Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
This document analyzes the performance of a neighbor knowledge based broadcast protocol called BCAST in mobile ad hoc networks using network simulator NS-2. It varies the number of data senders (multicast group size) and data sending rate to analyze packet delivery ratio, end-to-end delay, packet loss probability, and network control overhead. The simulation results show that BCAST generally performs well and provides robust performance even with high traffic loads.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate.
This document summarizes a research paper that proposes a novel cross-layer routing technique for mobile ad hoc networks. The technique calculates both signal strength and node mobility to select the most efficient and stable path for data transmission. It aims to improve on traditional ad hoc routing protocols like AODV by considering both link quality metrics from the physical layer (signal strength) and node mobility. The proposed method selects routes based on signal strength if mobility is high, and on traditional hop count if mobility is low, in order to find paths that reduce link failure and improve throughput.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
Multimedia traffic routing in multilayer wdm networksAlexander Decker
(i) The document describes a study on routing multimedia traffic in multilayer WDM networks. Two routing algorithms were explored: Capacitated Shortest Path First (CSPF) routing and Flow Deviation Algorithm (FDA) routing.
(ii) A new hybrid algorithm was proposed that uses both CSPF and FDA routing to minimize network-wide average packet delay. The algorithm was tested on two network topologies with multimedia traffic.
(iii) Simulation results showed that the hybrid algorithm successfully minimized the distance of each flow between source and destination nodes while satisfying capacity constraints, and minimized the total packet delay in the network.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
The document describes a proposed Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. The CPCRT aims to improve transmission performance by distinguishing between packet loss due to link failure versus other causes, while also conserving power used for packet transmission. It builds upon an earlier Crosslayered Routing Topology (CRT) approach by incorporating power conservation. The CPCRT is intended to identify the root cause of packet loss, avoid unnecessary congestion handling from link failures, allow congestion handling at specific high-traffic nodes rather than all nodes, and optimize resource and power usage for packet routing in mobile ad hoc networks.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that proposes a new algorithm for congestion control in Wavelength Division Multiplexing (WDM) optical networks. The algorithm aims to improve network survivability and reduce congestion. It analyzes existing congestion issues in WDM networks and formulates the problem the new algorithm seeks to address. The proposed algorithm will be tested through simulations to evaluate its performance at reducing congestion compared to existing strategies. The research has the potential to provide cost-effective solutions for congestion control in developing countries.
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
The document describes a new biological routing protocol called Biological Tunnel Routing Protocol (BioTROP) for Tunnel Wireless Sensor Networks (TWSN). BioTROP uses concepts from ant colony behavior and optimal forwarding calculations to determine the best next hop neighbor for packet transmission. It was tested on a 7 node TelosB sensor network in a tunnel, where over 70% of transmitted data packets were successfully delivered to the base station. BioTROP employs a cross-layer design between the physical and network layers to select next hops based on metrics like signal strength, link quality, and remaining power from the physical layer. It consists of routing management and neighborhood management modules to determine optimal routes and maintain neighbor tables.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
The document proposes a Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. CPCRT aims to distinguish between packet loss due to link failure versus other causes like congestion. It takes a cross-layer approach using information from the physical, MAC, and application layers. The proposed method also aims to conserve power during packet transmission by adjusting transmission power levels based on received signal strength. Simulation results show that CPCRT can better utilize resources and conserve power during congestion control compared to other approaches.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
More Related Content
Similar to Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
In this study, the multicast mobile ad hoc (MANET) CRN has been developed, which involves multi-hop and multilayer consideration and Steiner minimal tree (SMT) algorithm is employed as the router protocol. To enhance the network performance with regards to throughput and packet delivery rate (PDR), as channel assignment scheme, the probability of success (POS) is employed that accounts for the channel availability and the time needed for transmission when selecting the best channel from the numerous available channels for data transmission from the source to all destinations nodes effectively. Within Rayleigh fading channels under various network parameters, a comparison is done for the performance of SMT multicast (MANET) CRN with POS scheme versus maximum data rate (MDR), maximum average spectrum availability (MASA) and random channel assignment schemes. Based on the simulation results, the SMT multicast (MANET) CRN with POS scheme was seen to demonstrate the best performance versus other schemes. Also, the results proved that the throughput and PDR performance are improved as the number the primary channels and the channel’s bandwidth increased while dropped as the value of packet size D increased. The network’s performance grew with rise in the value of idle probability (푃퐼) since the primary user’s (PU) traffic load is low when the value of 푃퐼 is high.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
This document analyzes the performance of a neighbor knowledge based broadcast protocol called BCAST in mobile ad hoc networks using network simulator NS-2. It varies the number of data senders (multicast group size) and data sending rate to analyze packet delivery ratio, end-to-end delay, packet loss probability, and network control overhead. The simulation results show that BCAST generally performs well and provides robust performance even with high traffic loads.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate.
This document summarizes a research paper that proposes a novel cross-layer routing technique for mobile ad hoc networks. The technique calculates both signal strength and node mobility to select the most efficient and stable path for data transmission. It aims to improve on traditional ad hoc routing protocols like AODV by considering both link quality metrics from the physical layer (signal strength) and node mobility. The proposed method selects routes based on signal strength if mobility is high, and on traditional hop count if mobility is low, in order to find paths that reduce link failure and improve throughput.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
Multimedia traffic routing in multilayer wdm networksAlexander Decker
(i) The document describes a study on routing multimedia traffic in multilayer WDM networks. Two routing algorithms were explored: Capacitated Shortest Path First (CSPF) routing and Flow Deviation Algorithm (FDA) routing.
(ii) A new hybrid algorithm was proposed that uses both CSPF and FDA routing to minimize network-wide average packet delay. The algorithm was tested on two network topologies with multimedia traffic.
(iii) Simulation results showed that the hybrid algorithm successfully minimized the distance of each flow between source and destination nodes while satisfying capacity constraints, and minimized the total packet delay in the network.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
The document describes a proposed Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. The CPCRT aims to improve transmission performance by distinguishing between packet loss due to link failure versus other causes, while also conserving power used for packet transmission. It builds upon an earlier Crosslayered Routing Topology (CRT) approach by incorporating power conservation. The CPCRT is intended to identify the root cause of packet loss, avoid unnecessary congestion handling from link failures, allow congestion handling at specific high-traffic nodes rather than all nodes, and optimize resource and power usage for packet routing in mobile ad hoc networks.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that proposes a new algorithm for congestion control in Wavelength Division Multiplexing (WDM) optical networks. The algorithm aims to improve network survivability and reduce congestion. It analyzes existing congestion issues in WDM networks and formulates the problem the new algorithm seeks to address. The proposed algorithm will be tested through simulations to evaluate its performance at reducing congestion compared to existing strategies. The research has the potential to provide cost-effective solutions for congestion control in developing countries.
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
The document describes a new biological routing protocol called Biological Tunnel Routing Protocol (BioTROP) for Tunnel Wireless Sensor Networks (TWSN). BioTROP uses concepts from ant colony behavior and optimal forwarding calculations to determine the best next hop neighbor for packet transmission. It was tested on a 7 node TelosB sensor network in a tunnel, where over 70% of transmitted data packets were successfully delivered to the base station. BioTROP employs a cross-layer design between the physical and network layers to select next hops based on metrics like signal strength, link quality, and remaining power from the physical layer. It consists of routing management and neighborhood management modules to determine optimal routes and maintain neighbor tables.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
The document proposes a Crosslayered and Power Conserved Routing Topology (CPCRT) for congestion control in mobile ad hoc networks. CPCRT aims to distinguish between packet loss due to link failure versus other causes like congestion. It takes a cross-layer approach using information from the physical, MAC, and application layers. The proposed method also aims to conserve power during packet transmission by adjusting transmission power levels based on received signal strength. Simulation results show that CPCRT can better utilize resources and conserve power during congestion control compared to other approaches.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Similar to Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network
1. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
DOI: 10.5121/ijcnc.2023.15502 17
OPTIMIZE THE NETWORK CODING PATHS TO
ENHANCE THE CODING PROTECTION IN
WIRELESS MULTIMEDIA SENSOR NETWORK
Mohammad Javad Abbasi, A. S. Abdullah and N. Fisal
MIMOS CoE in Telecommunication Technology, Faculty of Electrical Engineering,
Universiti Teknologi Malaysia (UTM), 81310 Johor Bahru, Johor, Malaysia
ABSTRACT
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very
essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a
challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore,
Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless,
the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless
network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an
optimized protection technique based on network coding and rateless code has been proposed to enhance
the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is
enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected
using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the
proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the
network paths so that the throughput can be improved.
KEYWORDS
Optimal Network Path, network coding, Particle Swarm Optimization, rateless and Wireless Sensor
1. INTRODUCTION
The rise of consumer demand has fostered the development of various new technologies for
multimedia applications. In communications, the multimedia functionality has become one of the
standard specifications in almost all communication gadgets [1]. It can be observed that most of
multimedia functions are closely related to the entertainment applications such as sound, picture,
animation, and video [2]. Research on multimedia communication that provides high Quality of
Service (QoS) to consumers is critical as multimedia and communication technologies provide a
significant impact on the society.
One of the communications fields that are currently going through extensive development of
multimedia applications is the Wireless Sensor Network (WSN) technology. WSN must be
designed with robustness in dynamic topology and features self-organized characteristics since
most of the applications of WSN technology require sensor nodes to perform unattended
functions once deployed in a targeted area [3]. Besides, the performance of WSN technology is
also restricted to constraints such as inadequate power resources, limited bandwidth, small
memory size, and low processing capability [4, 5]. The most commonly simple and small data
transfer applications include temperature, distance, humidity,etc. [6]. Even with all those
constraints, the development of the technology has moved forward to a more challenging task to
2. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
18
include multimedia data transfer. With the bulky size of data in conjunction with the constraints,
the implementation of multimedia data transfer in WSN poses significant challenges [23].
Author in [7] introduced a network coding with crowdsourcing-based trajectory estimation
(NC/CTE) approach for data relay in vehicular network which key point were predesigned in
movement area. At various time each vehicular estimates the key points discovered by the other
vehicular node using a crowdsourcing method in the explored area which based on GPS pre-
trajectory navigation. In [8] author proposed a cross-layer systematic method for the navigation
of network coding based on MAC protocols in correlated moderate blurred conditions, which last
two hubs are helped by a some of node to trade information packages. This method controls
channel access between a set of nodes and can use NC to minimize the total number of
transmissions, which can increase the networks’ performance in terms of QoS.
Various paper have proposed different network coding methods in vehicular networks to improve
multi-hop routing protocols. In [7-8], a multi-hop communication method were was introduced
for time-basic emergency messages (EMs) dispersal. This introduced approach trinary
apportioned black-burst-based protocol (3P3B) used mini-distributed interframe space (DIFS)
device and trinary packing at the system layer at the medium access control (MAC) sub layer.
Author in [9-15] introduced fuzzy broadcast (FUZZBR), a fuzzy logic based multi-hop
communicate method, where has a minimum overhead of massage because of its utilization of
just specific transfer hubs for data.
In [25], the authors has combined the network coding technique and multi-paths network in
development of protection scheme in optical network. This idea can be adapted for WSN
environment where the encoded packet and its constituted packets can be transmitted
simultaneously through multiple paths in the network. However, the loss of more than one
transmitted packets will caused the decoding process to be impossible. Furthermore, the
possibility of occurrence of two or more packet loss increase as the number of hops increase
which make it impractical to be applied in the network with large number of hops. Alternatively,
certain transmission technique can be used in multi-paths network to reduce packet loss rate of a
transmitted packet. The idea is that, the packet is transmitted in multiple copies via several paths
from the source to the destination. This is to increase the packet survival rate since the possibility
of the transmitted packet reaches the destination is higher as the number of copies of the packet is
higher. However, this technique consumes too much power due to the large number of paths
involved. This situation is not applicable especially in power limited WSN.
This paper will focus on the optimization of the network model via optimally selecting the
transmission paths. The work in this paper will elaborate the optimization design approach to
select the best paths out of the available number of paths in the network in order to realize packet
transmission with the lowest probability of packet loss. The optimization framework will
consider the loss rate of the paths in the networks, the power level of the relay nodes and the
transmission cost. The performance of the scheme with the optimized network model has been
evaluated and the results are showed in this paper. The results study the effect of link quality,
node power, image size and loads on the system performance.
The rest of this paper is organized as follows. Section 2 provides a main optimization which
include ONPM design approach and Optimization using PSO to enhance the throughput and
reduce overhead during data transfer in WMSN. In Section 3 we evaluate the effectiveness of
ONPM through simulations and compare it with existing algorithms. Finally, Section 4 presents
the concluding remarks.
2. OPTIMIZATION
3. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
19
Optimization is a mathematical technique which is used to find the optimal value of certain
parameters based on certain functions. It is known to be introduced in [16]. Since then, varieties
of optimization techniques have been introduced and widely used in numerous applications. This
is most probably due to the massive computational efforts that increase exponentially with the
problem size and eventually helps to the NP and unsolvable solutions [17].
Particle Swarm Optimization Particle Swarm Optimization (PSO) is a population-based
stochastic optimization algorithm which is primarily based on social behavior of schools of
fishes, flocks of birds and swarms of bees [18]. In fact, PSO has been promising optimization
tools due to its simplicity, fast convergence and high searching ability [22, 24]. The solution to
the optimization problem is acquired using the velocity and position of the particle in the search
space after certain number of iterations. Equation (1) and (2) is used to update the velocity and
position of the particle during iteration process. Given that, v(t) and x(t) are the velocity and
position of the particle at time t respectively while the updated velocity and position of the
particle at time t+1 is represented by v(t+1) and x(t+1).
)
(
)
(
)
(
)
1
( 2
1 t
x
P
c
t
x
P
c
t
t g
l
(1)
)
1
(
)
(
)
1
(
t
t
x
t
x (2)
where ω is called the inertia weight. Variables c1 and c2 are positive constants that represent the
social and cognitive components respectively. v(t) controls the direction of particle movement
while avoiding large direction changes. The performance of the particle based on the local
experience and the performance of the particle based on their neighbors are measured
by
)
(
1 t
x
P
c l and
)
(
2 t
x
P
c g
respectively. Both the local and global components are
depending on c1 and c2 respectively. Both global and local best will assist the particle to discover
the best possible position and velocity at time (t+1).
2.1. Onpm Design Approach
Figure 1 illustrates the example of ONPM process for the proposed OPR-NCP in a network of
two sources and five paths. In this example, ONPM process has to select three transmission paths
consisting of two active paths and one protection path. Basically, the process is carried out by the
destination node instead of the source or relay nodes. This is due to two reasons. Firstly, the
destination node usually has no resources constraint. This eventually reduces the power
consumption at the relay nodes to deploy the ONPM process. Secondly, the destination node has
direct connectivity to each path and indirect connectivity to the source nodes through the
available paths in the network. This is crucial since the network status information required by
ONPM process which are packet loss rate, transmissions cost and relay nodes power level can be
transferred to the destination node via the connectivity established.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
20
Figure 1 Process flows of ONPM in five paths network
Based on the example in Figure 1, the ONPM process begins with gathering of information
regarding nodes power levels and transportation cost by the destination node. Throughout
information gathering step, the quality of each link in each path is used to compute the packet
loss rate of the path (refer to Step 1). Then, the PSO algorithm is initiated using information
gathered as in Step 2. In Step 3, the path selection is notified to the sensor nodes of the selected
paths and the source nodes. The destination node will transmit the information of the decision to
the source nodes through the selected paths. After receiving the information on the selected paths,
the source nodes will initiate packets transmission process according to OPR-NCP scheme.
The ONPM process is repeated periodically so that the best paths for packets transmission can be
updated regularly. This is to allow the relay nodes power to be evenly consumed. In ONPM
scheme, a parameter called optimization repetition interval, τ is introduced. This parameter
determines the number of transmission sessions allowed after the transmission paths are updated.
In ONPM repetition, the information required as in Step 1 can be attached to the transmitted
packets by the relay nodes of the selected paths during packet transmission process. This is to
avoid the needs of additional transmissions in order to transmit the status information of relay
nodes of the current transmission paths. Simultaneously, the relay nodes of non-transmission
paths will transmit their status information to the destination node according to Step 1.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
21
Figure 2 ONPM optimization process flow
2.2. Optimization Using PSO
As described in the previous section, the second step of the proposed ONPM scheme is to
optimally select the best M number of paths out of L available paths in the network for the packet
transmission process. During the optimization process, the network status information gathered
by the destination node will be considered as one of the path selection criteria. The destination
node initiates the PSO algorithm according to the flow depicted in Figure 2.
As mentioned earlier, the paths selection criteria are as follows. The selection of M-1 paths is
conducted by optimally selecting the paths with the lowest packet loss rate. These paths will be
functioning as active paths in the network. Meanwhile, the selection of the last path is done by
optimally selecting the path with the highest packet loss rate. This path will be used as a
protection path. An example of path selection for nine paths network based on this criteria is
presented in Figure 3. The computation of the absolute packet loss rate of a transmitted packet via
the selected paths in the example is provided in Table 1.
Basically, there is possibility to have a significant difference between the highest and the lowest
packet loss rate of the paths in the network. Based on the example in Figure 3, the highest and the
lowest packet loss rates are 0.4 and 0.01 which belong to Path 1 and Path 3 respectively. As long
as the lowest packet loss rate is considerably low, the recovery process may not be critically
required since the active paths are able to provide reliable transmission due to low packet loss
6. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
22
rate. In protection path, the number of packet loss is expected to be significantly higher than in
active paths since the packet loss rate is high. However, the effect of this occurrence to the
system performance may not be significant since there is less packet recovery required by the
active paths. Furthermore, packet loss in the protection path can be recovered with high
possibility using the transmitted packets in active paths.
As for comparison, the example of paths selection and computation of the absolute packet loss
rate for the normal paths selection model is also included in Figure 4 and Table 1respectively. In
performance analysis of the proposed ONPM, the normal network model will be used as
comparison with the proposed model. Based on the best paths selection, all M paths assigned to
the paths with the minimum packet loss rate. It can be showed that the packet loss rate for the
first and second path selections using this criterion are less than the paths selection of ONPM.
However, the third paths selection using this criterion yield a significantly high absolute packet
loss rate compared to the ONPM. According to the result the average of the packet loss rate using
this criterion is more than the ONPM where most of packet lost rate will happen in the third set of
transmission paths. The reason to this occurrence is that, most of the paths with low packet loss
rate have been used as transmission paths including the protection path although the packet loss
recovery may not be critically needed.
Table 1: Absolute packet loss rate computation
The absolute packet loss rate of a packet from source S1 and S2 to the destination node via the selected
paths in Figure 3 is as follow:
ONPM Scheme
Figure 3 (a):
Source S1 PT(a) = 0.01(1 - (1 - 0.05)(1 - 0.40)) = 0.0043 (3)
Source S2 PT(a) = 0.05(1 - (1 - 0.01)(1 - 0.40)) = 0.0203 (4
Figure 3 (b):
Source S1 PT(b) = 0.08(1 - (1 - 0.11)(1 - 0.29)) = 0.0294 (5)
Source S2 PT(b) = 0.11(1 - (1 - 0.08)(1 - 0.29)) = 0.0381 (6)
Figure 3 (c):
Source S1 PT(c) = 0.15(1 - (1 - 0.13)(1 - 0.25)) = 0.0521 (7)
Source S2 PT(c) = 0.13(1 - (1 - 0.15)(1 - 0.25)) = 0.0471 (8)
The absolute packet loss rate of a transmitted packet from source S1 and S2 via all paths in the network
can be determine from the average of absolute packet loss rate of each set of transmission paths which
are equal to 0.0286 and 0.0352 respectively
Normal Scheme
Figure 4 (a):
Source S1 PT(a) = 0.01(1 - (1 - 0.05)(1 - 0.08)) = 0.0013 (9)
Source S2 PT(a) = 0.05(1 - (1 - 0.01)(1 - 0.08)) = 0.0045 (10)
Figure 4 (b):
Source S1 PT(b) = 0.13(1 - (1 - 0.11)(1 - 0.15)) = 0.0317 (11)
Source S2 PT(b) = 0.11(1 - (1 - 0.13)(1 - 0.15)) = 0.0287 (12)
Figure 4 (c):
Source S1 PT(c) = 0.25(1 - (1 - 0.29)(1 - 0.40)) = 0.1435 (13)
Source S2 PT(c) = 0.29(1 - (1 - 0.25)(1 - 0.40)) = 0.1595 (14)
The absolute packet loss rate of a transmitted packet from source S1 and S2 via all paths in the network
are equal to 0.0588 and 0.0642 respectively
7. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
23
Figure 3 Paths selection using ONPM scheme
Figure 4 Paths selection using normal scheme
8. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
24
3. ONPM PERFORMANCE ANALYSIS
In this section, the performance of the OPR-NCP scheme in the proposed biologically-inspired
network model is analyzed and evaluated. The simulation is conducted using the network model
depicted in Figure 5. Twentyseven of the nodes are arranged in a grid form which produces a
total of 9 paths with 3 hops each. Two stand still images “Pepper and mandrill” are used in the
simulations. The standard network parameters settings are listed in Table unless it is stated to be
otherwise while the optimization parameters are tabulated in Error! Reference source not
found..
Figure 5 Simulation network model
Table 2: Model parameter settings of WMSN
Parameter Description Value
L Total number of paths 9 paths
H Number of hops 3 hops
p Link Quality (range: 0.6-0.95) ‘random’
εmin Minimum Power Level Required 1406
ε Initial Node Power Level 1000 (≈0.7εmin)
K Number of Transmitted Packet 2048
τ Optimization Repetition Interval 5
Table 3: PSO parameter settings
Parameter Value
Number of particles 9
Number of iterations 5
Acceleration Constant c1 and c2 1.0
Inertia weight ω 1.0
The simulation is divided into several experiments in order to analyze the performance of the
proposed network model. The results presented begin with exhaustive search of the PSO
parameters value. Effect of node power, link quality and loads are also provided subsequently.
Analysis is done using two performance metrics which are structural similarity index (SSIM) and
normalized throughput. According to the result from the average of the data sets of 1000 times
experiment repetitions. The performance of the proposed network coding using ONPM and
normal network, and the conventional transmission technique are compared. In conventional
transmission technique, each source is assigned with one transmission path. The transmission
R5,1 R5,2 R5,3
S1
R3,1 R3,2 R3,3
R2,1 R2,2 R2,3
R1,1 R1,2 R1,3
Path 1
Path 2
Path 3
Path 5
R4,1 R4,2 R4,3
Path 4
S2
D
R9,1 R9,2 R9,3
R7,1 R7,2 R7,3
R6,1 R6,2 R6,3
Path 6
Path 7
Path 9
R8,1 R8,2 R8,3
Path 8
Loss free
9. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
25
process is conducted according to the traditional amplify and forward strategy in [19]. Since
there are nine paths available in the network, each source is expected to use four paths
consecutively which are selected according to the normal paths selection scheme explained in
next section. The remaining one path will be left unused.
3.1. Optimization Parameters Value
In this research, the PSO algorithm is conducted using parameter settings tabulated in Error!
Reference source not found.. In the simulation Value of each parameter is selected from the
searching by testing several parameter values which depicted in Table 3. Besides, the
optimization repetition interval is also acquired in this test. Parameter value that provides the
lowest packet loss rate in the test will be used in the simulations performance analysis of the
proposed ONPM. The following are the results of the test carried out on several parameter values.
3.1.1. Acceleration Constants
The cognitive, c1 and social, c2 parameters which are called acceleration constants determine a
particle searching behavior relative to its past experience and the overall swarm experience
respectively [20]. Basically, small acceleration constants value will limit the searching capability
of the particle which eventually causes it to be less effective although the number of iterations is
large. Moreover, the particle may diverge due to too large acceleration constants [21]. The
experiments are conducted in two different swarm sizes which are one and nine particles. For
each swarm size, the results of 1, 5 and 10 number of iterations are collected. The results of both
one and nine particles are depicted in Figure 6 and Figure 7 respectively.
The best acceleration constant for one swarm particle in this experiment is four since it provides
the lowest packet loss rate as illustrated in Figure 5. The best value in this case is obtained from
both 5 and 10 iterations. As described previously, the large number of iterations may be required
for large acceleration constants. Furthermore, for nine particles experiment, it could be shown
that the acceleration of value one gives the minimum packet loss for three iterations tested as
shown in Figure 7. Since the swarm size is sufficiently large to cover all possible solutions, the
optimization can determine the best solution although the number of iterations used is one.
Therefore, the acceleration constants value is set to be unity in the performance analysis of the
proposed ONPM.
0.35
0.37
0.39
0.41
0.43
0.45
0.47
0.49
0.51
0.53
0.55
0 0.5 1 1.5 2 2.5 3 3.5 4
Packet
Loss
Rate
Acceleration Constants
Iteration = 1
Iteration = 5
Iteration = 10
10. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
26
Figure 6 Packet loss rate for different acceleration constants in one particle swarm
0.378
0.379
0.38
0.381
0.382
0.383
0.384
0.385
0.386
0.387
0 0.5 1 1.5 2 2.5 3 3.5 4
Packet
Loss
Rate
Acceleration Constants
Iteration = 1
Iteration = 5
Iteration = 10
Figure 7 Packet loss rate for various acceleration constants in nine particles swarm
3.1.2. Inertia Weight
Based on PSO schemes, inertia weight is a constant used to find the discovery of best solution of
the particle in the search space [21]. With a sufficiently large value, the inertia weight allows the
swarm to move around the search space freely and determine the global best region fast [21]. To
determine the best value of inertia weight for the performance analysis of the proposed ONPM,
two experiments are conducted involving one and nine swarm particles with 1, 5, and 10
iterations. The results of both one and nine swarm particle experiments are illustrated in Figure 8
and Figure 9 respectively.
Based on both figures, the determination of inertia weight in one and nine swarm particles shows
nearly similar performance to the acceleration constants experiments. However, in one particle
experiment (refer to Figure 8.), the lowest packet loss rate is achieved using inertia weight of
value larger than or equal to two in ten number of iterations. Due to the same reason as for the
acceleration constants, the larger number of iterations will provide lower packet loss rate since
there is only one particle in the swarm searching for the optimum solution.
0.38
0.4
0.42
0.44
0.46
0.48
0.5
0.52
0.54
0 0.5 1 1.5 2 2.5 3 3.5 4
Packet
Loss
Rate
Inertia Weight
Iteration = 1
Iteration = 5
Iteration = 10
Figure 8 Packet loss rate for different inertia weight in one particle swarm
11. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
27
In nine particles experiment (refer to Figure 9), the lowest packet loss rate is obtained at inertia
weight of value 0.5 in one iteration. The reason is maybe due to the number of particles used is
sufficiently large to allow one of the particles to discover the best solution in a single iteration.
Nevertheless, the inertia weight of value one gives a more consistent performance for the three
iterations. Furthermore, it is more reliable to use more than one iteration in determining the best
solution.
0.3795
0.38
0.3805
0.381
0.3815
0.382
0 0.5 1 1.5 2 2.5 3 3.5 4
Packet
Loss
Rate
Inertia Weight
Iteration = 1
Iteration = 5
Iteration = 10
Figure 9 Packet loss rate for different inertia weight in nine particles swarm
3.1.3. Number of Particles and Iterations
From the result illustrated in Figure 10, the best number of swarm particles is nine. It shows the
minimum packet loss rate in the experiment. The lowest packet loss rate is obtained using a
single number of iteration and it sustains larger number of iterations used. It can also be observed
that ten particles also provide almost the same packet loss rate as nine particles for all number of
iterations tested. On the other hand, packet loss rate is higher when smaller number of particles is
used. This is maybe due to the small number of paths in the network that can easily be discovered
by each particle in the swarm. However, in the case where the number of particles is smaller than
nine, some of the paths may not be discovered in the first iteration. This indicates that the best
path can be discovered using larger number of iterations.
0.37
0.39
0.41
0.43
0.45
0.47
0.49
0.51
0.53
0.55
0.57
0 5 10 15 20
Packet
Loss
Rate
Number of Iterations
Swarm Size 1 Swarm Size 3
Swarm Size 5 Swarm Size 7
Swarm Size 9 Swarm Size 10
Figure 10 Packet loss rate for different number of iterations
12. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
28
3.1.4. Optimization Repetition Interval
As mentioned earlier, the repetition interval limit the number transmission session allowed after
each optimization process. This parameter is essential since it avoid the transmission process to
be conducted through the obsolete paths due to outdated paths selection information. This occurs
when the repetition interval is too large. On the other hand, this parameter also reduces the
network power from the unnecessary optimization process which may provide the same decision
as the previous one. This situation occurs when the repetition interval is small. In general, small
value of repetition interval will consume more network power while large value will cause
outdated of optimization information. Therefore, the result of the test provided in Figure 11,
illustrates that the repetition intervals that provide the lowest packet loss rate are 4 and 5.
Basically, higher repetition interval value reduces the power consumption in conducting the paths
selection process. Hence, the repetition interval of value 5 will be used in the performance
analysis of the proposed ONPM.
0.37
0.375
0.38
0.385
0.39
0.395
0.4
0.405
0.41
0.415
0.42
0 2 4 6 8 10 12
Packet
Loss
Rate
Transmission Sessions per Interval
Figure 11 Packet loss rate for several Optimization Repetition Intervals
3.2. Effect of Node Power
In the simulation, the effect of power level at every node on the performance of the system is
analyzed. The power required for transmitting/receiving a packet is set to 1 unit. Besides, the
power required for transmitting/receiving a status information packet is assumed to be 0.05. The
performance of the system is obtained by varying the power, ε of every node in the network from
300 to 3600. Based on the simulation results of the effect of different sensor node powers on the
image quality and throughput are illustrated in Figure 12 and Figure 13, respectively.
13. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
29
0 500 1000 1500 2000 2500 3000 3500 4000
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Node Power Level
Normalized
Throughput
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 12 Throughput at different initial node power
0 500 1000 1500 2000 2500 3000 3500 4000
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Node Power Level
Structural
Similarity
Index
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 13 Effect of initial node power on image quality
Based on both figures, the throughput and image quality is increasing linearly with the increment
of power level from 300 to 1200 unit. Despite, the performance of ONPM in terms of throughput
and image quality are improved by average of 7 and 11% respectively within this range. This is
due to most of packet loss occurred are caused by node failure which is due to power depletion.
Even though there are paths with lower packet loss rate, insufficient power level has caused the
relay nodes power in the paths to be exhausted. Therefore, the transmission has to be carried out
using higher packet loss rate paths until all relay nodes in the network drawn off power. As a
result, the transmission of the remains packets is also failed. Since ONPM is able to consistently
control the usage of high and low packet loss rate paths, the number of transmitted packets in the
insufficient power network are maximized.
Based on the maximize the power level after 1500 unit illustrated less effect to the image quality
and throughput since the sensor node power level is larger than the minimum value required. In
this case, packet losses are totally depending on the paths packet loss rate since network power is
14. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
30
more than sufficient for the transmission of all packets. The selected paths are also able to allow
more packets to be transmitted through it. Therefore, more packets can be transferred via the
paths with the lowest packet loss rate as power level increases. This allow the normal network
model to perform better than ONPM as can be observed from the results of both throughput and
image quality. In Figure 12 and 13, the performance lines of OPR-NCP in both normal network
model and ONPM overlap at 1700 unit power level.
3.3. Effect of Link Quality
The performance of the system for several link qualities is studied. Let the network be in both
insufficient and excess power conditions where each relay node in the network is set to
approximately 70% and 130% of ε min respectively for the transmission of 2048 packets. The
effects of different link qualities on the similarity index and throughput are illustrated in Figure
14 to Figure 17. In the inspection of all four figures, a common pattern that can be identified is
that the performance of OPR-NCP in normal network model and ONPM illustrate almost similar
results. This is theoretically true since the ONPM assists the system to use the network resources
evenly based on its optimization objective which is the lowest packet loss rate for the first M-1
paths and the highest packet loss rate for the last path. In this simulation, the quality of all links in
the network is assumed to be the same. Hence, ONPM will find out that all paths in the network
is of the same packet loss rate and therefore, it will choose the first M paths in the network, given
that the relay nodes in the paths have sufficient power for the packets transmission process. On
the other hand, the normal network model that chooses the paths based on the lowest packet loss
rate for all transmission paths faces the same experience. As a result, the performance of OPR-
NCP in both network models is nearly similar to each other.
In insufficient power conditions, based on Figure 14, it can be observed that even in almost
perfect link quality (of value 0.975), the ONPM obtains the similarity index slightly more than
0.6 while the throughput of the network is around 0.7 as illustrated in Figure 15. Since the power
level of the relay node is 0.7εmin, the power depletion of the relay nodes occurs much earlier
before the transfer process finishes which causes the failure of the packet delivery in the network.
At lower link qualities such as 0.6 and 0.8, both power depletion and inconsistent channel
condition are the main reasons for packet loss which eventually reduce the image quality and
throughput of the ONPM below 0.3 and 0.65 respectively.
0.600 0.800 0.900 0.950 0.975
0
0.2
0.4
0.6
0.8
1
Link Quality
Structural
Similarity
Index
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 14 Quality of image at different link qualities for ε ≈ 0.7εmin
15. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
31
0.600 0.800 0.900 0.950 0.975
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
Link Quality
Normalized
Throughput
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 15 System throughput at different link qualities for ε ≈ 0.7εmin
In the condition of excess power where the node initial power used is 1.3εmin, Figure 16 and
Figure 17 show that the image quality is more than 0.9 while the system throughput approaching
100% respectively at high link quality which is 0.975. It can also be observed that there are
around 0.05 and 0.1 increments in the performance of the system for 0.6 and 0.8 link qualities
respectively compared to the performance of the experiment in insufficient power condition. This
shows that power level has effect on the system performance although the link quality is poor.
However, as the link quality gets poorer, the changes between insufficient powers to excess
power condition will be less effective to the performance of the system since the number of
packet loss is away much than the number of survived packets. The optimization in this case will
not enhance the system performance.
0.600 0.800 0.900 0.950 0.975
0
0.2
0.4
0.6
0.8
1
Link Quality
Structural
Similarity
Index
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 16 Quality of image at different link qualities for ε ≈ 1.3εmin
3.4. Effect of Loads
The size of image to be transported from the source to the destination is extremely related to the
network loads. Larger size of image cause heavier load to the network since the number of
packets needs to be transferred will increase subsequently. The simulation has been conducted to
determine the loads effect on the throughput and image quality. Different image sizes have been
16. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
32
considered based on the simulation parameter settings stated earlier. Table 4 provided, sizes of
the input image number of transmitted packets and nodes power level are provided in Table 4.
The relay nodes power is set to approximately 70% of the total minimum power level required in
the transmission of all packets of each image size. The samples of original and received images
of 8, 64 and 1024 Kbytes size are also provided in Figure 20 to Figure 22 respectively. These
images are obtained from the simulation of OPR-NCP in the proposed ONPM.
0.600 0.800 0.900 0.950 0.975
0
0.2
0.4
0.6
0.8
1
Link Quality
Normalized
Throughput
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure 17 System throughput at different link qualities for ε ≈ 1.3εmi
Table 4: Image size and the correlate number of packets and nodes power
Image Size
(Kbytes)
Number of
Packet, K
Nodes Power
Level (unit)
8 1024 495
16 4096 1970
64 16384 7880
256 65536 31500
1024 262144 125000
Based on throughput and image quality results as depicted in Figure 18 and Figure 19.
Respectively, it can be seen that the throughput of the system is not affected by the changes of
image size. Intuitively, number of packets transmitted will not affect the system throughput if the
ratio of the nodes power level to the total number of transmitted packets is fixed. Given that, the
size of packets of each image is fixed while the link quality used must be in the same range.
The reason is that, only 70% of the packets are transmitted by the source since the network has
only 70% of the total power. Therefore, the remaining 30% of the packets are considered loss and
appear as black area on the image. Besides, packet loss also occurs among the 70% of the
transmitted packets. They can be identified from the noises in the images. In small dimension
image, the noises scatter in almost all areas of the image as depicted in Figure 20. On the other
hand, different noise levels can be distinguished between left and center regions in the large
dimension image shown in Figure21. This is primarily due to the paths with the lowest packet
loss rate are used during the first approximate 30% of the transmission process. However, as the
nodes in the paths are out of power, the new paths with higher packet loss rate will be used which
consequently caused higher packet loss. Based on Figure 22 the noise level will maximized
subsequently.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
33
8 16 64 256 1024
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Image Size (Kbyte)
Normalized
Throughput
Figure 18 Normalized throughput at different image size
8 16 64 256 1024
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
Image Size (Kbyte)
Structural
Similarity
Index
Conventional Technique
NCP (Normal)
NCP (ONPM)
Figure19 Effect of image size on the output image quality
Figure 20 Original and received 8 Kbytes images in ONPM (Magnified 800%)
18. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
34
Figure 21 Original and received 64 Kbytes images in ONPM (Magnified 200%)
Figure 22 Original and received 256 Kbytes images in ONPM (Actual Size)
4. CONCLUSIONS
The optimal paths selection model framework for the proposed network coding scheme is
introduced in this paper. The proposed OPNM is used to optimally select the best paths out of
several paths available in the network to be used for the packet transmission process. More
importantly, it clearly shows that the proper selection of the paths will support distributed energy
usage in the network. This is extremely vital for WMSN in which limited energy has been a
major performance bottleneck. Therefore, it can be illustrated that the proposed paths selection
algorithm is energy efficient and resilient to transmission errors when compared to network
coding in a normal network. The works however can be improved in the future to enhanced the
performance and eventually make it more practical. The following are some suggestions on the
work that can be done in the future on the proposed ideas.
RECEIVED IMAGE
ORIGINAL IMAGE
RECEIVED IMAGE
ORIGINAL IMAGE
19. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
35
CONFLICT OF INTEREST
The authors declare no conflict of interest.
REFERENCES
[1] Joel JPC, R., Marco, O., and Binod, V. New trends on ubiquitous mobile multimedia applications.
EURASIP Journal on Wireless Communications and Networking. 2010. 2010
[2] Akpan, I.U. and Presly, O.O. Multi-Media Communication Systems for Social Development in
Nigeria: A Symbiotic Deconstruction. New Media and Mass Communication. 2013. 10 23-32.
[3] Purohit, N., Agrawal, H., and Jain, A. A New Scheme for Cooperative Communication in LEACH
Based Wireless Sensor Network. 2011 International Conference on Computational Intelligence and
Communication Networks (CICN). 7-9 Oct. 2011. 47-51.
[4] Shi, B., Weiyi, Z., Guoliang, X., Jian, T., and Chonggang, W. DEAR: Delay-bounded Energy-
constrained Adaptive Routing in wireless sensor networks. INFOCOM, 2012 Proceedings IEEE. 25-
30 March 2012. 2012. 1593-1601.
[5] Akyildiz, I.F., Melodia, T., and Chowdhury, K.R. A survey on wireless multimedia sensor
networks. Computer Networks. 2007. 51 (4): 921-960.
[6] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. Wireless sensor networks: a
survey. Computer Networks. 2002. 38 (4): 393-422.
[7] L. Li, Z. Yang, J. Wang, Z. S. Kui and Y. Zhu "Network coding with crowdsourcing-based
trajectory estimation for vehicular networks," Journal of Network and Computer Applications, vol.
64, pp. 204-215, 2016.
a. Antonopoulos, A. S. Lalos, M. Di Renzo and C. Verikoukis, "Cross-Layer Theoretical Analysis of
NC-Aided Cooperative ARQ Protocols in Correlated Shadowed Environments," in IEEE
Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4074-4087, Sept. 2015.
[8] W. Libing, F. Jing, W. Jing, N. Lei and W. Hao. "Emergency Message Broadcast Method Based on
Huffinan-Like Coding," Journal of Computer Research and Development, vol. 54, no. 11, pp. 2475-
2486, 2017.
[9] F. Liu, Z. Chen and B. Xia, "Data Dissemination With Network Coding in Two-Way Vehicle-to-
Vehicle Networks," in IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 2445-2456,
April 2016.
[10] N. M. A. Brahin, H. M. Nasir, A. Z. Jidin, M. F. Zulkifli and T. Sutikno, "Development of
Vocabulary Learning Application by Using Machine Learning Technique," Bulletin of Electrical
Engineering and Informatics, vol. 9, no.1, pp. 362-369, 2020.
[11] M. Mabrok, Z. Zakaria, T. Sutikno and A. Alhegazi, "Wideband power amplifier based on
Wilkinson power divider for s-band satellite communications," Bulletin of Electrical Engineering
and Informatics, vol. 8, pp. 1531-1536, 2019.
[12] R. A. Hasan, M. A. Mohammed, Z. H. Salih, M. A. B. Ameedeen, N. Ţăpuş and M. N. Mohammed,
"HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in the
Cloudlets," Telecommunication, Computing, Electronics and Control, vol. 16, no. 5, pp. 2144-2154,
2018.
[13] M. A. Ahmed, R. A. Hasan, A. H. Ali and M. A. Mohammed, "The classification of the modern
arabic poetry using machine learning," Telecommunication, Computing, Electronics and Control,
vol. 17, no. 5, pp. 2667-2674, 2019.
[14] M. A. Mohammed, R. A. Hasan, M. A. Ahmed, N. Tapus, M. A. Shanan, M. K. Khaleel, et al., "A
Focal load balancer-based algorithm for task assignment in cloud environment," in 2018 10th
International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2018, pp. 1-
4
[15] Nash, J.C. The (Dantzig) simplex method for linear programming. Computing in Science &
Engineering. 2000. 2 (1): 29-31.
[16] Binitha, S. and Sathya, S.S. A Survey of Bio inspired Optimization Algorithms. International
Journal of Soft Computing and Engineering (IJSCE). 2012. 2 (2): 137-151.
[17] Kennedy, J. and Eberhart, R.C. Swarm intelligence. Morgan Kaufmann Publishers Inc. 2001
20. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.5, September 2023
36
[18] El-Darymli, K. Amplify-and-Forward cooperative relaying for a linear Wireless Sensor Network.
2010 IEEE International Conference on Systems Man and Cybernetics (SMC). 10-13 Oct. 2010.
2010. 106-112.
[19] Baguda, Y., Fisal, N., Rashid, R., Yusof, S., Syed, S., and Shuaibu, D. Biologically-Inspired
Optimal Video Streaming over Wireless LAN. In: Kim, T.-h., Adeli, H., Fang, W.-c., Vasilakos, T.,
Stoica, A., Patrikakis, C., Zhao, G., Villalba, J., and Xiao, Y. eds. Communication and Networking.
Springer Berlin Heidelberg. 188-197; 2012
[20] Del Valle, Y., Venayagamoorthy, G.K., Mohagheghi, S., Hernandez, J.C., and Harley, R.G. Particle
Swarm Optimization: Basic Concepts, Variants and Applications in Power Systems. IEEE
Transactions on Evolutionary Computation. 2008. 12 (2): 171-195.
[21] Abbasi, M., Abd Latiff, M. S., Modirkhazeni, A., & Anisi, M. H. (2011). Optimization of wireless
sensor network coverage based on evolutionary algorithm. International Journal Computer
Communications and Networks, 1, 1-5.
[22] Abdullah, A. S., Abbasi, M. J., & Fisal, N. (2015). Review of Rateless-Network-Coding-Based
Packet Protection in Wireless Sensor Networks.
[23] Abbasi, M., Bin Abd Latiff, M. S., & Chizari, H. (2014). Bioinspired evolutionary algorithm based
for improving network coverage in wireless sensor networks. TheScientificWorldJournal, 2014.
[24] Kamal, A.E. and Al-Kofahi, O. Toward an optimal 1+N protection strategy. 2008 46th Annual
Allerton Conference on Communication, Control, and Computing. 23-26 Sept. 2008. 162