This document discusses improving the performance of Network-on-Chip (NoC) using parallel transmission through wireless links. It proposes a method for transmitting and receiving flits in parallel through wireless links using a parallel buffer structure. Simulation results show this approach can reduce energy consumption by up to 30% for all-to-all traffic and 15% for transpose traffic. It can also improve latency as a function of packet injection rate by up to 71% for all-to-all traffic and 19% for transpose traffic.
An Energy Efficient Protocol To Increase Network Life In WSNIOSR Journals
Abstract : Wireless Sensor Network consists of several sensor nodes, these nodes loss some of their energy after the process of communication. So an energy efficient approach is required to improve the life of the network. In case of broadcast network, LEACH protocol uses an aggregative approach by creating cluster of nodes. Now the major concern is to built such clusters over WSN in an optimized way. This work presents the improvement over LEACH protocol. Hence we have different work environments where the network is having different capacities. The proposed work shows how the life time of the network will improve when the number of nodes varies within the network. Keywords - LEACH, energy, lifetime, cluster based, WSN\
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Extending the longevity, is a significant job to be accomplished by these sensor networks. The traditional routing protocols could not be applied here, due to its nodes powered by batteries. Nodes are often clustered in to non-overlapping clusters, so as to provide energy efficiency. A concise overview on clustering processes, within wireless sensor networks is given in this paper. But it is difficult to replace the deceased batteries of the sensor nodes. A distinctive sensor node consumes much of its energy during wireless communication. This research work suggests the development of a hierarchical distributed clustering mechanism, which gives improved performance over the existing clustering algorithm LEACH. The two hiding concepts behind the proposed scheme are the hierarchical distributed clustering mechanism and the concept of threshold. Energy utilization is significantly reduced, thereby greatly prolonging the lifetime of the sensor nodes.
Using Wavelength Division Multiplexing for Protection ApplicationsPower System Operation
Summary
This paper reports on an experimental investigation that
uses coarse or dense wavelength division multiplexing
(CWDM, DWDM) for applications in high-speed
traveling-wave protection. This paper documents the
performance, opportunities, and pitfalls associated with
this application and outlines practical strategies for the
seamless integration of protection systems with the
latest generation of optical transport network (OTN)
technologies.
1. Introduction
Power system protection typically operates
autonomously, with communications-based schemes
historically reserved only to protect the most critical
transmission assets. Communications bandwidth and the
cost associated with providing it has for many decades
forced power system protection engineers to economize
on communications resources.
Communications-based protection scheme deployments
started with analog pilot wire, which sent current
transformer secondary signals over a span of several
kilometers. Pilot wire schemes evolved rapidly,
spanning ever-increasing distances. Power line carrier
technology, microwave links, and eventually time-
division multiplexing (TDM) channels, such as
synchronous optical network (SONET) and synchronous
digital hierarchy (SDH), came next. They enabled the
deployment of full segregated digital phase differential
schemes (ANSI Device #87), as illustrated
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
An Energy Efficient Protocol To Increase Network Life In WSNIOSR Journals
Abstract : Wireless Sensor Network consists of several sensor nodes, these nodes loss some of their energy after the process of communication. So an energy efficient approach is required to improve the life of the network. In case of broadcast network, LEACH protocol uses an aggregative approach by creating cluster of nodes. Now the major concern is to built such clusters over WSN in an optimized way. This work presents the improvement over LEACH protocol. Hence we have different work environments where the network is having different capacities. The proposed work shows how the life time of the network will improve when the number of nodes varies within the network. Keywords - LEACH, energy, lifetime, cluster based, WSN\
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Extending the longevity, is a significant job to be accomplished by these sensor networks. The traditional routing protocols could not be applied here, due to its nodes powered by batteries. Nodes are often clustered in to non-overlapping clusters, so as to provide energy efficiency. A concise overview on clustering processes, within wireless sensor networks is given in this paper. But it is difficult to replace the deceased batteries of the sensor nodes. A distinctive sensor node consumes much of its energy during wireless communication. This research work suggests the development of a hierarchical distributed clustering mechanism, which gives improved performance over the existing clustering algorithm LEACH. The two hiding concepts behind the proposed scheme are the hierarchical distributed clustering mechanism and the concept of threshold. Energy utilization is significantly reduced, thereby greatly prolonging the lifetime of the sensor nodes.
Using Wavelength Division Multiplexing for Protection ApplicationsPower System Operation
Summary
This paper reports on an experimental investigation that
uses coarse or dense wavelength division multiplexing
(CWDM, DWDM) for applications in high-speed
traveling-wave protection. This paper documents the
performance, opportunities, and pitfalls associated with
this application and outlines practical strategies for the
seamless integration of protection systems with the
latest generation of optical transport network (OTN)
technologies.
1. Introduction
Power system protection typically operates
autonomously, with communications-based schemes
historically reserved only to protect the most critical
transmission assets. Communications bandwidth and the
cost associated with providing it has for many decades
forced power system protection engineers to economize
on communications resources.
Communications-based protection scheme deployments
started with analog pilot wire, which sent current
transformer secondary signals over a span of several
kilometers. Pilot wire schemes evolved rapidly,
spanning ever-increasing distances. Power line carrier
technology, microwave links, and eventually time-
division multiplexing (TDM) channels, such as
synchronous optical network (SONET) and synchronous
digital hierarchy (SDH), came next. They enabled the
deployment of full segregated digital phase differential
schemes (ANSI Device #87), as illustrated
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Improving Energy Efficiency in Optical NetworksIJEEE
This paper presents an energy saving technique for optical networks without loss of dignity of Quality of service. This paper emphasis on the energy minimization of technologies in optical network. One simple method toconsume energy is to switched off an unused element, so the power consumption cuts by around 20% and network resources saved by 29%.
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...IJCNCJournal
Next-generation wireless networks such as 5G and 802.11ad networks will use millimeter waves operating
at 28GHz, 38GHz, or higher frequencies to deliver unprecedentedly high data rates, e.g., 10 gigabits per
second. However, millimeter waves must be used directionally with narrow beams in order to overcome the
large attenuation due to their higher frequency. To achieve high data rates in a mobile setting,
communicating nodes need to align their beams dynamically, quickly, and in high resolution. We propose a
data-driven, deep neural network (DNN) approach to provide robust localization for beam alignment,
using a lower frequency spectrum (e.g., 2.4 GHz). The proposed DNN-based localization methods use the
angle of arrival derived from phase differences in the signal received at multiple antenna arrays to infer the
location of a mobile node. Our methods differ from others that use DNNs as a black box in that the
structure of our neural network model is tailored to address difficulties associated with the domain, such as
collinearity of the mobile node with antenna arrays, fading and multipath. We show that training our
models requires a small number of sample locations, such as 30 or fewer, making the proposed methods
practical. Our specific contributions are: (1) a structured DNN approach where the neural network
topology reflects the placement of antenna arrays, (2) a simulation platform for generating training and
evaluation data sets under multiple noise models, and (3) demonstration that our structured DNN approach
improves localization under noise by up to 25% over traditional off-the-shelf DNNs, and can achieve submeter
accuracy in a real-world experiment.
DWDM-RAM: Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
Advances in Grid technology enable the deployment of data-intensive distributed applications, which require moving Terabytes or even Petabytes of data
between data banks. The current underlying networks cannot provide dedicated links with adequate end-to-end sustained bandwidth to support the requirements of these Grid applications. DWDM-RAM1 is a novel service-oriented architecture, which harnesses the enormous bandwidth potential of optical networks and demonstrates their on-demand nsage on the OMNlnet. Preliminary experiments suggest that dynamic optical networks, such as the OMNlnet, are the ideal option for transferring such massive amounts of data. DWDM-RAM incorporates an OGSI/OGSA compliant service interface and will promote greater convergence between dynamic optical networks and data intensive Grid computing.
In this paper, we delve into the basics of existing monitoring technology and discuss an interesting in-service real-time monitoring solution that provides instantaneous root cause of
the fault without any influence on data traffic. Furthermore, applications of this novel technology are also illustrated.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGKhushbooGupta145
Energy Efficiency in Wireless Sensor Network is one of the most significant aspects of routing in these networks. WSN consist of thousands of sensory nodes densely distributed over wide geographical network. As these nodes are deployed in remote areas where recharging is not possible, even if it is possible it will incur high cost. So there is a need of a protocol which facilitates less energy dissipation and thereby enhances the overall performance of the network. We surveyed several protocols such as LEACH, PEGASIS, ACT etc. and concluded that important performance measures are First Node Die (FND), Half Node Alive (HNA) and Last Node Alive (LNA). Values for above mentioned parameters vary for different protocols. In this paper we present a new protocol Energy Efficient Optimal Chain Protocol (EEOC) which outperforms all above mentioned protocols. We compared the results of all these protocols with EEOC and found that with respect to FND, HNA and LNA EEOC performs way better than others.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
White Paper-Evolution from 10Gbps to 100Gbps for a Metro Network-hsSusmita Adhikari Joshi
Overlaying flourishing 10 Gb/s services with additional co-propagating 10 Gb/s channels in different colors, or wavelengths, is already common practice. Network operators eager to increase capacity have begun overlaying 40 Gb/s channels onto available fiber without leasing more dark fibers as the best pragmatic approach. With the advent of 100G technology, the interest is now shifting from 40G to 100G installations.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
New Adaptive Cooperative-MIMO for LTE Technologyijtsrd
Multiple Input Multiple Output (MIMO) systems have been widely used in an area of wireless cellular communication system, providing the both increased capacity and reliability. However, the use of multiple antennas in mobile terminals may not be very practical due to limited space and other implementation issues. In this paper, cooperative MIMO has been used in a way to optimise the implementation and working of conventional MIMO systems in terms of BER and Spectral Efficiency while maintaining a minimal number of antennas on each handset. Cooperative MIMO with V-BLAST transmission over Rayleigh flat fading channels and amplify and forward protocol with one relay node for modulation techniques like BPSK, QPSK, QAM using various decoding techniques has been analysed. Decoding algorithms like ZF, MMSE and ML have been analysed with respect to their BER performances. Since, there is throughput loss in cooperative MIMO due to extra resources required for relaying, adaptive modulation has been used with C-MIMO to meet the demands for high data rates in Long Term Evolution Network. Sukhreet Kaur | Dr. Amita Soni"New Adaptive Cooperative-MIMO for LTE Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12919.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12919/new-adaptive-cooperative-mimo-for-lte-technology/sukhreet-kaur
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
Gateway based multi hop distributed energy efficient clustering protocol for ...ijujournal
Wireless sensor network consists of application oriented and cheap micro-devices called sensors nodes having potential of connecting the physical world with virtual world by their sensing abilities. These sensor nodes are having restrained battery sources. Efficient energy management is current area of research in wireless sensor networks. Here we advice one such energy aware multi-hop protocol (G-DEEC) for two
level heterogeneous networks. In G-DEEC, the Base Station is placed out of sensing area and rechargeable
gateway nodes are placed inside field with other randomly deployed sensor nodes. Simulation shows the proposed protocol G-DEEC is better than single-hop DEEC in terms of number of half dead nodes, alive nodes and dead nodes; thereby showing improvement in network lifetime and stability.
This paper research review Ant colony optimization (ACO) and Genetic Algorithm (GA), both are two
powerful meta-heuristics. This paper explains some major defects of these two algorithm at first then
proposes a new model for ACO in which, artificial ants use a quick genetic operator and accelerate their
actions in selecting next state.
Experimental results show that proposed hybrid algorithm is effective and its performance including speed
and accuracy beats other version.
Modeling of manufacturing of a field effect transistor to determine condition...ijcsa
In this paper we introduce an approach to model technological process of manufacture of a field-effect
heterotransistor. The modeling gives us possibility to optimize the technological process to decrease length
of channel by using mechanical stress. As accompanying results of the decreasing one can find decreasing
of thickness of the heterotransistors and increasing of their density, which were comprised in integrated
circuits.
Vulnerability scanners a proactive approach to assess web application securityijcsa
With the increasing concern for security in the network, many approaches are laid out that try to protect
the network from unauthorised access. New methods have been adopted in order to find the potential
discrepancies that may damage the network. Most commonly used approach is the vulnerability
assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack.
Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to
protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability
scanners and their related methodology to detect the various vulnerabilities available in the web
applications or the remote host across the network and tries to identify new mechanisms that can be
deployed to secure the network.
Improving Energy Efficiency in Optical NetworksIJEEE
This paper presents an energy saving technique for optical networks without loss of dignity of Quality of service. This paper emphasis on the energy minimization of technologies in optical network. One simple method toconsume energy is to switched off an unused element, so the power consumption cuts by around 20% and network resources saved by 29%.
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...IJCNCJournal
Next-generation wireless networks such as 5G and 802.11ad networks will use millimeter waves operating
at 28GHz, 38GHz, or higher frequencies to deliver unprecedentedly high data rates, e.g., 10 gigabits per
second. However, millimeter waves must be used directionally with narrow beams in order to overcome the
large attenuation due to their higher frequency. To achieve high data rates in a mobile setting,
communicating nodes need to align their beams dynamically, quickly, and in high resolution. We propose a
data-driven, deep neural network (DNN) approach to provide robust localization for beam alignment,
using a lower frequency spectrum (e.g., 2.4 GHz). The proposed DNN-based localization methods use the
angle of arrival derived from phase differences in the signal received at multiple antenna arrays to infer the
location of a mobile node. Our methods differ from others that use DNNs as a black box in that the
structure of our neural network model is tailored to address difficulties associated with the domain, such as
collinearity of the mobile node with antenna arrays, fading and multipath. We show that training our
models requires a small number of sample locations, such as 30 or fewer, making the proposed methods
practical. Our specific contributions are: (1) a structured DNN approach where the neural network
topology reflects the placement of antenna arrays, (2) a simulation platform for generating training and
evaluation data sets under multiple noise models, and (3) demonstration that our structured DNN approach
improves localization under noise by up to 25% over traditional off-the-shelf DNNs, and can achieve submeter
accuracy in a real-world experiment.
DWDM-RAM: Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
Advances in Grid technology enable the deployment of data-intensive distributed applications, which require moving Terabytes or even Petabytes of data
between data banks. The current underlying networks cannot provide dedicated links with adequate end-to-end sustained bandwidth to support the requirements of these Grid applications. DWDM-RAM1 is a novel service-oriented architecture, which harnesses the enormous bandwidth potential of optical networks and demonstrates their on-demand nsage on the OMNlnet. Preliminary experiments suggest that dynamic optical networks, such as the OMNlnet, are the ideal option for transferring such massive amounts of data. DWDM-RAM incorporates an OGSI/OGSA compliant service interface and will promote greater convergence between dynamic optical networks and data intensive Grid computing.
In this paper, we delve into the basics of existing monitoring technology and discuss an interesting in-service real-time monitoring solution that provides instantaneous root cause of
the fault without any influence on data traffic. Furthermore, applications of this novel technology are also illustrated.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGKhushbooGupta145
Energy Efficiency in Wireless Sensor Network is one of the most significant aspects of routing in these networks. WSN consist of thousands of sensory nodes densely distributed over wide geographical network. As these nodes are deployed in remote areas where recharging is not possible, even if it is possible it will incur high cost. So there is a need of a protocol which facilitates less energy dissipation and thereby enhances the overall performance of the network. We surveyed several protocols such as LEACH, PEGASIS, ACT etc. and concluded that important performance measures are First Node Die (FND), Half Node Alive (HNA) and Last Node Alive (LNA). Values for above mentioned parameters vary for different protocols. In this paper we present a new protocol Energy Efficient Optimal Chain Protocol (EEOC) which outperforms all above mentioned protocols. We compared the results of all these protocols with EEOC and found that with respect to FND, HNA and LNA EEOC performs way better than others.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
White Paper-Evolution from 10Gbps to 100Gbps for a Metro Network-hsSusmita Adhikari Joshi
Overlaying flourishing 10 Gb/s services with additional co-propagating 10 Gb/s channels in different colors, or wavelengths, is already common practice. Network operators eager to increase capacity have begun overlaying 40 Gb/s channels onto available fiber without leasing more dark fibers as the best pragmatic approach. With the advent of 100G technology, the interest is now shifting from 40G to 100G installations.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
New Adaptive Cooperative-MIMO for LTE Technologyijtsrd
Multiple Input Multiple Output (MIMO) systems have been widely used in an area of wireless cellular communication system, providing the both increased capacity and reliability. However, the use of multiple antennas in mobile terminals may not be very practical due to limited space and other implementation issues. In this paper, cooperative MIMO has been used in a way to optimise the implementation and working of conventional MIMO systems in terms of BER and Spectral Efficiency while maintaining a minimal number of antennas on each handset. Cooperative MIMO with V-BLAST transmission over Rayleigh flat fading channels and amplify and forward protocol with one relay node for modulation techniques like BPSK, QPSK, QAM using various decoding techniques has been analysed. Decoding algorithms like ZF, MMSE and ML have been analysed with respect to their BER performances. Since, there is throughput loss in cooperative MIMO due to extra resources required for relaying, adaptive modulation has been used with C-MIMO to meet the demands for high data rates in Long Term Evolution Network. Sukhreet Kaur | Dr. Amita Soni"New Adaptive Cooperative-MIMO for LTE Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12919.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12919/new-adaptive-cooperative-mimo-for-lte-technology/sukhreet-kaur
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
Gateway based multi hop distributed energy efficient clustering protocol for ...ijujournal
Wireless sensor network consists of application oriented and cheap micro-devices called sensors nodes having potential of connecting the physical world with virtual world by their sensing abilities. These sensor nodes are having restrained battery sources. Efficient energy management is current area of research in wireless sensor networks. Here we advice one such energy aware multi-hop protocol (G-DEEC) for two
level heterogeneous networks. In G-DEEC, the Base Station is placed out of sensing area and rechargeable
gateway nodes are placed inside field with other randomly deployed sensor nodes. Simulation shows the proposed protocol G-DEEC is better than single-hop DEEC in terms of number of half dead nodes, alive nodes and dead nodes; thereby showing improvement in network lifetime and stability.
This paper research review Ant colony optimization (ACO) and Genetic Algorithm (GA), both are two
powerful meta-heuristics. This paper explains some major defects of these two algorithm at first then
proposes a new model for ACO in which, artificial ants use a quick genetic operator and accelerate their
actions in selecting next state.
Experimental results show that proposed hybrid algorithm is effective and its performance including speed
and accuracy beats other version.
Modeling of manufacturing of a field effect transistor to determine condition...ijcsa
In this paper we introduce an approach to model technological process of manufacture of a field-effect
heterotransistor. The modeling gives us possibility to optimize the technological process to decrease length
of channel by using mechanical stress. As accompanying results of the decreasing one can find decreasing
of thickness of the heterotransistors and increasing of their density, which were comprised in integrated
circuits.
Vulnerability scanners a proactive approach to assess web application securityijcsa
With the increasing concern for security in the network, many approaches are laid out that try to protect
the network from unauthorised access. New methods have been adopted in order to find the potential
discrepancies that may damage the network. Most commonly used approach is the vulnerability
assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack.
Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to
protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability
scanners and their related methodology to detect the various vulnerabilities available in the web
applications or the remote host across the network and tries to identify new mechanisms that can be
deployed to secure the network.
Persian arabic document segmentation based on hybrid approachijcsa
Document segmentation is an essential requirement for automatic transformation of paper documents into
electronic documents. However, some restrictions such as variations in character font sizes, different text
line spacing, and also non-uniform document layout structures altogether makes designing a generalpurpose
document layout analysis algorithm much more sophisticated. Thus in most previously reported
methods these parameters are inevitably included. This mentioned issue becomes much more acute and
excessively severe, especially in Persian/Arabic documents. Since the Persian/Arabic scripts differ
considerably from the English scripts, most of the proposed methods for the English scripts do not render
good results for the Persian/Arabic scripts. In this paper, we present a novel parameter-free method based
on hybrid method for segmenting the Persian/Arabic document images which also works well for English
scripts. The proposed method is capable of document segmentation without considering the character font
sizes, text line spacing, document skew, and document layout structures. This algorithm is examined for
150 Persian/Arabic and English documents and document segmentation process are done successfully for
97.3 percent of them at worst condition.
Alzheimer’s disease(AD) is a neurological disease. It affects memory. The livelihood of the people that are
diagnosed with AD. In this paper, we have discussed various imaging modalities, feature selection and
extraction, segmentation and classification techniques.
A survey on cloud security issues and techniquesijcsa
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of
resources and services that are offered by the network or internet. Cloud computing extends various
computing techniques like grid computing, distributed computing. Today cloud computing is used in both
industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As
the field of cloud computing is spreading the new techniques are developing. This increase in cloud
computing environment also increases security challenges for cloud developers. Users of cloud save their
data in the cloud hence the lack of security in cloud can lose the user’s trust.
In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy,
elasticity, availability etc. the paper also discuss existing security techniques and approaches for a secure
cloud. This paper will enable researchers and professionals to know about different security threats and
models and tools proposed.
The study evaluates three background subtraction techniques. The techniques ranges from very basic
algorithm to state of the art published techniques categorized based on speed, memory requirements and
accuracy. Such a review can effectively guide the designer to select the most suitable method for a given
application in a principled way. The algorithms used in the study ranges from varying levels of accuracy
and computational complexity. Few of them can also deal with real time challenges like rain, snow, hails,
swaying branches, objects overlapping, varying light intensity or slow moving objects.
Impact of HeartBleed Bug in Android and Counter Measures ijcsa
Now a days smart phones revolving around the globe. The no of
Android users are also increasing day by
day, the main problem arises here. The Android operating syste
m based devices are more advance and also
prone to bugs when compared to other OS devices. Mainly Android co
mes with lot of Apps so in order to
provide the services to the user. So the App developers was i
n a hurry to release the Apps as per market
strategy which causes vulnerabilities. Some of them intentional
ly creates the Apps in order to hack the
device. When compared to other operating system Android is a ope
n source so everybody trys to perform
the reverse-engineering of Apks and perform some modification
s, release the Apks into the market. We
believe that our study will awaken the developers and researches
.
Vulnerabilities and attacks targeting social networks and industrial control ...ijcsa
Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used
by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or
other motives or just for cyber escapades.
In this paper, we re-examined the various types of attacks on industrial control systems as well as on social
networking users. We have listed which all vulnerabilities were exploited for executing these attacks and
their effects on these systems and social networks. The focus will be mainly on the vulnerabilities that are
used in OSNs as the convertors which convert the social network into antisocial network and these
networks can be further used for the network attacks on the users associated with the victim user whereby
creating a consecutive chain of attacks on increasing number of social networking users. Another type of
attack, Stuxnet Attack which was originally designed to attack Iran’s nuclear facilities is also discussed
here which harms the system it controls by changing the code in that target system. The Stuxnet worm is a
very treacherous and hazardous means of attack and is the first of its kind as it allows the attacker to
manipulate real-time equipment.
Some alternative ways to find m ambiguous binary words corresponding to a par...ijcsa
Parikh matrix of a word gives numerical information of the word in terms of its subwords. In this Paper an
algorithm for finding Parikh matrix of a binary word is introduced. With the help of this algorithm Parikh
matrix of a binary word, however large it may be can be found out. M-ambiguous words are the problem of
Parikh matrix. In this paper an algorithm is shown to find the M- ambiguous words of a binary ordered
word instantly. We have introduced a system to represent binary words in a two dimensional field. We see
that there are some relations among the representations of M-ambiguous words in the two dimensional
field. We have also introduced a set of equations which will help us to calculate the M- ambiguous words.
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...ijcsa
As the information proliferates, searching for relevant information has become a primary task. Searching
or Information retrieval (IR) aims to help the users in organising as well as retrieving those documents
from the documentary collection which are most likely to satisfy information needs of the user. An optimal
Information Retrieval System (IRS) is one which retrieves only those documents from the document
database which are pertinent to user's information needs, while excluding documents that are not relevant.
Genetic Algorithm is described by higher likelihood of finding good solutions to large and complex
problems of IR optimisation. The performance of Genetic Algorithm depends upon the decision of
underlying operators used namely selection, crossover and mutation. A GA-based algorithm IRIGA
(Information Retrieval Improvement using Genetic Algorithm) is developed to improve the performance of
Information Retrieval System. This paper presents a comparison of performance of IRIGA when different
selection methods are used. The results are analysed by conducting experiments keeping the rest of the GA
parameters as constant and varying only the selection strategy.
World Wide Web is a huge repository of information and there is a tremendous increase in the volume of
information daily. The number of users are also increasing day by day. To reduce users browsing time lot
of research is taken place. Web Usage Mining is a type of web mining in which mining techniques are
applied in log data to extract the behaviour of users. Clustering plays an important role in a broad range
of applications like Web analysis, CRM, marketing, medical diagnostics, computational biology, and many
others. Clustering is the grouping of similar instances or objects. The key factor for clustering is some sort
of measure that can determine whether two objects are similar or dissimilar. In this paper a novel
clustering method to partition user sessions into accurate clusters is discussed. The accuracy and various
performance measures of the proposed algorithm shows that the proposed method is a better method for
web log mining.
Labview with dwt for denoising the blurred biometric imagesijcsa
In this paper, biometric blurred image (fingerprint) denoising are presented and investigated by using
LabVIEW applications , It is blurred and corrupted with Gaussian noise. This work is proposed
algorithm that has used a discrete wavelet transform (DWT) to divide the image into two parts, this will
be increasing the manipulation speed of biometric images that are of the big sizes. This work has included
two tasks ; the first designs the LabVIEW system to calculate and present the approximation coefficients,
by which the image's blur factor reduced to minimum value according to the proposed algorithm. The
second task removes the image's noise by calculated the regression coefficients according to Bayesian-
Shrinkage estimation method.
Augmented reality (AR) is a technology which provides real time integration of digital content with the
information available in real world. Augmented reality enables direct access to implicit information
attached with context in real time. Augmented reality enhances our perception of real world by enriching
what we see, feel, and hear in the real environment. This paper gives comparative study of various
augmented reality software development kits (SDK’s) available to create augmented reality apps. The
paper describes how augmented reality is different from virtual reality; working of augmented reality
system and different types of tracking used in AR.
Robust face recognition by applying partitioning around medoids over eigen fa...ijcsa
An unsupervised learning methodology for robust face recognition is proposed for enhancing invariance to
various changes in the face. The area of face recognition in spite of being the most unobtrusive biometric
modality of all has encountered challenges with high performance in uncontrolled environment owing to
frequently occurring, unavoidable variations in the face. These changes may be due to noise, outliers,
changing expressions, emotions, pose, illumination, facial distractions like makeup, spectacles, hair growth
etc. Methods for dealing with these variations have been developed in the past with different success.
However the cost and time efficiency play a crucial role in implementing any methodology in real world.
This paper presents a method to integrate the technique of Partitioning Around Medoids with Eigen Faces
and Fisher Faces to improve the efficiency of face recognition considerably. The system so designed has
higher resistance towards the impact of various changes in the face and performs well in terms of success
rate, cost involved and time complexity. The methodology can therefore be used in developing highly robust
face recognition systems for real time environment.
An ahp (analytic hierarchy process)fce (fuzzy comprehensive evaluation) based...ijcsa
In this paper the AHP (Analytic Hierarchy Process) and the FCE (Fuzzy Comprehensive Evaluation) are
applied to find the best coaches from different sports and to rank these great coaches.
First, we screen coaches’ information using three screening criterions. We rank the screened coaches
preliminarily by means of analytic hierarchy process (AHP). Second, we rank them by fuzzy comprehensive
evaluation method(FCE), and we determined the top5 coaches on basketball, football and hockey. Third,
we use the Topsis method to test the accuracy and reasonableness of the model, modify the model and then
reorder the original results to inspect the consistency of the results of the two models. Finally, we take
some other factors into account to optimize our model, which includes on the influence of time line horizon
and genders.
Automatic speech emotion and speaker recognition based on hybrid gmm and ffbnnijcsa
In this paper we present text dependent speaker recognition with an enhancement of detecting the emotion
of the speaker prior using the hybrid FFBN and GMM methods. The emotional state of the speaker
influences recognition system. Mel-frequency Cepstral Coefficient (MFCC) feature set is used for
experimentation. To recognize the emotional state of a speaker Gaussian Mixture Model (GMM) is used in
training phase and in testing phase Feed Forward Back Propagation Neural Network (FFBNN). Speech
database consisting of 25 speakers recorded in five different emotional states: happy, angry, sad, surprise
and neutral is used for experimentation. The results reveal that the emotional state of the speaker shows a
significant impact on the accuracy of speaker recognition.
Grid computing is concerned with the sharing and use of resources in dynamic distributed virtual
organizations. The dynamic nature of Grid environments introduces challenging security concerns that
demand new technical approaches. In this brief overview we review key Grid security issues and outline
the technologies that are being developed to address those issues. We focus on works done by Globus
Toolkits to provide security and also we will discuss about the cyber security in Grid.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
INTERFERENCE-AWARE CHANNEL ASSIGNMENT FOR MAXIMIZING THROUGHPUT IN WMN pijans
Wireless Mesh network (WMN) is dynamically self-organizing and self-configured, with the nodes in the
network automatically establishing an ad-hoc network and maintaining the mesh connectivity. The ability
to use multiple-radios and multiple channels can be cashed to increase aggregate throughput of wireless
mesh network. Thus the efficient use of available interfaces and channels without interference becomes
the key factor. In this paper we propose interference aware clustered based channel assignment schemes
which minimizes the interference and increases throughput. In our proposed scheme we have given
priority to minimize interference from nearby mesh nodes in interference range than maximizing channel
diversity. We simulated our proposed work using NS-3 and results show that our scheme improves
network performance than BFSCA and Distributed Greedy CA.
Energy efficient load balanced routing protocol for wireless sensor networkscsandit
Telecommunications is increasingly vital to the society at large, and has become essential to
business, academic, as well as social activities. Due to the necessity to have access to
telecommunications, the deployment requires regulations and policy. Otherwise, the deployment
of the infrastructures would contribute to environment, and human complexities rather than
ease of use.
However, the formulation of telecommunication infrastructure deployment regulation and
policy involve agents such as people and processes. The roles of the agents are critical, and are
not as easy as it meant to belief. This could be attributed to different factors, as they produce
and reproduce themselves overtime.
This paper presents the result of a study which focused on the roles of agents in the formulation
of telecommunication infrastructures deployment regulation and policy. In the study, the
interactions that take place amongst human and non-human agents were investigated. The study
employed the duality of structure, of Structuration theory as lens to understand the effectiveness
of interactions in the formulation of regulations, and how policy is used to facilitate the
deployment of telecommunications infrastructure in the South African environment.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (2
2n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
In recent years, applications of wireless sensor networks have evolved in many areas such as target tracking, environmental monitoring, military and medical applications. Wireless sensor network continuously collect and send data through sensor nodes from a specific region to a base station. But, data redundancy due to neighbouring sensors consumes energy, compromising the network lifetime. In order to improve the network lifetime, a novel cluster based local route search method, called, Greedy Clusterbased Routing (GCR) technique in wireless sensor network. The proposed GCR method uses arbitrary timer in order to participate cluster head selection process with maximum neighbour nodes and minimum distance between the source and base station. GCR constructs dynamic routing improving the rate of network lifetime through Mass Proportion value. Also, GCR uses a greedy route finding strategy for
balancing energy consumption. Experimental results show that GCR achieves significant energy savings and prolong network lifetime.
In recent years, applications of wireless sensor networks have evolved in many areas such as target tracking, environmental monitoring, military and medical applications. Wireless sensor network continuously collect and send data through sensor nodes from a specific region to a base station. But, data redundancy due to neighbouring sensors consumes energy, compromising the network lifetime. In order to improve the network lifetime, a novel cluster based local route search method, called, Greedy Clusterbased Routing (GCR) technique in wireless sensor network. The proposed GCR method uses arbitrary timer in order to participate cluster head selection process with maximum neighbour nodes and minimum distance between the source and base station. GCR constructs dynamic routing improving the rate of network lifetime through Mass Proportion value. Also, GCR uses a greedy route finding strategy for balancing energy consumption. Experimental results show that GCR achieves significant energy savings and prolong network lifetime.
In recent years, applications of wireless sensor networks have evolved in many areas such as target
tracking, environmental monitoring, military and medical applications. Wireless sensor network
continuously collect and send data through sensor nodes from a specific region to a base station. But, data
redundancy due to neighbouring sensors consumes energy, compromising the network lifetime. In order to
improve the network lifetime, a novel cluster based local route search method, called, Greedy Cluster-
based Routing (GCR) technique in wireless sensor network. The proposed GCR method uses arbitrary
timer in order to participate cluster head selection process with maximum neighbour nodes and minimum
distance between the source and base station. GCR constructs dynamic routing improving the rate of
network lifetime through Mass Proportion value. Also, GCR uses a greedy route finding strategy for
balancing energy consumption. Experimental results show that GCR achieves significant energy savings
and prolong network lifetime
Energy saving in cooperative transmission using opportunistic protocol in MANETIOSR Journals
Abstract : In this thesis, we study the joint problems of cooperative link and diversity in A Mobile Ad-Hoc Network (MANET) with variable wireless channels. In MANET the wireless nodes are in group and infrastructure less in nature. The major problems faced by wireless communication in real time environment are that of interference and un-reliable communication links. Much research work has been done to overcome this by using various techniques. Cooperative communication and transmission side diversity in the network are the two of the techniques that help in reducing interference and communication link failures. We have also proposed a new technique to find the optimum route as a joint problem of the transmission power at the physical layer and the link selection at the network layer that incurs the minimum cost in terms of energy, no. of hops, available bandwidth and link quality (SNR), outage probability. Analytical results show that our cooperative transmission schemes (OMCTSP) achieves average energy saving of more than 80% than direct transmission. Keywords: cooperative transmission, , channel gain, diversity, , linkcost minimum energy routing, outage diversity, Variable wireless channels.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and
packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which
ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer
from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of
sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads
in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption
and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer
and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers
reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
One of the major reason for performance degradation in Wireless sensor network is the overhead due to control packet and packet delivery degradation. Clustering in cross layer network operation is an efficient way manage control packet overhead and which ultimately improve the lifetime of a network. All these overheads are crucial in a scalable networks. But the clustering always suffer from the cluster head failure which need to be solved effectively in a large network. As the focus is to improve the average lifetime of sensor network the cluster head is selected based on the battery life of nodes. The cross-layer operation model optimize the overheads in multiple layer and ultimately the use of clustering will reduce the major overheads identified and their by the energy consumption and throughput of wireless sensor network is improved. The proposed model operates on two layers of network ie., Network Layer and Transport Layer and Clustering is applied in the network layer . The simulation result shows that the integration of two layers reduces the energy consumption and increases the throughput of the wireless sensor networks.
Comparative performance evaluation of routing algorithm and topology size for...journalBEEI
Wireless Network-on-Chip or WiNoC is an alternative to traditional planar on-chip networks. On-chip wireless links are utilized to reduce latency between distant nodes due to its capability to communicate with far-away node within a single hop. This paper analyzes the impact of various routing schemes and the effect of WiNoC sizes on network traffic distributions compared to conventional mesh NoC. Radio hubs (4×4) are evenly placed on WiNoC to analyze global average delay, throughput, energy consumption and wireless utilization. For validation, three various network sizes (8×8, 16×16 and 32×32) of mesh NoC and WiNoC architectures are simulated on cycle-accurate Noxim simulator under numerous traffic load distributions. Simulation results show that WiNoC architecture with the 16×16 network size has better average speedup (∼1.2×) and improved network throughputs by 6.36% in non-uniform transpose traffic distribution. As the trade-off, WiNoC requires 63% higher energy consumption compared to the classical wired NoC mesh.
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
In recent years, multi-channel multi-radio Wireless Mesh network has become one of the most important technologies in the evolution of next-generation networks. Its multi-hop, selforganization,self-healing and simple deployment is an effective way to solve the bottleneck problem of last mile. In this paper, we propose a new routing metric called WAEED, deployed in JCWAEED protocol, a joint channel assignment and weighted average expected end-to-end delay routing protocol which considers both interference suppression with factor IF and end-toend delay. Additionally, we give the exact calculation formula of transmission delay and queuing delay. Simulations results demonstrate that JCWAEED outperforms other joint design routing protocols in terms of throughput, end-to-end delay and packet loss rate.
Clustering provides an effective method for
extending the lifetime of a wireless sensor network. Current
clustering methods selecting cluster heads with more residual
energy, and rotating cluster heads periodically to distribute the
energy consumption among nodes in each cluster. However,
they rarely consider the hot spot problem in multi hop sensor
networks. When cluster heads forward their data to the base
station, the cluster heads closer to the base station are heavily
burdened with traffic and tend to die much faster. To mitigate
the hot spot problem, we propose a Novel Energy Efficient
Unequal Clustering Routing (NEEUC) protocol. It uses residual
energy and groupsthe nodesinto clusters of unequal layers
Similar to Nocs performance improvement using parallel transmission through wireless links (20)
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
"Impact of front-end architecture on development cost", Viktor Turskyi
Nocs performance improvement using parallel transmission through wireless links
1. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
DOI:10.5121/ijcsa.2014.4305 51
NOCS PERFORMANCE IMPROVEMENT USING
PARALLEL TRANSMISSION THROUGH WIRELESS
LINKS
Shokoofeh Bakhtiari1
and Midia Reshadi2
1 Student member, Department of Computer, Science and Research Branch Islamic Azad
University, Tehran, Iran
2Department of Computer, Science and Research Branch Islamic Azad University,
Tehran, Iran
Abstract
The Network-on-Chip (NoC) is a solution for integrating high numbers of cores on a single chip. The
integration of high number of cores especially on the mesh topology causes long diameter, which, in
turn, affects the network performance due to an increase in average hop count. Hence, other solutions
like long range links have been proposed to decrease average hop count. These links can be
implemented by new technologies such as high bandwidth on-chip wireless connection to decrease
latency. On-chip wireless links prepare high bandwidth interconnections using carbon nanotube
antennas. Wireless links bandwidth is higher than wire links;hence for handling bandwidth
incompatibility a new transmission rule is needed. In this paper, a method for transmitting/receiving
flits through the wireless links in a parallel manner is initially presented. Then, a parallel buffer
structure to store flits from wireless links is introduced. Finally, we demonstrate the advantages of the
proposed methodusing energy and latency analysis. Simulation results show that energy is saved
around 30% on the all-to-all traffic and 15% on the transpose traffic. Network latency as a function of
the packet injection rate can be improved on the all-to-all and transpose traffics around 71% and 19%,
respectively.
Keywords
network-on-chip, wireless interconnect, on-chip antenna, parallel buffer, parallel transmission
1. Introduction
The Network-on-Chip (NoC) is known as a solution that creates a high degree of integration on a
chip.1
The traditional NoCs that use metal/dielectric planar suffer from additional network latency
and power consumption due to multi hop communications. To tackle these problems, some
alternative solutions such as inserting long range links2
, 3D NoCs3,4,5
,on-chip optical
interconnects6
, RF interconnect transmission lines7
, CMOS Ultra-Wide Band (UWB) wireless
interconnect technology8
and hybrid wire/wirelesstopology using the partitioning technique have
been proposed.9
The basic idea behind these solutions is to decrease power consumption and
latency by incrementing connectivity and using new technologies.
Wireless links achieve high bandwidth using carbon nanotube antennas10
in Thz/optical
2. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
52
frequency.These antennas as on-chip antennas are considered for establishing awireless
link.Wireless bandwidth is more considerable than a wire link. Where only one data unit can be
sent or received per clock, wireless bandwidth incompatibility appears.In this paper, an approach
is proposed for using the wireless interconnect bandwidthon a hybrid wire/wireless topology
thatimproves energy consumption and average network latency.Latency is defined as the time (in
clock cycles) that elapses between injecting a message header into the network at the source node
and the receiving a tail flit at the destination node.11
The proposed approach offers a solution to
adjustdifferent interconnectbandwidth on the hybrid topologies bytransferringpacketsin a parallel
manner.In wormhole switching each packet is divided to minimal data units named flits, so
storing whole packet in each node does not necessary and flits are transferred in pipeline manner.
Therefore, the size of each buffer and delivery latency is reduced. A packet usually includes one
header, some body and one tail flits. Header and tail flits include specific control bits to reserved
and release the path. The body flits consist of data units should be received in destination node.
The parallel transfer needs pushing and popping flits that has similar output at the same time. To
achieve this goal, a parallel buffer is proposed as a storing memory.
The remaining of this paper is structured as follows.Section 2reviews the relevant literature and
presents similar works undertaken in this context. Section 3 is devoted to the WirelessNoCs
(WNoCs) architecture and wireless links placements algorithm. Section4introduces the proposed
approach. Experimental results and cost analysis are presented in Section 5. Finally,Section 6puts
a conclusion on the findings ofthis paper.
2. Related works
The Network-on-Chip has replaced conventional bus-based communication with private channels
for integrating hundreds of cores on a single chip.1
According to the international technology road
map for semiconductors (ITRS)12
, the properties of metal wires used on traditional NoCsdo not
provide expected performance, hence new interconnect paradigms have been introduced.Inserting
long range links improvesthe performance of 2D NoCs by decreasing average hop count,
whichthis, in turn, causeslower power consumption and network latency.2
Pavlidis and Friedman
proposed 3D NoCs to decrease average hop count and achieve high performance.3
Similarly,
Optical NoCs6
, RF interconnect transmission lines7
and wireless interconnects8,9,13
have been
introduced to improve power consumption and latency using new interconnect technologies. The
advantages and disadvantages of these approaches are fully explained byRef. 14.
Wireless interconnects are designed using antennas as transceivers and receivers. Before the
current improvement on the characteristics of on-chip antennas which was made using carbon
nanotube10
, mm-wave antennas were being used. The mm-wave antennas support tens of GHz
bandwidth15
, 1-2 mm length and 10-15mm distance.16
Despite this, the use of carbon nanotube
antennascan improve the advantages of wireless interconnects by supporting a higher data rate,
For instance theycan achieve the 500 GHzbandwidth.17
As seen, the data transmission of carbon
nanotube antennas can be five times greater than the mm-wave antennas.
To improveWNoCs, the partitioning approach wasintroduced byRef. 18and 19in which the
network is divided to small parts called subnets. Every subnethas an antenna for sending flits to
other subnets if the hop count is reduced and congestion is not existed. In this regard, the
partitioning system was also proposed through which nodes placed in a subnet use the upper layer
with wireless links on nodes that called hub nodes to send flits to other subnets.9
On other
wordsahierarchicalarchitecture was introduced for interconnecting subnets using hub nodes.
A recursive structure named WCubewas introduced in Ref. 20 which centralizedthe wireless
router equipped to multi receivers and one transmitter. This approach reduced20-45% of latency
3. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
53
compared to the 2D wire mesh.Moreover,this idea in Ref. 21restricts maximum three hops using
distributing receivers consisting of256 cores;this causes 2X power saving compared to Ref. 20.
Some approaches use wireless links as data transmitter without any data wire links.Passing all
data packets through RF nodes makes 65% latencyimprovement as explained in Ref. 8. Promises
and challenges of related wireless backbone are discussed by Sujay Deb and etal.22
None of the
introduced wireless infrastructures exhibit an idea to tackle bandwidth incompatibility problem.
Our proposed approach using distributed antennas to aid hop countreduction can improve 71%
latency and 19% energy dissipation. It alsoprovides a solution to handle hybrid network link
bandwidth incompatibility. The WCube approach presented in Ref. 19 uses a table with one entry
per destination but we consider the number of entries equal to mesh directions plus parallel flits
count. This decreases the memory cost a lot as explained in Section 3.3.
3. WNoC Architecture and wireless linkslocations
The 2D mesh topology (see Figure 1) is known as the most popular simple network.It is used
because it has short channel length, low router complexity and high bisection bandwidth. We
assume no partitioning method and virtual channel on this network.
Fig 1. Mesh 4*4 topology; All nodes are connected via incoming and outgoing channels
Wireless links should connect the routers which have high communication and multi hops
distance to decrease power consumption and latency. Hence,the priority of links is calculatedas
follows.
= ∑ ( , − , ), ∈ × , (1)
wherehopdefsrc,des and hopwssrc,des are the number of hops between the source and destination
according to the routing algorithm. hopdef considers the default routing like XY routing and
hopws uses the routing that appliesLong-Range links2
. Using this routing, a packet with the (x,y)
coordinate is passed to the X axis until the x coordinate is equal to destination. After that, the
packet is leaded to the Y axis until destination is reached. If a wireless link is found in the path
that decreases hop counts, the packet uses the transfer antenna to truncate the path. Trafficsrc,des is
defined as the number of traversal packets between source and destination.
The wireless links placements algorithm is shown in Figure 2. The algorithm consumes a wireless
link between a pair of source and destination which have more than one hop count. Then, the cost
of wireless placement is calculated using Equation 1 in order to compare it with the previous link
cost. The new placement and its cost are selected as an optimized option if it is greater than the
4. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
54
previous one. Thefollowing algorithm is performed for all pairs of nodes.
1. L: wireless link
2. int Head; int Tail
3. While (count( L) != 0)
4. OptCost = -1;
5. For (j=0; j<count (nodes) )
6. For(k=0; k<count(nodes) )
7. If(nodej is not a neighbor of nodek )
8. If( no wireless link between nodej&nodek )
9. Consider L between nodej&nodek
10. Compute Cost
11. If (Cost >OptCost)
12. OptCost = Cost
13. Tail = k
14. Insert L between nodeHead&nodeTail
15. remove one L
Fig 2. Wireless links placementsalgorithm
3.1. Parallel Flits transmission and reception
As mentionedearlier, wireless links achieve high bandwidth using carbon nanotube antennas. One
way to utilize wireless bandwidth is the use of parallel flits transmission by a merging operation.
This operation appends some flits to send through a wireless link. Thus, packets are arrived faster
to their destination because waiting for reservation is eliminated. Section 4.1 describes buffers
architecture for wireless links to enable parallel transferring. Section 4.2 shows how flits are sent
through a wireless link, Section 4.3 explains flit reception at the next hop and finally, Section 4.4
presents anequation to calculate the number of parallel flits.
3.2. Buffer Structure
FIFO buffers are used to store flits of a packet, and reserved while a tail flit is received if
wormhole switching is consumed. Therefore, wireless links (Wslink)that can carry more than one
header need a specific buffer called the parallel buffer.Using this buffer, Wslink can be reserved
for more than one packet. The input and output of mentioned buffers are depicted in Figure 3. As
shown, a FIFO buffer has one input and output channel but a parallel buffer has parallel incoming
and outgoing.
Fig 3.Input and output of (a) FIFO buffer (b) Parallel buffer
The parallel buffer structure, which uses the Mano`s registers design23
, is demonstrated in Figure
4.As seen, there are three levels of gates including ‘not’, ‘and’, and ‘or’ gates levels. If the
arbitrator detects a new buffering request and a free buffer cell is existed, a positivesignal is
passed from the first level to the second level gates for pushing the flit to that free cell. A negative
signal from the arbitrator causesthe buffer keeps previous flits.
5. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
55
Fig 4. Digital design of parallel buffer
3.3. Flits Transmission
To send a packet, a header flit reserves the path by using a reservation table. As seen inFigure 5,
outputs can be therefore reserved by the buffer index. The constant value (CV) of cells is defined
for allocating to Wslinks.These cells are called Vpi (0≤i<CV). The index of buffers for a Wslink
is greater than four because of the mesh topology structure. So, if two flits are to be sent through
a wireless link at the same time, the 5th
and 6th
cells can be reserved.
Fig 5.Reservation tableis used for sending a packet at each router.N, E, S, W and Ip symbols refer to North,
East, South, West and local ports. Two cells are allocated to the wireless port,labeled as Ws1Vp1 and
Ws1Vp2.
If the output of arouted header flit was reserved by another header, the flit should wait except
where the output is a Wslink. Wslinks can be reserved by CV flits, hence, ifVpiis reserved, Vpj
can be reserved while j is less than CV.
After the reservation step, flits are popped up and sent through outputs. For Wsflits (i.e. wireless
flits), a merging operation for parallel transmission is required. As shown in Figure 6, a flit in the
north buffer is popped up and pushed in to the first part of Wsflit with Vp0, then the south flit is
marked as Vp1 and pushed in to the second part. The index of Vp iscalculated Equation 2.
= − (2)
6. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
56
wherei is the index of Vp, BufferIndex is the index of buffer and LinkNumberWS is the index of
Wslink.
Fig 6.The merging operation for parallel transmission overthe wireless link
3.4. Flits reception
At the next hop, Wsflit is received and it should be split to push in to the parallel buffer. The
buffer index cell that the flit with Vpiis pushed into is calculated by Equation 3.
= + (3)
wherei is the content of the Vp flag, BufferIndex is the index of buffer and LinkNumberWSis the
index of Wslink that is greater than 4 because of other neighbors.
3.5. Optimizing cost value
The CV should be defined as a proper value. If this value is small, congestion occurs and delay
will be high. By increasing the number of CVs, latency decreases down to a threshold with
expending memory cost. For cost reduction, the threshold value should be calculated to eliminate
competition. Therefore, the number of Vpsis assumedequal to the flows that are received at the
same time on the wireless node according to the routing algorithm.
4. Experimental Results
The parallel transferring/receiving approachconsidering various numbers of Vpsis compared with
the wired network using a cycle accurate System-Cbased simulator namedNoxim.The
configuration parameters are listed in Table1.The Noxim simulator has been extended by the
coding to support the proposed approach. The performance of the approach is evaluated in terms
of latency (part 4.1) and power consumed (part 4.2). The place of the wireless link is determined
by the cost equation whereall-to-all and transpose traffics are applied. All-to-all traffic is a
uniform traffic that all nodes send a packet one to another. On the transpose traffic, the n*n mesh
topology is considered as a matrix of the n size which nodei, has communicated with nodej,i where
i and j indices are (X ,Y) dimensions. The routing algorithm is that used in Ref. 2
7. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
57
.
4.1. Latency
Inserting long range links decrease the hop count;soit is an alternative to reduce latency. If the
long link is wired, only one flit can be transferred/received per clock. Using the mentioned
approach in this paper, the number of transmission flits is increased up to Vps that effect on
average clock reductionin order to receive packets. Thus, it is expected thatlatencydecreases than
full wired mesh network.
The results of average latencyconsidering all-to-all traffic on the 4*4 meshare shown in Figure 7
(a), where a wireless link is placed among the first and 14th
nodes. It is clear that when Vp3 is
used, the latencyis less than others. Because in this state the flows at the first node come from
nodes of 0, 1, 2 and 3; so there are three flows at the same time on the first node from west, east
and local ports. At the 14th
node, the flows come from nodes of12, 13, 14 and 15.This simulation
shows that latencyis improved by 71% if the number of Vps is carefully selected. If Vp2 is used
the improvement is about 15% which is 56% less than Vp3.The same reason justifies that Vp1is
not useful on the all-to-all traffic
An additional evaluation on the 5*5 mesh with one Wslink from the second node to the 14th
one is
undertaken. In this case, only two flows at the head and tail of Wslinkarereceived at the same
time. As shown in Figure 7(b), the best value for the number of Vps in this case is two and an
additional Vpwould not improve latency. In this case,the latency is improved about 19%
compared to the simple mesh. The improvement is about 6% by using Vp2.
4.2. Power Consumption
Energy is consumed when a flit is received, transferred or routed. Hence, if the number of hops
decreases, energy consumption is reduced too. Moreover, if the number of flits efforts for
allocating output ports decrease, power is saved. Parallel transmission/reception decreases hop
counts by the long range links idea, and competition by eliminatingthe limitation of blockingan
output for one packet.The energy consumption in a wireless link was modeled inRef. 9where the
longestWslinkwasconsidered 23mm.The plots of the total energy consumption on both traffics are
shown in Figure 8. It is evident that energy is saved using a wireless link. The simple mesh power
consumption (Ws less pillar) is 18% more than the proposed approach on all-to-all traffic. The
improvement is about 12% when transpose traffic is considered having hotspots nodes.
Table 1. Simulation parameters
Parameters Value
Simulation time 100000 cycles
Warm up 10000 cycles
Topology Mesh
Routing algorithm Routing that is explained in Ref. 2
Virtual channel Zero
Packet size 10 flit
8. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
58
Fig 7. Average latency of (a) 16 nodes on the all-to-all traffic, (b) 25 nodes on the transpose traffic
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
6E-05 7E-05 8E-05 9E-05 0.0001 0.0002 0.0003 0.0004
Latency(cycle)
injectionrate(flits/core/cycle)
vp3
vp2
vp1
WS less
0
5
10
15
20
25
30
0.004 0.005 0.006 0.007 0.008 0.009 0.01
latency(cycle)
injectionrate(flits/core/cycle)
vp3
vp2
vp1
Ws less
0
0.0001
0.0002
0.0003
0.0004
0.0005
0.0006
)j(energy
injectionrate (flits/core/cycle)
vp
Ws less
(a)
(b)
(a)
9. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
59
Fig 8.Energy consumption on (a) all-to-all traffic(b) transpose traffic
5. Conclusion and Future Works
In this paper, a parallel transferring/receiving approach was proposed to handle bandwidth
incompatibility of wire and wireless links on hybrid topologies.Carbon nanotube antennas can
support 500 GHZ bandwidth on a wireless link. The placement of these antennas decreased hop
counts that, in turn, it would impact on latency and power dissipation. An algorithm was
presented to consider wireless links according to traffic and distance between nodes
Wire link bandwidth is limited to carry one flit per clock; so flits are challenged to reserve a path
at the next hop. The proposed approach merges competitor flits and makes a bigger flit to transfer
through a wireless link per clock. The parallel transmission idea reminds additional ports at one
direction. Therefore, a wireless link is assumed to some virtual ports that are called Vps. Vps are
indexed for splitting flits to send via wire links at the next hop.A parallel transmission/reception
idea needs a buffer which is able to push and pop a constant value (CV) of flits at the same time.
The structure of the parallel buffer was also demonstrated. The CV was optimized by considering
its value equal to the flows that were received at the same time on the wireless node.
Improvements made on energy consumption and latency were also evaluated on all-to-all and
transpose traffics. Simulation results showed that energy consumption was decreased around 30%
and 15% on all-to-all and transpose traffics, respectively. Network latency as a function of the
packet injection rate was improved 71% on the all-to-all and around 19% on transpose traffic.
As a future work, a partitioning approach can be studied in order to improve wireless usage by
using antennas as a bridge between partitions.This implies thatthe improvement of the proposed
approach is unfolded via the number of parallel transmission flits growth. In response to this
limitation, a routing algorithm can be expressed for leading flits to wireless nodes and decreasing
hop counts. Further, a wireless link placement algorithm is going to improve for supporting
unpredictable traffics. The related works will synthesize and compare with the proposed approach
to handle bandwidth incompatibility.
6. References
[1] L. Benini, G. D. Micheli, Networks on Chips: A New SoC Paradigm, IEEE Computer, 35(2002),70-
78.
[2] U. Y. Ogras, R. Marculescu, it’s a small world after all: NoC performance optimization via long-range
link insertion, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14(2006), 693–
706.
[3] V. F. Pavlidis, E. G. Friedman, 3-D Topologies for Networks-on-Chip, IEEE Transactions on Very
0
0.00005
0.0001
0.00015
0.0002
0.00025
0.0003
0.00035
0.0004
0.00045
0.0005
0.004 0.005 0.006 0.007 0.008 0.009 0.01
)j(energy injectionrate(flits/core/cycle)
vp
ws less
(b)
10. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.3, June 2014
60
Large Scale Integration (VLSI), 15(2007), 1081-1090.
[4] B. Feero, P. P. Pande, Networks-on-Chip in a Three-Dimensional Environment: A Performance
Evaluation,IEEETransactions on Computers, 58(2009), 32-45.
[5] D. Park, et al., MIRA: A Multi-layered On-Chip Interconnect Router Architecture, IEEE International
Symposium on Computer Architecture, 2008, 251-261.
[6] A. Shacham, et al., Photonic Network-on-Chip for Future Generations of Chip Multi-Processors,
IEEE Transactions on Computers,57(2008), 1246-1260.
[7] M. F. Chang, et al., CMP Network-on-Chip Overlaid with Multi-Band RF-Interconnect, IEEE 14th
International Symposium on high performance computer architecture, 2008, 191-202.
[8] D. Zhao, Y. Wang, SD-MAC: Design and synthesis of a hardware-efficient collision-free QoS-aware
MAC protocol for wireless network-on-chip, IEEE Transactions on Computers,57(2008), 1230–1245.
[9] AmlanGanguly, Kevin Chang, et al., Scalable Hybrid Wireless Network-on-Chip Architectures for
Multi-Core Systems, IEEE transactions on computers, 60(2010), 1485-1502.
[10] K. Kempa, et al., Carbon Nanotubes as Optical Antennae, Advanced Materials, 19(2007), 421-426.
[11] P.P. Pande, C. Grecu, A. Ivanov, and R. Saleh, Design of a Switch for Network on Chip Applications,
Proc. Int’l Symp. Circuits and Systems (ISCAS), 5(2003), 217-220.
[12] ITRS, http://www.itrs.net/Links/2007ITRS/Home2007.htm, 2007.
[13] K. Kim, H. Yoon, K. O.,On-chip wireless interconnection with integrated antennas, Electron Devices
Meeting , 2000, 485 –488.
[14] Luca P. Carloni, ParthaPande, Yuan Xie, Networks-on-Chip in Emerging Interconnect Paradigms:
Advantages and Challenges, 3rd ACM/IEEE International Symposium, 2009, 93-102.
[15] Y. Huang, W. Y. Yin, Q. H. Liu, Performance prediction of carbon nanotube bundle dipole antennas,
IEEE Transactions on Nanotechnology,7(2008), 331–337.
[16] J. Lin, et al., Communication Using Antennas Fabricated in Silicon Integrated Circuits, IEEE Journal
of Solid-State Circuits,42(2007), 1678-1687.
[17] P. J. Burke, et al., Quantitative Theory of Nanowire and Nanotube Antenna Performance, IEEE
Transactions on Nanotechnology, 5(2006), 314-334.
[18] Wen-Hsiang Hu, Chifeng Wang, Nader Bagherzadeh, Design and Analysis of a Mesh-based Wireless
Network-on-Chip, 20th Euromicro International Conference on Parallel, Distributed and Network-
based Processing, 2012, 483-490.
[19] Chifeng Wang, Wen-Hsiang Hu, Nader Bagherzadeh, A Wireless Network-On-Chip Design for
Multicore Platforms, 19th Euromicro International Conference on Parallel, Distributed and Network-
based Processing, 2011, 409-416.
[20] S. B. Lee et al., A scalable micro wireless interconnect structure for CMPs, in Proc. ACM Annu. Int.
Con. Mobile Comput. Network, 2009, 20–25.
[21] D. DiTomaso, et al., iWise: Inter-routerwireless scalable express channels for Network-on-Chips
(NoCs) architecture, in Proc. Annu. Symp. High Performance Interconnects, 2011, 11–18.
[22] Sujay Deb, AmlanGanguly, ParthaPratimPande, et al., Wireless NoC as Interconnection Backbone for
Multicore Chips: Promises and Challenges, IEEE Journalon Emerging and
SelectedTopicsinCircuitsand Systems, 2(2012), 228-239.
[23] M. Morris Mano, Michael D. Ciletti, Digital Design: With an Introduction to the Verilog HD(Prentice
Hall, 2006).