The big and small networks we shall study all have two-dimensional configurations that can detect applications in land-based networks. We shall also explore our study to a three-dimensional network by studying an USN. Here, we have the issue to understand first the underwater physical atmosphere for acoustic propagation and thus the effect to data communication. This would also permit us to detect the suitable channel model which we shall integrate into our underwater topology for the study and network coding analysis. However a queuing analysis includes much time in mathematics for the time limit of this study, we have resorted to simulation. Of all the simulation languages existed in the research world, I have selected RIVERBED (Optimized Network Engineering Tools) [OPNE14] to be our simulation simulator because that its hierarchical modeling technique builds it simple to utilize and our research group already has a lot of expertness about exploiting RIVERBED.
this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum transmit power and code length to decrease the near-far impact. UW-MAC objective is to obtain three goals i.e. low channel access delay, high network throughput and low energy consumption. It is shown that UW-MAC maintains to simultaneously obtain limited channel access delay, high network throughput and low energy consumption in deep water communications, which are not critically influenced by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC) protocol which
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum transmit power and code length to decrease the near-far impact. UW-MAC objective is to obtain three goals i.e. low channel access delay, high network throughput and low energy consumption. It is shown that UW-MAC maintains to simultaneously obtain limited channel access delay, high network throughput and low energy consumption in deep water communications, which are not critically influenced by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC) protocol which
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
Security of Wireless Ad hoc network has a primary
concern to provide protected communication between mobile
nodes. When we routing some packet it can use both malicious
node or authenticate node for forwarding and receiving data.
Malicious node can attack like black hole, misuse of data or
hacked information. Our aim is to discuss the feasibility of
monitoring the node of different networks, to analyze it for
providing better security in AODV routing protocol. We
implement data mining techniques for search large amount
of data according characteristic rules and patterns to detect
malicious node. We have used growing neural gas (GNS)
clustering algorithm to make clusters and analysis data. Using
soft computing technique we find patterns, analysis node and
take decision based on decision tree.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Securing Data Communication for Node Anonymization Using Location InformationIJMER
MANET is a type of wireless ad-hoc network that usually has a routable networking
environment. Mobile Ad Hoc Networks use unidentified routing protocols that hide node identities and
routes from outside observers to provide anonymity protection. Our existing anonymous routing
protocols depending on either hop-by-hop encryption, redundant traffic either produce high cost or it
cannot provide privacy protection to data sources, destinations, and routes. We propose a new location
based routing protocol which offers high privacy protection at low cost to sources, destinations, and
routes. It also has approaches to effectively counter intersection and timing attacks. The proposed plan
ensures the privacy of both route and nodes which westudy and simulate the result. This existing
protocol achieves better route privacy protection and its lower cost compared to other unidentified
routing protocols, and also improving the routing efficiency compared to other geographical routing
protocol.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
Routing in mobile networks is a multiobjective
optimization problem. The problem needs to consider multiple
objectives simultaneously such as Quality of Service
parameters, delay and cost. This paper uses the NSGA-II
multiobjectve genetic algorithm to solve the dynamic shortest
path routing problem in mobile networks and proposes a
framework for real-time software implementation.
Simulations confirm a good quality of solution (route
optimality) and a high rate of convergence.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Disruption Tolerant Network Coding scenarios often rises from mobile wireless networks where due to limited transmission power, fast node mobility,sparse node density, and frequent equipment failures, there is often no contemporaneous path from the source to destination nodes. Before going to the depth of DTN, it is recommended to review traditional non-coding routing schemes for broadcast and unicast applications in DTNs, and the basic operations of Random Linear Coding (RLC).
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...ijsrd.com
Deep Packet Inspection (DPI) is becoming more widely used in virtually all applications or services like Intrusion Detection System (IDS), which operate with or within a network. DPI analyzes all data present in the packet as it passes an inspection to determine the application transported and protocol. Deep packet inspection typically uses regular expression matching as a core operator. Regular expressions (RegExes) are used to flexibly represent complex string patterns in many applications ranging from network intrusion detection and prevention systems (NIDPSs). Regular expressions represent complex string pattern as attack signatures in DPI. It examine whether a packet’s payload matches any of a set of predefined regular expressions. There are various techniques developed in DPI for deep packet inspection for regular expression. We survey on these techniques for further improvement in regular expression detection in this paper. In the result we found that it is possible to reduce RegEx transaction memory required in network intrusion detection. We made this survey with possible use of DPI techniques in the wireless network.
A dynamic performance-based_flow_controlingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
Abstract Physical layer security can be considered to solve the security problem from the point of view of information theory in wireless networks. The combination of cryptographic schemes with channel coding techniques is called for in the basic principle of information-theoretic security. Due to the presence of one or more eavesdropper in wireless relay networks, secrecy of communication is in jeopardy. For such a scenario secrecy rate of the network provide a good measure of performance of the system. In this paper our focus is on secrecy capacity and its optimization with appropriate weight designs of relays taking into consideration the channels through which the eavesdroppers are connected to the relays. We propose the AF and DF based optimal beam forming scheme to improve the wireless security against eavesdropping attack by detecting and removing the eavesdroppers from the wireless relay networks and thus finding measures to maximize the efficiency, response time and the throughput of the system It includes an auto-regression technique as first approach and the use of RC6 algorithm for encrypting the confidential messages. The scheme is a two way approach that will not only provides security to the confidential messages, to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the relays. Keywords: Beamforming, Channel State Information, Eavesdropper Attack, Power Consumption, Secrecy Capacity.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Securing Data Communication for Node Anonymization Using Location InformationIJMER
MANET is a type of wireless ad-hoc network that usually has a routable networking
environment. Mobile Ad Hoc Networks use unidentified routing protocols that hide node identities and
routes from outside observers to provide anonymity protection. Our existing anonymous routing
protocols depending on either hop-by-hop encryption, redundant traffic either produce high cost or it
cannot provide privacy protection to data sources, destinations, and routes. We propose a new location
based routing protocol which offers high privacy protection at low cost to sources, destinations, and
routes. It also has approaches to effectively counter intersection and timing attacks. The proposed plan
ensures the privacy of both route and nodes which westudy and simulate the result. This existing
protocol achieves better route privacy protection and its lower cost compared to other unidentified
routing protocols, and also improving the routing efficiency compared to other geographical routing
protocol.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
Routing in mobile networks is a multiobjective
optimization problem. The problem needs to consider multiple
objectives simultaneously such as Quality of Service
parameters, delay and cost. This paper uses the NSGA-II
multiobjectve genetic algorithm to solve the dynamic shortest
path routing problem in mobile networks and proposes a
framework for real-time software implementation.
Simulations confirm a good quality of solution (route
optimality) and a high rate of convergence.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Disruption Tolerant Network Coding scenarios often rises from mobile wireless networks where due to limited transmission power, fast node mobility,sparse node density, and frequent equipment failures, there is often no contemporaneous path from the source to destination nodes. Before going to the depth of DTN, it is recommended to review traditional non-coding routing schemes for broadcast and unicast applications in DTNs, and the basic operations of Random Linear Coding (RLC).
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...ijsrd.com
Deep Packet Inspection (DPI) is becoming more widely used in virtually all applications or services like Intrusion Detection System (IDS), which operate with or within a network. DPI analyzes all data present in the packet as it passes an inspection to determine the application transported and protocol. Deep packet inspection typically uses regular expression matching as a core operator. Regular expressions (RegExes) are used to flexibly represent complex string patterns in many applications ranging from network intrusion detection and prevention systems (NIDPSs). Regular expressions represent complex string pattern as attack signatures in DPI. It examine whether a packet’s payload matches any of a set of predefined regular expressions. There are various techniques developed in DPI for deep packet inspection for regular expression. We survey on these techniques for further improvement in regular expression detection in this paper. In the result we found that it is possible to reduce RegEx transaction memory required in network intrusion detection. We made this survey with possible use of DPI techniques in the wireless network.
A dynamic performance-based_flow_controlingenioustech
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of
network device compromised with attack and loss of data. For the prevention of attack and reliable
communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP
(secured backup routing protocol). The process of these methods work along with route discovery and
route maintains, discovery and route maintained needed more power consumption for that process. The
power of devices is decrease during such process and network lifetimes expire. In this paper, we modified
the secured stateless protocol for secured routing and minimized the utilization of power during path
discovering and establishment. For the authentication of group node used group signature technique and
sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and
compare to other routing protocol gives a better performance in comparison to energy consumption and
throughput of network.
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLdbpublications
The goal of this project is to implement the (AES) encryption system using Verilog. To do this, several separate sections of the algorithm will be coded to work together towards the end goal of performing the correct encryption routines. A telecommand is a command sent to control a remote system or systems i.e not directly connected (e.g. via wires) to the place from which the telecommand is sent. The telecommand word is derived from tele = remote (Greek), and command = to entrust/order (Latin). Systems that need remote measurement and reporting of information of interest to the system designer or operator, require the counterpart of telecommand, telemetry. For a telecommand (TC) to be effective, it must be compiled into a pre-arranged format (which may follow a standard structure), modulated onto a carrier wave which is then transmitted with adequate power to the remote system. The remote system will then demodulates the digital signal from the carrier, decode the telecommand, and execute it.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
There are two methods to improve the performance of routing protocols in wireless mesh networks. One way is to improve the methods used for select the path. Second way is to improve the algorithms to add up the new characteristics of wireless mesh networks. We also propose a new protocol that is used for Multi Interfaces and Multiple Channels (MIMC) named as Hybrid Wireless Mesh Protocol.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
In this paper we present first a study of covert channels (steganography) that may be applied for each TCP/IP layer in VoIP application. Then, we present a steganographic method which hide secret data in IP protocol header fields, particularly the identification field. The IP protocol covert channel implementation was carried out in NS-3 (Network Simulator 3).
Turbo codes are error-correcting codes with performance that is close to the
Shannon theoretical limit (SHA). The motivation for using turbo codes is
that the codes are an appealing mix of a random appearance on the channel
and a physically realizable decoding structure. The communication systems
have the problem of latency, fast switching, and reliable data transfer. The
objective of the research paper is to design and turbo encoder and decoder
hardware chip and analyze its performance. Two convolutional codes are
concatenated concurrently and detached by an interleaver or permuter in the
turbo encoder. The expected data from the channel is interpreted iteratively
using the two related decoders. The soft (probabilistic) data about an
individual bit of the decoded structure is passed in each cycle from one
elementary decoder to the next, and this information is updated regularly.
The performance of the chip is also verified using the maximum a posteriori
(MAP) method in the decoder chip. The performance of field-programmable
gate array (FPGA) hardware is evaluated using hardware and timing
parameters extracted from Xilinx ISE 14.7. The parallel concatenation offers
a better global rate for the same component code performance, and reduced
delay, low hardware complexity, and higher frequency support.
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
We would send hard copy of Journal by speed post to the address of correspondence author after online publication of paper.
We will dispatched hard copy to the author within 7 days of date of publication
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
The router is a network device that is used to connect subnetwork and packet-switched networking by directing the data packets to the intended IP addresses. It succeeds the traffic between different systems and allows several devices to share the internet connection. The router is applicable for the effective commutation in system on chip (SoC) modules for network on chip (NoC) communication. The research paper emphasizes the design of the two dimensional (2D) router hardware chip in the Xilinx integrated system environment (ISE) 14.7 software and further logic verification using the data packets transmitted from all input/output ports. The design evaluation is done based on the pre-synthesis device utilization summary relating to different field programmable gate array (FPGA) boards such as Spartan-3E (XC3S500E), Spartan-6 (XC6SLX45), Virtex-4 (XC4VFX12), Virtex-5 (XC5VSX50T), and Virtex-7 (XC7VX550T). The 64-bit data logic is verified on the different ports of the router configuration in the Xilinx and Modelsim waveform simulator. The Virtex-7 has proven the fast-switching speed and optimal hardware parameters in comparison to other FPGAs.
Similar to Master Thesis on Performance Improvement of Underwater Acoustic Sensor Network using Network Coding Algorithm (20)
HTML stands for Hyper Text Markup Language, which is the most widely used language on Web to develop web pages. and dummies guide to html5 and complete html guide pdf
Ransomware is a type of malicious software that blocks access to data or threatens to publish it until a ransom is paid. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them and ransomware attacks 2017
How to write a Great Research Paper?
The research paper is a significant piece of academic writing, in which the author performs research on a topic independently and writes a description of the results of that research. It is written to communicate to the community and to contribute to the advancement of knowledge. Types of papers include:
• Inventions
• Progress
• Survey
https://www.ThesisScientist.com
Research process involves a systematic way that focuses on being objective and gathering a multitude of information for analysis so that the researcher can come to a conclusion. Basic steps that should be considered and research process definition pdf and marketing research process 5 steps
How to write a good Dissertation/ Thesis
Thesis refers to a written work on a particular domain resulting from original research. You should introduce your subject area and explain research topic by referring latest published materials instead of old published materials. The objective is to present a simple, clear and complete account of the results of your research.
• Brainstorm or generate ideas for your topic.
• Conduct a thorough literature search before designing your methodology and collecting your data.
Relate your findings to your original statement of the problem and your literature review.
Https://www.ThesisScientist.com
How to write a research paper: How to write a research paper?
The research paper can be considered as the living thing which grows and changes as the student explores, interprets and evaluates sources related to a specific topic. Steps to write a research paper:
• Choose your topic.
• Begin your search.
• Making an outline.
• Write your paper.
A computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.and internet security tips and tricks
But as we’re stuck with the word ‘teenager’, what do we do? We could use it in a non-judgemental way just to mean those aged 13-19. Or, better still, we could ditch it altogether and take people for what they are, not how they’re labeled.Case Study: I left school at 18 and worked as a teacher. I dressed like a teacher, behaved like a teacher and, as far as I can remember, even thought like a teacher. and how to deal with a lying teenager
driverless car 2020 is a vehicle that is capable of sensing its environment and navigating without human input.[4] Many such vehicles are being developed, but as of May 2017 automated cars permitted on public roads are not yet fully autonomous and driverless car google
the podcast is an episodic series of digital audio files which a user can subscribe to so that new episodes are automatically downloaded via web syndication to the user's own local computer, mobile application, or portable media player.[1] and podcast tips beginners and podcast speaking tips
The science of vastu is related to the branch vedic truth which is very important for creating a natural balance in the life of human beings. Vastu not only helps in your personal growth but also helps in creating a prosperous environment all around you. Every person wants to enhance their career opportunities in order to gain excellent benefits in future. Vastu is science that helps you in many ways, it makes your house and the surroundings around you completely positive, and this in turn helps in improving your career objectives to a great extent. According to the Vastu principles, every person should follow certain rules and regulations in their study and working norm.
Reliance Jio Infocomm Limited, or Jio, is a LTE mobile network operator in India. It is a wholly owned subsidiary of Reliance Industries headquartered in Navi Mumbai, Maharashtra that provides wireless 4G LTE service network (without 2G/3G based services) and is the only 'VoLTE-only' (Voice over LTE) operator in the country which lacks legacy network support of 2G and 3G and reliance jio business model
The relationship between how satisfied a person is with their job and their actual job performance is open to discussion and debate. You see, it's hard to correlate those two aspects primarily. and job satisfaction and performance ande job satisfaction factors
Where should you put your advertising when there a limited number of dollars available? It’s the number one question of business owners as they consider all things marketing. Every media salesperson is going to tell you that you should advertise with them and mistakes in advertising
The very first step towards aiming to become a contributor on top platforms is to build your own brand and online presence.Bigger websites continually require valuable pieces of content to feed the insatiable quest of their audiences; however, they wouldn’t just take on any piece of content or contributor who they aren’t able to trust and verify. and contributor and non contributor
This thesis presents a simulation based analysis of these protocols. We used the combination of EIGRP&IS-IS, RIP&IS-IS routing protocols on the Hybrid network in order to reveal the advantage of one over the other as well as the robustness of each protocol combination and how this is measured.
Dynamic source routing protocol (DSR) is an on-demand protocol designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table update messages required in the table-driven approach.ad hoc network protocols
Delivering high-quality video content is one of the latest and most demanding challenges faced by the IP. With the deployment of these new IPTV services, the existing network infrastructures will be pushed to their limits. To accommodate the needs of IPTV services, networks must be able to scale to millions of customers and how to setup iptv
Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isn’t efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. “Fuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,” explains Baker. “So we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.” This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based
One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems is the communication which is crucial for cooperation and collaboration between the UAVs. If all UAVs are directly connected to an infrastructure, such as a ground base or a satellite, the communication between UAVs can be realized through the in-frastructure. However, this infrastructure based communication architecture restricts the capabilities of the multi-UAV systems. Ad-hoc networking between UAVs can solve the problems arising from a fully infrastructure based UAV networks. In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs. The differences between FANETs, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks) are clarified first, and then the main FANET design challenges are introduced. Along with the existing MANET protocols, open research issues are also discussed.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
Master Thesis on Performance Improvement of Underwater Acoustic Sensor Network using Network Coding Algorithm
1. For more Https://www.ThesisScientist.com
42
Performance Improvement of Underwater
Acoustic Sensor Network using Network Coding
Algorithm
A Synopsis Submitted in the Partial Fulfilment of
The Award of the Degree of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Under Guidance of: Submitted By:
Name of Internal Guide Name of Students
(Designation) Roll No
2. For more Https://www.ThesisScientist.com
43
CONTENTS
Candidate Declaration
Certificate
Acknowledgement
Abstract
Contents
Abbreviations
I
ii
iii
iv
v
Chapter 1 Introduction
1.1. Overview…………………………………………………………………
1.2. 1 .Network Coding Algorithm…………………………………………...
1.2.2. Topologies……………………………………………………………...
1.2.3.Routing Protocol with Network Coding ………………………………
1.2.3.1 Coding Based Routing Protocoals (Intra Flow Coding)…………
1.2.3.2. Coding Aware Routing Protocoals (Inter Flow Coding)…………
1.2.3.3Network Coding in MAC and TCP………………………………..
1.2.4.Underwater Networks…………………………………………………
1.2.5.Benefits of Network Coding…………………………………………..
1.3. Motivation and Objectives……………………………………………….
1.4. Methodologies and Approaches………………………………………….
1.5.Contributions
1.6 Layout of Thesis
Chapter 2 Literature Review……………………………………………………
2.1.Literature Review ………………………………………………………...
Chapter 3 Background Study…………………………………………………...
3.1.Underwater Acoustic Sensor Networks Communication Architecture…...
3.2.Challenges………………………………………………………………..
3.3 Assumptions………………………………………………………………
3.4 Target Scenrio…………………………………………………………….
1
1
2
3
5
5
5
6
7
8
9
10
12
12
14
14
21
21
23
24
3. For more Https://www.ThesisScientist.com
44
3.4.1. Line-up Network………………………………………………………
3.4.2.Meshed Network………………………………………………………..
3.5..Technical Criteria………………………………………………………...
3.6.Design Consideration…………………………………………………….
Chapter 4 Proposed Work……………………………………………………
4.1. Network Layout and Operation………………………………………….
4.2. Network Coding at a Node……………………………………………...
4.2.1. Encoding Implementation………………………………………...
4.2.2. Decoding…………………………………………………………
4.3. Topologies for Network Coding ………………………………………..
4.4. OPNET Models ………………………………………………………..
4.4.1. Packet for Network Coding……………………………………….
4.4.2.Node Model and Process Model…………………………………...
4.4.3. Pipeline Stages…………………………………………………….
4.5.
Assumption……………………………………………………………..
Chapter 5 Result ………………………………………………………………
5.1 The opnet simulation and performance evaluation………………………
5.2 Small network …………………………………………………………..
5.2.1 Butterfly topology…………………………………………………..
5.2.1.1. Throughput………………………………………………….
5.2.1.2. ETE Delay…………………………………………………
5.2.1.3 .PDR………………………………………………………
5.2.1.4 .Mean Queue Size of the Coding Node……………………
5.2.2Multi Relay Topology………………………………………………
5.2.2.1.Throughput…………………………………………………
5.2.2.2. ETE Delay…………………………………………………
5.2.2.3. PDR……………………………………………………….
5.2.2.4. Mean Queue Size of the Coding Node…………………….
25
25
26
27
29
31
31
32
33
34
36
37
37
38
40
41
42
42
43
43
44
4. For more Https://www.ThesisScientist.com
45
5.2.3. Performance Tradeoff and comparision of the two topologies……
5.3. Big Network……………………………………………………………..
5.3.1. Performance Evaluation……………………………………………
5.3.1.1. Throughput…………………………………………….....
5.3.1.2.ETE Delay…………………………………………………
5.3.1.3. PDR ………………………………………………………
5.3.1.4. Mean Queue Size………………………………………….
5.3.2. Performance Tradeoff………………………………………………
5.4.Concluding Remarks ……………………………………………………
Chapter 6 Conclusions…………………………………………………………
6.1.Conclusion…………………………………………………………………
6.2Furture Work ………………………………………………………………
References………………………………………………......................................
Appendix A:…………………………………………………………………….
A.1: Example of Achieving Maximum Flow in a Network………………….
A.2: Example of Improving Throughput……………………………………
A.3: Example of Balancing Traffic Load and Saving Bandwidth…………..
Appendix B:…………………………………………
45
46
47
48
49
51
51
52
52
52
55
55
57
58
59
59
59
61
61
62
63
67
67
69
70
71
5. For more Https://www.ThesisScientist.com
46
LIST OF ABBREVIATIONS
UAV Unmanned aerial vehicle
UAANET Unmanned Aeronautical Ad-hoc Network
AANET Aircraft Ad-hoc Network
AODV Ad hoc On Demand Distance Routing Vector
CBLADSR Cluster-Based Location - Aided Dynamic Source Routing
DES Data Encryption Standard
DREAM Distance Routing Effect Algorithm for Mobility
DSR Dynamic Source Routing
EGR Energy Aware Geographic Routing
FANET Flying Ad-hoc Network
FTP File Transfer Protocol
GPS Global Positioning System
GPSR Greedy Perimeter Stateless Routing
IDE Integrated Development Environment
IEEE Institute of Electrical and Electronics Engineering
IMU Greedy Geographic Forwarding
LAN Local Area Network
LAR Location-aided Routing
MAC Medium access control
6. For more Https://www.ThesisScientist.com
47
MANET Mobile Ad-hoc Network
MDD Model Driven Development
NS2 Network Simulator 2
OLSR Optimized Link State Routing
OPNET Optimized Network Engineering Tool
RGR Reactive-Greedy-Reactive
RREP Route Response
RREQ Route Request
SCF Store-Convey Forward
SRCM Semi-Random Circular Development
VANET Vehicular Ad-hoc Network
XML Extensible Markup Language
7. For more Https://www.ThesisScientist.com
48
CHAPTER 1
INTRODUCTION
1.1 Overview
With the advancement in acoustic modem technology that enabled high-rate reliable
communications, current research concentrates on communication between several
remote instruments within a network atmosphere [2]. Research on underwater
networking has become an attractive, interesting and challenging area today because of
its support to the applications i.e. pollution monitoring, oceanographic data collection,
disaster prevention, offshore exploration and assisted navigation [1]. We can describe
underwater acoustic networking as the enabling technique for these applications.
Underwater acoustic (UWA) networks are normally configured by acoustically linking
autonomous underwater vehicles, bottom sensors and a surface station, which offers a
connection to an on-shore control centre [1].
In conventional operation, network nodes utilize the store-forward techniques, and
network transmission performance is constrained by the capacity of some bottleneck
connections. With respect to the Maximum Flow Minimum Cut theory, the transmission
rate between the receivers and transmitters cannot increase the maximum network flow.
So the conventional multipath routing often cannot arrive the upper bound of the
maximum flow. Comes network coding which breaks the conventional way of data
transmission [4]. With network coding, the intermediary nodes no longer just send
packets only. They are permitted to process the packets, and integrate two or many
income packets into one or many output packets for transmission. This builds it possible
to utilize less network bandwidth to forward the same amount of information. At last, the
actual packets can be retrieved in their destinations [3].
Network coding technology is a discovery in network communication area [4]. It has
been broadly studied in current years because of its powerful advantages of enhancing
the throughput of the network, decreasing transmission times, increasing end-to-end
8. For more Https://www.ThesisScientist.com
49
performance and offering a high degree of network flexibility. It can also save
bandwidth, balance traffic load and enhance the network security. Routing Protocols and
algorithms depending on network coding are applied to wireless or wired
communication. With its capability of enhancing network performance, it could also be
used to ad-hoc networks, wireless multi-hop networks, wireless sensor networks and
particularly underwater sensor networks.
Fig 1.1:Underwater Sensor Architecture
UAN (Underwater Acoustic Network) is an application of wireless networks which
utilizes acoustic as the data transmission medium in underwater atmosphere [5]. As
compared to terrestrial radio channel, underwater channel has several natural loss factors
i.e. Doppler shift, ocean noise, multipath impact and transmission fading. These unique
UAN features cause high bit rate, long propagation delay, restricted bandwidth and
restricted energy, and build it hard to obtain efficient data transmission [4].
1.2.1 Network Coding Algorithms
9. For more Https://www.ThesisScientist.com
50
Network coding idea is first introduced by R. Ahlswede et al. From the information flow
point of view, they showed that in a multicast network with a single source and many
sinks, the maximum network throughput as determined by the max-flow min-cut theory
can be obtained by utilizing a simple network coding; the bandwidth can be saved also
[4, 7].
The basic feature of network coding is the optimal processing of different transmission
data. This should be directly reflected by the different design of coding techniques, and
the code structure is the main concern. So the actual research in network coding
primarily concentrates on the coding algorithms, the enhancement of performance
brought by a coding technique and the complexity degree of the coding algorithm. The
code structure algorithm design should ensure the targeted nodes can decode the actual
packets after they obtained a specific amount of coded packets. During this time, the
coding complexity should be decreased. The coding structure algorithms studied so far
can be classified into three categories: algebraic coding, linear coding and random
coding [7]. A construction of linear coding was introduced for its practicability and
simplicity. A multicast network is developed and it is shown that the max-flow bound
can be arrived through a linear coding multicast. Linear coding also involves the
polynomial time algorithm. But perhaps the easiest form is the coding based on the XOR
operation i.e., just perform the Exclusive-OR operation on the bits of two packets. There
are several XOR-based protocols i.e. ROCX (Routing with Opportunistically Coded
eXchanges) and COPE. In the introduced algebraic framework-based coding mechanism
a polynomial algorithm was utilized to solve network issues and an algebraic tool was
offered to the network coding research. A randomized network coding for numerous
source multicast networks was proposed in where the success possibility [6, 7].
1.2.2 Topologies
The network topology is a necessary issue we require to assume when studying network
coding. One would observe that a regular configuration often provides network coding.
We shall classify and summarize below some general topologies utilized in the network
coding research [12].
10. For more Https://www.ThesisScientist.com
51
1) Linear Topology
In the linear topology, each node has one upstream node and one downstream node to
transmit or obtain data. A routing technique depending on network coding has been
introduced for 6 nodes. Another study only utilizes three node but with a queuing model
in the middle for comparison of the NC model and non-NC model. A simple three node
wireless linear topology can also be transformed to a butterfly configuration. In the
introduced PCMRDT (Practical Coding based Multi-hop Reliable Data Transfer)
protocol, simulations of a multi-hop linear topology were carried out to measure
performance of delay and the no. of packets transferred per data packet [18].
2) X topology
In this topology, there are 5 nodes occupying the centre and ends of the letter X. Studies
have indicated that network coding can enhance the coding gain in the X topology. A
double decoding mechanism was introduced to enhance the network throughput in both
the slightly lousy and loss-free networks [18].
3) Butterfly Topology
The butterfly topology may be the most widely utilized topology in the network coding
research. The network coding idea was first introduced utilizing the multicast butterfly
topology. The same model was also employed to propose random network coding and
linear network coding. A queuing analysis of the butterfly network was carried out, and
the NC performance was compared with classic routing. A theoretical coding model was
studied for coding-aware-based routing on the butterfly network. The performance of
end-to-end delay of butterfly topology was inquired, and it was concluded that network
coding can have a big effect on delay performance. Another research utilized network
coding to a altered underwater network and experiment with practical underwater device
[18].
4) Diamond Topology
The diamond topology is often utilized to emphasize the high error recovery features of
random network coding. The advantage of effective error recovery rate was depicted in
and the coding technique was applied to underwater networks employing VBF (Vector
11. For more Https://www.ThesisScientist.com
52
Based Forwarding) routing. The diamond topology was also utilized and enforced in a
real UASN (Underwater Acoustic Sensor Network) model [2]
5) Random Topology
Additionally, the regular topologies, some researchers have used network coding to
random topologies. A algorithms suite for network CLONE (Coding with LOss
awareNEss) operation was introduced by proposing enough redundancy in local network
coding operations. Simulation is the primary tool for performance measurement. One
research measured the throughput performance of single-path routing and coding-aware
multipath routing depending on a 15-node random wireless configuration. Others also
examined the effect of network coding on the MAC (Medium Access Control) protocol
depending on the CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
scheme and carried out simulations on a configuration with 50 randomly-distributed
nodes[17.]
1.2.3 Routing Protocols with Network Coding
Coding-based routing protocols are practical implementation of network coding.
Researchers have noted that the integration of localized NC and route selection would
further enhance the wireless networks performance. Much research has-been performed
to integrate routing and coding in both practical analysis and theoretical system design.
There are two general classes: coding-aware routing and coding-based routing. The
difference between themes whether the coded packets come from the same information
flow.
1.2.3.1Coding-Based Routing Protocols (Intra-Flow Coding)
Coding-based routing is also called intra-flow network coding where routers can only
code packets from the same flow. In the coding-based protocol with MORE (MAC-
independent Opportunistic Routing & Encoding) the source divides the file into batches
of K packets. Before sending, the source combines the K packets into a linear
combination randomly and floods the coded packets. MORE is also been checked in a
20-node wireless network, and compared with the conventional best path routing known
12. For more Https://www.ThesisScientist.com
53
as ExOR, which is an Opportunistic Multi-Hop Routing for Wireless Networks. The
result indicates that MORE can dramatically enhance the network throughput.
One MORE issue is that a sending node does not know how much coded packets they
should send. So a destination may obtain several redundancy packets which do not
consist any new information and has to loss all of them. The useless packets are a waste
of the transmission bandwidth. For solving this issue, a novel NC-based protocol
CCACK (Cumulative Coded Acknowledgment) was introduced. This novel NC-based
protocol enables nodes to acknowledge the obtained coded packets of their upstream
nodes. This would void the unessential transmission accordingly for saving the
bandwidth. Performance measurements results indicate that CCACK importantly
enhances throughput as compared to MORE. Finally, the OMNC (Optimized Multipath
Network Coding) exploits rate control technique to assign the optimal encoding and
broadcast rate to all nodes, and accordingly to control the network congestion.
1.2.3.2 Coding-Aware Routing Protocols (Inter-Flow Coding)
Inter-flow coding enables the intermediary nodes to code packets from several flows.
COPE is the first protocol to utilize network coding in wireless mesh networks. The
protocol has used the network coding theory on a practical uni-cast network. Acceding
layer is embedded between the MAC layer and the IP layer. Every node can overhear its
neighboring packets, record any packets it obtained for a specified period and flood
packets reception report it has to its neighbors. The router will XOR many packets
together and transfers the coded packets in a single transmission. Performance
measurement of COPE on a 20–node wireless network indicates that network throughput
is improved a lot. Although COPE can determine coding opportunities on the chosen
routing path, many other powerful coding opportunities are usually ignored. This is
because the routing and coding in COPE are not dependent. It looks for coding
opportunities passively however it cannot change the route selection. To obtain a further
gain, a routing protocol ROCX (Routing with Opportunistically Coded eXchanges) was
introduced. A metric known as the ECX (Expected Coding Transmission)is utilized to
catch the expected no. of coded transmissions required for a successful interchange of
packets between two nodes through an intermediary node. ROCX analyses the network
13. For more Https://www.ThesisScientist.com
54
coding opportunities with a linear optimization algorithm. The evaluation results
indicated that ROCX can further decrease the no. of transmissions in COPE. Since this
protocol needs every intermediary node to have a very high calculation capacity.
Integrating network coding with routing selection within the network can generate more
coding opportunities initiatively. Examples are the Rate RCR (Adaptive Coding Aware
Routing) and CAMR(Coding Aware Multipath Routing).
1.2.3.3 Network Coding in MAC and TCP
In addition to integrating network coding with routing protocols, some researchers also
begin to implement network coding in other protocol layers i.e. the TCP (Transmission
Control Protocol) layer and the MAC layer. BEND is a practical MAC layer coding
technique in multi-hop networks which is also the first exploration of the broadcast
behavior of wireless channels In protocols i.e. COPE, network coding can only be done
at joint nodes within the routing path. BEND permits all neighbors of a node to overhear
the packet transmission and send the packets by only one of these neighbors. dSeveral
topologies ddwere utilized to measure BEND and to compare IEEE 802.11 with COPE.
The results indicate that BEND can obtain a higher throughput and coding ratio. For
making network coding compatible with the sliding window and retransmission schemes
of TCP, a new mechanism is introduced to incorporate network coding into TCP layer In
their mechanism, the source transfer a random but linear combinations of packets in the
sliding window. Instead of forwarding an ACK for every packet decoded successfully,
the sink will forward an ACK to show the no. of coded packets already obtained. An
adaptive W mechanism was introduced to adaptively control the packets waiting time
recorded in a buffer. By utilizing this technique, a tradeoff between TCP throughput and
packet over head has been obtained.
1.2.4 Underwater Networks
Underwater sensor networks are different from terrestrial networks in various different
aspects. One of the differences is the communication media. Unlike the terrestrial
networks utilizing electromagnetic waves to interact, underwater networks often utilize
14. For more Https://www.ThesisScientist.com
55
acoustic wave Currently, the applications and researches on underwater network coding
are still at their stage of growth however the network coding technology is not as
developed as air wireless communications [22]. We only discovered a handful of
concerned papers. Network coding technique depending on VBF (Vector Based
Forwarding) routing for USN has been introduced. Simulations indicated that multipath
forwarding with network coding mechanism is more effective for error recovery as
compared to single-path and even multiple-path forwarding without the use of network
coding. Several routing techniques with network coding have been compared for
providing an underwater acoustic channel model. The numerical results indicate that
network coding technique has a better performance of transmission delay in the situation
of high traffic loads. A novel mechanism of network coding utilizing implicit
acknowledgement is also introduced to reduce nodes power consumptions. Network
coding has also been used to a 2-D “cluster string topology”. The results indicate that
network coding has the benefits in good energy consumption and high error recovery. A
guideline and parameter setting in network coding is also offered. As an extension of the
work of, the network coding algorithm is employed to a real underwater sensor network
utilizing both software and hardware. The results showed that network coding enhanced
the packet delivery ratio and throughput in underwater sensor network. Network coding
was also carried out in a practical underwater device in shallow water with low data rates
(inter-transmission time of 2s to 20s). The performances of an altered underwater
butterfly network are measured. The experiment results are offered and examined.
Additionally, the stationary two-dimensional underwater networks three-dimensional
networks with acoustic wireless nodes are continuously utilized to determine ocean
phenomena which the two dimensional network may not be capable to realize in an
adequate way. In three-dimensional underwater networks, sensor nodes float at different
depth levels for observing a provided phenomenon. Furthermore, the underwater channel
is rather different from the terrestrial channel. A review was carried out on the available
network technology and its suitability to underwater acoustic channels [21].
15. For more Https://www.ThesisScientist.com
56
An integration of interference avoidance and network coding technique in underwater
atmosphere was investigated. Performances have been measured and compared with
CDMA/CA scheme. The results indicate NC is more efficient and consumed less energy.
In the work surveyed above, often only one or two network performances aspects are
studied. There was no comprehensive measurement of network coding and the discussion
of their tradeoff.
1.2.5 Benefits of Network Coding
We can briefly explain below some of the generally claimed advantages of network
coding in the papers we survey. Appendix A also surveys some papers that have offered
arguments/proofs/examples to these different claims [18].
1) Achieving maximum flow:
It is aware that the theoretically maximum flow of an interaction network often cannot be
obtained because of the availability of bottleneck connections in the network. With
network coding, the traffic flow going through the bottleneck connection can be
increased without having to increase the bandwidth (data flow rate) of the physical
connection. Thus, the maximum flow of the network can be obtained [12].
2) Improving throughput: The significance of this advantage is basis to network coding.
Utilizing network coding, packets can be coded in one packet for transmission and the
throughput is enhanced consequently. Observe that throughput is not only enhanced as a
consequence of (1); it can also be incremented in other scenario because of network
coding. For instance, the actual packets can be recovered even a small no. of packets are
missing. Another instance in SectionA2 (in Appendix A) is also offered to show how
enhanced throughput can be obtained.
3) Balancing traffic flow and saving bandwidth: Multicasting with network coding can
sufficiently use the connection paths in a communication network, hence obtaining an
even traffic network distribution and balancing the traffic load.
4) Improving reliability Higher reliability is the most obliging advantage of network
coding particularly in mobile and/or lousy networks. Utilizing network coding, many
original packets that are linearly independent of each other can be coded together to
16. For more Https://www.ThesisScientist.com
57
make a group of new coded packets. The recipient is capable to decode the real packets
so long as an enough no. of encoded packets are achieved. The loss of a small no. of
packets does not need retransmissions. The results indicate the network coding technique
can decrease the times of packet retransmission in comparison of other mechanism.
5) Enhancing security. Another network performance would be enhanced by network
coding security. The coding feature improves the complications of cracking information
from the network. However a node can decode the packets only if it obtained a sufficient
no. of coded packets, an eavesdropper is not capable to receive the helpful information
even through it can overhear one or many coded packets. A wiretap model utilizing
linear network coding was introduced where wire tappers cannot obtain the transferred
information even if they are permitted to access the transmission channels.
1.3 Motivation and Objectives
However Allseed et al. introduced the network coding concept in year 2000, it has been
studied by several researchers in various aspects. From our literature review, we
observed that the network coding performance can change with different network
configurations. Selecting an appropriate topology and suitable coding nodes can build a
better usage of network coding. Furthermore, most of the papers only measure only one
or two network performance aspects. It would be required to have a comprehensive
measurement of the networks on each mainly promised advantages of network coding,
and to view if these advantages can be all obtained in the same configuration and
situations. If not, what tradeoffs are in the network coding implementation to
communication networks.
Our literature survey also indicate that the general design objectives of underwater
networks are increasing throughput among nodes, educing energy consumption, saving
bandwidth and enhancing network reliability. However these seem to be the benefits of
network coding also, we would like to apply network to underwater networks to look if
the underwater networks performance can be enhanced [17].
The ocean is a volatile and complex atmosphere where the signal can attenuate because
of diffusion loss and energy absorption during its transmission. Thus, the channel model
17. For more Https://www.ThesisScientist.com
58
is quite different from terrestrial channel models. We would like to set up an underwater
channel model in RIVERBED Simulator for our simulation and future usage. As a basic
goal of this thesis in view of the above discussion, we would like to verify the promised
advantages of network coding. Particularly, we would like
1) To have a more comprehensive and systematic evaluation of network coding on some
selected configurations.
2) To compare data network communication without and with network coding in terms
of their performances and study the trade offs in these performances [18].
3) To measure the performance of a wireless underwater acoustic network utilizing
network coding to view if the same advantages can be obtained.
1.4 Methodologies and Approaches
For achieving our goals, we require to first understand the operation descriptions of
network coding so that we can integrate them into our network queuing model and
measure the performance appropriately. Through the literature survey, we hope to get the
knowledge and operation descriptions related to different regions involving the routing
protocols with network coding, the coding algorithms, and the network coding
application to multi-hop network, wireless sensor network and underwater acoustic
networks.
At first, we shall utilize static configurations in our network coding study because we can
select by inspection which intermediary nodes in the network should perform the coding
operation. We shall assume some regular configurations in this thesis and realize their
network performances [18].
However there can be several possible configurations, we would be selective to take a
few famous ones in the literature. We initiate with the butterfly configuration and the
multi-relay topology which are small networks of continuous configurations, We have
not selected the single node nor the three-node linear network utilized by several
researchers because they are a subset of the two selected candidates that have more
characteristics for us to study and to compare with networks without coding for
understanding the tradeoffs. We shall study the queuing nature of a coding node and the
18. For more Https://www.ThesisScientist.com
59
network performance i.e. end to end delay and network throughout. Then we select some
big regular configurations for seeing and understanding how network performance would
change when utilizing different configurations and/or bigger networks [12].
The big and small networks we shall study all have two-dimensional configurations that
can detect applications in land-based networks. We shall also explore our study to a
three-dimensional network by studying an USN. Here, we have the issue to understand
first the underwater physical atmosphere for acoustic propagation and thus the effect to
data communication. This would also permit us to detect the suitable channel model
which we shall integrate into our underwater topology for the study and network coding
analysis. However a queuing analysis includes much time in mathematics for the time
limit of this study, we have resorted to simulation. Of all the simulation languages
existed in the research world, I have selected RIVERBED (Optimized Network
Engineering Tools) [OPNE14] to be our simulation simulator because that its
hierarchical modeling technique builds it simple to utilize and our research group already
has a lot of expertness about exploiting RIVERBED.
RIVERBED has a sophisticated workstation-based atmosphere for the modeling and
simulation of communication systems, networks and protocols for verifying the
described operations of some protocol and to examine their performance. On the other
side, it is comparatively easy to utilize once its design ideas are understood. RIVERBED
contains four major components: Project Editor, Node Editor, Process Editor and Packet
Editor [OPNE14]. Project Editor is utilized to make the network topology and offer the
basic analysis abilities and simulation. With the Node Editor, we can make a node with
several objects and describe several interfaces. The Process Editor contains various states
linked with transition situations; the process behavior is mentioned utilizing C/C++
language. The Packet Editor is utilized to describe the packet internal structure which can
have various different formats and fields. The debugging tool is another very helpful
characteristic of RIVERBED we shall utilize to do debugging of our simulation codes as
well as setting up and verifying the underwater channel specified above.
1.5 Contributions
19. For more Https://www.ThesisScientist.com
60
The important contributions of this thesis are:
1. The queuing performance measurement of coding nodes.
2. The network performance measurement of a multi relay network, a small butterfly
network and a bigger network when utilizing network coding, as well as the tradeoffs in
performance depending on these studies.
3. The network coding application to an underwater acoustic network and its
performance measurement and enhancement.
4. The RIVERBED modeling of an underwater channel depending on available
mathematical models so that the network performances of an underwater network can be
measured and enhanced.
1.6 Layout of Thesis
In this section describes brief insights on the dissertation work by showing the
organization of the other Chapters. There are six chapters presented in this dissertation
report that are describes as follows:
Chapter 1:.This chapter describes a detail overview of basic concepts behind the
emerging area of Underwater Acoustic Sensor Network , overview, network coding
algorithm, Topologies, Benefits of network coding, problem statement and methodology,
contributions.
Chapter 2: This chapter describes a detail explanation of various works conducted on
different protocols and simulators. It also describes the state of the art.
Chapter 3: This chapter describes a detailed background study, challenges
,assumptions.
Chapter 4: This chapter describes the operation details coding of operation at a node and
along the network data path. Then we implement them in the RIVERBED process
models and node models that are utilized in our simulations in the paper. Any general
consideration utilized in our performance analysis and evaluation are offered at the end.
Chapter 5: The chapter describes the network coding may improve the network
throughput, decrease end-to-end delay and enhance the reliability of the network. In this
chapter, we shall investigate these benefits of network coding in small networks as well
20. For more Https://www.ThesisScientist.com
61
as big networks. We shall also compare the scenarios with and without network coding.
Before we do that, we shall first provide information on our simulation and performance
evaluations.
Chapter 6: This chapter describes the conclusion and future work of this dissertation
study.
CHAPTER 2
LITERATURE REVIEW
2.1Literature Review
Wireless acoustic sensor networks are helpful in a variety of applications i.e. tracking,
localization and home applications i.e. baby alarm systems. In these applications, the
networks are needed to position acoustic sources utilizing acoustic sensor arrays and this
has been employed in several security and environmental applications. In this paper [1]
,
various basic key aspects of underwater acoustic communications are inquired. Different
architectures for two-dimensional and three-dimensional USNs are talked about, and the
features of the underwater channel are described. The main issues for the development of
effective networking solutions posed by the underwater atmosphere are described and a
cross-layer technique to the combination of all communication functionalities is
proposed. Moreover, open research challenges are talked about and possible solution
techniques are outlined. Network coding is a method where, rather than simply relaying
the packets of information they achieve, the network nodes will take many packets and
integrate them together for transmission. This can be utilized to achieve the maximum
possible information flow in a network. Network coding is a area of coding theory and
information theory. Network coding can enhance robustness, throughput, security and
complexity [2]
. In [3]
this paper they introduced UWMAC, a transmitter-based CDMA
MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to
establish the optimum transmit power and code length to decrease the near-far impact.
UW-MAC objective is to obtain three goals i.e. low channel access delay, high network
21. For more Https://www.ThesisScientist.com
62
throughput and low energy consumption. It is shown that UW-MAC maintains to
simultaneously obtain limited channel access delay, high network throughput and low
energy consumption in deep water communications, which are not critically influenced
by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a
distributed Medium Access Control (MAC) protocol which offers high bandwidth and
low energy consumption. By restricting Subcarrier Spacing Df and Guard Interval g T
they have indicated that the low energy consumption can be obtained. Subcarrier Spacing
should be selected so that the sub-carriers are orthogonal to each other, meaning that
cross-talk among the sub-carriers is removed or in other words Inter-Carrier interference
(ICI) is neglected. Guard Interval is inserted to neglect inter symbol disruption. A large
no. of closely spaced orthogonal sub-carrier signals to carry data. The data is classified
into many parallel data channels or streams, one for each subcarrier [4]
.
The writers introduced a new multi-path routing algorithm, which considering the energy
and distance into account to determine the path of transmission. The algorithm balances
the network energy consumption, increases the network‟s lifetime and enhances energy
efficiency. HMRLEACH algorithm put the energy on the first priority when selects the
path of transmission. HMR-LEACH algorithm would decrease the single path to energy
depletion process, increasing the network lifetime Period. Sink broadcast control package
first in a frequency to find the adjacent clusters, which refer to cluster that directly
transmit converged data to Sink. Then the adjacent clusters flood its own colour coded
information to non-adjacent cluster in the same frequency and proceed to flood until the
broadcast coverage of the whole network. If a cluster has obtained only one color-coded,
it indicates that the cluster has only one path leading to BS. If obtain multiple color-
coded, showing that the cluster can be multi-paths to transmit data to sink nodes [5]
.
Depending on energy consumption analysis for LEACH in underwater channel, the
writers introduced a new mechanism for cluster-head selection to assure nodes energy
load balance by assuming the distance to SINK and residual energy of candidate nodes.
A cluster based network can be divided into disjoint clusters. Every cluster contains one
cluster head and several member nodes. Every cluster head gathers data from its member
nodes and relays the processed data. Depending on the analysis of energy of LEACH
22. For more Https://www.ThesisScientist.com
63
protocol in underwater channel, a clustering mechanism for choosing and putting sensor
nodes into operation in every round is also introduced by utilizing a time metric,
according which the nodes throughout the network broadcast ADV, to assure the node
with more energy to become cluster head. Then it neglects selecting nodes with lower
residual energy and bad position as cluster-heads and then offers the energy load‟s
proportionality of sensor node [6]
. In [7]
, they introduce a new energy effective MAC
protocol known as NOGO-MAC (Node Grouped OFDMA MAC) which depend on
orthogonal frequency division multiple accesses (OFDMA) and exploit the physical
feature that propagation loss of acoustic wave based on the distance more heavily at high
frequency as compared to at low frequency. In the introduced scheme, sensor nodes are
collected according to the distance to sink node. Then, every group utilizes a different
frequency band in such a manner that sensor nodes which are nearer to the sink node
utilize higher frequency band and farther ones utilize lower frequency band. The
introduced technique not only enables all sensor nodes to manage the signal-to-noise
ratio above a specific needed level, but also decreases entire transmission power
consumption. Additionally, an adaptive sub channel allocation is used for improving data
transmission rate. In a WSN the sensor nodes are partitioned into many clusters
according to the sink position. At first, a sensor node in the cluster is elected in a random
way as the cluster head. Periodically, the sensor nodes in the same cluster will forward
its data to the head. The head combines the gathered data and then, forward these data
directly to the sink node. The process that sensor nodes forward the data to the head, the
head combined the gathered data and then, forward these data directly to the sink node is
termed as a round. After a round, every cluster will choose a new head. Maximal-energy
mechanism chooses a head which consists the maximal energy of this cluster [8]
. In [9]
the
writers investigate the CHs selection in a distributed atmosphere i.e. MANET. They
obtain new results on the algorithmic complexity of two variants of the CH selection:
size-constrained clustering and distance-constrained clustering. The first variant such as
distance constrained chooses a group of CHs such that each network node is either a CH
or is positioned within distance h hops away from the closest CH. The second variant
such as size-constrained limits the maximum size of every cluster to members. A third
23. For more Https://www.ThesisScientist.com
64
variant, integrating the distance and size constraints, is also shown. The distance-
constrained CH selection can determine a smaller CH set in comparison of the size-and-
distance-constrained selection. In this paper, a new, token-based medium access control
(TMAC) solution for underwater acoustic broadcast is proposed. TMAC offers a solution
to the synchronization issue, assuring efficient communication. TDMA protocols
partition a time interval called a frame into time slots. Every time slot is allocated to a
communication source. TDMA protocols in underwater acoustic networks need strict
synchronization. This TMAC solution neglects the requirement for synchronization and
thus underwrites successful communication [10]
. Borja Peleato and Milica Stojanovic
introduced Distance-Aware Collision Avoidance Protocol (DACAP) a non-synchronized
protocol that permits a node to utilize different hand-shake lengths for different
recipients so as to decrease the average handshake duration. This is obtained by taking
benefit of both the greater obtained power over short connections, and the computed
distance between the nodes. DACAP is a collision avoidance protocol that is simply
scalable to the changing no. of nodes and the network coverage region, and can be
analyzed for a specific network with very few restraints on the nodes. And it offers
higher throughput in comparison of Slotted FAMA with similar power efficiency [11]
. In
[12]
this paper, deployment methods of USN and gateway nodes for two-dimensional
communication architecture in Underwater Acoustic Wireless Sensor Networks
(UWSNs) are introduced. In the sensor deployment mechanism, underwater sensor nodes
are deployed in two rows along the coastline, which is of localization available, complete
coverage and connectivity and scalable. In the gateway deployment mechanism, the
gateway deployment is simulated as an optimization issue, by finding the underwater
gateway nodes locations needed to achieve a provided design goal, which can be
minimal required delay and minimal required energy consumption. The writers measure
the performance of the mechanism by extensive simulations utilizing the OPNET
network simulator. The connectivity and coverage are significant standards of the sensor
deployment techniques in underwater acoustic wireless sensor networks (UWSNs). In [13]
this paper, the writers mainly research on the deployment of underwater sensors in
UWSNs. The benefits and drawbacks of some available algorithms are examined and an
24. For more Https://www.ThesisScientist.com
65
enhanced algorithm is offered, which can obtain the complete connectivity and coverage.
Moreover, integrating with the localization problem, they deliberate a novel deployment
programmed, which is of complete connectivity and coverage, localization available and
scalable. The writers evaluate the performance of the programmed by extensive
simulations utilizing the OPNET network modeller. Unlike that of terrestrial sensor
networks, the physical layer design of Underwater Acoustic Sensor Networks (UW-
ASNs) faces far more issues due to the restricted band-width, refractive properties of the
medium, extended multipath, severe fading and large Doppler shifts. This paper
considers a tutorial overview of the physical features of acoustic propagation, modulation
techniques and power efficiency that are related to the physical layer design for
UWASNs, and examines the design consideration on every aspect. In the end, it presents
various open research problems, targeting to encourage research attempts to lay down
fundamental basis for the growth of new advanced underwater networking schemes in
the near future [14]
. LEACH protocol was introduced in [15]
. This is one of the clustering
routing protocols in WSNs. The benefit of LEACH is that every node has the equal
possibility to be a cluster head, which builds the energy dissipation of every node be
comparatively balanced. In LEACH protocol, time is partitioned into several rounds, in
every round, all the nodes contend to be cluster head according to a pre-specified
criterion. In [16]
this paper they introduce the new cluster head selection protocol i.e.
HEECH. This protocol chooses a best sensor node in terms of distance and energy as a
cluster head. The introduced protocol assumes the distance among cluster heads and BS
in multi hop and thus can solve the unbalancing energy consumption issue. As compared
to the LEACH, cluster heads in HEECH can utilize cluster heads of high level for data
transmission. Hence energy consumption is balanced between the cluster heads and thus
the network lifetime is increased. In HEECH, every cluster heads directly forwards a
beacon message to the BS to announce itself left energy when the energy level is going
to be changed. Then BS is immediately broadcasts the obtained beacon message to the
cluster heads positioned at the lower level of the cluster head that its energy has changed
to declare its energy amount. Simulation Results indicate that the HEECH increases the
lifetime of network about 9% and 56% in comparison of the HEED and LEACH
25. For more Https://www.ThesisScientist.com
66
respectively. A major concentration on the Acoustic Telemetry Group at Woods Hole
Oceanographic Institution (WHOI) has been the development of underwater acoustic
communication networks. Same as a cellular telephone network, an acoustic network
contains a no. of modems or nodes which adaptively transmit digital data packets
between scientific sensors and a viewing point or data collection. An important milestone
in the growth of such a network has been the latest establishment of a multichannel
adaptive recipient for coherent underwater communications. In paper [17]
, conventionally,
FEC (Forward Error Correction) and ARQ (Automatic Repeat Request) techniques have
been employed to tackle channel errors. In ARQ-based techniques, a sender resends a
packet if it obtains some feedback from either the destination node or next-hop that the
packet has been dropped, or if it observes a timeout. In the underwater acoustic channel,
an ARQ-based technique may induce long waiting time before a dropped packet can be
retransferred, hence exacerbating the long delays already caused by the slow propagation
speed. On the other side, FEC-based techniques add additional redundancy to the packet
before transmission. With limited bandwidth and energy restraints, as well as a highly
dynamic channel, the right amount of redundancy may be hard to determine. In current
years, network coding has become a very active research field. With network coding, an
intermediary node may integrate packets that it has prior obtained; this yields to higher
robustness against packet drops, however the destination node would still be capable to
extract the actual packets when it achieves an enough no. of packets that meets specific
properties. It has been indicated to be a promising scheme that could powerfully help
networks obtain high packet delivery ratio (PDR) as well as lower packet delays and
energy efficiency linear network coding encoded packet is a linear integration of the
actual packets, and all computations are done over a finite field for any provided set of
actual packets. Acoustic waves are specifically pleased to underwater water wireless
communication because of the comparatively low absorption in underwater atmospheres.
The pathless, multipath and noise effects of the underwater terrain on acoustic waves are
explained in [20]
with comparison to optical and electromagnetic waves. They introduce
engineering counter measures in the form of physical layer schemes i.e. Direct Sequence
Spread Spectrum and multicarrier modulation i.e. orthogonal frequency division
26. For more Https://www.ThesisScientist.com
67
multiplexing (OFDM) to mitigate the impact of channel non-idealities i.e. multipath.
Acoustic signals were also represented to provide lowest data rate, medium antenna
complexity and longest transmission range. Since, the impact of propagation delay,
particularly arising from this long transmission coverage, on the selection of modulation
is not treated. A network performance evaluation related to choice of medium access
control techniques (MAC) and different configurations is defined in [6]
. Chen and
Varshney [5]
, as well as Yigitel et al [31]
also provide some depth of insight into the
literature review in Quality of Service (QoS) support for wireless sensor networks
(WSNs). These works and other reviews [2,5,9,23]
without knowledge share a common
theme on the reliability of design and wireless sensor networks implementation. While
this has explored the application to various different fields, it has also generated
divergent views, resulting in deficiency of standardization and diverse application-
specific needs. As specified in [28]
, this has stripped WSNs from having a single de-facto
standard MAC protocol. While, these techniques have obtained remarkable levels of
efficiency, when the packets gain access to the medium, non-idealities of the channel
take their toll on the transferred packets and medium access control techniques can no
longer ensure the packets conditions when they reach at the sink; regardless of the QoS
measures implemented. The aforesaid references do not take cognizance of the available
of these non-idealities in the results shown hence building such results rather optimistic.
According to [14]
, incorporating non-ideal situations i.e. path loss and multipath fading
into the simulation exerts a non-negligible effect on the wireless local area networks
performance. However, the wireless acoustic signal utilized in WASNs is also subject to
same intrinsic channel impacts, this sets the stage for a similar investigation into the
effect on WASN performance The starting point for such investigation starts with a
observation that the information transmission over a channel is achieved by mapping the
digital information to a sequence of symbols which vary some features of an
electromagnetic wave known as the carrier. This procedure is known as modulation, and
is responsible for message signal transmission through the communication channel with
the best possible quality [23]
. Thus the choice of a modulation technique that is robust to
channel impairments is always an interesting concern for communication systems, and
27. For more Https://www.ThesisScientist.com
68
more so when the channel is a wireless medium. The study in [24]
concentrated on
traditional narrowband modulation mechanisms i.e. quadrature amplitude modulation
(QAM) and differential phase shift keying (DPSK) and the results indicate that these
techniques cannot be depend on to mitigate network performance reduction in the
existence of non-ideal channel situations. Since, it is well established in literature [32,33]
that translating the narrowband signal to a wideband signals before transmission
decreases the impact of channel non-idealities i.e. multipath. The traditional scheme for
narrowband to wideband signal conversion is the usage of pseudo-noise (PN) sequences
and is further explained in chapter two. Worthy of note however, is that most available
research works [10,14]
acknowledge that traditional broadband modulation techniques,
otherwise known as spread spectrum mechanisms provide excellent performance in
mitigating the impact of non-ideal channel conditions, and especially excel in
importantly decreasing the impact of multipath. In [15]
, Kennedy et al. propose the
application of an alternative spread spectrum scheme to WLANs. This optional technique
is derived from the evolving field of chaos communication where the information to be
transferred is mapped to chaotic signals (rather than PN sequences) which are robust to
multipath and reputed to be inherently wideband [1,28]
. It was shown, through noise
performance comparison (AWGN), that the performance of chaos modulation techniques
is worse than those of the traditional broadband techniques with their performance
restrictions stemming from their chaotic features [18,25]
. Citing the availability of other
non-ideal application scenarios i.e. industrial application, where the channel impairments
go beyond the ideal scope of AWGN, Kennedy et al. introduce the application of a chaos
modulation technique to WLANs. They provide support to the proposal by highlighting
many benefits provided by chaos modulation techniques i.e. demodulation without
carrier synchronization as well as simple circuitry. These were also specified to be
downsides for traditional spread spectrum mechanisms. This makes a good platform for
the new work performed by Leung et.al in [22]
and the comparison in [25]
. These works,
since, concentrates on the physical layer and network performance comparisons are not
involved in the results.
28. For more Https://www.ThesisScientist.com
69
CHAPTER 3
BACKGROUND STUDY
3.1 Underwater Acoustic Sensor Networks Communication
Architecture
In this section, we describe the communication architecture of underwater acoustic
sensor networks. The reference architectures described in this section are used as a basis
for discussion of the challenges associated with underwater acoustic
Fig. 3.1 Architecture for 2D Underwater Sensor Networks
sensor networks [21]. The underwater sensor network topology is an open research issue
in itself that needs further analytical and simulative investigation from the research
community. In the remainder of this section, we discuss the following architectures:
Static two-dimensional UW-ASNs for ocean bottom monitoring. These are
constituted by sensor nodes that are anchored to the bottom of the ocean. Typical
applications may be environmental monitoring, or monitoring of underwater plates in
tectonics [4].
29. For more Https://www.ThesisScientist.com
70
Static three-dimensional UW-ASNs for ocean column monitoring. These include
networks of sensors whose depth can be controlled by means of techniques discussed in
Section II-B, and may be used for surveillance applications or monitoring of ocean
phenomena (ocean biogeochemical processes, water streams, pollution, etc).
A. Two-dimensional Underwater Sensor Networks
Reference architecture for two-dimensional underwater networks is shown in Fig. 2.1. A
group of sensor nodes are anchored to the bottom of the ocean with deep ocean anchors.
By means of wireless acoustic links, underwater sensor nodes are interconnected to one
or more underwater sinks (uw-sinks), which are network devices in charge of relaying
data from the ocean bottom network to a surface station. To achieve this objective, uw-
sinks are equipped with two acoustic transceivers, namely a vertical and a horizontal
transceiver [20]. The horizontal transceiver is used by the uw-sink to communicate with
the sensor nodes in order to: i) send commands and configuration data to the sensors
(uw-sink to sensors); ii) collect monitored data (sensors to uw-sink). The vertical link is
used by the uw links to relay data to a surface station. Vertical transceivers must be long
range transceivers for deep water applications as the ocean can be as deep as 10 km. The
surface station is equipped with an acoustic transceiver that is able to handle multiple
parallel communications with the deployed uw-sinks. It is also endowed with a long
range RF and/or satellite
30. For more Https://www.ThesisScientist.com
71
Fig. 3.2 Architecture for 3D Underwater Sensor Networks
Design Criteria
The development of practical underwater networks is a difficult task that requires a broad
range of skills. Not only must the physical layer provide reliable links in all
environmental conditions, but there are a host of protocols that are required to support
the network discovery and maintenance as well as interoperability, message formation,
and system security [28]. As electromagnetic waves do not propagate well underwater,
acoustics plays a key role in underwater communication. Due to significant differences
in the characteristics of electromagnetic and acoustic channels, the design of feasible
underwater networks needs to take into account a wide variety of different constraints.
The long delays, frequency-dependence and extreme limitations in achievable bandwidth
and link range of acoustics should be of primary concern at an early design stage in
addition to power and throughput efficiency, and system reliability. These factors make
underwater networking a challenging and rewarding endeavour. In this chapter, some
significant aspects to be considered when designing an underwater communication
31. For more Https://www.ThesisScientist.com
72
system are analyzed. For example, the description of the environment where the network
is supposed to be deployed, technical criteria and general assumptions [18].
3.2 Challenges
The design of underwater networks involves many topics covering physical and
networking capabilities. As acoustic channels are commonly used for underwater
communications, the main focuses in this project are the state of- the-art analysis of
commercial acoustic modems and suppliers as well as the design and possible
implementation of Medium Access with Interference Cancellation and Network Coding
(main part). While some Medium Access schemes have been successful in traditional
radio communications, they are prone to severe limitations in efficiency and scalability
when employed in the underwater environment posing many challenges to networking
protocol design. For example, in Medium Access Control (MAC) schemes which operate
entirely in the time domain (for instance, TDMA and CSMA), these disadvantages are
primarily because of the very large propagation delays [31]. Therefore, new strategies are
needed in order to account the specific features of underwater propagation. Some design
challenges for reliable data transport in UWSNs [32] could be as follows:
1. End-to-End approach does not work well due to the high channel error probability and
the low propagation speed of acoustic signals
2. Half-Duplex acoustic channels limit the choice of complex ARQ protocols
3. Too many feedback from receivers are not desirable in terms of energy consumption
4. Very large bulk data transmission is not suitable in mobile UWSNs because of the
limited communication time between any pair of sender and receiver, the low bandwidth
and the long propagation delay
3.3 Assumptions
The main goal of this project is to investigate how Medium Access with Interference
Cancellation and Network Coding perform regarding data dissemination as compared
with employed MAC techniques underwater. In this sense, some tests are conducted in
32. For more Https://www.ThesisScientist.com
73
order to evaluate the performance. Consequently, general assumptions should be stated
to understand how the tests are carried out. In this project, an underwater network is
simply defined as a set of nodes which communicate using acoustics waves. The nodes
are fixed and the distance among them is considered in the long range; a typical range
between transmitter and receiver could be 1 km. Despite being a stationary network,
mobile scenarios where nodes can passively float with water currents are also taken into
account for explanations. The coverage range of a node is one hop. This means that the
level of signal which is received by next hop node is very high, otherwise, is very low.
Typical values used in mobile communications systems are 90% and 10%, respectively.
So, it is assumed that the signal from a source node will not be received by nodes whose
range is higher than one hop. Likewise, regarding the sound propagation speed, its
nominal value 1500 m/s is used for calculations. Another relevant aspect which should
be assumed in the performance evaluation of Medium Access schemes is the packet
length. Hence, the packet size is set basing on two approaches. First, the transmission
capacity of nodes is considered without data redundancy. Second, the packet
transmission time is equals to the propagation delay depending on the distance between
sender and receiver [30].
On the other hand, it should be mentioned that the node with greater impact on the
network is supposed to implement Interference Cancellation and Network Coding
whereas the other nodes are in charge of data packet retransmission using Interference
Cancellation. Besides, a two-way communication (upstream and downstream flows),
unlimited storage capacity of terminals and kjno packet erasures are assumed to conduct
the experiments. Finally, the dissemination process is completed when the target nodes
have received all the requested packets [31].
3.4 Target Scenario
The tests have been conducted over two scenarios:
• Scenario 1: Line-up network. The goal is to investigate how the data is disseminated
through nodes and how many time the data dissemination process takes
33. For more Https://www.ThesisScientist.com
74
• Scenario 2: Meshed network. The aim is to analyze the performance of proposed MAC
methods in such common topologies: dense traffic situations in large-scale networks
3.4.1 Line-up Network
This scenario consists of 5 nodes which are aligned either vertically or horizontally. They
are named and organized from left to right as ”NODE X”. Each node is logically linked
with its upstream and downstream nodes. Figure 3.3 shows the horizontal deployment of
the line-up network.
Figure 3.3: Line-up network in horizontal deployment
Its working principle is based on disseminating data packets among nodes. Thus, two
information flows, A and B, are disseminated through the network. While flow A is
transmitted upstream by NODE 1, flow B is sent downstream by NODE 5. Note that all
nodes want both data flows. So, this scenario is an easy way to evaluate the performance
of proposed and existing MAC techniques in terms of data dissemination process.
3.4.2 Meshed Network
As in the previous scenario, the network comprises 5 nodes in a meshed topology.
However, its purpose and behavior are quite different. In this particular case, nodes are
34. For more Https://www.ThesisScientist.com
75
linked logically building a meshed network with some single properties. Despite being a
meshed network, it works through two axes, x and y. The performance focuses on two
data flows, A and B, which are transmitted in parallel. Flow A is transmitted through x-
axis by NODE 2 whereas flow B is sent through y-axis by NODE 3. Note that now
NODE 4 and 5 wants the data flows A and B, respectively. Also, NODE 2 and 3
broadcast their corresponding data flows as well as NODE 1, which is in charge of
broadcasting both data flows to the rest of nodes as its the core of the network. This
means that other nodes around will received both data flows even though they are not
interested. Figure 3.4 depicts a possible deployment of the meshed network.
This scenario is intended for describing a typical situation in present meshed networks
which is faced poorly efficient by current employed MAC methods due to the
underwater channel constraints. Consequently, it is a good chance to find out how
proposed MAC techniques performs in this common environment.
Figure 3.4: Meshed network deployment
3.5 Technical Criteria
From the engineering point of view, several desirable requirements should be aimed at
when designing an underwater communication system. They can vary depending on the
deployment environment and the applications. Such crucial issues can be power
35. For more Https://www.ThesisScientist.com
76
consumption, throughput, reliability and scalability. In this section, some design factors
for underwater networks will be stated [33].
Signal Communication
According to previous statements, the most convenient technology for underwater
communication is upon acoustics in spite of its limiting factors. So, its channel effects
should be taken into account at an early design stage evaluating how they affect to the
design requirements. Note that range and data rate plays a key role in the selection of the
communication carrier.
Type of Cells
Depending on the environment and the distribution of nodes, omnidirectional or
directional antennas should be chosen for the design.
• Omni directional: Suitable for dynamic topologies where nodes are mobile and the
communication time between sender and receiver is limited.
• Directional: Appropriated for stationary communications where nodes are fixed. In this
scenario, the objective is to concentrate all the energy on a particular area
In this project, the nodes are supposed to transmit with omni-directional antennas though
the scenarios to conduct the tests are static, thus, the broadcast nature can be exploited.
Coverage Levels
As in each wireless communication system, the coverage study is a significant factor to
determine the system efficiency. It should fulfill the BER and SNR requirements at the
receiver to correctly demodulate the data packets. This analysis should also consider the
limiting factors of underwater propagation, sensitivity at the receiver, transmission power
and all those factors which are included in the power balance. The passive sonar equation
[33] characterizes the signal to noise ratio (SNRU) of an emitted underwater signal at the
receiver.
Underwater Deployment
The medium has strong influence on the deployment of an underwater network. In this
sense, performance varies drastically depending on depth, type of water and weather
conditions which affect seriously any underwater communications. To combat this
unpredictability, some underwater communications systems are designed for reliability
36. For more Https://www.ThesisScientist.com
77
even when operating in harsh conditions and these configurations lead to sub-optimal
performance when good propagation conditions exist. Part of the challenge in optimizing
performance is to predict which environmental factors have the greatest impact. A key
element to predicting channel characteristics is correctly estimate the multipath and this
is possible only if the properties of the boundaries are carefully modeled with simulation
tools or channel measurements when possible [33].
Energy Consumption
Energy efficiency is always a major concern to prolong the network time. As nodes are
battery-powered, recharging or replacing node batteries is difficult, especially in hard-to-
access areas such as the underwater environment. In order to cope this constraint there
are two solutions: the first is energetic based on the finding of optimal frequency for
underwater communication, the second solution is formal based on the choice of MAC
protocols essentially these of routing. That second approach is the basis of this project in
investigating the viability of proposed MAC techniques in underwater networks. NB.
Another approach in order to optimize energy utilization which is gaining more and more
attention in sensor networks is the power-sleeping mode, where devices alternate
between active and sleep mode. There is proved that the combination of both radio off
and microcontroller power down mode can significantly increase the network lifetime. A
particular work [34] proposes a cooperative mechanism for data distribution that
increases system reliability, and at the same time keeps the memory consumption for
data storage low on each device using previous approach.
Bandwidth
It is well known that the frequency-dependency of the acoustic path loss imposes a
bandwidth limitation on an underwater communication system. As sound waves are
much slower than the electromagnetic the latency in communication is typically much
higher. Due to the multi-path propagation and ambient noise, the effective data rates are
lower and packet loss rate is usually much greater. There are several approaches to
improve the bandwidth efficiency. One way to achieve high throughputs over band-
limited underwater acoustic channels could be to improve the receivers by using optimal
modulation and coding techniques. Many research focus on the PSK (Phase Shift
37. For more Https://www.ThesisScientist.com
78
Keying) modulation, which are a viable way of achieving high speed data transmission.
This topic is also included in this project as an important research task. For this reason,
the state-of-the-art analysis of current commercial acoustic modems will be discussed
later.
Reliability
The need for reliable underwater communications is a difficult task when there are
limitations in energy consumption and storage capacity of nodes. Some critical
applications can demand data retrieval with high probability but assuring low energy
consumption. On possible approach is temporally distribute the date to be stored
cooperatively on many nodes of the network. Data replication can also be applied to
increase reliability of data retrieval process.
Underwater Wireless Transceiver
Evolutionary processes have shaped acoustic communication behaviors of remarkable
complexity. Thus, numerous researches have led to the development of innovative
receiver structures for robust underwater acoustic communication as consequences of
advances in electronics and computer technology.
Due to the underwater acoustic channel constraints, some issues like attenuation, low
power consumption, Bit Error Rate, error coding and alternative modulation strategies
should be considered in the proposition of the transceiver structure and its design. The
values of these parameters mentioned above are crucial to improve the wireless
underwater communication. Although the aim of this chapter is to describe the state-of-
the-art of commercial acoustic modems, it is also desirable to introduce some design
considerations for underwater wireless communication transceivers.
3.6 Design Considerations
As acoustic carriers are used for communications, signals are distorted by a variety of
factors; the major contributors are absorption, refraction and reflection (reverberation).
Through these three factors, the signals picked up by receivers are duplicated forms of
the original, of varying levels of strength and distorted by spreading or compression.
Large delays between transactions can reduce the throughput of the system considerably
38. For more Https://www.ThesisScientist.com
79
if it is not taken into account. Also, the battery-powered network nodes limit the lifetime
of the proposed transceiver. Therefore, advanced signal processing is very important and
required to make optimum use of the transmission capabilities. To overcome these
difficulties, different modulations techniques and signaling encoding methods might
provide a feasible means for a more efficient use of the underwater acoustic channel
bandwidth. In fact, the values of the transmission loss, transmission distance and power
consumption, should be optimized to improve the wireless underwater communication
and the transceiver performance [27]. An important concern regarding wireless
transceiver for the underwater communication is its requirement of a transducer at the
transmitter side. This transducer allows to transform electrical waves into sound waves
and inversely.
CHAPTER 2
LITERATURE REVIEW
2.1Literature Review
Wireless acoustic sensor networks are helpful in a variety of applications i.e. tracking,
localization and home applications i.e. baby alarm systems. In these applications, the
networks are needed to position acoustic sources utilizing acoustic sensor arrays and this
has been employed in several security and environmental applications. In this paper [1]
,
various basic key aspects of underwater acoustic communications are inquired. Different
architectures for two-dimensional and three-dimensional USNs are talked about, and the
features of the underwater channel are described. The main issues for the development of
effective networking solutions posed by the underwater atmosphere are described and a
cross-layer technique to the combination of all communication functionalities is
proposed. Moreover, open research challenges are talked about and possible solution
techniques are outlined. Network coding is a method where, rather than simply relaying
the packets of information they achieve, the network nodes will take many packets and
39. For more Https://www.ThesisScientist.com
80
integrate them together for transmission. This can be utilized to achieve the maximum
possible information flow in a network. Network coding is a area of coding theory and
information theory. Network coding can enhance robustness, throughput, security and
complexity [2]
. In [3]
this paper they introduced UWMAC, a transmitter-based CDMA
MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to
establish the optimum transmit power and code length to decrease the near-far impact.
UW-MAC objective is to obtain three goals i.e. low channel access delay, high network
throughput and low energy consumption. It is shown that UW-MAC maintains to
simultaneously obtain limited channel access delay, high network throughput and low
energy consumption in deep water communications, which are not critically influenced
by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a
distributed Medium Access Control (MAC) protocol which offers high bandwidth and
low energy consumption. By restricting Subcarrier Spacing Df and Guard Interval g T
they have indicated that the low energy consumption can be obtained. Subcarrier Spacing
should be selected so that the sub-carriers are orthogonal to each other, meaning that
cross-talk among the sub-carriers is removed or in other words Inter-Carrier interference
(ICI) is neglected. Guard Interval is inserted to neglect inter symbol disruption. A large
no. of closely spaced orthogonal sub-carrier signals to carry data. The data is classified
into many parallel data channels or streams, one for each subcarrier [4]
.
The writers introduced a new multi-path routing algorithm, which considering the energy
and distance into account to determine the path of transmission. The algorithm balances
the network energy consumption, increases the network‟s lifetime and enhances energy
efficiency. HMRLEACH algorithm put the energy on the first priority when selects the
path of transmission. HMR-LEACH algorithm would decrease the single path to energy
depletion process, increasing the network lifetime Period. Sink broadcast control package
first in a frequency to find the adjacent clusters, which refer to cluster that directly
transmit converged data to Sink. Then the adjacent clusters flood its own colour coded
information to non-adjacent cluster in the same frequency and proceed to flood until the
broadcast coverage of the whole network. If a cluster has obtained only one color-coded,
it indicates that the cluster has only one path leading to BS. If obtain multiple color-
40. For more Https://www.ThesisScientist.com
81
coded, showing that the cluster can be multi-paths to transmit data to sink nodes [5]
.
Depending on energy consumption analysis for LEACH in underwater channel, the
writers introduced a new mechanism for cluster-head selection to assure nodes energy
load balance by assuming the distance to SINK and residual energy of candidate nodes.
A cluster based network can be divided into disjoint clusters. Every cluster contains one
cluster head and several member nodes. Every cluster head gathers data from its member
nodes and relays the processed data. Depending on the analysis of energy of LEACH
protocol in underwater channel, a clustering mechanism for choosing and putting sensor
nodes into operation in every round is also introduced by utilizing a time metric,
according which the nodes throughout the network broadcast ADV, to assure the node
with more energy to become cluster head. Then it neglects selecting nodes with lower
residual energy and bad position as cluster-heads and then offers the energy load‟s
proportionality of sensor node [6]
. In [7]
, they introduce a new energy effective MAC
protocol known as NOGO-MAC (Node Grouped OFDMA MAC) which depend on
orthogonal frequency division multiple accesses (OFDMA) and exploit the physical
feature that propagation loss of acoustic wave based on the distance more heavily at high
frequency as compared to at low frequency. In the introduced scheme, sensor nodes are
collected according to the distance to sink node. Then, every group utilizes a different
frequency band in such a manner that sensor nodes which are nearer to the sink node
utilize higher frequency band and farther ones utilize lower frequency band. The
introduced technique not only enables all sensor nodes to manage the signal-to-noise
ratio above a specific needed level, but also decreases entire transmission power
consumption. Additionally, an adaptive sub channel allocation is used for improving data
transmission rate. In a WSN the sensor nodes are partitioned into many clusters
according to the sink position. At first, a sensor node in the cluster is elected in a random
way as the cluster head. Periodically, the sensor nodes in the same cluster will forward
its data to the head. The head combines the gathered data and then, forward these data
directly to the sink node. The process that sensor nodes forward the data to the head, the
head combined the gathered data and then, forward these data directly to the sink node is
termed as a round. After a round, every cluster will choose a new head. Maximal-energy
41. For more Https://www.ThesisScientist.com
82
mechanism chooses a head which consists the maximal energy of this cluster [8]
. In [9]
the
writers investigate the CHs selection in a distributed atmosphere i.e. MANET. They
obtain new results on the algorithmic complexity of two variants of the CH selection:
size-constrained clustering and distance-constrained clustering. The first variant such as
distance constrained chooses a group of CHs such that each network node is either a CH
or is positioned within distance h hops away from the closest CH. The second variant
such as size-constrained limits the maximum size of every cluster to members. A third
variant, integrating the distance and size constraints, is also shown. The distance-
constrained CH selection can determine a smaller CH set in comparison of the size-and-
distance-constrained selection. In this paper, a new, token-based medium access control
(TMAC) solution for underwater acoustic broadcast is proposed. TMAC offers a solution
to the synchronization issue, assuring efficient communication. TDMA protocols
partition a time interval called a frame into time slots. Every time slot is allocated to a
communication source. TDMA protocols in underwater acoustic networks need strict
synchronization. This TMAC solution neglects the requirement for synchronization and
thus underwrites successful communication [10]
. Borja Peleato and Milica Stojanovic
introduced Distance-Aware Collision Avoidance Protocol (DACAP) a non-synchronized
protocol that permits a node to utilize different hand-shake lengths for different
recipients so as to decrease the average handshake duration. This is obtained by taking
benefit of both the greater obtained power over short connections, and the computed
distance between the nodes. DACAP is a collision avoidance protocol that is simply
scalable to the changing no. of nodes and the network coverage region, and can be
analyzed for a specific network with very few restraints on the nodes. And it offers
higher throughput in comparison of Slotted FAMA with similar power efficiency [11]
. In
[12]
this paper, deployment methods of USN and gateway nodes for two-dimensional
communication architecture in Underwater Acoustic Wireless Sensor Networks
(UWSNs) are introduced. In the sensor deployment mechanism, underwater sensor nodes
are deployed in two rows along the coastline, which is of localization available, complete
coverage and connectivity and scalable. In the gateway deployment mechanism, the
gateway deployment is simulated as an optimization issue, by finding the underwater
42. For more Https://www.ThesisScientist.com
83
gateway nodes locations needed to achieve a provided design goal, which can be
minimal required delay and minimal required energy consumption. The writers measure
the performance of the mechanism by extensive simulations utilizing the OPNET
network simulator. The connectivity and coverage are significant standards of the sensor
deployment techniques in underwater acoustic wireless sensor networks (UWSNs). In [13]
this paper, the writers mainly research on the deployment of underwater sensors in
UWSNs. The benefits and drawbacks of some available algorithms are examined and an
enhanced algorithm is offered, which can obtain the complete connectivity and coverage.
Moreover, integrating with the localization problem, they deliberate a novel deployment
programmed, which is of complete connectivity and coverage, localization available and
scalable. The writers evaluate the performance of the programmed by extensive
simulations utilizing the OPNET network modeller. Unlike that of terrestrial sensor
networks, the physical layer design of Underwater Acoustic Sensor Networks (UW-
ASNs) faces far more issues due to the restricted band-width, refractive properties of the
medium, extended multipath, severe fading and large Doppler shifts. This paper
considers a tutorial overview of the physical features of acoustic propagation, modulation
techniques and power efficiency that are related to the physical layer design for
UWASNs, and examines the design consideration on every aspect. In the end, it presents
various open research problems, targeting to encourage research attempts to lay down
fundamental basis for the growth of new advanced underwater networking schemes in
the near future [14]
. LEACH protocol was introduced in [15]
. This is one of the clustering
routing protocols in WSNs. The benefit of LEACH is that every node has the equal
possibility to be a cluster head, which builds the energy dissipation of every node be
comparatively balanced. In LEACH protocol, time is partitioned into several rounds, in
every round, all the nodes contend to be cluster head according to a pre-specified
criterion. In [16]
this paper they introduce the new cluster head selection protocol i.e.
HEECH. This protocol chooses a best sensor node in terms of distance and energy as a
cluster head. The introduced protocol assumes the distance among cluster heads and BS
in multi hop and thus can solve the unbalancing energy consumption issue. As compared
to the LEACH, cluster heads in HEECH can utilize cluster heads of high level for data
43. For more Https://www.ThesisScientist.com
84
transmission. Hence energy consumption is balanced between the cluster heads and thus
the network lifetime is increased. In HEECH, every cluster heads directly forwards a
beacon message to the BS to announce itself left energy when the energy level is going
to be changed. Then BS is immediately broadcasts the obtained beacon message to the
cluster heads positioned at the lower level of the cluster head that its energy has changed
to declare its energy amount. Simulation Results indicate that the HEECH increases the
lifetime of network about 9% and 56% in comparison of the HEED and LEACH
respectively. A major concentration on the Acoustic Telemetry Group at Woods Hole
Oceanographic Institution (WHOI) has been the development of underwater acoustic
communication networks. Same as a cellular telephone network, an acoustic network
contains a no. of modems or nodes which adaptively transmit digital data packets
between scientific sensors and a viewing point or data collection. An important milestone
in the growth of such a network has been the latest establishment of a multichannel
adaptive recipient for coherent underwater communications. In paper [17]
, conventionally,
FEC (Forward Error Correction) and ARQ (Automatic Repeat Request) techniques have
been employed to tackle channel errors. In ARQ-based techniques, a sender resends a
packet if it obtains some feedback from either the destination node or next-hop that the
packet has been dropped, or if it observes a timeout. In the underwater acoustic channel,
an ARQ-based technique may induce long waiting time before a dropped packet can be
retransferred, hence exacerbating the long delays already caused by the slow propagation
speed. On the other side, FEC-based techniques add additional redundancy to the packet
before transmission. With limited bandwidth and energy restraints, as well as a highly
dynamic channel, the right amount of redundancy may be hard to determine. In current
years, network coding has become a very active research field. With network coding, an
intermediary node may integrate packets that it has prior obtained; this yields to higher
robustness against packet drops, however the destination node would still be capable to
extract the actual packets when it achieves an enough no. of packets that meets specific
properties. It has been indicated to be a promising scheme that could powerfully help
networks obtain high packet delivery ratio (PDR) as well as lower packet delays and
energy efficiency linear network coding encoded packet is a linear integration of the
44. For more Https://www.ThesisScientist.com
85
actual packets, and all computations are done over a finite field for any provided set of
actual packets. Acoustic waves are specifically pleased to underwater water wireless
communication because of the comparatively low absorption in underwater atmospheres.
The pathless, multipath and noise effects of the underwater terrain on acoustic waves are
explained in [20]
with comparison to optical and electromagnetic waves. They introduce
engineering counter measures in the form of physical layer schemes i.e. Direct Sequence
Spread Spectrum and multicarrier modulation i.e. orthogonal frequency division
multiplexing (OFDM) to mitigate the impact of channel non-idealities i.e. multipath.
Acoustic signals were also represented to provide lowest data rate, medium antenna
complexity and longest transmission range. Since, the impact of propagation delay,
particularly arising from this long transmission coverage, on the selection of modulation
is not treated. A network performance evaluation related to choice of medium access
control techniques (MAC) and different configurations is defined in [6]
. Chen and
Varshney [5]
, as well as Yigitel et al [31]
also provide some depth of insight into the
literature review in Quality of Service (QoS) support for wireless sensor networks
(WSNs). These works and other reviews [2,5,9,23]
without knowledge share a common
theme on the reliability of design and wireless sensor networks implementation. While
this has explored the application to various different fields, it has also generated
divergent views, resulting in deficiency of standardization and diverse application-
specific needs. As specified in [28]
, this has stripped WSNs from having a single de-facto
standard MAC protocol. While, these techniques have obtained remarkable levels of
efficiency, when the packets gain access to the medium, non-idealities of the channel
take their toll on the transferred packets and medium access control techniques can no
longer ensure the packets conditions when they reach at the sink; regardless of the QoS
measures implemented. The aforesaid references do not take cognizance of the available
of these non-idealities in the results shown hence building such results rather optimistic.
According to [14]
, incorporating non-ideal situations i.e. path loss and multipath fading
into the simulation exerts a non-negligible effect on the wireless local area networks
performance. However, the wireless acoustic signal utilized in WASNs is also subject to
same intrinsic channel impacts, this sets the stage for a similar investigation into the
45. For more Https://www.ThesisScientist.com
86
effect on WASN performance The starting point for such investigation starts with a
observation that the information transmission over a channel is achieved by mapping the
digital information to a sequence of symbols which vary some features of an
electromagnetic wave known as the carrier. This procedure is known as modulation, and
is responsible for message signal transmission through the communication channel with
the best possible quality [23]
. Thus the choice of a modulation technique that is robust to
channel impairments is always an interesting concern for communication systems, and
more so when the channel is a wireless medium. The study in [24]
concentrated on
traditional narrowband modulation mechanisms i.e. quadrature amplitude modulation
(QAM) and differential phase shift keying (DPSK) and the results indicate that these
techniques cannot be depend on to mitigate network performance reduction in the
existence of non-ideal channel situations. Since, it is well established in literature [32,33]
that translating the narrowband signal to a wideband signals before transmission
decreases the impact of channel non-idealities i.e. multipath. The traditional scheme for
narrowband to wideband signal conversion is the usage of pseudo-noise (PN) sequences
and is further explained in chapter two. Worthy of note however, is that most available
research works [10,14]
acknowledge that traditional broadband modulation techniques,
otherwise known as spread spectrum mechanisms provide excellent performance in
mitigating the impact of non-ideal channel conditions, and especially excel in
importantly decreasing the impact of multipath. In [15]
, Kennedy et al. propose the
application of an alternative spread spectrum scheme to WLANs. This optional technique
is derived from the evolving field of chaos communication where the information to be
transferred is mapped to chaotic signals (rather than PN sequences) which are robust to
multipath and reputed to be inherently wideband [1,28]
. It was shown, through noise
performance comparison (AWGN), that the performance of chaos modulation techniques
is worse than those of the traditional broadband techniques with their performance
restrictions stemming from their chaotic features [18,25]
. Citing the availability of other
non-ideal application scenarios i.e. industrial application, where the channel impairments
go beyond the ideal scope of AWGN, Kennedy et al. introduce the application of a chaos
modulation technique to WLANs. They provide support to the proposal by highlighting
46. For more Https://www.ThesisScientist.com
87
many benefits provided by chaos modulation techniques i.e. demodulation without
carrier synchronization as well as simple circuitry. These were also specified to be
downsides for traditional spread spectrum mechanisms. This makes a good platform for
the new work performed by Leung et.al in [22]
and the comparison in [25]
. These works,
since, concentrates on the physical layer and network performance comparisons are not
involved in the results.
CHAPTER 3
BACKGROUND STUDY
3.1 Underwater Acoustic Sensor Networks Communication
Architecture
47. For more Https://www.ThesisScientist.com
88
In this section, we describe the communication architecture of underwater acoustic
sensor networks. The reference architectures described in this section are used as a basis
for discussion of the challenges associated with underwater acoustic
Fig. 3.1 Architecture for 2D Underwater Sensor Networks
sensor networks [21]. The underwater sensor network topology is an open research issue
in itself that needs further analytical and simulative investigation from the research
community. In the remainder of this section, we discuss the following architectures:
Static two-dimensional UW-ASNs for ocean bottom monitoring. These are
constituted by sensor nodes that are anchored to the bottom of the ocean. Typical
applications may be environmental monitoring, or monitoring of underwater plates in
tectonics [4].
Static three-dimensional UW-ASNs for ocean column monitoring. These include
networks of sensors whose depth can be controlled by means of techniques discussed in
Section II-B, and may be used for surveillance applications or monitoring of ocean
phenomena (ocean biogeochemical processes, water streams, pollution, etc).
A. Two-dimensional Underwater Sensor Networks
48. For more Https://www.ThesisScientist.com
89
Reference architecture for two-dimensional underwater networks is shown in Fig. 2.1. A
group of sensor nodes are anchored to the bottom of the ocean with deep ocean anchors.
By means of wireless acoustic links, underwater sensor nodes are interconnected to one
or more underwater sinks (uw-sinks), which are network devices in charge of relaying
data from the ocean bottom network to a surface station. To achieve this objective, uw-
sinks are equipped with two acoustic transceivers, namely a vertical and a horizontal
transceiver [20]. The horizontal transceiver is used by the uw-sink to communicate with
the sensor nodes in order to: i) send commands and configuration data to the sensors
(uw-sink to sensors); ii) collect monitored data (sensors to uw-sink). The vertical link is
used by the uw links to relay data to a surface station. Vertical transceivers must be long
range transceivers for deep water applications as the ocean can be as deep as 10 km. The
surface station is equipped with an acoustic transceiver that is able to handle multiple
parallel communications with the deployed uw-sinks. It is also endowed with a long
range RF and/or satellite
Fig. 3.2 Architecture for 3D Underwater Sensor Networks
Design Criteria
49. For more Https://www.ThesisScientist.com
90
The development of practical underwater networks is a difficult task that requires a broad
range of skills. Not only must the physical layer provide reliable links in all
environmental conditions, but there are a host of protocols that are required to support
the network discovery and maintenance as well as interoperability, message formation,
and system security [28]. As electromagnetic waves do not propagate well underwater,
acoustics plays a key role in underwater communication. Due to significant differences
in the characteristics of electromagnetic and acoustic channels, the design of feasible
underwater networks needs to take into account a wide variety of different constraints.
The long delays, frequency-dependence and extreme limitations in achievable bandwidth
and link range of acoustics should be of primary concern at an early design stage in
addition to power and throughput efficiency, and system reliability. These factors make
underwater networking a challenging and rewarding endeavour. In this chapter, some
significant aspects to be considered when designing an underwater communication
system are analyzed. For example, the description of the environment where the network
is supposed to be deployed, technical criteria and general assumptions [18].
3.2 Challenges
The design of underwater networks involves many topics covering physical and
networking capabilities. As acoustic channels are commonly used for underwater
communications, the main focuses in this project are the state of- the-art analysis of
commercial acoustic modems and suppliers as well as the design and possible
implementation of Medium Access with Interference Cancellation and Network Coding
(main part). While some Medium Access schemes have been successful in traditional
radio communications, they are prone to severe limitations in efficiency and scalability
when employed in the underwater environment posing many challenges to networking
protocol design. For example, in Medium Access Control (MAC) schemes which operate
entirely in the time domain (for instance, TDMA and CSMA), these disadvantages are
primarily because of the very large propagation delays [31]. Therefore, new strategies are
needed in order to account the specific features of underwater propagation. Some design
challenges for reliable data transport in UWSNs [32] could be as follows:
50. For more Https://www.ThesisScientist.com
91
1. End-to-End approach does not work well due to the high channel error probability and
the low propagation speed of acoustic signals
2. Half-Duplex acoustic channels limit the choice of complex ARQ protocols
3. Too many feedback from receivers are not desirable in terms of energy consumption
4. Very large bulk data transmission is not suitable in mobile UWSNs because of the
limited communication time between any pair of sender and receiver, the low bandwidth
and the long propagation delay
3.3 Assumptions
The main goal of this project is to investigate how Medium Access with Interference
Cancellation and Network Coding perform regarding data dissemination as compared
with employed MAC techniques underwater. In this sense, some tests are conducted in
order to evaluate the performance. Consequently, general assumptions should be stated
to understand how the tests are carried out. In this project, an underwater network is
simply defined as a set of nodes which communicate using acoustics waves. The nodes
are fixed and the distance among them is considered in the long range; a typical range
between transmitter and receiver could be 1 km. Despite being a stationary network,
mobile scenarios where nodes can passively float with water currents are also taken into
account for explanations. The coverage range of a node is one hop. This means that the
level of signal which is received by next hop node is very high, otherwise, is very low.
Typical values used in mobile communications systems are 90% and 10%, respectively.
So, it is assumed that the signal from a source node will not be received by nodes whose
range is higher than one hop. Likewise, regarding the sound propagation speed, its
nominal value 1500 m/s is used for calculations. Another relevant aspect which should
be assumed in the performance evaluation of Medium Access schemes is the packet
length. Hence, the packet size is set basing on two approaches. First, the transmission
capacity of nodes is considered without data redundancy. Second, the packet
transmission time is equals to the propagation delay depending on the distance between
sender and receiver [30].