandwidth, memory and
computational power. In Adhoc Network there are frequent path break due to mobility. Also time
synchronization is difficult & consumes more Bandwidth. Bandwidth reservations requires complex
Medium Access Control protocol. In this field the work of quantitative and qualitative metrics analysis has
been done. The analysis of protocol performance for improving the capacity of adhoc network using
probabilistic approaches of the network is yet to be proposed. Our probabilistic approach will cover
analysis of various computational parameters for different mobility structures. In our proposed method we
have distributed mobile nodes using Pareto distribution & formulated various energy models using
regression statistic.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio.
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Mission to Decommission: Importance of Decommissioning Products to Increase E...
J011137479
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 74-79
www.iosrjournals.org
DOI: 10.9790/2834-11127479 www.iosrjournals.org 74 | Page
Design and Simulation of Mobile Ad Hoc Network for Multiple
Mobility Management
Anubhuti Jain1
, Shashank Mane2
1,2
(Electronics and communication, SBITM Betul, RGPV University Bhopal, India)
Abstract: Now a days many countries are facing a serious problem of mobile signal strength. It has also
become a major issue in many parts of the world. In order to solve this problem use of MANET (mobile ad hoc
network) through WiMAX has popularized. In this paper I will show the complete scenario of MANET network.
In this three conditions are included: when the users are fixed, when the users are movable away from the base
station and the last one is when the users are movable towards the base station. These three conditions are
shown one by one by routing protocol both AODV and DSDV and results are simulated with NS2.
Keywords: AODV, Ad hoc network, DSDV, MANET, NS2, Simulation, WiMAX
I. Introduction
1.1 Mobile Ad Hoc Network(MANET)
Mobile Ad hoc network is a group of wireless equipments knows as wireless nodes, that vigorously
links and transmit information .Wireless nodes can be personal computer with wireless LAN card, Personal
digital assistant (PDA) or additional types of wireless or mobile communication equipments. A wireless node in
general is any computing device that utilizes the air as broadcasting medium.
Fig.1 In this fig we can see there is one base station, through which all the devices like mobiles and laptops are
connected. Base station transfers the data to all devices.
In MANET, a wireless node can be the basis, the target, or transitional node of data broadcasting . A
node playing the task of in between node, functions as a router that can obtain and forward data packets to its
near the objective node. The nature of Ad hoc is the reason because of which wireless nodes have a propensity
to keep moving in place of being still. Consequently, the network topology alters from time to time.
1.2 WiMAX
Worldwide interoperability microwave access includes wireless standards initially formed to give 30-
40 megabit/second data rates and after having 2011 update it allocates up to 1 gigabit/second for stationary
stations. It was named WIMAX by WIMAX Forum which started in June 2001 led and forwarded the
conformity and interoperability of standard IEEE 802.16 or wireless man advanced is nominee for the 4G, in
contest with LTE advanced.
1.3Conditions Related To MANET
In this scenario of MANET, there are eight nodes out of which four users are there, three are relay
stations and one is base station.
1) When users are fixed- In this the base station is fixed along with relay station and users i.e. the users are fixed
on their position and neither move towards the base station nor away from it.
2. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 75 | Page
2) When the users move towards the base station- In this the base station and relay stations are fixed however,
the users are in continuous motion towards the base station. Time the user takes to reach to the base station
depends on the speed which might be defined by us. It can be changed as per users wish.
3) When the users are moving away from the base station- In this the users are continuously moving away from
the base stations but the base and relay stations are fixed. The time taken depends on the speed of the user
defined earlier.
II. Protocols Used
Here we use two protocols the first one is AODV and the other is DSDV.
2.1 Aodv
AODV is a routing protocol for Ad hoc mobile networks with many mobile nodes. AODV stands for
Ad hoc on demand distance vector. As its name suggests it creates routes on demand by the users. Thus, it is a
reactive protocol. The information about the next hop to the destination and the sequence number is obtained
from the destination are stored by routing table showing the freshness of information obtained.
Furthermore the information about the lively neighbors is collected throughout the discovery of the
target host. When the equivalent route breaks, then the neighbors can be notified. The avoidance of source
routing decreases the routing burden in a large network. It is the main advantage of AODV. In addition another
useful feature of AODV is its application of enlarging ring search to manage the deluge of RREQ (Route
Request) packets and look for routes to strange destinations. Along with this it also supplies destination
sequence numbers, permitting the nodes to have up to date routes.
On the other hand few nodes have to be taken into concern when using AODV. Firstly, it needs
bidirectional links and periodic link layer acknowledgements to become aware of broken links. Then, it needs to
sustain routing tables for maintenance unlike DSR.
2.2 Dsdv
It stands for Destination sequenced distance vector routing. It creates routes automatically and is active
all the time. It checks for updates itself without users demand. DSDV requires more data packets than AODV.
It adds attributes, sequence number, to each route table entry of the conventional routing information protocol
(RIP). Utilizing the initially linked sequence number, the mobile nodes can differentiate stale route information
from the latest and thus prevent the formation of routing loops.
In DSDV, every mobile node belonging to an ad hoc network sustains a routing table, which registers
all existing destinations, the metric and next hop to each destination and a sequence made by the destination
node. Using such routing table which is piled up in each mobile node, the packets are broadcasted between the
nodes of an ad hoc network. Sporadically routing table is updated with advertisement by nodes on an ad hoc
network or when important new information is available to sustain the stability of the routing table with the
vigorously altering topology of the ad hoc network.
At times or at once when network topology modification are sensed, each mobile node advertises
routing information using transmitting or multicasting a routing table update packet. The update packet launch
out with a metric of one to direct connected nodes.It shows that each neighbor is at a distance of one metric
(hop) from the node. It is dissimilar from that of the conventional algorithm. After having the update packet,
routing table is updated by the neighbor with rise in the metric by one and recovery the update packet to the
equivalent neighbors of each of them.
This process will be go over till all the nodes of Ad hoc network get a copy of the update packet with a
equivalent metric. Before updating routing table and retransmitting the update packet for each destination node,
the update data is maintained for a short time till the arrival of the best route. If a node obtains more than one
update packets for the same destination during waiting time duration, the routes with more fresh sequence
numbers are always chosen as the source for packet forwarding decisions. If the update packet with same
sequence number is found with the same node, then the update packet with the smallest metric is utilized and the
existing route will be deleted or stored as less favorable. Interpreting the advertisement of probably unstable root
can moisten the rise and fall of the routing table and decrease the number of retransmission of possible route
entries that enter in with same sequence number.
3. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 76 | Page
III. Simulation Parameter
Table.1 shows simulation parameters and their description. It shows channel type, protocols, packet size and
other parameters.
IV. Simulation Result
The simulation results are shown below.
Fig.2 In this fig user are fixed at their position
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are
users. We can see in above diagram, users are fixed at their position i.e. they can’t move towards or away from
the base station. And black circle indicates the coverage area.
Fig. 3 In this fig we can see that the users are moving towards the base station
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones
are users .We can see in this diagram users are moving towards the base station. And black circle indicates the
coverage area.
Parameter Description
1.Channel Wireless
2. Radio propagation Two ray ground
3.Network interface Wireless physical
4. Mac type 802.16
5. Interface queue Drop tail/pre queue
6. Antenna type Omni directional
7. Routing protocol AODV & DSDV
8. Packet size 1000 byte
9. Nodes 8
10. Area 500/500
4. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 77 | Page
Fig. 4 this graph shows that what happens when the users moving towards the base station in AODV
Fig 4 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate
that the maximum delay of the condition in which user are moving towards the base station for AODV protocol
is about 97 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number
of lines shoes the number of packet communicated in the network which is design using AODV protocol.
Fig.5 this graph shows that what happens when the users moving away from the base station in AODV
Fig 5 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving towards the base station for AODV protocol is about
98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines
shoes the number of packet communicated in the network which is design using AODV protocol.
Fig 6 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving away from the base station for AODV protocol is
about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of
lines shoes the number of packet communicated in the network which is design using AODV protocol.
5. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 78 | Page
Fig. 6 this graph shows that what happens when the users moving towards the base station in DSDV
Table. 2 shows the results for AODV protocol when users are moving towards the base station.
Average Throughput 797.6480 kbps
Total packet sent 1720
Total packet received 1474
Packet delivery ratio 85.697674 %
Packet loss ratio 14.302326 %
Table. 3 shows the results for AODV protocol when users are moving away from the base station.
Table.4 shows the results for DSDV protocol when users are moving towards the base station
Average Throughput 657.1686 kbps
Total packet sent 1720
Total packet received 1223
Packet delivery ratio 71.104651 %
Packet loss ratio 28.895349 %
V. Conclusion
From the above all result we can conclude that if the mobile user are fix or moving towards the base
station then the signal strength will increase and high signal to noise ratio obtain due to which we got maximum
packet delivery and less packet loss for AODV as well as DSDV protocol. But if the mobile user moves away
from the base station then the strength of the signal decreases and the result for both the protocols are degrade
than other two scenarios.
VI. Future Work
In the upcoming days we will be able to implement more nodes in MANET. The number of base stat
ion, relay station and users would be increased. Recently in this paper I have used AODV and DSDV routing
protocols but in future we would be implement by many other protocols.
Refrences
[1] Mrs.S.Madhurikkha &Dr.R.Sabitha ,Defending against packet dropping attack using DRI & cross checking mechanism in MANET.
[2] Zahian Ismail& Rosilah Hassan, Effect of packet size on AODV routing protocol implementation in homogenous and heterogenous
manet-2011
[3] S.Mangai & A.Tamilarasi ,Hybrid location aided routing protocol for gps enabled manet clusters-29 Dec 2011
[4] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route
Update Mechanism” IEEE 14TH
International Conference On High Performance Computing And Communications 2012.
[5] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different
Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP
Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012.
Average Throughput 1678.0190 kbps
Total packet sent 2375
Total packet received 1977
Packet delivery ratio 83.242105 %
Packet loss ratio 16.757895 %
6. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 79 | Page
[6] Rajan patel& nimisha patel , A comparative study and simulation of AODV & DSDV manet routing protocol in ns2 & ns3- march
2014.