This document summarizes a research paper that proposes and evaluates a cross-layer optimization approach for the Dynamic Source Routing (DSR) protocol and the 802.11 MAC layer in mobile ad hoc networks. The approach tracks signal strengths of neighboring nodes to distinguish between packet losses due to mobility versus congestion. This information is provided to DSR to avoid unnecessary route error and maintenance processes when losses are due to congestion rather than broken links. Simulations evaluate the approach under different static and mobile scenarios and traffic patterns, showing improvements in routing overhead, packet losses and throughput compared to the conventional DSR protocol.
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
There are many routing approaches have been borrowed from mobile ad hoc network to achieve routing solutions in wireless mesh network. WMN was developed for reliable data communication and load balancing. AODV provides loop-free routes even while repairing broken links. This paper have been proposed an improved hierarchical AODV routing protocol
(IH-AODV), which exhibits better scalability and performance in the network. This IH-AODV protocol has been proposed for improvement in the scaling potential of AODV. MAODV allows
each node in the network to send out multicast data packets, used for multicast traffic. The wireless mesh network architecture provides reduction in installation cost, large scale
deployment, reliability and self management. It is mainly focused on implementing military or specialized civilian applications. Two protocols MAODV and IH-AODV were simulated using NS2 package. Simulation results will demonstrate that, IH-AODV scales well for large network
and other metrics are also better than or comparable to MAODV in hybrid WMNs.
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
The document proposes an enhanced version of the Destination Sequenced Distance Vector (DSDV) routing protocol called Multicost Parameter Based DSDV (MPB-DSDV) that incorporates additional cost parameters like interference, residual energy, and transmission power to improve energy efficiency and network performance for wireless ad hoc networks. The MPB-DSDV protocol is simulated and evaluated based on performance metrics like end-to-end delay, packet delivery ratio, routing overhead, and throughput, and shown to outperform the standard DSDV protocol by taking energy constraints into consideration for path selection.
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
Business Intelligence: A Rapidly Growing Option through Web MiningIOSR Journals
This document discusses web mining techniques for business intelligence. It begins with an introduction to web mining and its subfields of web content mining, web structure mining, and web usage mining. It then focuses on web usage mining, describing the process of preprocessing log data, discovering patterns using techniques like statistical analysis and association rule mining, and analyzing the patterns. The goal is to understand customer behavior and improve business functions like marketing through data collected from web servers, proxy servers, and clients.
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
The document proposes an enhanced version of the Destination Sequenced Distance Vector (DSDV) routing protocol called Multicost Parameter Based DSDV (MPB-DSDV) that incorporates additional cost parameters like interference, residual energy, and transmission power to improve energy efficiency and network performance for wireless ad hoc networks. The MPB-DSDV protocol is simulated and evaluated based on performance metrics like end-to-end delay, packet delivery ratio, routing overhead, and throughput, and shown to outperform the standard DSDV protocol by taking energy constraints into consideration for path selection.
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
The document summarizes an Efficient Position-Based Opportunistic Routing (EPOR) protocol proposed for mobile ad hoc networks. EPOR takes advantage of geographic routing and the broadcast nature of wireless transmissions. When a packet is transmitted, overhearing nodes can act as forwarding candidates. The best forwarder is chosen, but if it fails to forward in time, a suboptimal candidate will forward instead to avoid transmission interruptions. Simulation results show EPOR achieves higher packet delivery ratios and lower end-to-end delays than GPSR and AOMDV routing protocols, even under high node mobility.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
Business Intelligence: A Rapidly Growing Option through Web MiningIOSR Journals
This document discusses web mining techniques for business intelligence. It begins with an introduction to web mining and its subfields of web content mining, web structure mining, and web usage mining. It then focuses on web usage mining, describing the process of preprocessing log data, discovering patterns using techniques like statistical analysis and association rule mining, and analyzing the patterns. The goal is to understand customer behavior and improve business functions like marketing through data collected from web servers, proxy servers, and clients.
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
Synthesis, Characterization and Application of Some Polymeric Dyes Derived Fr...IOSR Journals
In this study, Some Monoazo disperse dyes namely, 4-arylazoaminophenols (AAPs) were synthesized via diazotization and coupling reactions and later, polycondensation of these dyes with formaldehyde in the presence of aqueous oxalic acid was carried out. The resulting polymeric dyes namely, (4-arylazoaminophenol-formaldehyde)s (PAAP-F)s as well as their low-molecular weight precursors were characterized by yield, melting point, color, solubility, viscosimetry, Proton Nuclear Magnetic Resonance spectroscopy, UV-visible spectroscopy and Infra red spectroscopy. Their dyeing performance on nylon and polyester were assessed using standard methods. The products were obtained in good yield and had low melting points The dyes were found to be soluble in chloroform and acetone, some were found to dissolve in ethanol and methanol, and generally insoluble in water. The dyeing on nylon and polyester had yellow shades with moderate to good light and wash fastness. Their rubbing fastnesses on nylon and polyester were very good. Polymerizations of the monomeric dyes on dyed nylon and polyester have also been carried out. The dyeing properties of the monomeric and polymeric dyes were compared with the dyes polymerized in situ on nylon and polyester and the fastness properties were found to increase on polymerization and even better with the dyes polymerized inside the fibers
Software Development Multi-Sourcing Relationship Management Model (Sdmrmm) P...IOSR Journals
This document describes a systematic literature review protocol to investigate challenges and critical success factors for managing relationships in software development multi-sourcing. Multi-sourcing involves one client contracting with multiple vendors. The review aims to identify challenges vendors face in establishing and maintaining relationships with clients and other vendors. It also seeks to identify critical factors for developing long-lasting relationships. The anticipated outcomes are a list of key challenges and success factors to help vendors improve multi-sourcing relationship management. The protocol outlines the planning, search strategy, and reporting that will be followed to conduct the review.
This document summarizes a survey paper that examines workflow signatures for business process compliance.
The paper discusses how cryptographic signature schemes are not well-suited for representing logical relationships in workflows, such as AND-joins and AND-splits. It proposes using a multi-key hierarchical encryption scheme for workflow signatures instead.
The paper provides an example of a business travel workflow involving multiple tasks and agents. It also briefly describes identity-based, hierarchical identity-based, and multi-level hierarchical identity-based digital signature schemes. The main goal of the survey is to examine workflows and encryption techniques that can provide authentication, integrity, and representation of logical workflow relationships.
Simultaneous Triple Series Equations Involving Konhauser Biorthogonal Polynom...IOSR Journals
Biorthogonal polynomials are of great interest for Physicists.Spencer and Fano [9] used the biorthogonal polynomials (for the case k = 2) in carrying out calculations involving penetration of gamma rays through matter.In the present paper an exact solution of simultaneous triple series equations involving Konhauser-biorthogonal polynomials of first kind of different indices is obtained by multiplying factor technique due to Noble.[4] This technique has been modified by Thakare [10, 11] to solve dual series equations involving orthogonal polynomials which led to disprove a possible conjecture of Askey [1] that a dual series equation involving Jacobi polynomials of different indices can not be solved. In this paper the solution of simultaneous triple series equations involving generalized Laguerre polynomials also have been discussed as a charmfull particular case.
50 Hz Frequency Magnetic Field Effects On Pseudomonas Aeruginosa And Bacillus...IOSR Journals
The effect of electromagnetic field of different intensities on Pseudomonas aeruginosa (as gram-negative
bacteria) and Bacillus subtilis (as gram-positive bacteria) was investigated to find out the effective magnetic field strength that alters the running physiological processes of every microorganism. Equal volumes of P. aeruginosa and B. subtilis suspensions were exposed for one hour at their maximum rate of active growth to the electromagnetic field (2 - 10 mT, 50 Hz). The results indicated that no remarkable differences were found in the growth of exposed P. aeruginosa. Moreover, a remarkable inhibition in the growth of exposed relative to unexposed B. subtilis cells was achieved at (4 mT) as compared with other intensities which may indicate that this magnetic field induction had a great effect on the biological activity of the cells, so more investigations were made at this magnetic field induction. Remarkable changes in the growth characteristics could be easily detected as the absorbance decreased which indicate a decrease in the cells number and consequently an
inhibition case for the bacteria. Also, the antibiotic sensitivity test of B. subtilis cells indicated either inhibition or stimulation case for the bacteria depending on the drug mode of action
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
Membrane Stabilizing And Antimicrobial Activities Of Caladium Bicolor And Che...IOSR Journals
The crude methanol extracts of whole plant of Caladium bicolor (Aiton) Vent. and leaf of Chenopodium album L. as well as their pet-ether, carbon tetrachloride, chloroform and aqueous soluble fractions were evaluated for membrane stabilizing and antimicrobial activities. At concentration 1.0 mg/ml, the carbon tetrachloride soluble fraction of C. bicolor inhibited 43.92±1.63% and 38.08±0.83 % hypotonic solution and heat induced haemolysis of RBCs, respectively. Among the extractives of C. album, the aqueous soluble fraction inhibited 47.11±0.49 % and 36.73±0.76 % hypotonic solution and heat induced haemolysis of RBCs as compared to 72.79 % and 42.12 % by acetyl salicylic acid (0.10 mg/ml), respectively. C. bicolor test samples demonstrated zone of inhibition ranging from 6.0 to 20.0 mm. The chloroform soluble fraction showed the highest zone of inhibition (20.0 mm) against Staphylococcus aureus. The test samples of C. album displayed zone of inhibition ranging from 7.0 to 13.0 mm. The highest zone of inhibition (13.0 mm) was showed by the chloroform soluble fraction against Salmonella paratyphi
This document discusses using an enhanced support vector machine (ESVM) to detect and classify distributed denial of service (DDoS) attacks. The ESVM is trained on normal user access behavior attributes and then tests samples of application layer attacks like HTTP flooding and network layer attacks like TCP flooding. It aims to classify these attacks with high accuracy, over 99%. An interactive detection and classification system architecture is proposed that takes DDoS attack samples as input for the ESVM and cross-validates them against normal traffic training samples to identify anomalies.
This document summarizes an academic paper about using a partially observable Markov decision process to improve handoff latency in an automatic train control system that uses wireless local area networks with multiple-input multiple-output technologies. The objective is to reduce handoff decision time by considering channel estimation errors and balancing multiplexing gain versus diversity gain. It also provides background on train control systems, noting their evolution from mechanical to electromechanical to computer-based systems using wayside communication to determine train locations and ensure safe movement between tracks.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
DC Motor Position Control Using Fuzzy Proportional-Derivative Controllers Wit...IOSR Journals
This document discusses controlling the position of a DC motor using fuzzy proportional-derivative controllers with different defuzzification methods. It first introduces Shravan Kumar Yadav and his background. It then models a DC motor in Simulink and designs a crisp PD controller as a benchmark. Different fuzzy PD controllers using various defuzzification methods are implemented and their responses compared. The fuzzy controllers are able to reject disturbances without retuning, unlike the crisp PD controller. The purpose is to control DC motor position using fuzzy logic control in MATLAB and compare its performance to PID control.
Nasal Parameters of Ibibio and Yakurr Ethnic Groups of South South NigeriaIOSR Journals
The study involved 400 subjects, 200 each of the two ethnic groups(100 males and 100 females). The age range was 18-35years. Subjects with facial deformities or surgeries that involved the nasal region were excluded from the study. Subjects that have both parents and grandparents of each ethnic group and who have lived in that environment for at least the first 18years of their lifetime were selected for the study. The nasal length and width were measured using spreading calipers and nasal indices deducted from these measurements. Test for significance was done using the students’ t-test. Results showed the nasal indices of the Ibibio males and females to be 86.58±1.20 and 81.75±1.14 respectively and for the Yakurr males and females, it was 77.76±0.82 and 102.27±1.13 respectively. There was significant ethnic and gender differences in all the nasal parameters (nasal length, nasal width and nasal indices) at p<0.05. From the nasal indices the nose type of the Ibibio males is platyrrhine while that of the Ibibio females is mesorrhine, the Yakurr males also have mesorrhine nose type while the Yakurr females have platyrrhine nose type. With this result, nasal parameters could be a useful tool in gender and ethnic differentiation between the Ibibio and Yakurr ethnic groups.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
Assessment of Mehr Housing Project as an Example of Housing for Low-Income Pe...IOSR Journals
This document assesses the Mehr Housing Project in Iran as an example of housing for low-income people. The project aims to address Iran's housing shortage by constructing 1.5 million affordable residential units on state lands leased for 99 years at low rental costs. Mehr Housing units average 75 square meters and are constructed by housing cooperatives. The goal is to eliminate land prices from housing costs to make homes affordable for low and middle-income families without housing. The project provides land in new towns near major cities to prevent population concentration in urban centers. The research analyzes whether Mehr Housing achieved its goal of providing housing for low-income populations using a descriptive-analytical methodology.
1) The document describes a simple and accurate method for the microestimation of sulfur-containing amino acids cysteine, cystine, and methionine using ammonium metavanadate (V) as an oxidizing reagent.
2) Samples of 1-5 mg are reacted with ammonium metavanadate and sulfuric acid, then titrated with ferrous ammonium sulfate solution using an indicator to determine the amount of unconsumed reagent.
3) The method was found to accurately determine the amino acids within 1% error and provides a convenient alternative to more complex existing methods without requiring a catalyst or sophisticated instrumentation.
IOSR Journal of Humanities and Social Science is an International Journal edited by International Organization of Scientific Research (IOSR).The Journal provides a common forum where all aspects of humanities and social sciences are presented. IOSR-JHSS publishes original papers, review papers, conceptual framework, analytical and simulation models, case studies, empirical research, technical notes etc.
This document proposes a system for efficient analysis of sensor data in wireless sensor networks using cloud storage and the Greedy Perimeter Stateless Routing (GPSR) algorithm. GPSR uses greedy forwarding and perimeter routing to route packets between nodes. The system stores sensor data in the cloud, allowing users to access data, information, and insights. The document summarizes existing routing protocols and their limitations. It then describes the proposed system's architecture and GPSR algorithm in more detail. A simulation is used to evaluate GPSR's performance compared to Dynamic Source Routing in terms of packet delivery ratio, energy consumption, and delay. The system aims to improve scalability as the number of nodes increases in large-scale wireless sensor networks.
This document summarizes previous work on data preprocessing for web usage mining. It discusses how web server log files contain raw data that needs preprocessing before analysis. The preprocessing steps commonly used are data cleaning, user identification, session identification, and path completion. Several papers are reviewed that discuss different techniques for preprocessing web server log files, including custom preprocessing steps, algorithms for reading logs and transferring data to a database, and the outputs of preprocessed data. The goal of the literature review is to study and compare various techniques for the important preprocessing phase of web usage mining.
Multipath Fault Tolerant Routing Protocol in MANET pijans
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically
exchange data among themselves without the reliance on a fixed base station or a wired backbone network
and it the makes the routing a crucial issue to the design of the MANET. Multiple path routing protocols
are shown to be performance-effective alternatives over single-path routing for ad hoc networks and it
represents a promising routing method for wireless mobile ad hoc networks. Multi-path routing achieves
load balancing and is more resilient to route failures..In this paper we propose an energy efficient
multipath fault tolerant routing protocol to improve the reliability of data routing in Mobile ad hoc
networks. The proposed RFTA is a multi objective routing protocol that meets diverse application
requirements by considering the changing conditions of the network. The efficiency of the proposed
protocol has been evaluated on different scenarios and there has been a noticeable improvement in the
packet delivery ratio and also in the reduction of end-to-end delay comparing to SMR,SMS and MDSR.
This document summarizes a research paper that compares the performance of two reactive routing protocols (AODV and DSR) in mobile ad hoc networks (MANETs) using the NS-2 simulator. It provides background on MANETs and describes the key mechanisms of AODV and DSR. The document then outlines the simulation setup, including mobility and traffic models, and the performance metrics used to evaluate and compare the protocols: packet delivery ratio, throughput, and average end-to-end delay.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, we propose cross-layer design to achieve a reliable data transmission in MANET. A key challenge is to create a mechanism that can provide good delivery performance and high quality of service in intermittent networks. The key components of our approach include a cross-layer design (CLD) to improve information sharing between different protocol layers. In order to improve the end-to-end performance of MANET, we present mechanism that allows the network layer to adjust its routing protocol dynamically based on SNR and Received Power along the end-to-end routing path for each transmission link. We evaluate our approach using one of common MANET routing protocols, DSR, to illustrate that our CLD improved the performance of DSR.
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETSijwmn
Routing in MANET is complex due to the fact that the network graph is episodically connected and nodes get only intermittently connected because of nodes mobility, terrain, weather, and jamming that change topology rapidly. In this paper, we propose cross-layer design to achieve a reliable data transmission in MANET. A key challenge is to create a mechanism that can provide good delivery performance and high quality of service in intermittent networks. The key components of our approach include a cross-layer design (CLD) to improve information sharing between different protocol layers. In order to improve the end-to-end performance of MANET, we present mechanism that allows the network layer to adjust its routing protocol dynamically based on SNR and Received Power along the end-to-end routing path for each transmission link. We evaluate our approach using one of common MANET routing protocols, DSR, to illustrate that our CLD improved the performance of DSR
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
This document compares the performance of three routing protocols - DSDV, AODV, and DSR - for mobile ad hoc networks by simulating networks of varying sizes using the Qualnet simulator. The main findings are that AODV performed most efficiently for network sizes of 30, 40, and 50 nodes, and that performance decreased for all three protocols as the number of nodes increased. For a network of 50 nodes, the three protocols exhibited different performance levels at different node counts.
This document analyzes the performance of the Dynamic Source Routing (DSR) protocol for mobile ad hoc networks in terms of cache updating. It proposes a distributed cache updating algorithm to proactively disseminate link failure information to nodes with cached routes containing the broken link. Simulation results show that the modified DSR protocol with distributed cache updating has higher packet delivery ratio and throughput, while generating lower normalized routing overhead compared to the standard DSR protocol. The distributed cache updating approach helps remove stale routes from caches faster and improves the performance of the on-demand DSR protocol for highly mobile ad hoc networks.
The document evaluates the performance of 5 routing protocols (AODV, DSR, TORA, OLSR, GRP) in a mobile ad hoc network (MANET) using the OPNET simulator. Simulations were run with 30, 60, and 90 nodes using email and video conferencing applications. Performance was analyzed based on throughput, delay, load, and data dropped. In general, GRP and OLSR had the lowest delay, DSR and GRP had the lowest load, and OLSR and AODV had the highest throughput, while TORA often had the worst performance based on the metrics. The evaluation provides insights into the relative performance of the routing protocols under different conditions in a MANET
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
The document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It first describes cognitive radio networks and their ability to dynamically access unused radio spectrum. It then summarizes the characteristics of reactive, proactive, and hybrid routing protocols. Reactive protocols determine routes on demand through flooding, while proactive protocols constantly update routing tables. The document analyzes the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) reactive protocols as well as the destination sequenced distance vector (DSDV) and optimized link state (OLSR) proactive protocols. It aims to compare these protocols and determine the most energy efficient for the cognitive radio network model.
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
This document compares different wireless routing protocols to find the most energy efficient for creating a cognitive radio network model with attacker nodes. It analyzes reactive, proactive, and hybrid routing protocols including AODV, DSR, DSDV, OLSR, and a hybrid protocol. Simulation results show the hybrid protocol consumes the least energy compared to other protocols, making it well-suited for an energy efficient cognitive radio network model.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of different QoS routing protocols, their properties and various parameters advantages and disadvantages. Also describes the use of QoS in Cross layer routing protocol. Finally, it concludes by study of all these cross layer QoS routing protocols.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
This document compares the performance of three routing protocols - AODV, DSDV, and OLSR - under the random waypoint mobility model using network simulation. Simulation results with 30 and 50 nodes found that OLSR performed better than AODV and DSDV in terms of packet receive rate and packets received with 30 nodes and a simulation time of 100 seconds. DSDV performed better than the other protocols with 50 nodes and a simulation time of 200 seconds. Overall, AODV showed the poorest performance in both scenarios. The document analyzes these routing protocols and the random waypoint mobility model to evaluate their performance under different parameters.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
The document summarizes a study that evaluated the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSDV, and DSR. The protocols were simulated using the NS-2 network simulator across networks of 30 to 70 nodes. Key performance metrics analyzed include packet delivery fraction, average end-to-end delay, normalized routing load, and packet loss. The results found that AODV performed best in terms of packet delivery fraction and shortest end-to-end delay, while DSDV had the lowest normalized routing load and DSR had the lowest packet loss. Overall, the document compares the performance of these three MANET routing protocols under different conditions using simulation results.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
This document proposes a modification to the Dynamic Source Routing (DSR) protocol called Modified DSR (MDSR) to reduce routing overhead caused by frequent link breakages in mobile ad hoc networks. MDSR adds a link breakage prediction algorithm that uses signal strength measurements to predict when a link may break. Intermediate nodes monitor signal strength and warn the source node if a link may soon break. This allows the source to proactively rebuild the route or switch to a backup route to avoid disconnection. Simulation results showed MDSR can reduce the number of dropped packets by at least 25% compared to standard DSR. The document also discusses how DSR works and the proposed proactive route maintenance concept in M
Similar to Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3 (Mar. - Apr. 2013), PP 71-77
www.iosrjournals.org
www.iosrjournals.org 71 | Page
Cross-layer based performance optimization for different
mobility and traffic scenarios in adhoc networks
Pankaj Kumar1
, Ajeet Kumar2
, Ashwini Singh3
, Raj Kumar4
,Dr. Ritesh Kumar
Mishra5
1
(ECE, National Institute of Technology Patna, India)
2
(ECE, National Institute of Technology Patna, India)
3
(ECE, National Institute of Technology Patna, India )
4
(ECE, National Institute of Technology Patna, India)
5
(Asst. Prof. ECE, National Institute of Technology Patna, India)
Abstract : The self configuring dexterous autonomy of MANET imposes some network challenges constrained
to traditional dynamic routing behaviour. So as working with different mobility and traffic patterns with normal
management schemes may lead some minor pitfalls to some important network performance parameters and
hence can degrade the whole network performance. Here, Our aim is to make some DSR and MAC based cross
layer optimizations and testify it on different mobility and traffic scenarios so as to justify the robustness of our
proposed improvement.
Keywords – cross- layer,MANET,MAC,optimization
I. INTRODUCTION
In wired networks the infrastructure of the network is fixed hence the routes are being selected
according to some predetermined tables within some fixed routing devices such as routers ,3-layer switches
etc. But in case of wireless Ad-hoc networks, the nodes themselves comprises the network ,and they do not
need any fixed infrastructure. Therefore each nodes executes routing functionalities, such as forwarding
network traffic. So before we design, we should consider different features such as the use of MAC protocol,
routing protocol, transport layer protocol, quality of service etc.For proper working the different protocols in
wireless ad-hoc networks must handle different issues, such as noise of the network, routing information,
transmission ranges, etc. Sometimes in one node, only part of the information collected by one protocol is
delivered to Another protocol and a misinterpretation among these protocols may happen. To deal with this, we
propose a modification in the MAC 802.11 protocol to avoid launching unnecessary operations in the DSR
(Dynamic Source Routing) protocol., achieving better performance in the network, i.e. less routing overhead,
less routing changes, less collision of packets, less route errors, less MAC errors, and more throughput.
Concretely, DSR protocol launches route error when a neighbouring node is still near, because it understands
the information received from the MAC layer as a broken link. Usually, the interferences among radio ranges of
nodes could lead to this misunderstanding. The proposed approach tracks the signal strength of each node,
informing the routing layer that the node has enough signal strength, skipping the route error launched by
DSR..With these things in mind our goal is:
To detect the presence of neighbour nodes in MAC 802.11 for each nodes within its reachable radio
transmission. This can be achieved by tracking the signal strength of neighbouring nodes.
To inform the higher layer, routing protocol DSR in this case, when a transmission was not successful,
and if a neighbouring node is in the transmission range of each other.
To adapt routing protocol DSR using this information, detecting error links and avoiding unnecessary
route maintenance processes.
To compare the achieved results with previous values, performing simulations in several (static and
mobility) scenarios, and for different type of traffic.
II. RELATED WORKS
The Dynamic Source Routing protocol (DSR) is an efficient routing protocol designed for use in multi-
hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and
self-configuring, without the need for any existing network infrastructure or administration. DSR has been
implemented by numerous groups, and deployed on several test beds. This protocol was used as base for other
protocols as well. Some implementations of the DSR are:
The Monarch Project implementation [1]: It is a set of kernel patches that supports FreeBSD 3.3 and 2.2.7.
It is a pre-alpha release and is available because of educational purposes and for researchers.
2. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 72 | Page
The Microsoft Research Mesh Connectivity Layer (MCL) MCL [2]: It implements a layer between link
layer and network layer multi-hop routing protocol on Windows XP. This protocol is derived from the DSR
protocol and is called Link Quality Source Routing (LQSR) protocol that means that DSR was widely
modified.
The Click DSR Router Project at the PecoLab at UC Boulder [3].. A user level and open source
implementation of DSR implemented in accordance with the IETF draft specifications of DSR. It is ready
on Linux and a 802.11g Wi-Fi card.
The National Institute of Standards and Technology (NIST) [4] developed a simulation model for the DSR
for MANETs based on the Internet Draft version 4 with the purpose of using it at OPNET in their
communications system simulation software.
Alex Tzu-Yu Song [5] has implemented DSR according to the fifth draft of The IETF DSR
III. DSR PROTOCOL
DSR is works on demand, without any periodic updates. It‟s characterized by the use of source
routing. That is, the sender knows the complete hop-by-hop route to the destination. These routes are stored in a
route cache.[6] The protocol is composed of route discovery and route Maintenance. The DSR agent checks
every data packet for source-route information [7]. It forwards the
packet in accordance with the routing information. If the DSR agent does not find routing information in the
packet, one of two options can be followed. If the route is known, it provides the source route. Otherwise, if the
route is unknown, it caches the packet and sends out route queries. Route queries messages are broadcasted to
all neighbours whenever there is no route to reach the destination. Then, route replies messages are sent back
either by the intermediate nodes, if they have such path in their cache, or by the destination node. The source
files for implementation of DSR protocol in ns-2 belongs to the ns-2/dsr directory. More details can be found in
tcl/mobility/dsr.tcl
3.1 DSR FUNCTION BEHAVIOUR
The DSR strategy for ns-2 network simulator was ported from the CMU/Monarch‟s code and
it is as follows [8]:
It is only worth discovering bidirectional routes, since all data paths must be bidirectional to work
properly for 802.11 ACKs.
Reply to all route requests in destination nodes, but reply to them by reversing the route and unicasting.
Then, do not trigger a route request. By reversing the discovered route for the route reply, only routes that
are bidirectional will make it back the original requestor.
Once a packet goes into the sendbuffer, it cannot be piggybacked on a route request. The code assumes
that the only reason that removes packets from the send buffer is the StickPktIn routine, or the route reply
arrives routine.
IV. CHALLANGES AND CONCEPT
A bad interaction between DSR protocols and the MAC layer could decrease the throughput in wireless
802.11 networks [9]. Once the MAC layer has been improved with a table of received powers of neighbouring
nodes with the purpose tracking their distances to the sender node, our goal in this thesis is to handle that
information in the routing layer to avoid that DSR triggers a route error process or route maintenance if it is not
required. DSR protocol triggers a route error when the receiver node of the communication did not reply after
several attempts of RTS in the MAC layer. Consequently, DSR assumes „link error‟, manages that link error as
broken link and triggers the route maintenance process .However, as we know, unsuccessful communication
among nodes may arise because of different reasons than broken links. In such case, the route maintenance
process is not necessary when a neighbouring node is still reachable. A cross layer design should identify when
a link error was due to broken link (node not reachable), triggering the route maintenance process only in such
case, or other reasons such as increased contention
1.1 MAC 802.11 RELATED ISSUES
The main reasons for lost packets are high levels of congestion (high traffic), equipment failures
(power problems) or errors due to noise or low signal (mobility). It would be beneficial for DSR the ability to
distinguish these reasons, adjusting transmission rate in case of congestion, or deleting old routes in case of
mobility.
Normal DSR interprets a link failure (in MAC layer)as a broken link, even when it was caused by
congestion at receiver. The sender node should know why communication was not possible. here, we
implemented an approach that tracks the received signal strength of each neighbouring node in order to know
3. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 73 | Page
when a neighbouring node is near enough for a successful transmission. If lost packets are due to congestion and
high traffic, normal DSR triggers route error but this is counterproductive because it adds more. If lost packets is
due to low signal quality or misrouted packets, then route error is needed because receiver is not reachable.
Then, the signal strength of neighbouring nodes can be used to detect the reason for lost packets, distinguishing
between congestion and broken links due to mobility, because in broken links due to mobility, the receiver is not
reachable and its signal strength is now available.
The implementation is divided into two parts; the first one keeps the last twenty received signals from
a node in an array, and the second part decides the kind of message (link failure, either due to errors or due to
congestion using signal strength of neighbouring nodes) to be sent to the upper layer, whenever the
communication is not possible but the destination node is in the transmission range of the sender.
In the graphic below, the received power of neighbouring nodes is tracked with the purpose of using it later for
distinguishing if neighbouring nodes are reachable or not.
Fig.1. MAC layer at receiver node. Packet is
received even when the current node is not the destination node
These modifications are made at the sender as:
void
Mac802_11::recv(Packet *p, Handler *h)
{
. . .
if(tx_active_ && hdr->error() == 0) {
hdr->error() = 1;
}
hdr_mac802_11 *mh = HDR_MAC802_11(p);
u_int32_t idNode = ETHER_ADDR(mh->dh_ta);
double power = p->txinfo_.RxPr;
insertNode (idNode,power,nodesPower);
}
. . . .
struct time_power {
int pos;
double power[20];
Packet reception
in MAC layer
Create new entry
for recd node at
MAC layer
Insert recvd
power from phy
layer for this
node
pkt from
this node
recvd
before?
Discard or send it to
upper layer
Search for
sender node ID
inside packet
4. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 74 | Page
u_int32_t idNode; }
};
The proposed approach for future work that we designed adds new functionalities for every node in the network.
Since each neighbouring node is tracked via its received signal strength, a sender node is able to discern if
neighbouring nodes are moving away or not. In addition, we propose to calculate and use the average signals of
nodes with the purpose of stop retransmitting packets when destination is not reachable because it moved away.
The reason of using an average value, instead of only the last received value from neighbouring nodes, is to
adapt this approach to more realistic scenarios, where objects such as furniture, may interfere temporally in
communication among mobile nodes. Modification suggested on MAC layer:
. . .
if (average_selected){
u_int32_t idNode = ETHER_ADDR(rf->rf_ra);
int pos =findNode (idNode, nodesPower);
if (pos!=-1){
float av=0; int movAw=0;
average(nodesPower[pos],av,movAw);
if ( (movAw >= 18) && (av < RxThreshold) ) {
discard(pktRTS_, DROP_MAC_RETRY_COUNT_EXCEEDED); pktRTS_ = 0;
hdr_cmn *ch = HDR_CMN(pktTx_);
if (ch->xmit_failure_) {
ch->size() -= phymib_.getHdrLen11();
ch->xmit_reason_ = XMIT_REASON_RTS;
ch->xmit_failure_(pktTx_->copy(),ch- >xmit_failure_data_); }
discard(pktTx_, DROP_MAC_RETRY_COUNT_EXCEEDED);
pktTx_ = 0; ssrc_ = 0;rst_cw();
return;}
}
}
. . .
1.2 DSR RELATED ISSUES
When a node tries to communicate to a neighbouring node and this communication is not successful
(after several attempts, MAC layer sends an error to the routing layer), the normal behaviour of DSR is to
interpret that the neighbouring node is not present anymore, that is, DSR assumes that the communication
failure was due to mobility. Once the DSR protocol at sender interprets that link error as a broken link,which
information is delivered for each intermediate node back to the sender node, which receives that information as
well. A route error may trigger a route request process (processBrokenRouteError or handlePacketWithoutSR),
if the sender does not have an alternative route towards the destination, or there is an alternative route towards
the destination, which will be used. In both cases, the route containing the broken link is removed from the
caches of the nodes involved in the route error.
In a scenario without mobility communication failures may arise, but DSR will interpret that it was due
to mobility, when actually it was due to congestion. Therefore, the process of
route error should not be performed since it increases even more the congestion, decreasing
the overall performance in the network. The proposed modifications will make DSR able to distinguish between
both situations, avoiding the route error process when the link error at MAC layer was due to congestion and not
due to mobility of nodes causing broken links. In the proposed approach, when MAC layer is not able to
communicate to a neighbouring node, MAC layer informs to the routing layer not only that there was a problem,
it is also included if the neighbouring node is still reachable. Therefore, DSR at the sender realizes about the real
situation and do not perform a route error if the error received from MAC layer informs that the node is still
reachable.
The DSR modifications can be appended as:
void DSRAgent::xmitFailed(Packet *pkt, const char* reason)
{
(...)
if(cmh>xmit_reason_==XMIT_REASON_HIGH_POWER
&& !strcmp(reason, "DROP_RTR_MAC_CALLBACK")) {
Packet::free(pkt);
pkt = 0;
5. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 75 | Page
return;
}
(…)
/* send out the Route Error message */
sendOutPacketWithRoute(p, true);
}
V. SIMULATION AND RESULTS
Extensive simulations were carried out to compare
the NEW-DSR routing protocol proposed in this paper
with the conventional DSR. Network Simulator (NS-2)
[10] is used to simulate these protocols
5.1 SIMULATION PERFORMANCE PARAMETER
a)Throughput: It can be calculated as
Throughput = Received _bytes/Time_of_simulation
b)Routing Overhead:It comes as
Routing_Overhead=number_routing_bytes/number_
(routing+data )bytes
c)Lost Packets
5.2 TRAFFIC SOURCE
In order to perform our simulation, a scenario defining position and number of nodes, physical
interfaces, routing protocol and a transport protocol (TCP/UDP) are needed. Besides this, it is also needed to
attach some traffic to such transport protocol.
5.3 SIMULATION SCENARIOS
In our simulations, we utilized different scenarios, with the purpose of evaluating diverse behaviours of
mobile ad hoc networks. First, we distinguish between static and mobile scenarios. We used static scenarios to
analyse and to show communication in the network, avoiding changes of routes or disconnections due to
mobility of nodes. Later, we use mobile scenarios to verify the adaptability of our approach in mobility and high
mobility scenarios.
5.3.1 STATIC SCENARIO
Chain scenario:
The chain scenario defines 22 nodes without mobility forming a chain with a separation of 200 meters.
The carrier sense threshold for each node is 550 meters and the transmission range is set to 250 meters. The
simulation results were obtained from two, four and eight simultaneous flows for TCP . The number of hops to
reach the destination varies among 4, 5, 6, 7, 8, 10, 12, 14, 16 and 20 hops. The source is always the same,
where the destination depends on the number of hops to simulate. For instance, four TCP flows and 7 or 12 hops
means that there were simulated four TCP flows from node 0 (source) to node 7 or node 12 respectively (see
figures 2, 3, 4). This scenario was designed to demonstrate the improvements in TCP when the fractional
window [11] is used. Simulation time for this was set to 120 seconds.
Figure.2. Two flows from node 0 to 4, example for 4 hops
Figure.3.Four flows from node 0 to 10, example for 10 hops
Figure.4. Eight flows from node 0 to 20 example for 20 hops
6. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 76 | Page
Fig.5. Throughput vs no of hops graph Fig.6. Routing Overhead vs no of hops graph
FIG.7. THROUGHPUT VS NO OF HOPS GRAPH
5.3.2 MOBILITY SCENARIO
Random Waypoint scenario:
Random way point scenario was created using the “scengen” tool provided in the ns-2.35 package. The
scengen tool creates n nodes and places them randomly. The nodes are moving during the simulation with
random speeds, from 1m/sto 10m/s. In mobility scenarios there is a special parameter called pause time, which
means that a node stops for a while after a movement. In this scenario, the pause time value was set to five
seconds, used mainly for simulation purposes. The size of this scenario is set to 2000x2000 meters, therefore it
is quite probable the existence of, at least, one route from a sender to a receiver node. The carrier sense
threshold is 550m and the transmission range is 250m for each node.Simulation time for this scenario was set to
120s.
Fig.8. Throughput vs no. of TCP flows graph Fig.9. Routing overhead vs no. of TCP flows graph
0
20
40
60
4 5 6 7 8 10 12 14 16 20
Packets/sec
Numberof hops
ROUTING OVERHEAD
I_DSR DSR
0
5
10
15
8 16 32 50
KB/Sec
NumberTCP flows
THROUGHPUT
DSR I_DSR
0
1000
2000
3000
4000
5000
8 16 32 50
Packets/Sec
NumberTCP flows
ROUTING OVERHEAD
DSR I_DSR
0
0.5
1
1.5
2
2.5
4 5 6 7 8 10 12 14 16 20
KB/sec
Throughput
I_DSR DSR
0
1
2
3
4
4 5 6 7 8 10 12 14 16 20
%Packets
Numberof hops
LOST PACKETS
DSR I_DSR
7. Cross-layer based performance optimization for different mobility and traffic scenarios in adhoc networks
www.iosrjournals.org 77 | Page
Figure.10. Lost packets vs no. of TCP flows graph
In TCP random waypoint scenario, MAC errors are increasing using normal DSR , because of the mobility of
nodes (from a minimum of 0m/s to a maximum of 10m/s). This mobility, as well, causes a high number of route
errors and therefore more routing overhead and packet loss. Moreover, the throughput decreases meanwhile
the number of flows increases.
VI. CONCLUSION & FUTURE WORK
In the situation of congestion, the MAC 802.11 protocol does not perform well enough using the
RTS/CTS/DATA/ACK dialog because RTS packets from a sender to a receiver may collide and communication
fails, leading to bad interaction with the routing layer. The MAC layer could mistakenly inform the routing
layer about broken links when the communication among nodes is still possible, when, however, communication
failed due to the collisions of RTS packets caused by congestion. Thus, the routing protocol interprets broken
links in the MAC layer as route errors, triggering the route maintenance process, therefore increasing the
overhead in the network. Our main purpose is to avoid this misinterpretation by determining the cause of the
broken links. To deal with this, the signal strength of each node is tracked. This information is used to notify the
routing protocol if the node is still reachable but the communication was dropped. Then, at routing layer it is
possible to distinguish if the different speeds of scenarios .Moreover, it is important to decide on the value of the
average which determines if the protocol continues trying to retransmit or not, and on the number of times that
this node was moving away. the route exists and do not trigger a route error process, avoiding routing packets
which would increase more the congestion in the network.
we have developed a new feature with the objective of avoiding disconnections in scenarios with
objects that interfere with the communication among nodes. The main idea makes sense in mobility scenarios,
for example an office with mobile nodes. Here the connection can be interrupted easily due to furniture
obstructing the communication. If the receiver node is not moving away from the transmitter node, it is possible
to avoid disconnection by making an average of the received signals. This new approach makes a prediction
based on the last twenty movements and interprets if the receiver node is not reachable anymore. We should be
careful choosing what method of average (arithmetic mean, geometric mean).
ACKNOWLEDGMENT
This work is supported by National Institute of Technology, Patna as a part of partial fulfilment of post
graduate degree in communication system.
REFERENCES
[1] The Monarch Project implementation. http://www.monarch.cs.rice.edu/dsr-impl.html
[2] The Microsoft Research Mesh Connectivity Layer. http://research.microsoft.com/mesh
[3] The Click DSR Router Project. http://pecolab.colorado.edu/DSR.html (2002) The IEEE website. /
[4] OPNET, http://w3.antd.nist.gov/wctg/prd_dsrfiles.html
[5] O Piconet II mobile router, implementing an ad hoc routing protocol. http://piconet.sourceforge.net/thesis/main.html
[6] Akintola, A.& Aderounmu, A. & Owojori, A. & Adigun,M.O.(2006) Performance modelling of UDP over IP-Based wireline and
Wireless Networks.
[7] The network simulator. http://www.isi.edu/nsnam/ns/
[8] Bryan‟s ns2 DSR faq.http://www.geocities.com/b_j_hogan/
[9] Nahm, K, & Helmy, A. & Kuo, J. TCP over multihop 802.11 networks: Issues and performance enhancement.
[10] Dube, R. & Rasi, C & Wang, K. & Tripathi, K. (1997) Signal stability-based adaptive routing for ad hoc mobile networks.
[11] Nahm, K & Helmy, A. & Jay Kuo, C. Improving Stability and Performance of Multihop 802.11 Networks.
0
5
8 16 32 50
%Packets
Number of TCP flows
LOST PACKETS
DSR I_DSR