A hybrid objective function with empirical stability aware to improve RPL for...IJECEIAES
The diverse applications of the internet of things (IoT) require adaptable routing pro- tocol able to cope with several constraints. Thus, RPL protocol was designed to meet the needs for IoT networks categorized as low power and lossy networks (LLN). RPL uses an objective function based on specific metrics for preferred parents selection through these packets are sent to root. The single routing metric issue generally doesn’t satisfy all routing performance requirements, whereas some are improved others are degraded. In that purpose, we propose a hybrid objective function with empirical stability aware (HOFESA), implemented in the network layer of the embedded operating system CONTIKI, which combines linearly three weighty metrics namely hop count, RSSI and node energy consumption. Also, To remedy to frequent preferred parents changes problems caused by taking into account more than one metric, our proposal relies on static and empirical thresholds. The designed HOFESA, evaluated under COOJA emulator against Standard-RPL and EC-OF, showed a packet delivery ratio improvement, a decrease in the power consumption, the convergence time and DIO control messages as well as it gives network stability through an adequate churn.
Comparative Performance Analysis of RPL for Low Power and Lossy Networks base...Kashif Mehmood
The Internet of Things (IoT) is an extensive
network between people-people, people-things and things-things.
With the overgrown opportunities, then it also comes with a lot of
challenges proportional to the number of connected things to the
network. The IPv6 allows us to connect a huge number of things.
For resource-constrained IoT devices, the routing issues are very
thought-provoking and for this purpose an IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL) is proposed.
There are multi-HOP paths connecting nodes to the root node.
Destination Oriented Directed Acyclic Graph (DODAG) is
created taking into account different parameters such as link
costs, nodes attribute and objective functions. RPL is flexible
and it can be tuned as per application demands, therefore, the
network can be optimized by using different objective functions.
This paper presents a novel energy efficient analysis of RPL by
performing a set of simulations in COOJA simulator. The
performance evaluation of RPL is compared by introducing
different Objective functions (OF) with multiple metrics for the
network.
Q-LEARNING BASED ROUTING PROTOCOL TO ENHANCE NETWORK LIFETIME IN WSNSIJCNCJournal
In resource constraint Wireless Sensor Networks (WSNs), enhancement of network lifetime has been one of the significantly challenging issues for the researchers. Researchers have been exploiting machine learning techniques, in particular reinforcement learning, to achieve efficient solutions in the domain of WSN. The objective of this paper is to apply Q-learning, a reinforcement learning technique, to enhance the lifetime of the network, by developing distributed routing protocols. Q-learning is an attractive choice for routing due to its low computational requirements and additional memory demands. To facilitate an agent running at each node to take an optimal action, the approach considers node’s residual energy, hop length to sink and transmission power. The parameters, residual energy and hop length, are used to calculate the Q-value, which in turn is used to decide the optimal next-hop for routing. The proposed protocols’ performance is evaluated through NS3 simulations, and compared with AODV protocol in terms of network lifetime, throughput and end-to-end delay.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
In this paper we discuss about how to increase the reliability, energy-efficiency in a wireless sensor network. Since energy saving has become the top factor on demand due to the increasing multimedia services in mobile devices. The existing batteries unfortunately do not provide the desirable lifetime. Therefore reducing energy consumption has become very crucial factor in all the tasks the mobile devices perform. This work presents an Opportunistic Routing Protocol, which supports energy consumption by increasing the networks performance and also providing reliability to the wireless sensor networks.
Influence of various application types on the performance of LTE mobile networksIJECEIAES
Modern mobile internet networks are becoming heavier and denser. Also it is not reg- ularly planned, and becoming more heterogeneous. The explosive growth in the usage of smartphones poses numerous challenges for LTE cellular networks design and implementation. The performance of LTE networks with bursty and self-similar traffic has become a major challenge. Accurate modeling of the data generated by each connected wireless device is important for properly investigating the performance of LTE networks. This paper presents a mathematical model for LTE networks using queuing theory considering the influence of various application types. Using sporadic source traffic feeding to the queue of the evolved nodeB and with the exponential service time assumption, we construct a queuing model to estimate the performance of LTE networks. We use the performance model presented in this paper to study the influence of various application categories on the performance of LTE cellular networks. Also we validate our model with simulation using NS3 simulator with different scenarios.
A hybrid objective function with empirical stability aware to improve RPL for...IJECEIAES
The diverse applications of the internet of things (IoT) require adaptable routing pro- tocol able to cope with several constraints. Thus, RPL protocol was designed to meet the needs for IoT networks categorized as low power and lossy networks (LLN). RPL uses an objective function based on specific metrics for preferred parents selection through these packets are sent to root. The single routing metric issue generally doesn’t satisfy all routing performance requirements, whereas some are improved others are degraded. In that purpose, we propose a hybrid objective function with empirical stability aware (HOFESA), implemented in the network layer of the embedded operating system CONTIKI, which combines linearly three weighty metrics namely hop count, RSSI and node energy consumption. Also, To remedy to frequent preferred parents changes problems caused by taking into account more than one metric, our proposal relies on static and empirical thresholds. The designed HOFESA, evaluated under COOJA emulator against Standard-RPL and EC-OF, showed a packet delivery ratio improvement, a decrease in the power consumption, the convergence time and DIO control messages as well as it gives network stability through an adequate churn.
Comparative Performance Analysis of RPL for Low Power and Lossy Networks base...Kashif Mehmood
The Internet of Things (IoT) is an extensive
network between people-people, people-things and things-things.
With the overgrown opportunities, then it also comes with a lot of
challenges proportional to the number of connected things to the
network. The IPv6 allows us to connect a huge number of things.
For resource-constrained IoT devices, the routing issues are very
thought-provoking and for this purpose an IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL) is proposed.
There are multi-HOP paths connecting nodes to the root node.
Destination Oriented Directed Acyclic Graph (DODAG) is
created taking into account different parameters such as link
costs, nodes attribute and objective functions. RPL is flexible
and it can be tuned as per application demands, therefore, the
network can be optimized by using different objective functions.
This paper presents a novel energy efficient analysis of RPL by
performing a set of simulations in COOJA simulator. The
performance evaluation of RPL is compared by introducing
different Objective functions (OF) with multiple metrics for the
network.
Q-LEARNING BASED ROUTING PROTOCOL TO ENHANCE NETWORK LIFETIME IN WSNSIJCNCJournal
In resource constraint Wireless Sensor Networks (WSNs), enhancement of network lifetime has been one of the significantly challenging issues for the researchers. Researchers have been exploiting machine learning techniques, in particular reinforcement learning, to achieve efficient solutions in the domain of WSN. The objective of this paper is to apply Q-learning, a reinforcement learning technique, to enhance the lifetime of the network, by developing distributed routing protocols. Q-learning is an attractive choice for routing due to its low computational requirements and additional memory demands. To facilitate an agent running at each node to take an optimal action, the approach considers node’s residual energy, hop length to sink and transmission power. The parameters, residual energy and hop length, are used to calculate the Q-value, which in turn is used to decide the optimal next-hop for routing. The proposed protocols’ performance is evaluated through NS3 simulations, and compared with AODV protocol in terms of network lifetime, throughput and end-to-end delay.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
In this paper we discuss about how to increase the reliability, energy-efficiency in a wireless sensor network. Since energy saving has become the top factor on demand due to the increasing multimedia services in mobile devices. The existing batteries unfortunately do not provide the desirable lifetime. Therefore reducing energy consumption has become very crucial factor in all the tasks the mobile devices perform. This work presents an Opportunistic Routing Protocol, which supports energy consumption by increasing the networks performance and also providing reliability to the wireless sensor networks.
Influence of various application types on the performance of LTE mobile networksIJECEIAES
Modern mobile internet networks are becoming heavier and denser. Also it is not reg- ularly planned, and becoming more heterogeneous. The explosive growth in the usage of smartphones poses numerous challenges for LTE cellular networks design and implementation. The performance of LTE networks with bursty and self-similar traffic has become a major challenge. Accurate modeling of the data generated by each connected wireless device is important for properly investigating the performance of LTE networks. This paper presents a mathematical model for LTE networks using queuing theory considering the influence of various application types. Using sporadic source traffic feeding to the queue of the evolved nodeB and with the exponential service time assumption, we construct a queuing model to estimate the performance of LTE networks. We use the performance model presented in this paper to study the influence of various application categories on the performance of LTE cellular networks. Also we validate our model with simulation using NS3 simulator with different scenarios.
A surrogate-assisted modeling and optimization method for planning communicat...Power System Operation
The development of industrial informatization stimulates
the implementation of cyber-physical system (CPS) in
distribution network. As a close integration of the power
network infrastructure with cyber system, the research
of design methodology and tools for CPS has gained
wide spread interest considering the heterogeneous
characteristic. To address the problem of planning
communication system in distribution network CPS, at
first, this paper proposed an optimization model utilizing
topology potential equilibrium. The mutual influence
of nodes and the spatial distribution of topological
structure is mathematically described. Then, facing the
complex optimization problem in binary space with
multiple constraints, a novel binary bare bones fireworks
algorithm (BBBFA) with a surrogate-assisted model
is proposed. In the proposed algorithm, the surrogate
model, a back propagation neural network, replaces the
complex constraints by incremental approximation of
nonlinear constraint functions for reducing the difficulty
in finding the optimal solution. The communication
system planning of IEEE 39-bus power system,
which comprises four terminal units, was optimized.
Considering the different heterogeneous degrees,
four programs were involved in planning for practical
considerations. The simulation results of the proposed
algorithm were compared with other representative
methods, which demonstrated the effective performance
of the proposed method to solve communication system
planning for optimizing problems of distribution
network.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
A mobile ad-hoc network (MANETs) is an infrastructure less network in which the mobile nodes
communicate with each other. Due to its various characteristics like highly dynamic topology
and limited battery power of the nodes, routing is one of the key issue. Also, it is not possible to
give a significant amount of power to the mobile nodes of ad-hoc networks. Because of all this
the energy consumption is also an important issue. Due to limited battery power, some other
issues like if some node gets fail, which results in loss of data packets and no reliable data
transfer has been raised. In this paper, an algorithm is proposed for data transmission which
detects the node failure (due to energy) before it actually happens. Because of this network
lifetime gets improved. The proposed routing algorithm is energy efficient as compared to
AODV routing algorithm. The performance is analyzed on the basis of various performance
metrics like Energy Consumption, Packet Delivery Ratio, Network Life Time, Network Routing
Overhead and number of Exhausted nodes in the network by using the NS2 Simulator.
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systemsrahulmonikasharma
At the present time whole information and communication technology industry contributes to the global carbon emission. With the aim of reducing the carbon footprint and the operating cost of wireless networks, overall energy reduction is required in the region of two to three orders of magnitude. Meanwhile, significant increase of the network spectrum efficiency is needed to cope with the exponentially increasing traffic loads. Due to this factors spatial modulation (SM) has recently established itself as promising transmission concept which belongs to single-radio frequency large scale multiple input multiple output (MIMO) wireless system. Spatial modulation MIMO takes advantage of whole antenna array at the transmitter, while using limited number of radio frequency chains. The multiple input multiple output multiplies capacity by transmitting different signals over multiple antennas and orthogonal frequency division multiplexing (OFDM), which divides a radio channel into many closely spaced sub channels to provide more reliable communication at high speeds. The system calculate the bit error rate (BER) for multicast multiple input multiple output system with the spatial modulation (SM) and study the effect of signal to noise ratio on bit error rate. MATLAB software is use to simulate system. The simulation results show that bit error rate decreases as signal to noise ratio increases. System reaches zero bit error rate for the value of signal to noise ratio greater than 18dB. System has provided less bit error rate for large signal to noise ratio which improves system performance.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
The longevity of the network and the lack of resources are the main problems within the WSN. Minimizing energy dissipation and optimizing the lifespan of the WSN network are real challenges in the design of WSN routing protocols. Load balanced clustering increases the reliability of the system and enhances coordination between different nodes within the network. WSN is one of the main technologies dedicated to the detection, sensing, and monitoring of physical phenomena of the environment. For illustration, detection, and measurement of vibration, pressure, temperature, and sound. The WSN can be integrated into many domains, like street parking systems, smart roads, and industrial. This paper examines the efficiency of our two proposed clustering algorithms: Fuzzy C-means based hierarchical routing approach for homogeneous WSN (F-LEACH) and fuzzy distributed energy efficient clustering algorithm (F-DEEC) through a detailed comparison of WSN performance parameters such as the instability and stability duration, lifetime of the network, number of cluster heads per round and the number of alive nodes. The fuzzy C-means based on hierarchical routing approach is based on fuzzy C-means and low-energy adaptive clustering hierarchy (LEACH) protocol. The fuzzy distributed energy efficient clustering algorithm is based on fuzzy C-means and design of a distributed energy efficient clustering (DEEC) protocol. The technical capability of each protocol is measured according to the studied parameters.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
CL-SA-OFDM: cross-layer and smart antenna based OFDM system performance enha...IJECEIAES
The growing usage of wireless services is lacking in providing high-speed data communication in recent times. Hence, many of the modulation techniques are evolved to attain these communication needs. The recent researches have widely considered OFDM technology as the prominent modulation mechanism to fulfill the futuristic needs of wireless communication. The OFDM can bring effective usage of resources, bandwidth, and system performance enhancement in collaboration with the smart antenna and resource allocation mechanism (adaptive). However, the usage of adaptive beamforming with the OFDM leads to complication in the design of medium access layer and which causes a problem in adaptive resource allocation mechanism (ARAM). Hence, the proposed manuscript intends to design an OFDM system by considering different switched beam smart antenna (SBSA) along with the cross-layer adaptive resource allocation (CLARA) and hybrid adaptive array (HAA). In this, various smart antenna mechanism are considered to analyze the quality of service (QoS) and complexity reduction in the OFDM system. In this paper, various SA schemes are used as per the quality of service (QoS) requirement of the different users. The performance analysis is conducted by considering data traffic reduction, bit-rate reduction, and average delay.
Integrated approach for efficient power consumption and resource allocation i...IJECEIAES
The growing interest towards wireless communication advancement with smart devices has provided the desired throughput of wireless communication mechanisms. But, attaining high-speed data packets amenities is the biggest issue in different multimedia applications. Recently, OFDM has come up with the useful features for wireless communication however it faces interference issues at carrier level (intercarrier interferences). To resolve these interference issues in OFDM, various existing mechanisms were utilized cyclic prefix, but it leads to redundancy in transmitted data. Also, the transmission of this redundant data can take some more power and bandwidth. All these limitations factors can be removed from a parallel cancellation mechanism. The integration of parallel cancellation and Convolution Viterbi encoding and decoding in MIMOOFDMA will be an effective solution to have high data rate which also associations with the benefits of both the architectures of MIMO and OFDMA modulation approaches. This paper deals with this integrated mechanism for efficient resource allocation and power consumption. For performance analysis, MIMO-OFDMA system is analyzed with three different approaches likeMIMO-OFDM system without parallel cancellation (MIMO-OFDMA-WPC), MIMO-OFDMA System with parallel cancellation (MIMO-OFDMA-PC) and proposed IMO-OFDMA system with parallel cancellation and Convolution Viterbi encoding/decoding (pMIMO-OFDMAPC &CVed) for 4x4 transmitter and receiver. Through performance analysis, it is found that the proposed system achieved better resource allocation (bandwidth) with high data rate by minimized BER rate and achieved least power consumption with least BER.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
Ritu Parasher, Yogesh Rathi "A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Mobile ad-hoc network (MANET) is an autonomous wireless network, deploy without any fixed infrastructure and assistance of base stations. Each node in network shares wireless link for interconnections and not only operates as an end system, but also as a router to forward packets. Since the network nodes are mobile, can be move in any direction with varying paces that generate high dynamicity of network so the protocols that are developed for general ad hoc networks are unsuitable for such an environment. In addition, on-hand routing protocols performance decreases as size of network increased. In this context, to enhance the recitation of routing in MANETs, we propose a new approach in this paper, named Advanced Ad hoc On-Demand Distance Vector (A_AODV). It is a modified version of traditional AODV routing protocol, shrink the active path whenever optimal pathway is available and switches the traffic on it. Simulation studies are conducted using NS2 to prove that proposed approach enhance network performance when network size, load or the mobility increases
A surrogate-assisted modeling and optimization method for planning communicat...Power System Operation
The development of industrial informatization stimulates
the implementation of cyber-physical system (CPS) in
distribution network. As a close integration of the power
network infrastructure with cyber system, the research
of design methodology and tools for CPS has gained
wide spread interest considering the heterogeneous
characteristic. To address the problem of planning
communication system in distribution network CPS, at
first, this paper proposed an optimization model utilizing
topology potential equilibrium. The mutual influence
of nodes and the spatial distribution of topological
structure is mathematically described. Then, facing the
complex optimization problem in binary space with
multiple constraints, a novel binary bare bones fireworks
algorithm (BBBFA) with a surrogate-assisted model
is proposed. In the proposed algorithm, the surrogate
model, a back propagation neural network, replaces the
complex constraints by incremental approximation of
nonlinear constraint functions for reducing the difficulty
in finding the optimal solution. The communication
system planning of IEEE 39-bus power system,
which comprises four terminal units, was optimized.
Considering the different heterogeneous degrees,
four programs were involved in planning for practical
considerations. The simulation results of the proposed
algorithm were compared with other representative
methods, which demonstrated the effective performance
of the proposed method to solve communication system
planning for optimizing problems of distribution
network.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
A mobile ad-hoc network (MANETs) is an infrastructure less network in which the mobile nodes
communicate with each other. Due to its various characteristics like highly dynamic topology
and limited battery power of the nodes, routing is one of the key issue. Also, it is not possible to
give a significant amount of power to the mobile nodes of ad-hoc networks. Because of all this
the energy consumption is also an important issue. Due to limited battery power, some other
issues like if some node gets fail, which results in loss of data packets and no reliable data
transfer has been raised. In this paper, an algorithm is proposed for data transmission which
detects the node failure (due to energy) before it actually happens. Because of this network
lifetime gets improved. The proposed routing algorithm is energy efficient as compared to
AODV routing algorithm. The performance is analyzed on the basis of various performance
metrics like Energy Consumption, Packet Delivery Ratio, Network Life Time, Network Routing
Overhead and number of Exhausted nodes in the network by using the NS2 Simulator.
Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systemsrahulmonikasharma
At the present time whole information and communication technology industry contributes to the global carbon emission. With the aim of reducing the carbon footprint and the operating cost of wireless networks, overall energy reduction is required in the region of two to three orders of magnitude. Meanwhile, significant increase of the network spectrum efficiency is needed to cope with the exponentially increasing traffic loads. Due to this factors spatial modulation (SM) has recently established itself as promising transmission concept which belongs to single-radio frequency large scale multiple input multiple output (MIMO) wireless system. Spatial modulation MIMO takes advantage of whole antenna array at the transmitter, while using limited number of radio frequency chains. The multiple input multiple output multiplies capacity by transmitting different signals over multiple antennas and orthogonal frequency division multiplexing (OFDM), which divides a radio channel into many closely spaced sub channels to provide more reliable communication at high speeds. The system calculate the bit error rate (BER) for multicast multiple input multiple output system with the spatial modulation (SM) and study the effect of signal to noise ratio on bit error rate. MATLAB software is use to simulate system. The simulation results show that bit error rate decreases as signal to noise ratio increases. System reaches zero bit error rate for the value of signal to noise ratio greater than 18dB. System has provided less bit error rate for large signal to noise ratio which improves system performance.
PERFORMANCE ANALYSIS OF THE LINK-ADAPTIVE COOPERATIVE AMPLIFY-AND-FORWARD REL...IJCNCJournal
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that
employ adaptive M-ary quadrature amplitude modulation (M-QAM)/M-ary phase shift keying (M-PSK)
digital modulation techniques in Nakagami-m fading channel. In particular, we present and compared the
analysis of CAF relay networks with different cooperative diversity and opportunistic routing strategies
such as regular Maximal Ratio Combining (MRC), Selection Diversity Combining (SDC), Opportunistic
Relay Selection with Maximal Ratio Combining (ORS-MRC) and Opportunistic Relay Selection with
Selection Diversity Combining (ORS-SDC). We advocate a simple yet unified numerical approach based on
the marginal moment generating function (MGF) of the total received SNR to compute the average symbol
error rate (ASER), mean achievable spectral efficiency, and outage probability performance metrics.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
Performance evaluation of hierarchical clustering protocols with fuzzy C-means IJECEIAES
The longevity of the network and the lack of resources are the main problems within the WSN. Minimizing energy dissipation and optimizing the lifespan of the WSN network are real challenges in the design of WSN routing protocols. Load balanced clustering increases the reliability of the system and enhances coordination between different nodes within the network. WSN is one of the main technologies dedicated to the detection, sensing, and monitoring of physical phenomena of the environment. For illustration, detection, and measurement of vibration, pressure, temperature, and sound. The WSN can be integrated into many domains, like street parking systems, smart roads, and industrial. This paper examines the efficiency of our two proposed clustering algorithms: Fuzzy C-means based hierarchical routing approach for homogeneous WSN (F-LEACH) and fuzzy distributed energy efficient clustering algorithm (F-DEEC) through a detailed comparison of WSN performance parameters such as the instability and stability duration, lifetime of the network, number of cluster heads per round and the number of alive nodes. The fuzzy C-means based on hierarchical routing approach is based on fuzzy C-means and low-energy adaptive clustering hierarchy (LEACH) protocol. The fuzzy distributed energy efficient clustering algorithm is based on fuzzy C-means and design of a distributed energy efficient clustering (DEEC) protocol. The technical capability of each protocol is measured according to the studied parameters.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
Optimized link state routing (OLSR) is a routing protocol that has a small delay, low traffic control, support the application of denser networks, and adopts the concept of multipoint relays (MPR). The problem of OLSR is routing table updating which continually causes excessive packet delivery, and energy consumption becomes increased. This article proposes the improvement of OLSR performance using the min-max algorithm based on the quality of service (QoS) with considering the density of the node. The Min-max algorithm works in selecting MPR nodes based on the largest signal range. The QoS parameters analyzed with a different number of nodes are packet delivery ratio (PDR), throughput, delay, energy consumption, and topology control (TC). Simulation result of network simulator version 2 (NS-2) shows that OLSR performance using the min-max algorithm can increase PDR of 91.17%, packet loss of 60.77% and reduce topology control packet of 8.07%, energy consumption of 16.82% compared with standard OLSR.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
CL-SA-OFDM: cross-layer and smart antenna based OFDM system performance enha...IJECEIAES
The growing usage of wireless services is lacking in providing high-speed data communication in recent times. Hence, many of the modulation techniques are evolved to attain these communication needs. The recent researches have widely considered OFDM technology as the prominent modulation mechanism to fulfill the futuristic needs of wireless communication. The OFDM can bring effective usage of resources, bandwidth, and system performance enhancement in collaboration with the smart antenna and resource allocation mechanism (adaptive). However, the usage of adaptive beamforming with the OFDM leads to complication in the design of medium access layer and which causes a problem in adaptive resource allocation mechanism (ARAM). Hence, the proposed manuscript intends to design an OFDM system by considering different switched beam smart antenna (SBSA) along with the cross-layer adaptive resource allocation (CLARA) and hybrid adaptive array (HAA). In this, various smart antenna mechanism are considered to analyze the quality of service (QoS) and complexity reduction in the OFDM system. In this paper, various SA schemes are used as per the quality of service (QoS) requirement of the different users. The performance analysis is conducted by considering data traffic reduction, bit-rate reduction, and average delay.
Integrated approach for efficient power consumption and resource allocation i...IJECEIAES
The growing interest towards wireless communication advancement with smart devices has provided the desired throughput of wireless communication mechanisms. But, attaining high-speed data packets amenities is the biggest issue in different multimedia applications. Recently, OFDM has come up with the useful features for wireless communication however it faces interference issues at carrier level (intercarrier interferences). To resolve these interference issues in OFDM, various existing mechanisms were utilized cyclic prefix, but it leads to redundancy in transmitted data. Also, the transmission of this redundant data can take some more power and bandwidth. All these limitations factors can be removed from a parallel cancellation mechanism. The integration of parallel cancellation and Convolution Viterbi encoding and decoding in MIMOOFDMA will be an effective solution to have high data rate which also associations with the benefits of both the architectures of MIMO and OFDMA modulation approaches. This paper deals with this integrated mechanism for efficient resource allocation and power consumption. For performance analysis, MIMO-OFDMA system is analyzed with three different approaches likeMIMO-OFDM system without parallel cancellation (MIMO-OFDMA-WPC), MIMO-OFDMA System with parallel cancellation (MIMO-OFDMA-PC) and proposed IMO-OFDMA system with parallel cancellation and Convolution Viterbi encoding/decoding (pMIMO-OFDMAPC &CVed) for 4x4 transmitter and receiver. Through performance analysis, it is found that the proposed system achieved better resource allocation (bandwidth) with high data rate by minimized BER rate and achieved least power consumption with least BER.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
Ritu Parasher, Yogesh Rathi "A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Mobile ad-hoc network (MANET) is an autonomous wireless network, deploy without any fixed infrastructure and assistance of base stations. Each node in network shares wireless link for interconnections and not only operates as an end system, but also as a router to forward packets. Since the network nodes are mobile, can be move in any direction with varying paces that generate high dynamicity of network so the protocols that are developed for general ad hoc networks are unsuitable for such an environment. In addition, on-hand routing protocols performance decreases as size of network increased. In this context, to enhance the recitation of routing in MANETs, we propose a new approach in this paper, named Advanced Ad hoc On-Demand Distance Vector (A_AODV). It is a modified version of traditional AODV routing protocol, shrink the active path whenever optimal pathway is available and switches the traffic on it. Simulation studies are conducted using NS2 to prove that proposed approach enhance network performance when network size, load or the mobility increases
Optimized reduction approach of congestion in mobile ad hoc network based on...IJECEIAES
Over the past decades, computer networks have experienced an outbreak and with that came severe congestion problems. Congestion is a crucial determinant in the delivery of delay-sensitive applications (voice and video) and the quality of the network. in this paper, the Lagrangian optimization rate, delay, packet loss, and congestion approach (LORDPC) are presented. A congestion avoidance routing method for device-to-device (D2D) nodes in an ad hoc network that addresses the traffic intensity problem. The method of Lagrange multipliers is utilized for active route election to dodge heavy traffic links. To demonstrate the effectiveness of our proposed method, we applied extensive simulation that presents path discovery and selection. Results show that LORDPC decreases delay and traffic intensity while maintaining a high bitrate and low packet loss rate and it outperformed the ad hoc on-demand distance vector (AODV) protocol and the Lagrangian optimization rate, delay, and packet loss, approach (LORDP).
M-EPAR to Improve the Quality of the MANETsIJERA Editor
In MANET, power aware is important challenge issue to improve the communication energy efficiency at individual nodes. We propose modified efficient power aware routing (M-EPAR), a new power aware routing protocol that increases the network lifetime of MANET. Designing a power aware routing algorithm or technique is one of the most important point considered in Mobile Ad Hoc Networks. These nodes are driven by reactive protocols where broadcasting is mandatory to form a path between two nodes. So in case of death of the node resulting out of less battery calls for re-routing. Since many existing techniques focuses on energy aware routing this paper presents combination of energy aware routing merged with link quality determined by packet drop rate. The proposed scheme has outperformed the existing technique in terms of packet delivery ratio, throughput and energy consumption.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
A Review of Sensor Node in Wireless Sensor Networksijtsrd
Wireless Sensor Networks WSNs are collection of tiny sensor nodes capable of sensing, processing and broadcasting data correlated to some occurrence in the network area. The sensor nodes have severe limitation, such as bandwidth, short communication range, limited CPU processing facility, memory and energy. Enhancing the lifetime of wireless sensors network and efficient utilizations of bandwidth are essential for the proliferation of wireless sensor network in different applications. We provide an in depth study of applying wireless sensor networks WSNs to real world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet the requirements of biologists. Although researchers anticipate some challenges arising in real world deployments of WSNs, many problems can only be discovered through experience. We present a set of experiences from a four month long deployment on a remote island. We analyze the environmental and node health data to evaluate system performance. The close integration of WSNs with their environment provides environmental data at densities previously impossible. We show that the sensor data is also useful for predicting system operation and network failures. Based on over one million data readings, we analyze the node and network design and develop network reliability profiles and failure models. Jobanputra Paresh Ashokkumar | Prof. Arun Jhapate ""A Review of Sensor Node in Wireless Sensor Networks"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23620.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23620/a-review-of-sensor-node-in-wireless-sensor-networks/jobanputra-paresh-ashokkumar
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
Many intellectual property (IP) modules are present in contemporary system on chips (SoCs). This could provide an issue with interconnection among different IP modules, which would limit the system's ability to scale. Traditional bus-based SoC architectures have a connectivity bottleneck, and network on chip (NoC) has evolved as an embedded switching network to address this issue. The interconnections between various cores or IP modules on a chip have a significant impact on communication and chip performance in terms of power, area latency and throughput. Also, designing a reliable fault tolerant NoC became a significant concern. In fault tolerant NoC it becomes critical to identify faulty node and dynamically reroute the packets keeping minimum latency. This study provides an insight into a domain of NoC, with intention of understanding fault tolerant approach based on the XY routing algorithm for 4×4 mesh architecture. The fault tolerant NoC design is synthesized on field programmable gate array (FPGA).
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
With increasing adoption of multicarrier-based communications e.g. 3G and 4G, the users are significantly benefited with impressive data rate but at the cost of battery life of their mobile devices. We reviewed the existing techniques to find an open research gap in this regard. This paper presents a novel framework where an optimization is carried out with the objective function to maintain higher level of equilibrium between maximized data delivery and minimized transmit power. An analytical model considering multiple radio antennae in the mobile device is presented with constraint formulations of data quality and threshold power factor. The model outcome is evaluated with respect to amount of power being conserved as performance factor. The study was found to offer maximum energy conservation and the framework also suits well with existing communication system of mobile networks.
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
With increasing adoption of multicarrier-based communications e.g. 3G and 4G, the users are significantly benefited with impressive data rate but at the cost of battery life of their mobile devices. We reviewed the existing techniques to find an open research gap in this regard. This paper presents a novel framework where an optimization is carried out with the objective function to maintain higher level of equilibrium between maximized data delivery and minimized transmit power. An analytical model considering multiple radio antennae in the mobile device is presented with constraint formulations of data quality and threshold power factor. The model outcome is evaluated with respect to amount of power being conserved as performance factor. The study was found to offer maximum energy conservation and the framework also suits well with existing communication system of mobile networks.
Similar to Joker a novel opportunistic routing protocol (20)
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
An efficient tree based self-organizing protocol for internet of things.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy Neural Networks for Cloud Services
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Privacy preserving and delegated access control for cloud applicationsredpel dot com
Privacy preserving and delegated access control for cloud applications
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space time utility maximization model.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
Efficient multicast delivery for data redundancy minimization over wireless data centers
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
A tutorial on secure outsourcing of large scalecomputation for big data
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
A parallel patient treatment time prediction algorithm and its applications in hospital.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1691
the final destination. To the authors’ knowledge, the pre-
sented metric is the first routing metric from the related
literature including the fade margin value within its cal-
culations [9].
• Two different implementations of JOKER are presented.
The first one has been coded to work in a network simu-
lation environment, while the other has been developed to
work on real devices.
• A performance evaluation of JOKER in terms of QoE
(Quality of user Experience), QoS (Quality of Service),
and energy consumption is carried out. This study
includes results for several JOKER parameter character-
izations in order to analyze their impact on the energy
consumed by the wireless cards as well as the quality of
a highly demanding multimedia service such as video-
streaming. These outcomes are compared with those
attained by BATMAN.
The remainder of the paper is organized as follows. Section II
reviews the related literature, focusing on those recent works
presenting novel proposals regarding opportunistic routing
algorithms. A deep description of JOKER is included in
Section III. Section IV details the implementation of JOKER
and the test-benches employed to obtain the presented results.
These outcomes are showed in Section V, which presents a per-
formance comparison of JOKER against BATMAN supporting
video traffic. Finally, the conclusions are drawn in Section VI.
II. RELATED WORK
During the last years, several works proposing novel oppor-
tunistic protocols for ad-hoc networks have been presented.
Although most of them are based on the opportunistic-routing
foundations, different works introduced interesting proposals,
some of them even addressing QoS and/ or energy efficiency
issues (for a more extensive review, please refer to [6]).
Lin and Chen [10] presented two different spectrum-map-
empowered opportunistic routing protocols for regular and
large-scale cognitive-radio ad-hoc networks. In this work,
two different state-of-art network architectures are gathered
together: cognitive radio and opportunistic routing. Thus, after
obtaining a spectrum map indicating the available spectrum
within the geographic area, the proposed protocols make use of
a packet-delivery strategy based on network coding. Therefore,
the candidate coordination phase is avoided. In turn, the candi-
dates are chosen and ordered by using the end-to-end delay and
ETX (expected number of transmissions) metrics. Additionally,
for large-scale scenarios, geographical information is also con-
sidered for selecting the best forwarders towards the final
destination. The proposed protocols showed improved perfor-
mance (in terms of end-to-end delay) in comparison with other
opportunistic protocols such as MORE (MAC-independent
Opportunistic Routing & Encoding) [11] and a shortest-path
greedy algorithm.
Following a similar approach, authors of [12] developed a
routing protocol based on cognitive networking with oppor-
tunistic routing for wireless sensor networks. In this case, the
candidate set selection criterion is the distance between each
neighbor and the destination, enhanced with information about
the network density. In turn, instead of using network coding,
the RTS/CTS (Request to Send / Clear to Send) strategy is
adopted for the candidate coordination. The proposed protocol
was compared with a simple opportunistic spectrum access pro-
tocol and a geographic opportunistic routing protocol similar
to GeRaF (GEographicRandom Forwarding) [13], showing to
be the most efficient in terms of throughput, delay and energy
consumption in an indoor environment.
Other schemes using the network coding strategy are those
presented in [14]–[16]. In the case of [14], a multicast protocol
was proposed. Authors employed different strategies: i) LP-
based opportunistic routing structure, which defines the candi-
date set by taking into account the tradeoff between opportunis-
tic forwarding and the contention probability, ii) opportunistic
feeding, which permits different nodes to serve as coopera-
tive sources for feeding other multicast receivers, iii) fast batch
moving, by which the original source can quickly start send-
ing coded packets of the next batch, allowing the coexistence
of different batches in the network, and iv) inter-batch coding
that permits improving the overall throughput by using RLNC
(Random Linear Network Coding) coding operations instead
of the traditional XOR coding scheme. Results showed how
the proposed algorithm outperformed MORE [11] and Pacifier
[17] in terms of energy efficiency, throughput, and response
time. Likewise, works in [15], [16] proposed unicast and mul-
ticast algorithms, respectively, to improve the performance
of real-time video communication in wireless networks. Both
algorithms presented network-coding-based proposals aiming
at improving the bandwidth utilization and throughput of the
network. The provided results showed how the proposed pro-
tocols overcame the performance of other opportunistic routing
algorithms. However, the test-benches employed in both works
seem to be limited considering that just 1 simultaneous video
flow was streamed to evaluate static and pre-defined topolo-
gies composed of up to 7 nodes. Gathering the concepts of
network coding and content-based prioritization Seferoglu and
Markopoulou proposed a more complete approach to oppor-
tunistic video coding for video-streaming taking into account
the importance of video packets in network code selection
[18]. By improving the application-level throughput, their pro-
posal reaches higher levels of quality (in terms of PSNR (Peak
Signal-to-Noise Ratio)) than other routing protocols.
From a different perspective, Wu et al. studied the problem
of selfish behavior in multi-rate opportunistic networks, i.e., the
case in which one node could manipulate its input/output met-
rics to lead its neighbors to take routing decisions for benefiting
itself [19]. This fact could be especially harmful in the presence
of highly demanding services. In this work, authors introduced
a new opportunistic routing protocol that ensures the faithful-
ness of each node in the network, maximizing the end-to-end
throughput. By employing an incentive protocol, the presented
scheme maximizes each node’s payoff. Besides, the overall net-
work throughput is also improved with the presence of selfish
nodes.
Work in [20] addressed the impact of link correlation in the
candidate set selection. Thus, a link correlation aware metric
was proposed aiming at enhancing the performance of the rout-
ing tasks by selecting the nodes with low correlated links as
www.redpel.com +917620593389
www.redpel.com +917620593389
3. 1692 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
forwarder candidates. The performance of the proposed pro-
tocol was evaluated in a wireless sensor network, showing a
great efficiency against a correlation unaware protocol in terms
of energy consumption, number of transmissions and delivery
ratio. Taking into account spatial reusability, Meng et al. intro-
duced the concept of spatial reusability-aware (single path and
any path) routing in [21]. They not only investigate the two
approaches but also proposed an algorithm for node selection,
cost calculation, and forwarding list determination aiming to
maximize the end-to-end throughput in multi-hop 802.11 wire-
less networks. Their performance evaluation results evidence a
notable improvement compared to the SAF (Shortest Any-path
First) algorithm.
Regarding energy efficiency, work in [22] presented an
opportunistic routing protocol for minimizing the energy con-
sumption of the nodes composing a fixed wireless sensor
network. Focused on a multi-hop chain topology, the proposed
algorithm takes into account two key metrics to select the can-
didate set: the distance of the sensor nodes to the sink and the
residual energy of each node. The candidate-coordination phase
is carried out following an ACK strategy: each candidate suc-
cessfully receiving the data-packet replies an ACK to the sender
after a given period determined by its priority. This operation
is performed only if no other ACK from a higher-priority node
has been overheard. After the ACK reply is completed, the data-
packet is forwarded. The proposed protocol was tested in both
simulation and realistic test-benches, showing better perfor-
mance, in terms of energy consumption, than GeRaF [13] and a
MTE (Minimum Transmission Energy) protocol. Work in [23]
also focuses on improving energy efficiency but from a different
perspective, by using the ant colony gossiping and geographic
forwarding. Results showed that their proposal increases the
wireless sensor network lifetime and maintains strict packet
delay needs, too.
Finally, from a QoS perspective, work in [24] proposed to
exploit GOR (Geographic Opportunistic Routing) for multi-
constrained QoS provisioning in wireless sensor networks.
Thus, reliability and end-to-end delay QoS constraints were
considered. To this end, the proposed scheme makes use of both
the packet reception ratio and the distance progress towards the
final destination provided by each one-hop neighbor as met-
rics to configure the candidate set. The candidate coordination
is performed by employing a similar ACK strategy like that
followed in [22]. Results showed a great performance of the
proposed protocol in terms of end-to-end delay, communica-
tion cost, and delivery ratio, which are greatly valued metrics in
scenarios with strict QoS requirements.
Although the discussed works propose a wide range of per-
formance improvements to different-nature services, there is
still a lack regarding the trade-off between multimedia-service
QoE and power consumption in ad-hoc networks. Additionally,
most of the proposed opportunistic routing protocols need to
make deep modifications to the wireless card protocol stack
by modifying or replacing the MAC layer protocol (e.g.,
802.11). Thus, the algorithm proposed in this work tries to
cover these gaps by i) improving the QoE of streaming ser-
vices while reducing the energy consumed in routing tasks, and
ii) being a ready-to-use piece of software compatible with other
layers’ protocols and without needing the modification of the
off-the-shelf implementations of these protocols.
III. JOKER
JOKER (auto-adJustable Opportunistic acKnowledgment/
timEr-based Routing) is an opportunistic routing protocol that
takes some of its features from the architecture of the BATMAN
ad-hoc routing protocol (for a deeper explanation of BATMAN,
please refer to [5], [25]). JOKER is a proactive algorithm,
designed to be as simple as possible to be suitable to work in a
variety of devices with computational or energetic constraints,
e.g., IEEE 802.11 mobile devices. Several JOKER’s configura-
tion parameters are adjustable so that JOKER is highly adaptive
to different network conditions. In the following, the structure
and the operational insights of JOKER are presented.
A. Main Characteristics
JOKER works between the link and the network layers of
the OSI protocol stack. All the regular traffic in a node, as well
as its self-generated control messages, are (de-)encapsulated,
processed, and forwarded by JOKER. Thus, any protocol on
higher layers (IPv4, IPv6, UDP, TCP, etc.) can run over JOKER
without any modification. Additionally, as the node-addressing
regarding routing tasks is based on MAC-addresses, there is
no need for a network-layer addressing management system,
e.g., IP, which simplifies the network setting-up operations. On
the other hand, the link protocol also remains unmodified; so
that, the original IEEE 802.11 protocol (or any other) can be
used just by setting the network card to promiscuous mode, as
JOKER is in charge of handling all the received packets (or
frames).
All the traffic, except for the routing control messages that
have their own format as discussed below, is encapsulated with
the JOKER header (please, see Fig. 1). The header includes the
following fields: a packet type that informs about the nature of
the encapsulated packet (as explained later, three types of pack-
ets have been defined: unicast, ACK, or Forwarding packet);
the packet TTL (Time To Live), defined as the number of hops
that it is permitted to travel before being discarded (this value is
initially set to the usual figure of 32); a packet-id, which is a 4-
byte code that uniquely identifies each packet and it is obtained
by calculating the CRC-32 of the payload; the final destination
address, i.e., the MAC address of the packet’s final receiver;
and the candidate x address, which is the MAC address of each
potential candidate to forward the packet, and in total there
are Ncandidates candidates (which is a protocol configuration
parameter).
This header is placed between those corresponding to the
network and the link layers, adding 12 + 6 · (Ncandidates − 1)
bytes of extra overhead. Note that the address of the candi-
date with the highest priority is not placed here but in the
MAC header. This fact will be deeply discussed in the next
sub-section. Also observe that, with the information included in
the JOKER header, it is not necessary to pass the packet up to
higher layers for routing or forwarding purposes. Furthermore,
the inclusion of the packet’s final destination address in the
www.redpel.com +917620593389
www.redpel.com +917620593389
4. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1693
Fig. 1. JOKER header.
header allows the final receiver to accept and process lucky long
transmissions (i.e., when a transmission is overheard by the
final destination, although it should be handled by a prior hop).
This situation, which will be discussed in next sections, reduces
the transmission delay and avoids discarding valid packets in
the receiving extreme of the communication.
B. Candidate Selection
As stated previously, JOKER takes inherited from BATMAN
the way nodes interact with each-other regarding routing oper-
ations. Hence, the concept of transmitting a tiny packet (called
OGM (OriGinator Message) in BATMAN) as the unique con-
trol packet employed is kept. By means of the reception and
selective broadcasting of these messages, nodes are able to
discover other nodes composing the network and establish-
ing routes towards them. The original BATMAN metric made
use of the number of OGM messages received from a given
node via each link-local neighbor to estimate the quality of a
route. In order to be able to find the best route to a particu-
lar end node, BATMAN counted the OGM messages received
from each node in the network and logged which link-local
neighbor relayed the greatest amount of messages. Currently,
BATMAN’s metric (Transmission Quality, TQ) has incorpo-
rated additional parameters regarding the asymmetry of the
links and the number of hops in the routes towards the desti-
nation to obtain a more accurate assessment of the end-to-end
path quality (please see (1)).
TQ = TQlocal · TQrecv · fasym · hop_penalty (1)
TQlocal is the transmission quality locally calculated towards
a direct neighbor to reach the final destination, TQrecv is the
transmission quality computed by the direct neighbor towards
the final destination, fasym is an asymmetric links penalization,
and hop_penalty is a penalization for longer paths.
Previous works have demonstrated that BATMAN performs
better than other ad-hoc routing protocols supporting real-time
communications [8], [26]. So that, the metric that JOKER
employs to select and sort the candidate set is based on the
BATMAN’s metric but including a fine tuning. This adjust-
ment regards the distance between nodes, penalizing the nearest
neighbors against the most distant ones. The aim of this tuning
is achieving a greater distance progress to the final destination
in each hop, as the geographic routing protocols propose [13],
[27]. Thus, the link quality (LQ) that a node assigns to a given
direct-link to reach a distant node is calculated as showed in (2),
LQ = TQ ·
TQmax − Distance_penalty
TQmax
(2)
TABLE I
Distance_ penalty MAPPING
where TQ is the transmission quality calculated following the
BATMAN algorithm (please, see (1)), TQmax is the maximum
value for the TQ (255 by default), and the Distance_penalty
factor is calculated based on the distance between the nodes,
in other words, the progress that the neighbor provides towards
the final destination. This value is estimated by assessing the
fade margin (FM) of the packets received from the correspond-
ing neighbor. The FM is defined as the difference between the
power of the received signal and the sensitivity of the wireless
card. Many routing protocols that make use of the link-strength
as unique metric, select the best neighbors trying to maximize
this value. These approaches tend to choose the nearest neigh-
bors, which has the drawback of calculating routes formed by
many short links. Adding more hops to the path causes addi-
tional transmissions, with its corresponding possible collisions,
and adds more delay to the communication. For those reasons,
the Distance_penalty factor rewards the longest links against
the shortest ones. Progress regions (Table I) have been defined
according to different wireless card manufactures [28], [29].
Three different regions have been established: high progress
(low level of received power, FM < 10 dB), medium progress
(medium level of received power, 10 dB ≤ FM ≤ 20 dB), and
low progress (high level of received power, FM > 20 dB), with
associated Distance_penalty values of 1, 3, and 5, respec-
tively. Observe that the tuning introduced by this factor is so
mild that it does not have enough weight in the LQ calculation
to modify very much the value of TQ. Thus, what it is achieved
with this tuning is selecting the most distant nodes among
the best qualified candidates; therefore, JOKER multi-metric
keeps the reliability of BATMAN’s metric but also incorpo-
rates a beneficial factor rewarding those nodes that provide
a greater progress to the end extreme of the communication
without injecting additional control-packets in the network or
making use of GPS information. As mentioned previously,
each node generates and broadcasts at a certain pace a sim-
ple packet to make the other nodes in the network know about
its existence. Although the control messages sending interval
(CMSI) is usually fixed in almost all the ad-hoc routing proto-
cols, as demonstrated in previous works [8], [30], the adaptation
of this period to the actual network conditions is crucial for
the good performance of the routing protocol; thus, this also
has a noticeable impact on the quality level of the service
flowing through the network. Thereby, JOKER incorporates a
dynamic adjustment of the routing control-messages broadcast-
ing time-interval. This period depends on the throughput that is
momentarily crossing each node; thus, nodes locally calculate
its own CMSI following (3),
C MSI = 0.006 · TP + 1.5 (3)
where TP is the throughput crossing the node in kbps.
The validity of this dynamic tuning of the CMSI was
www.redpel.com +917620593389
www.redpel.com +917620593389
5. 1694 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
demonstrated in [31], showing to be especially beneficial for
networks loaded with heavy traffic such as those supporting
multimedia transmissions. Observe that the candidate selec-
tion is finally computed from a cross-layer perspective. The
LQ value gathers network-layer metrics (end-to-end link reli-
ability), link-layer metrics (link symmetry taken into account
in the BATMAN’s original metric), and physical-layer met-
rics (distance between nodes). Additionally, the dynamic CMSI
regards the application layer by adjusting the broadcasting of
control traffic to the throughput generated by top-layer ser-
vices. According to this multi-layer metric, JOKER selects the
best Ncandidates as potential forwarders for a packet destined
to a given node. As mentioned above, Ncandidates is a protocol
parameter and its impact on the performance of JOKER will be
evaluated in following sections.
Finally, to avoid size-overspending in the JOKER header
and to permit a wide compatibility with lower layer proto-
cols the first candidate’s address is not included in the JOKER
header but is passed down to the link layer as an input param-
eter, letting this layer to include this address in its header’s
most appropriate field. This also permits JOKER to work as
a traditional ad-hoc routing algorithm, making use of just one
candidate that will perform as the unique potential next hop in
the path towards the final destination.
C. Candidate Coordination
In JOKER, two different candidate coordination schemes,
namely ACK-based or timer-based, can be employed depending
on the requirements of the service flowing through the network.
For applications that do not have stringent delay-constraints and
with some reliability needs, the ACK-based candidate coordi-
nation methodology has been designed. Following this scheme,
when the candidates receive the packet to forward, they extract
its packet-id and return an ACK message with this identifier to
the packet transmitter (Fig. 2(a)). ACK messages are sent as
unicast packets without any candidates in the JOKER header in
order to i) reduce its size and ii) avoid control packet storms.
To reduce the delay in this process, there is not any priority rule
for the order in which the candidates send their ACK messages,
i.e., there is no distinction among candidates: once the packet is
received, the ACK message is generated and sent. In turn, the
packet transmitter answers with a Forwarding message packet
(again, without candidates in the JOKER header) to the sender
of the first received ACK. Therefore, this coordination scheme
first makes use of the established candidate priorities computed
by the candidate selection algorithm, and finally, it relies on the
current state of the links between transmitter and candidates.
In other words, the best candidate among all the best poten-
tial candidates is selected in the forwarding-operation moment.
Once the Forwarding message is received by the chosen candi-
date, it automatically forwards the data packet. As mentioned
in the previous section, this methodology adds more control
traffic and delay to the transmission; nevertheless, the number
of duplicated packets is reduced to 0, and the election of the
forwarder is made based on the freshest information about the
status of the relaying nodes and the links between them and the
transmitter.
Fig. 2. Communication diagram of both candidate coordination schemes.
In order to provide a control-message-free candidate
coordination methodology that meets the requirements of
heavy-traffic applications with low tolerance to delay, e.g.,
multimedia-content distribution, a timer-based coordination has
been developed. By using this coordination scheme, when
a candidate receives a packet, it waits a period of twait ×
(priority − 1) ms before forwarding the packet; thus, the
highest priority candidate automatically forwards the packet
once it is fully received and the rest of candidates listen to
the medium before its forwarding timer is expired aiming at
determining whether the packet has been forwarded by other
candidates or not (Fig. 2(b)). The packet is only forwarded if
no other previous packet-relaying is heard. As explained above
the waiting timer can be tuned depending on the network and
applications characteristics. This methodology does not inject
any control packet into the network and reduces the extra delay
of the ACK-based methodology. However, if a lower priority
candidate does not hear the transmission of a higher priority
candidate, duplicated packets can appear. The other drawback
of this scheme is the extra delay added to the communication as
the priority of the actual packet forwarded decreases.
D. Theoretical Analysis
Aiming at exploring the impact of the new JOKER’s features
in comparison with BATMAN, in this sub-section a theoreti-
cal analysis is presented. First, the advantages provided by the
opportunistic paradigm adopted by JOKER will be discussed
by considering the communication between the transmitter
(TX) and the receiver (RX) in the network illustrated in Fig. 3;
this figure also presents the delivery probability of each link.
Based on these probabilities, BATMAN would compute the
following path TX → node 2 → RX to establish the commu-
nication between the end nodes. Therefore, 3.5 transmissions
would be needed on average to reach the RX node from the TX
node: 1/0.4 = 2.5 tries to transmit a packet from TX to node 2,
and an additional transmission to reach RX from the forwarder.
This way of calculating routes is inefficient as explained below:
1) By employing JOKER, configured to consider the three
intermediate nodes (1, 2, and 3) as candidates to reach the
RX from the TX, a “virtual link” would be generated with
a delivery ratio of 0.73, (1 − (1 − 0.4)(1 − 0.33)(1 −
0.33) ≈ 0.73); thus, only 2.37 transmissions would be
necessary on average to communicate both end points
(RX and TX): 1/0.73 ≈ 1.37 tries to transmit a packet
www.redpel.com +917620593389
www.redpel.com +917620593389
6. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1695
Fig. 3. Example network.
from TX node to the candidates, and another transmission
to reach the final destination.
2) 1 out of 5 packets directly reaches the RX node (1/0.2 =
5). As stated previously, this phenomenon is known as
lucky long transmission. BATMAN does not take advan-
tage of it, so these valid packets would be discarded in
the RX node, which also has to wait for the interme-
diate node 2 to forward the packet. Besides the wrong
decision of dropping a valid packet, the communication
would also suffer a longer delay due to the processing
time added by the forwarding node. By using JOKER,
the receiver would take this packet as valid improving the
communication performance.
3) In case of a link drop, due to link failures or nodes motion,
BATMAN has to recalculate the route after noticing these
troubles, which consumes extra time, adding more delay
to the communication. By employing JOKER, at least one
backup node would be ready to automatically forward the
packet if the primary forwarder fails.
In the following, the impact of the dynamic CMSI on the
number of control packets in the network is explored. For this
analysis, a 2-dimensional bidirectional Manhattan network is
considered [32]. This symmetric network is defined by its size
parameter (number of nodes in a row/column) n, hence having
a total number of nodes of N = n2. Assuming a uniform suc-
cessful transmission probability for every link in the network,
p, the number of control packets that each node broadcasts each
CMSI, CP, can be modeled as (4) indicates (please, see [33]).
neven : CPeven =1+
n
2 −1
d=1
4dpd
+(2n−2)p
n
2 +
n−1
n
2 +1
4(n−d)pd
+ p
nodd : CPodd = 1 +
n−1
2
d=1
4dpd
+
n−1
n+1
2
4(n − d)pd
(4)
Disregarding the even or odd nature of n, and considering the
default BATMAN’s CMSI (1 s) the number of control packets
per second in the whole network (overhead), O, is calculated
by (5),
OB AT M AN :
CP · N
C MSI
=
CP · N
1
= CP · N
OJ OK E R :
CP · N
C MSI
=
CP · N
0.006 · TP + 1.5
(5)
Fig. 4. Comparison of the overhead introduced by BATMAN and JOKER.
where TP is the average throughput crossing the nodes. Thus,
Fig. 4 presents a comparison of the overhead introduced by
JOKER and BATMAN in a worst case scenario with an ideal
probability of successful transmission for every link in the net-
work, i.e., p = 1. Notice that reducing this probability would
decrease the absolute number of control packets in the network,
but the comparative behavior between JOKER and BATMAN
remains the same. Observe the uncontrolled increase in the
number of control packets attained by BATMAN, whereas
JOKER presents a more controlled flooding scheme, especially
with high load in the network. In the less advantageous scenario
for JOKER, in which the average throughput crossing the nodes
is 0 kbps (no traffic in the network), the CMSI is 1.5 s. This
enlargement of the minimum CMSI (recall that BATMAN’s
default interval is 1 s) means, at least, a 33% reduction in the
number of control packets in the network.
IV. DEVELOPMENT DETAILS & TEST-BENCH
DESCRIPTION
JOKER has been coded to work in both simulation and
experimental test-benches. A JOKER version in a C++ imple-
mentation has been developed to be integrated in the InetManet
Framework v.2.2 of the Omnet++ v.4.4.1 network simulator
[34]; meanwhile, the JOKER version developed to work on real
devices was coded in C, and has been tested in Ubuntu 12.04
(Linux Kernel 3.2.0) real computers.
JOKER’s input parameters that can be tuned are: i) the
number of potential candidates considered when transmitting
a packet (Ncandidates), ii) the candidate coordination scheme
(ACK-based or timer-based), iii) the aforementioned waiting
timer employed in the timer-based coordination (twait ), and
iv) the number of retransmissions that a node attempts if a
packet is not received by the next hop.
A. Simulation Test-Bench
The simulated scenario in Omnet++ to evaluate the perfor-
mance of JOKER against BATMAN was an IEEE 802.11g
www.redpel.com +917620593389
www.redpel.com +917620593389
7. 1696 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
wireless ad-hoc network at 54 Mbps. The network was com-
posed by 25 nodes with both static and dynamic mobility con-
figurations. The nodes were randomly spread in a square area of
500 m × 500 m, thus having a node density of 100 nodes/km2
.
Aiming at evaluating different-topology scenarios, 10 indepen-
dent simulation instances with different seeds have been run for
every protocol and scenario characterization. Hence, in order
to generate the results, the average value for every measured
parameter was taken, avoiding non-representative singularities.
The 95% confidence intervals for every measurement have been
also calculated. Each simulation-run lasted 75 s.
The traffic pattern employed was generated by the InetManet
Framework’s UDPVideoServer2, which emulates the transmis-
sion of a video flow from a video server to an end-user, i.e.,
emulating a video-streaming application. In this case, a realistic
30 s video-trace (available in [35]) has been employed, corre-
sponding to a video encoded at 30 frames per second (fps) with
the H.264/SVC single layer VBR (Variable Bit Rate) codec.
As the considered devices are cell-phones, the video frame size
was 176 × 144 px (QCIF format), the GoP (Group of Pictures)
16, and the number of B frames between I and P frames is 1
(G16B1). The encoding system generated VBR frames with an
average size of 485.5 Bytes, transmitting them at 118 kbps.
With this video coding configuration, it was intended to sim-
ulate a handset-oriented video-streaming application. As the
802.11 MAC layer’s MTU (Maximum Transmission Unit) was
set to its default value (2304 Bytes), it was not necessary to
fragment each video frame into different packets. The starting
time for each multimedia communication was generated ran-
domly according to a Poisson distribution in a time interval of
(0, 10 s), after the convergence time for each routing protocol.
Aiming to obtain the most realistic results, the PHY layer
has been simulated by means of the Nakagami-m propagation
model (m factor has been set to 5), considering the effect of
fading in the wireless transmissions. Results have been also
collected when characterizing the physical layer with the Free
Space propagation model. Network performance has been eval-
uated in both static and dynamic conditions. Focusing on the
nodes movement, it imitates the motion of a pedestrian, fol-
lowing a Random Way Point mobility pattern with a speed
characterized by a Gaussian distribution with a mean value of
1.34 m/s and a standard deviation of 0.26 m/s. The stop period
was set to a uniform value between 2 s and 5 s [36].
Regarding the node’s hardware configuration, the normal
operation of a mobile handset has been simulated. Thus, each
node’s wireless card has been configured following the real
parameters of the widely used Broadcom’s BCM4330 IEEE
802.11 a/b/g/n chip [37]. This chipset has been installed in dif-
ferent brand’s cell-phones and tablets, namely, iPhone 4s, iPad
3, Samsung Galaxy S 2, or Samsung Galaxy Tab 2, among
others. Thereby, the transmission power was set to 20 mW
(13 dBm), with sensitivity at 54 Mbps of −74 dBm and a SNIR
(Signal to Interference and Noise Ratio) threshold of 4 dB.
The employed energy-consumption model is based on that pro-
posed by Feeney et al. [38]. This model registers the wireless
card’s state (transmit, receive, idle, or sleep), calculating the
momentarily consumption according to the current state and
the card’s consumption associated to this state. In this case, the
TABLE II
WIRELESS CARD ENERGY CONSUMPTION(EXTRACTED FROM [37])
TABLE III
EMULAB NODES CHARACTERISTICS
energy-consumption values presented in the BCM4330 chip’s
data-sheet [37] have been employed to characterize the sim-
ulated wireless card (please, see Table II). It was assumed
that the battery’s output voltage is 3.6 V. All the parameters
and configurations of the link and network layers’ protocols,
namely, IEEE 802.11 MAC and IP, respectively, have been set
to their default values. As mentioned above, JOKER does not
need any modification in other layers’ protocols for its proper
functioning.
B. Experimental Test-Bench
The evaluated scenario for the real implementation was sim-
ilar to that showed in Fig. 3 (please, note that the link reliability
values showed in that picture are only for the theoretical exem-
plification presented in previous sections and do not correspond
to the actual delivery probabilities of the employed test-bench).
This scenario was deployed by using the Emulab platform
[39]. This network test-bench provides both wired and wireless
nodes with high level of software customization. The Emulab
nodes’ characteristics are showed in Table III. In order to ensure
that the TX node was not able to reach the RX node directly
but by employing one of the relays (please, see Fig. 3), the
wireless cards transmission power was set to 1 mW, since
this is the minimum power value supported by the card [40].
The IEEE 802.11 channel 10, which was free of other trans-
missions during the experiment measurements, was employed,
thus avoiding undesired interferences and collisions. The test
traffic used in the Emulab test-bench was generated by the
Distributed-Internet Traffic Generator v2.8.1 [41], which allows
sending video traffic by generating bursty traffic characterized
by a given distribution and bit-rate. The video packets were
fixed to 512 Bytes and the average throughput was set to 150
kbps. Three independent and consecutive 60 s transmissions
were established between TX node and RX node. 5 indepen-
dent tests were performed in order to avoid non-representative
results, calculating the 95% confidence intervals for every mea-
surement, too. These values are not shown due to their low
significance. Finally, aiming at emulating disconnection issues,
the relay’s network cards (node 1, node 2, and node 3) have
www.redpel.com +917620593389
www.redpel.com +917620593389
8. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1697
Fig. 5. Comparison of QoE (MOS) and energy consumption for a time-period of 75 s attained by JOKER-ACK for a variable number of simultaneous video
streams and different number of opportunistic candidates. Results attained in static ((a) and (b)) and dynamic ((c) and (d)) conditions by considering the Free
Space ((a) and (c)) and Nakagami-m ((b) and (d)) propagations models.
been randomly switched off during 5 second-periods during the
transmission between the TX node and RX node. The beginning
time from each disconnection event was scheduled following a
uniform distribution from 30 s to 60 s.
C. Performance Metrics
Common to both test-benches, QoE and QoS metrics have
been employed to evaluate the performance of the routing pro-
tocols. Video QoE has been measured in terms of MOS (Mean
Opinion Score) following the model presented in [42] and the
corrections to this model introduced in [43]. This model allows
obtaining accurate video-MOS estimations by considering the
PLR (Packet Loss Ratio), the coding scheme (k), the resolution
(a) and the video-coding bit-rate (Br) as shown in (6).
Vq = 1 + 4k
⎛
⎜
⎝1 −
1
1 + a·Br
v1
v2
⎞
⎟
⎠ e
− PL R
v3 (6)
Besides, v1, v2, and v3, are experimental factors that depend
on the coding scheme, the resolution applied, and the motion
characteristics of the video. We have used the H.264 codec for
the video-streaming transmission in QCIF format, so the val-
ues assigned to these factors were: k = 1.12, a = 10.8, v1 =
0.366, v2 = 1.32, and v3 = 3.5, consistent with the figures rec-
ommended by the model’s authors [42], [43]. From the QoS
perspective, the metrics considered to accurately assess the net-
work performance have been: number of hops between video
server and video client, PDR (Packet Delivery Ratio), through-
put, and PLR. The energy consumed by the wireless card in
routing tasks has been taken into consideration, too.
V. RESULTS
In this section, the performance of JOKER supporting video-
streaming traffic is explored. Different subsections showing the
response of JOKER when varying its tunable parameters are
presented. All these outcomes are compared with those attained
by BATMAN. Results for this complete evaluation have been
extracted from the simulator due to its easiness for tuning
the environmental and network conditions. At the end of this
section, additional outcomes extracted from the realistic test-
bench are also exhibited aiming at showing the functionality of
the JOKER implementation for real machines.
A. Protocol Adjustment
Fig. 5 shows the average QoE (MOS) and the average
wireless card’s energy consumption for a variable number of
simultaneous video streams transmitted through the network
managed by JOKER with the ACK coordination (in the follow-
ing JOKER-ACK). Results have been extracted from different
scenario configurations, namely, static and dynamic, character-
izing the wireless transmission channel with the Free Space
and Nakagami-m (m = 5) propagation models. It is clear that
the best results in terms of both metrics under consideration
www.redpel.com +917620593389
www.redpel.com +917620593389
9. 1698 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
Fig. 6. Comparison of QoE (MOS) and energy consumption for a time-period of 75 s attained by JOKER-timer for a variable number of simultaneous video
streams and different number of opportunistic candidates. Results attained in static ((a) and (b)) and dynamic ((c) and (d)) conditions by considering the Free
Space ((a) and (c)) and Nakagami-m ((b) and (d)) propagations models.
(QoE and power consumption) are obtained when considering
just 2 opportunistic candidates, no matter the scenario condi-
tions. This fact has sense considering that the ACK coordination
injects more packets in the network. Therefore, when more can-
didates are involved in the routing activities, more ACK packets
are transmitted, which increases i) the probability of collision
and ii) the channel-accessing waiting-time, hence, harming the
video-streaming service. Regarding the impact of the trans-
mission channel conditions, observe that there is an overall
decrease on the attained QoE in hostile scenarios (Nakagami-m
conditions, Fig. 5(b) and Fig. 5(d)) compared to that obtained
in Free Space situations (Fig. 5(a) and Fig. 5(c)). This can be
attributed to the impact of the fading channels on the transmit-
ted packets. The channel variations increase the BER (Bit Error
Rate), generating more corrupted packets and more retrans-
missions are necessary, provoking additional collisions and
increasing the PLR. Focusing on nodes’ motion conditions, no
significant decrease in the attained QoE (MOS) is noticeable,
but there is a logical increase on the battery drained by the
nodes (please, compare Fig. 5(a) and Fig. 5(b) against Fig. 5(c)
and Fig. 5(d)). Due to the continuous changes in the routes
between transmitters and receivers, the routing tasks become
more intense and hence the energy draining too.
Regarding the timer-based candidate coordination method
(in the following JOKER-timer), Fig. 6 presents a similar com-
parison to that discussed above for the case of JOKER-ACK.
Note that in these experiments the waiting timer (twait ) has
been fixed to 50 ms. Unlike the JOKER-ACK case, now there
is not an evident superiority of a specific number of candi-
dates. Although it is clear that the worst results are obtained
when 4 candidates are considered, the highest quality levels
are attained when employing 2 or 3 candidates depending on
the scenario under study. Under heavy traffic conditions, i.e.,
with 5 simultaneous video streams, the best results are obtained
with the lowest number of candidates, 2. In turn, when just
1 video connection is established, the greatest levels of QoE
(MOS) are obtained when considering 3 candidates as potential
forwarders. This behavior is explained as follows: as the num-
ber of candidates grows, the probability that one of them was
not able to overhear the highest priority candidate also rises;
consequently, more duplicated transmissions happen, harming
the overall performance of the network.
Focusing on the impact of the wireless transmission channel
conditions, in this case the protocol seems to be more robust
than in the JOKER-ACK case. This can be explained by the
lack of control-packets exchange in JOKER-timer. Whereas
the effect of fading channels can affect JOKER-ACK’s control
messages, in the case of JOKER-timer, once the data packet is
correctly received by any of the candidates, it will be certainly
forwarded after a given time-interval (depending on the can-
didate priority). This forwarding operation is done without the
need of waiting for a confirmation message, which is also prone
to be affected by the channel conditions.
Comparing the performance of both candidate coordina-
tion methodologies, observe the overall improvement of QoE
of JOKER-timer (Fig. 6) against JOKER-ACK (Fig. 5). The
www.redpel.com +917620593389
www.redpel.com +917620593389
10. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1699
TABLE IV
QOE (MOS) FOR A VARIABLE NUMBER OF VIDEO-STREAMS. RESULTS
FOR JOKER-TIMER CONFIGURED WITH DIFFERENT twait VALUES
simplicity of the former adapts better to the needs of the
service under consideration. Video-streaming services require
quick routing operations, capable of delivering the video pack-
ets as soon as possible to the end-extreme of the communi-
cation. Although JOKER-ACK ensures the hop-by-hop data
transmission and no duplicated packets at the receiver, the intro-
duced overhead harms the real-time communication in terms
of extra delay and higher collision probability. Besides, the
energy consumed by JOKER-timer is also lower than that
drained by JOKER-ACK (please compare Fig. 5 and Fig. 6).
This is because of the lack of control messages exchange
in JOKER-timer that permits the wireless cards working in
low-consumption mode for longer time than in the case of
JOKER-ACK.
Another important configurable parameter in JOKER-timer
is the time that one candidate overhears the channel before for-
warding a packet (waiting timer, twait ). An excessively short
waiting timer could cause the multiple forwarding of the same
data packet, reducing the network efficiency. In turn, assign-
ing longer values to this parameter introduces extra delay in
the case that the candidate with the highest priority fails to
forward the packet. Thus, Table IV depicts the reached QoE
(MOS) when tuning the twait parameter for a variable number
of simultaneous video streams in the system. The number of
considered candidates was set to 2 and the considered envi-
ronment is that characterized by the realistic Nakagami-m
propagation model. Observe how the best results in terms of
QoE (MOS) are achieved by setting the waiting timer to 50 ms.
This figure is a usual timer employed to configure timer-based
candidate coordination schemes [44]. For that reason, hereafter
the waiting timer is fixed to this value.
B. JOKER vs. BATMAN
In the following, an exhaustive comparison between JOKER
and BATMAN is provided. To this end, the number of potential
opportunistic candidates has been fixed to 2 and the JOKER-
timer’s twait interval has been set to 50 ms. In turn, BATMAN’s
configuration parameters have been set to their recommended
values [5]. Thus, Fig. 7 presents a comparison of the QoE and
power consumption obtained for BATMAN, JOKER-ACK, and
JOKER-timer. Observe the superior quality values reached by
JOKER, especially JOKER-timer, in comparison with those
achieved by BATMAN. Focusing on the latter, it is interest-
ing how the network performance (in terms of QoE) decreases
when the traffic load increases (from 1 to 5 simultaneous video
streams). This behavior is similar in the case of JOKER-ACK.
In turn, JOKER-timer shows a greater strength supporting
high traffic load. Note that QoE (MOS) sometimes increases
with increasing load. These outcomes are obtained because
for every simulation-run, different seeds for initializing the
random variables, e.g., initial node positions, were employed.
Depending on the TX and RX positions, the QoE of the video-
streaming service could vary. Furthermore, please notice that
this MOS increase only happens in the case of JOKER-timer.
This exposes the great capability of this version of the proto-
col to adapt itself to support increasing traffic in the network.
Regarding the impact of motion and the wireless channel hos-
tility, observe how JOKER-timer seems to be less affected
by these environmental difficulties compared with BATMAN
and JOKER-ACK (observe the different scenario conditions in
Fig. 7). It is highly remarkable that, using JOKER-timer, the
QoE (MOS) level always remains over the notable value of 3,
which is a recommended value by the ITU-T for ensuring an
acceptable QoE for the end-users.
Focusing on the energy consumed by the wireless cards,
again JOKER-timer overcomes the other options. Even in some
scenarios, JOKER-ACK also presents lower battery consump-
tion than BATMAN. The reasons for this improvement in the
protocol energy efficiency are manifold. First, an important
factor for decreasing the power consumption is the reduction
of the control-packets broadcasts. By means of the dynamic
CMSI, the pace at which the routing-packets are broadcasted
is severely reduced, so that the wireless card can be in sleep
mode for longer periods, permitting energy saving. Another
key point for the showed reduction of battery draining is the
new metric employed by JOKER for selecting the candidate set,
which benefits from the nodes farther away from the transmitter.
By using the Distance_penalty factor, the distance progress
towards the final destination is increased at each hop, so the
routes calculated by JOKER tend to be shorter than those cal-
culated by BATMAN. Table V presents the average number
of hops composing the path from the transmitter to the final
receiver calculated by both BATMAN and JOKER. First, notice
that the routes calculated by JOKER-ACK and JOKER-timer
have almost the same length. This outcome makes sense as the
candidate selection algorithm is not related with the coordina-
tion phase. Thus, observe how the routes calculated by JOKER
are always shorter than those computed by BATMAN. Besides
the new metric employed by JOKER that improves the distance
progress in each hop, note that JOKER allows the final desti-
nation to take advantage of lucky long transmissions, hence,
reducing the number of hops. One interesting result is that,
despite the extra-difficulties added by node motion, the routes
calculated in dynamic scenarios are sometimes shorter than
those computed in the static ones. This behavior is attributed
to the good performance of both protocols; with nodes motion,
new opportunities for calculating more efficient routes than in
the static case arise.
Another important factor for the network scalability and
the node’s energy efficiency is the number of retransmissions
needed to deliver a packet from the transmitter to the final
receiver. The ideal routing protocol would be that one able to
successfully deliver a packet to its destination with the low-
est number of transmissions. Thereby, Fig. 8 depicts the PDR
of BATMAN, JOKER-ACK, and JOKER-timer in a static sce-
nario when tuning the IEEE 802.11 retry limit. Note that for
the previous experiments, this value was fixed to the standard
www.redpel.com +917620593389
www.redpel.com +917620593389
11. 1700 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
Fig. 7. Comparison of QoE (MOS) and energy consumption for a time-period of 75 s attained by BATMAN, JOKER-ACK, and JOKER-timer for a variable
number of simultaneous video streams. Results attained in static ((a) and (b)) and dynamic ((c) and (d)) conditions by considering the Free Space ((a) and (c)) and
Nakagami-m ((b) and (d)) propagations models.
TABLE V
AVERAGE NUMBER OF HOPS
short retry limit, i.e., 7, which is widely used as default value.
The better performance of JOKER-timer, in terms of deliv-
ered packets, compared to the other schemes is noticeable.
In turn, BATMAN-ACK presents some difficulties with a low
retry limit. The presented results have been extracted from a
Nakagami-m hostile scenario, so JOKER-ACK control packets
are impacted by fading channels. If the ACK or Forwarding
packets do not finally reach their destinations, the involved
data packet is dropped by the forwarder, hence reducing the
PDR. Regarding the necessary retransmissions for successfully
delivering data packets, observe that reducing the retry limit
from 7 down to 5, JOKER-timer reaches PDR levels over the
notable figure of 95%. On the other hand, BATMAN still needs
7 retransmissions to reach even lower PDR values. This reduc-
tion in the number of necessary retransmissions emphasizes that
JOKER-timer presents much more efficient and scalable per-
formance than BATMAN, permitting the improvement of the
quality of the streaming service flowing through the network,
as well as reducing the energy consumed by the nodes.
As aforementioned, an evaluation test has been also con-
ducted by employing the BATMAN and JOKER (3 candidates)
implementations in real machines. A similar topology to that
shown in Fig. 3 was used. Each test consisted of the transmis-
sion of 3 independent 60 s video streams at 150 kbps between
the RX node and the TX node by means of the relay nodes.
To simulate link failures provoking disconnection events, the
relay nodes’ wireless cards were randomly switched off for a
time interval of 5 s during the transmission between the TX
node and the RX node (please, see the experiment description
in Section IV). Fig. 9 presents the attained throughput and PLR
for the 5 performed tests. Observe how both JOKER-ACK and
JOKER-timer overcome BATMAN in all the conducted tests
in terms of both metrics under consideration. Focusing on the
throughput achieved in the RX node (Fig. 9(a)), JOKER-timer
presents a minimum value of 135 kbps, which is a 10% reduc-
tion from the original stream, and for JOKER-ACK is 130 kbps
(less than the 15% of reduction from the transmitted flow). In
turn, the maximum throughput reached by BATMAN is just
116 kbps (a 22.6% decrease with respect to the sent traffic).
Regarding PLR, (Fig. 9(b)), the differences between both algo-
rithms are also notable. Observe that JOKER maintains low
levels of packet loss (almost all values around 0% but a max-
imum value of 4% for JOKER-ACK in test 3); meanwhile
BATMAN is not able to obtain values lower than 9%, with
several tests achieving a PLR above 20%. The superior perfor-
mance of JOKER can be attributed to the ready-to-use backup
routes that the TX node employs when the first candidate is
www.redpel.com +917620593389
www.redpel.com +917620593389
12. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1701
Fig. 8. PDR attained by BATMAN, JOKER-ACK, and JOKER-timer when
tuning the IEEE 802.11 retry limit value. Results from a static scenario char-
acterized by the Nakagami-m propagation model with 1 (a), 3 (b), and 5
(c) simultaneous video streams in the network.
down. When this happens, the next candidate automatically
forwards the packet, so the transmission continues without
undesirable cuts. On the other hand, with BATMAN, the TX
node needs to re-calculate a new route each time that the
selected next- hop towards the RX node is down. Comparing
both candidate-selection algorithms, similar to the simulation
environment, the best results are attained by JOKER-timer.
Nevertheless the performance of JOKER-ACK seems to be suf-
ficient to support video traffic in the studied topology. From a
QoE perspective, the high levels of PLR attained by BATMAN
decrease video quality, achieving QoE (MOS) values near 1
in all the conducted tests (please, see Table VI). Recall that
the QoE estimations in terms of MOS have been computed
by employing (6). In turn, JOKER presents acceptable QoE
(MOS) values above 3 in most of the performed tests. Again,
the best results are attained by JOKER-timer that achieves
Fig. 9. Performance comparison of JOKER and BATMAN implementations
for real machines. Throughput (a) and PLR (b).
TABLE VI
QOE (MOS) VALUES ATTAINED IN THE EXPERIMENTAL TEST-BENCH
remarkable QoE (MOS) values equal or greater than 3.6 in three
out of five tests.
VI. CONCLUSION
In this work, an opportunistic routing protocol, called
JOKER, addressing the trade-off between QoE in multime-
dia transmissions and energy consumption has been presented.
Following the opportunistic paradigm, JOKER presents nov-
elties in both the candidate selection, where a new metric
that gathers the packet-delivery reliability of the links with
the distance-progress towards the final destination has been
introduced, and the candidate coordination, where two dif-
ferent procedures were included, namely, ACK-based and
timer-based coordination schemes. Additionally, a dynamic
adjustment of the protocol’s control-message sending-interval
was developed aiming at adapting JOKER to the actual net-
work conditions and reducing energy consumption as well. Two
different JOKER implementations, for simulation and experi-
mental test-benches, were introduced and tested, allowing com-
paring the performance of JOKER supporting video-streaming
traffic with that presented by the prominent ad-hoc routing algo-
rithm BATMAN. From the attained results, the superior perfor-
mance of JOKER in comparison with BATMAN was shown
in terms of both QoE and energy efficiency. We highlight the
www.redpel.com +917620593389
www.redpel.com +917620593389
13. 1702 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 34, NO. 5, MAY 2016
performance of JOKER-timer that increases the network relia-
bility and hence the multimedia service quality without adding
extra overhead. These outcomes were confirmed in several
scenarios evaluated in both simulation and experimental test-
benches. In the lights of the presented results, it can be
concluded that JOKER is an efficient proposal for the distri-
bution of streaming traffic in ad-hoc networks, considering the
energy constraints imposed by these systems, too. As future
work, it is planned to continue exploring the opportunistic rout-
ing approach. To the authors’ opinion, it permits an efficient
management of wireless networks by taking advantage of the
inherent characteristics of these systems, improving the overall
network performance as well as the node’s energy efficiency.
REFERENCES
[1] S. Liu and A. D. Striegel, “Exploring the potential in practice for oppor-
tunistic networks amongst smart mobile devices,” in Proc. 19th Annu. Int.
Conf. Mobile Comput. Netw. (MobiCom’13), Sep. 2013, pp. 315–326.
[2] I. Woungang, S. K. Dhurandher, A. Anpalagan, and A. V. Vasilakos,
Routing in Opportunistic Networks. New York, NY, USA: Springer,
2013.
[3] T. Clausen and P. Jacquet, “Optimized link state routing (OLSR) proto-
col,” IETF RFC 3626, 2003.
[4] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance
vector (AODV) routing,” IETF RFC 3561, 2003.
[5] A. Neumann, C. Aichele, M. Lindner, and S. Wunderlich, “Better
approach to mobile ad-hoc networking (B.A.T.M.A.N.),” IETF Draft,
2008 [Online]. Available: http://tools.ietf.org/html/draft-wunderlich-
openmesh-manet-routing-00
[6] A. Boukerche and A. Darehshoorzadeh, “Opportunistic routing in wire-
less networks: Models, algorithms, and classifications,” ACM Comput.
Surv., vol. 47, no. 2, pp. 1–36, Nov. 2014.
[7] S. Chiaravalloti, F. Idzikowski, and Ł. Budzisz, “Power consumption
of WLAN network elements,” TKN, TU, Berlin, Germany, Tech. Rep.
TKN-11-002, 2011.
[8] R. Sanchez-Iborra, M.-D. Cano, and J. Garcia-Haro, “Performance eval-
uation of BATMAN routing protocol for VoIP services: A QoE perspec-
tive,” IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4947–4958, Sep.
2014.
[9] M. Youssef, M. Ibrahim, M. Abdelatif, L. Chen, and A. V. Vasilakos,
“Routing metrics of cognitive radio networks: A survey,” IEEE Commun.
Surv. Tuts., vol. 16, no. 1, pp. 92–109, Jan. 2014.
[10] S.-C. Lin and K.-C. Chen, “Spectrum-map-empowered opportunistic
routing for cognitive radio ad hoc networks,” IEEE Trans. Veh. Technol.,
vol. 63, no. 6, pp. 2848–2861, Jul. 2014.
[11] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading struc-
ture for randomness in wireless opportunistic routing,” ACM SIGCOMM
Comput. Commun. Rev., vol. 37, no. 4, pp. 169–180, Oct. 2007.
[12] P. Spachos and D. Hantzinakos, “Scalable dynamic routing protocol
for cognitive radio sensor networks,” IEEE Sensors J., vol. 14, no. 7,
pp. 2257–2266, Jul. 2014.
[13] M. Zorzi and R. Rao, “Geographic random forwarding (GeRaF) for ad
hoc and sensor networks: Multihop performance,” IEEE Trans. Mobile
Comput., vol. 2, no. 4, pp. 337–348, Oct. 2003.
[14] P. Li, S. Guo, S. Yu, and A. V. Vasilakos, “CodePipe: An opportunistic
feeding and routing protocol for reliable multicast with pipelined network
coding,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 12, pp. 3264–
3273, Dec. 2014.
[15] H. Shen, G. Bai, Z. Tang, and L. Zhao, “Flow-correlation-aware oppor-
tunistic network coding for video streaming over wireless networks,” in
Proc. IEEE 8th Int. Conf. Commun. Netw. China (CHINACOM), Aug.
2013, pp. 155–160.
[16] K. Choumas, I. Syrigos, T. Korakis, and L. Tassiulas, “Video-aware multi-
cast opportunistic routing over 802.11 two-hop mesh networks,” in Proc.
11th Annu. IEEE Int. Conf. Sens. Commun. Netw. (SECON), Jun. 2014,
pp. 486–494.
[17] D. Koutsonikolas, Y. C. Hu, and C.-C. Wang, “Pacifier: High-throughput,
reliable multicast without “crying babies” in wireless mesh networks,”
IEEE/ACM Trans. Netw., vol. 20, no. 5, pp. 1375–1388, Oct. 2012.
[18] H. Seferoglu and A. Markopoulou, “Opportunistic network coding for
video streaming over wireless,” in Proc. IEEE Packet Video, Nov. 2007,
pp. 191–200.
[19] F. Wu, K. Gong, T. Zhang, G. Chen, and C. Qiao, “COMO: A game-
theoretic approach for joint multirate opportunistic routing and for-
warding in non-cooperative wireless networks,” IEEE Trans. Wireless
Commun., vol. 14, no. 2, pp. 948–959, Feb. 2015.
[20] S. Wang, A. Basalamah, S. M. Kim, S. Guo, Y. Tobe, and T. He, “Link-
correlation-aware opportunistic routing in wireless networks,” IEEE
Trans. Wireless Commun., vol. 14, no. 1, pp. 47–56, Jan. 2015.
[21] T. Meng, F. Wu, Z. Yang, G. Chen, and A. Vasilakos, “Spatial reusability-
aware routing in multi-hop wireless networks,” IEEE Trans. Comput.,
vol. 65, no. 1, pp. 244–255, Jan. 2016.
[22] J. Luo, J. Hu, D. Wu, and R. Li, “Opportunistic routing algorithm for relay
node selection in wireless sensor networks,” IEEE Trans. Ind. Informat.,
vol. 11, no. 1, pp. 112–121, Feb. 2015.
[23] Y. Yao, Q. Cao, and A. V. Vasilakos, “EDAL: An energy-efficient, delay-
aware, and lifetime-balancing data collection protocol for heterogeneous
wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 23, no. 3,
pp. 810–823, Jun. 2015.
[24] L. Cheng, J. Niu, J. Cao, S. K. Das, and Y. Gu, “QoS aware geographic
opportunistic routing in wireless sensor networks,” IEEE Trans. Parallel
Distrib. Syst., vol. 25, no. 7, pp. 1864–1875, Jul. 2014.
[25] Better Approach to Mobile Ad Hoc Networking (B.A.T.M.A.N.)
[Online]. Available: http://www.open-mesh.org, accessed on Nov. 30,
2015.
[26] D. Seither, A. Konig, and M. Hollick, “Routing performance of wireless
mesh networks: A practical evaluation of BATMAN advanced,” in Proc.
IEEE 36th Conf. Local Comput. Netw., Oct. 2011, pp. 897–904.
[27] A. Darehshoorzadeh and L. Cerda-Alabern, “Distance progress based
opportunistic routing for wireless mesh networks,” in Proc. IEEE 8th
Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), Aug. 2012,
pp. 179–184.
[28] Radius. Radio Fade Margin [Online]. Available: http://www.radius.
net/eng/services/radio-networking-tools/radio-fade-margin/, accessed on
Dec. 10, 2015.
[29] UltraElectronics, Wood&Douglas. What is fade margin [Online].
Available: http://ultra-woodanddouglas.com/FAQ/what-is-fade-margin,
accessed on Dec. 1, 2015.
[30] R. Sanchez-Iborra and M.-D. Cano, “An approach to a cross layer-
based QoE improvement for MANET routing protocols,” Netw. Protocols
Algorithms, vol. 6, no. 3, pp. 18–34, Aug. 2014.
[31] R. Sanchez-Iborra and M. D. Cano, “Evaluation of the trade-off between
energy consumption and QoE in video transmission with MANET routing
protocols,” in Proc. XII Jornadas de Ingenieria Telematica (JITEL’15),
Palma de Mallorca, Spain, 2015, pp. 145–152.
[32] F. N. Maxemchuk, “The Manhattan street network,” in Proc. IEEE Global
Telecommun. Conf., New Orleans, LA, USA, 1985, pp. 255–261.
[33] D. Furlan, “Analysis of the overhead of B.A.T.M.A.N. routing protocol in
regular torus topologies,” University of Trento, Italy, Tech. Rep., 2011.
[34] Omnet++ [Online]. Available: http://www.omnetpp.org, accessed on Nov.
30, 2015.
[35] Video Trace Library [Online]. Available: http://trace.eas.asu.edu,
accessed on Nov. 27, 2015.
[36] D. Helbing, “Traffic and related self-driven many-particle systems,” Rev.
Modern Phys., vol. 73, no. 4, pp. 1067–1141, Dec. 2001.
[37] Broadcom. (2011). BCM4330 preliminary data sheet.
[38] L. M. Feeney and D. Willkomm, “Energy framework: An extensible
framework for simulating battery consumption in wireless networks,” in
Proc. 3rd Int. ICST Conf. Simul. Tools Techn. (ICST), Mar. 2010 [Online].
Available: http://dl.acm.org/citation.cfm?id=1808143.1808170
[39] B. White et al., “An integrated experimental environment for distributed
systems and networks,” in Proc. 5th Symp. Oper. Syst. Des. Implement.
(OSDI’02), 2002, vol. 36, no. SI, pp. 255–270.
[40] F. Abdesslem, L. Iannone, M. Dias de Amorim, K. Kabassanov, and
S. Fdida, “On the feasibility of power control in current IEEE 802.11
devices,” in Proc. IEEE 4th Annu. Int. Conf. Pervasive Comput. Commun.
Workshops (PERCOMW’06), 2006, pp. 468–473.
[41] A. Botta, A. Dainotti, and A. Pescapé, “A tool for the generation of
realistic network workload for emerging networking scenarios,” Comput.
Netw., vol. 56, no. 15, pp. 3531–3547, Oct. 2012.
[42] K. Yamagishi and T. Hayashi, “Parametric packet-layer model for mon-
itoring video quality of IPTV services,” in Proc. IEEE Int. Conf.
Commun., 2008, pp. 110–114.
[43] J. Joskowicz and J. C. L. Ardao, “Enhancements to the opinion model for
video-telephony applications,” in Proc. 5th Int. Latin Amer. Netw. Conf.
(LANC’09), Sep. 2009, pp. 87–94.
[44] A. Darehshoorzadeh and A. Boukerche, “Opportunistic routing proto-
cols in wireless networks: A performance comparison,” in Proc. IEEE
Wireless Commun. Netw. Conf. (WCNC), Apr. 2014, pp. 2504–2509.
www.redpel.com +917620593389
www.redpel.com +917620593389
14. SANCHEZ-IBORRA AND CANO: JOKER: A NOVEL OPPORTUNISTIC ROUTING PROTOCOL 1703
Ramon Sanchez-Iborra received the B.Sc. degree
in telecommunication engineering and the M.Sc.
and Ph.D. degrees in information and communica-
tion technologies from the Universidad Politécnica
de Cartagena, Cartagena, Spain, in 2007, 2013, and
2016, respectively. He is an Associate Researcher
and Teaching Assistant with the Department of
Information Technologies and Communications,
Universidad Politécnica de Cartagena. He has been
a Visiting Researcher at the NetGNA Group,
Universidade da Beira Interior, Covilhã, Portugal, and
the Quality and Usability Laboratory, Technische Universität Berlin/Telekom
Innovation Laboratories, Berlin, Germany. His research interests include evalu-
ation of QoE in multimedia services, management of wireless mobile networks,
green networking techniques, and IoT/M2M architectures. He has authored
several papers in national and international conferences and journals. He
has collaborated as a TPC member and Reviewer for international jour-
nals and conferences such as the IEEE ICC, EAI ADHOCNETS, or IEEE
COMMUNICATIONS LETTERS, and is a member of many IEEE technical
committees.
Maria-Dolores Cano (M’10) received the telecom-
munications engineering degree from the Universidad
Politécnica de Valencia (UPV), Valencia, Spain, in
2000, and the Ph.D. degree from the Universidad
Politécnica de Cartagena (UPCT), Cartagena, Spain,
in 2004. She joined the UPCT in 2000, where she is
currently an Associate Professor with the Department
of Information Technologies and Communications.
She has authored numerous papers in international
journals and conferences. Her research interests
include quality of service (QoS)/quality of user expe-
rience (QoE), security provisioning in telecommunications networks, and
engineering education. She received the Fulbright Grant as a Postdoctoral
Researcher at Columbia University, New York, NY, USA, in 2006, and also
collaborates since 2007 with several universities in South America. She is a
member of the Editorial Board of the IET Journal on Wireless Sensor Systems,
as well as of the technical program committee of several the IEEE, IFIP,
and IARIA international conferences. She has participated in several national
and international research projects and also collaborates as a Reviewer for
international funding research programs and international journals included
in the JCR. She was the recipient of the Best Paper award at the 10th IEEE
International Symposium on Computers and Communications ISCC’05 and
was recognized as an Exemplary Reviewer by the IEEE COMMUNICATION
LETTERS journal in 2010.
www.redpel.com +917620593389
www.redpel.com +917620593389