A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important
issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended
original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as
Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using
Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol
EOLSR-RE and EOLSR-EC over OLSR, we performed various trials using Qualnet simulator. The
performance of these routing protocols is analyzed in terms of energy consumption, control overheads, end
to end delay, packet delivery ratio. The modified OLSR protocol improves energy efficiency of network by
reducing 20 % energy consumption and 50% control overheads.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important
issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended
original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as
Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using
Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol
EOLSR-RE and EOLSR-EC over OLSR, we performed various trials using Qualnet simulator. The
performance of these routing protocols is analyzed in terms of energy consumption, control overheads, end
to end delay, packet delivery ratio. The modified OLSR protocol improves energy efficiency of network by
reducing 20 % energy consumption and 50% control overheads.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an indispensable technology. A mobile sink may be required for some applications in the sensor field, where incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual backbone network enables data collection from members of the frame and delivers it to the mobile sink. The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy consumption by 30% and delay by 9% as compared with static sink scenario.
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an
indispensable technology. A mobile sink may be required for some applications in the sensor field, where
incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and
packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend
network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a
virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual
backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual
backbone network enables data collection from members of the frame and delivers it to the mobile sink.
The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy
consumption by 30% and delay by 9% as compared with static sink scenario.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
This paper conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc
network. The model covers all the fundamental aspects of such networks with a routing mechanism using
a scheme of orientation-dependent inter-node communication links. The simulation system Winsim is used
which explicitly represents parallelism of events and processes in the network. The purpose of these
simulations is to investigate the effect of node’s maximum speed, and different TTL over the network
performance under two different scenarios. Simulation study investigates five practically important
performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on
the transmission radius, link availability, and maximal possible node speed
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGYCSEIJJournal
Sigfox technology has emerged as a competitive product in the communication service provider market for
approximately a decade. Widely implemented for smart parking solutions across various European
countries, it has now gained traction in Germany as well. The technology's successful track record and
reputation in the market demonstrate its effectiveness and reliability in addressing the communication
needs of IoT applications, particularly in the context of vehicle parking systems. This is noted in terms of a
city like Berlin-Germany, for on which the study is conducted. The major challenge being on how to relate
the parking techniques in a more user friendly, cost effective and less energy consumpmti0n mode where
the questions had at the beginning of the paper, relatively at the end the answers are sought to it via Sigfox
and its comparison with other related technologies like LoRA WAN and weightless. But more so future
areas of research study is also pointed out on areas which are not clearly identified in this particular
research area.
This paper entails the pros, cons adaptive, emerging and existing technology study in terms of cloud, big
data, Data analytics are all discussed in tandem to Sigfox.
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
In diverse industrial and academic environments, the quality of the software has been evaluated using
different analytic studies. The contribution of the present work is focused on the development of a
methodology in order to improve the evaluation and analysis of the reliability of web-based software
applications. The Personal Software Process (PSP) was introduced in our methodology for improving the
quality of the process and the product. The Evaluation + Improvement (Ei) process is performed in our
methodology to evaluate and improve the quality of the software system. We tested our methodology in a
web-based software system and used statistical modeling theory for the analysis and evaluation of the
reliability. The behavior of the system under ideal conditions was evaluated and compared against the
operation of the system executing under real conditions. The results obtained demonstrated the
effectiveness and applicability of our methodology
More Related Content
Similar to Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...ijasuc
One of the important issues in wireless networks is the Routing problem that is effective on system
performance, in this article the attempt is made to propose a routing algorithm using the bee colony in
order to reduce energy consumption in wireless relay networks. In EBCD algorithm, through combined of
energy, distance and traffic parameters a routing algorithm for wireless networks is presented with more
efficiency than its predecessor. Applying the bee colony method would allow the placement of the
parameters under conventional conditions and to get closer to a mechanism with a better adaptability
than that of the existing algorithm. According to the parameters considered, the proposed algorithm
provides a fitness function that can be applied as a multi-hop. Unlike other algorithms of its kind this can
increase service quality based on environmental conditions through its multiple services. This new
method can store the energy accumulated in the nodes and reduce the hop restrictions.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an indispensable technology. A mobile sink may be required for some applications in the sensor field, where incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual backbone network enables data collection from members of the frame and delivers it to the mobile sink. The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy consumption by 30% and delay by 9% as compared with static sink scenario.
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
As physical and digital worlds become increasingly intertwined, wireless sensor networks are becoming an
indispensable technology. A mobile sink may be required for some applications in the sensor field, where
incomplete and/or delayed data delivery can lead to inappropriate conclusions. Therefore, latency and
packet delivery ratios must be of high quality. In most existing schemes, mobile sinks are used to extend
network lifetimes. By partitioning the sensor field into k equal sized frames, the proposed scheme creates a
virtual hexagonal structure. Each frame header (FH) is linked together through the creation of a virtual
backbone network. Frame headers are assigned to nodes near the centre of each frame. The virtual
backbone network enables data collection from members of the frame and delivers it to the mobile sink.
The proposed Virtual Hexagonal Frame Routing Protocol (VHFRP) improves throughput by 25%, energy
consumption by 30% and delay by 9% as compared with static sink scenario.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
This paper conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc
network. The model covers all the fundamental aspects of such networks with a routing mechanism using
a scheme of orientation-dependent inter-node communication links. The simulation system Winsim is used
which explicitly represents parallelism of events and processes in the network. The purpose of these
simulations is to investigate the effect of node’s maximum speed, and different TTL over the network
performance under two different scenarios. Simulation study investigates five practically important
performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on
the transmission radius, link availability, and maximal possible node speed
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
Multi-hop routing protocol in cognitive radio mobile ad hoc networks (CRMANETs) is a critical issue. Furthermore, the routing metric used in multi-hop CRMANETs should reflect the bands availability, the links quality, the PU activities and quality of service (QoS) requirements of SUs. For the best of our knowledge, many of researchers investigated the performance of the different routing protocols in a homogeneous environment only. In this paper, we propose a heterogeneous cognitive radio routing protocol (HCR) operates in heterogeneous environment (i.e. the route from source to destination utilize the licensed and unlicensed spectrum bands). The proposed routing protocol is carefully developed to make a tradeoff between the channel diversity of the routing path along with the CRMANETs throughput. Using simulations, we discuss the performance of the proposed HCR routing protocol and compare it with the AODV routing protocol using a discrete-event simulation which we developed using JAVA platform.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Similar to Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols (20)
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGYCSEIJJournal
Sigfox technology has emerged as a competitive product in the communication service provider market for
approximately a decade. Widely implemented for smart parking solutions across various European
countries, it has now gained traction in Germany as well. The technology's successful track record and
reputation in the market demonstrate its effectiveness and reliability in addressing the communication
needs of IoT applications, particularly in the context of vehicle parking systems. This is noted in terms of a
city like Berlin-Germany, for on which the study is conducted. The major challenge being on how to relate
the parking techniques in a more user friendly, cost effective and less energy consumpmti0n mode where
the questions had at the beginning of the paper, relatively at the end the answers are sought to it via Sigfox
and its comparison with other related technologies like LoRA WAN and weightless. But more so future
areas of research study is also pointed out on areas which are not clearly identified in this particular
research area.
This paper entails the pros, cons adaptive, emerging and existing technology study in terms of cloud, big
data, Data analytics are all discussed in tandem to Sigfox.
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
In diverse industrial and academic environments, the quality of the software has been evaluated using
different analytic studies. The contribution of the present work is focused on the development of a
methodology in order to improve the evaluation and analysis of the reliability of web-based software
applications. The Personal Software Process (PSP) was introduced in our methodology for improving the
quality of the process and the product. The Evaluation + Improvement (Ei) process is performed in our
methodology to evaluate and improve the quality of the software system. We tested our methodology in a
web-based software system and used statistical modeling theory for the analysis and evaluation of the
reliability. The behavior of the system under ideal conditions was evaluated and compared against the
operation of the system executing under real conditions. The results obtained demonstrated the
effectiveness and applicability of our methodology
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONCSEIJJournal
This study has been undertaken to predict the student employability.Assessing student employability
provides a method of integrating student abilities and employer business requirements, which is becoming
an increasingly important concern for academic institutions. Improving student evaluation techniques for
employability can help students to have a better understanding of business organizations and find the right
one for them. The data for the training classification models is gathered through a survey in which students
are asked to fill out a questionnaire in which they may indicate their abilities and academic achievement.
This information may be used to determine their competency in a variety of skill categories, including soft
skills, problem-solving skills and technical abilities and so on.The goal of this research is to use data
mining to predict student employability by considering different factors such as skills that the students have
gained during their diploma level and time duration with respect to the knowledge they have captured
when they expect the placement at the end of graduation. Further during this research most specific skills
with relevant to each job category also was identified. In this research for the prediction of the student
employability different data mining models such as such as KNN, Naive Bayer’s, and Decision Tree were
evaluated and out of that best model also was identified for this institute's student’s employability
prediction.So, in this research classification and association techniques were used and evaluated.
Call for Articles - Computer Science & Engineering: An International Journal ...CSEIJJournal
Computer Science & Engineering: An International Journal (CSEIJ) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.
A Complexity Based Regression Test Selection StrategyCSEIJJournal
Software is unequivocally the foremost and indispensable entity in this technologically driven world.
Therefore quality assurance, and in particular, software testing is a crucial step in the software
development cycle. This paper presents an effective test selection strategy that uses a Spectrum of
Complexity Metrics (SCM). Our aim in this paper is to increase the efficiency of the testing process by
significantly reducing the number of test cases without having a significant drop in test effectiveness. The
strategy makes use of a comprehensive taxonomy of complexity metrics based on the product level (class,
method, statement) and its characteristics.We use a series of experiments based on three applications with
a significant number of mutants to demonstrate the effectiveness of our selection strategy.For further
evaluation, we compareour approach to boundary value analysis. The results show the capability of our
approach to detect mutants as well as the seeded errors.
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure
their information. Web Services security could be guaranteed by employing security standards, which is the
main focus of this search. Every suggested model related to security design should put in the account the
securities' objectives; integrity, confidentiality, non- repudiation, authentication, and authorization. The
proposed model describes SOAP messages and the way to secure their contents. Due to the reason that
SOAP message is the core of the exchanging information in Web Services, this research has developed a
security model needed to ensure e-business security. The essence of our model depends on XML encryption
and XML signature to encrypt and sign SOAP message. The proposed model looks forward to achieve a
high speed of transaction and a strong level of security without jeopardizing the performance of
transmission information.
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
This paper compares the performance of face image retrieval system based on discrete wavelet transforms
and Lifting wavelet transforms with principal component analysis (PCA). These techniques are
implemented and their performances are investigated using frontal facial images from the ORL database.
The Discrete Wavelet Transform is effective in representing image features and is suitable in Face image
retrieval, it still encounters problems especially in implementation; e.g. Floating point operation and
decomposition speed. We use the advantages of lifting scheme, a spatial approach for constructing wavelet
filters, which provides feasible alternative for problems facing its classical counterpart. Lifting scheme has
such intriguing properties as convenient construction, simple structure, integer-to-integer transform, low
computational complexity as well as flexible adaptivity, revealing its potentials in Face image retrieval.
Comparing to PCA and DWT with PCA, Lifting wavelet transform with PCA gives less computation and
DWT-PCA gives high retrieval rate..
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
Computer Science & Engineering: An International Journal (CSEIJ) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.
Paper Submission - Computer Science & Engineering: An International Journal (...CSEIJJournal
Computer Science & Engineering: An International Journal (CSEIJ) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
This paper compares the performance of face image retrieval system based on discrete wavelet transforms
and Lifting wavelet transforms with principal component analysis (PCA). These techniques are
implemented and their performances are investigated using frontal facial images from the ORL database.
The Discrete Wavelet Transform is effective in representing image features and is suitable in Face image
retrieval, it still encounters problems especially in implementation; e.g. Floating point operation and
decomposition speed. We use the advantages of lifting scheme, a spatial approach for constructing wavelet
filters, which provides feasible alternative for problems facing its classical counterpart. Lifting scheme has
such intriguing properties as convenient construction, simple structure, integer-to-integer transform, low
computational complexity as well as flexible adaptivity, revealing its potentials in Face image retrieval.
Comparing to PCA and DWT with PCA, Lifting wavelet transform with PCA gives less computation and
DWT-PCA gives high retrieval rate..
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
Computer Science & Engineering: An International Journal (CSEIJ) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.
Data security and privacy are important to prevent the re-
veal, modification and unauthorized usage of sensitive information. The
introduction of using critical power devices for internet of things (IoTs),
e-commerce, e-payment, and wireless sensor networks (WSNs) has brought
a new challenge of security due to the low computation capability of sen-
sors. Therefore, the lightweight authenticated key agreement protocols
are important to protect their security and privacy. Several researches
have been published about authenticated key agreement. However, there
is a need of lightweight schemes that can fit with critical capability de-
vices. Addition to that, a malicious key generation center (KGC) can
become a threat to watch other users, i.e impersonate user by causing
the key escrow problem
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
Computer Science & Engineering: An International Journal (CSEIJ) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Computer Science & Computer Engineering. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science and computer Engineering.
Recommendation System for Information Services Adapted, Over Terrestrial Digi...CSEIJJournal
The development of digital television in Colombia has grown in last year’s, specially the digital terrestrial
television (DTT), which is an essential part to the projects of National Minister of ICT, thanks to the big
distribution and use of the television network and Internet in the country. This article explains how joining
different technologies like social networks, information adaptation and DTT, to get an application that
offers information services to users, based on their data, preferences, inclinations, use and interaction with
others users and groups inside the network.
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsCSEIJJournal
An intensive use of reconfigurable hardware is expected in future embedded systems. This means that the
system has to decide which tasks are more suitable for hardware execution. In order to make an efficient
use of the FPGA it is convenient to choose one that allows hardware multitasking, which is implemented by
using partial dynamic reconfiguration. One of the challenges for hardware multitasking in embedded
systems is the online management of the only reconfiguration port of present FPGA devices. This paper
presents different online reconfiguration scheduling strategies which assign the reconfiguration interface
resource using different criteria: workload distribution or task’ deadline. The online scheduling strategies
presented take efficient and fast decisions based on the information available at each moment. Experiments
have been made in order to analyze the performance and convenience of these reconfiguration strategies.
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemCSEIJJournal
The hyperchaotic Qi system (Chen, Yang, Qi and Yuan, 2007) is one of the important models of four-
dimensional hyperchaotic systems. This paper investigates the adaptive stabilization and synchronization
of hyperchaotic Qi system with unknown parameters. First, adaptive control laws are designed to
stabilize the hyperchaotic Qi system to its equilibrium point at the origin based on the adaptive control
theory and Lyapunov stability theory. Then adaptive control laws are derived to achieve global chaos
synchronization of identical hyperchaotic Qi systems with unknown parameters. Numerical simulations
are shown to demonstrate the effectiveness of the proposed adaptive stabilization and synchronization
schemes.
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
Data secrecy is one of the key concerns for wireless body sensor networks (WBSNs). Usually, a data
secrecy scheme should accomplish two tasks: key establishment and encryption. WBSNs generally face
more serious limitations than general wireless networks in terms of energy supply. To address this, in this
paper, we propose an energy efficient data secrecy scheme for WBSNs. On one hand, the proposed key
establishment protocol integrates node IDs, seed value and nonce seamlessly for security, then
establishes a session key between two nodes based on one-way hash algorithm SHA-1. On the other hand,
a low-complexity threshold selective encryption technology is proposed. Also, we design a security
selection patter exchange method with low-complexity for the threshold selection encryption. Then, we
evaluate the energy consumption of the proposed scheme. Our scheme shows the great advantage over
the other existing schemes in terms of low energy consumption.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
This paper introduces Topic Tracking for Punjabi language. Text mining is a field that automatically
extracts previously unknown and useful information from unstructured textual data. It has strong
connections with natural language processing. NLP has produced technologies that teach computers
natural language so that they may analyze, understand and even generate text. Topic tracking is one of the
technologies that has been developed and can be used in the text mining process. The main purpose of topic
tracking is to identify and follow events presented in multiple news sources, including newswires, radio and
TV broadcasts. It collects dispersed information together and makes it easy for user to get a general
understanding. Not much work has been done in Topic tracking for Indian Languages in general and
Punjabi in particular. First we survey various approaches available for Topic Tracking, then represent our
approach for Punjabi. The experimental results are shown.
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the
target domain on which the developed model will be deployed. Social media platform has experienced
more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two
possible ways. The first is to use the activities of the user while the second is to use the supplied details the
user registered the account with. To adequately identify a social media user as hacker proactively, there
are relevant user details called features that can be used to determine whether a social media user is a
hacker or not. In this paper, an exploratory data analysis was carried out to determine the best features
that can be used by a predictive model to proactively identify hackers on the social media platform. A web
crawler was developed to mine the user dataset on which exploratory data analysis was carried out to
select the best features for the dataset which could be used to correctly identify a hacker on a social media
platform.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
1. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
1
PERFORMANCE COMPARISON AND
ANALYSIS OF MOBILE AD HOC ROUTING
PROTOCOLS
T K Godder1
, M. M Hossain2
, M M Rahman1
, Md. Sipon Miah1
and S K
Mondal3
1
Dept. of Information & Communication Engineering
Islamic University, Kushtia 7003, Bangladesh.
2
Dept. of Applied Physics &Electronic Engineering
Rajshahi University, Rajshahi 6205, Bangladesh.
3
Dept. of Computer Science and Engineering
Islamic University, Kushtia 7003, Bangladesh
E-mail:{tkict, drmahbub_07}@yahoo.com, mdsiponmiah@gmail.com
ABSTRACT
A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
KEYWORDS
MANET
1. INTRODUCTION
Movements of nodes in a mobile ad hoc network cause the nodes to move in and out of range
from one another. As the result, there is a continuous making and breaking of links in the
network, making the network connectivity (topology) to vary dynamically with time. Since the
network relies on multi-hop transmissions for communication, this imposes major challenges for
the network layer to determine the multi-hop route over which data packets can be transmitted
between a given pair of source and destination nodes. Because of this time-varying nature of the
topology of mobile ad hoc networks, traditional routing techniques, such as the shortest-path
and link-state protocols that are used in fixed networks, cannot be directly applied to ad hoc
networks. A fundamental quality of routing protocols for ad hoc networks is that they must
dynamically adapt to variations of the network topology. This is implemented by devising
techniques for efficiently tracking changes in the network topology and rediscovering new
2. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
2
routes when older ones are broken. Since an ad hoc network is infrastructure less, these
operations are to be performed in a distributed fashion with the collective cooperation of all
nodes in the network.
Because of its many challenges, routing has been a primary focus of researchers in mobile ad
hoc networks. The MANET working group in the IETF has been working on the issue of
standardizing an IP based routing standard for mobile ad hoc networks. Consequently, a large
number of dynamic routing protocols applicable to mobile ad hoc networks have been
developed. Based on when routing activities are initiated, routing protocols for mobile ad hoc
networks may be broadly classified into three basic categories: (a) proactive or table-driven
protocols, (b) reactive or on-demand routing protocols, and (c) hybrid routing protocols.
DSDV OLSR FSR FSLS DSR AODV ZRP LANMAR
Figure 1. Classification and examples of ad hoc routing protocols.
Traditional distance-vector and link-state routing protocols [1] are proactive in that they
maintain routes to all nodes, including nodes to which no packets are sent. For that reason they
require a periodic control message, which leads to scarce resources such as power and link
bandwidth being used more frequently for control traffic as mobility increases. One example of
a proactive routing protocol is Optimized Link State Routing Protocol (OLSR) [2]. OLSR,
which has managed to reduce the utilization of bandwidth significantly. Reactive routing
protocols, on the other hand, operate only when there is a need of communication between two
nodes. This approach allows the nodes to focus either on routes that are being used or on routes
that are in process of being set up. Examples of reactive routing protocols are Ad hoc On-
Demand Distance Vector (AODV) [3], and Dynamic Source Routing (DSR) [4].
Both proactive and reactive routing has specific advantages and disadvantages that make them
suitable for certain types of scenarios. Proactive routing protocols have their routing tables
updated at all times, thus the delay before sending a packet is minimal. However, routing tables
that are always updated require periodic control messages that are flooded through the whole
network- an operation that consumes a lot of time, bandwidth and energy. On the other hand,
reactive routing protocols determine routes between nodes only when they are explicitly needed
to route packets. However, whenever there is a need for sending a packet, the mobile node must
first find the route if the route is not already known. This route discovery process may result in
considerable delay. Combining the proactive and reactive approaches results in a hybrid routing
protocol.
Ad Hoc routing protocols
Hybrid
Reactive
(On-demand)
Proactive
(table-driven)
3. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
3
A hybrid approach minimizes the disadvantages, but also the advantages of the two combined
approaches. The Zone Routing Protocol (ZRP) [5] is such a hybrid reactive /proactive routing
protocol. Each mobile node proactively maintains routes within a local region (referred to as the
routing zone). Mobile nodes residing outside the zone can be reached with reactive routing.
2. SIMULATION SET UP
This section describes the scenario, the movement model and the communication model used in
this study. Moreover, it presents the parameters used in the simulations.
2.1. Scenario
The studied scenario consists of 15 mobile nodes, 2 gateways, 2 routers and 2 hosts. The
topology is a rectangular area with 800 m length and 500 m width. A rectangular area was
chosen in order to force the use of longer routes between nodes than would occur in a square
area with equal node density. The two gateways are placed on each side of the area; their x,y-
coordinates in meters are (100,250) and (700,250). All simulations are run for 900 seconds of
simulated time.
Five of the 15 mobile nodes are constant bit rate traffic sources. They are distributed randomly
within the mobile ad hoc network. The time when the five traffic sources start sending data
packets is chosen uniformly distributed within the first ten seconds of the simulation. After this
times the sources continue sending data until one second before the end of the simulation. The
destination of each of the sources is one of the two hosts, chosen randomly.
A screenshot of the simulation scenario is shown in Figure 1. The five mobile nodes that are
marked with a ring are the sources. The two hexagonal nodes are the gateways and the four
square nodes are the two hosts and the two routers.
Figure 1. Screenshot of the simulation scenario.
4. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
4
2.3. Movement Model
The mobile nodes move according to the “random waypoint” model [6]. Each mobile node
begins the simulation by remaining stationary for pause time seconds. It then selects a random
destination in the defined topology area and moves to that destination at a random speed. The
random speed is distributed uniformly between zero (zero not included) and some maximum
speed. Upon reaching the destination, the mobile node pauses again for pause time seconds,
selects another destination, and proceeds there as previously described. This movement pattern
is repeated for the duration of the simulation.
2.4. Communication Model
In the scenario used in this study, five mobile nodes communicate with one of two fixed nodes
(hosts) located on the internet through a gateway. As the goal of the simulations was to compare
the different approaches for gateway discovery, the traffic source was chosen to be a constant
bit rate (CBR) source. Each source mobile node generates packets every 0.2 seconds in this
paper. Since each packet contain 512 bytes of data, the amount of generated data is 5*512*8
bit/s = 20 kbit/s, for each source. The traffic connection pattern is generated by CMU’s traffic
generator (cbrgen.tcl). The main parameters in cbrgen.tcl are “connections” (number of sources)
and “rate” (packet rate); see Table 1.
2.5. Parameters
The parameters that are common for all simulations are given in table 1 and the parameters that
are specific for some simulations are shown in table 2.
Table 1: General parameters used in all simulations.
Parameter Value
Transmission range 250 m
Simulation time 900 s
Topology size 800 m X 500 m
Number of mobile nodes 15
Number of sources 5
Number of gateways 2
Traffic type Constant bit rate
Packet rate 5 packets/s
Packet size 512 bytes
Pause time 5 s
Maximum speed 10 m/s
The transmission range is the maximum possible distance between two communicating mobile
nodes. If the distance between two mobile nodes is larger than 250 m they cannot communicate
with each other directly.
5. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
5
Table 2: Specific parameters used in some simulations.
Parameter Value
ADVERTISEMENT_INTERVAL Varied from 2-60 seconds
ADVERTISEMENT_ZONE 3 hops
ADVERTISEMENT_INTERVAL is used when proactive and hybrid discovery methods are
used. ADVERTISEMENT_ZONE is used for hybrid gateway discovery method and defines the
range within which proactive gateway discovery is used.
3. PERFORMANCE METRICS
The second goal of this paper was to “implement and compare different approaches for gateway
discovery”. Comparing the different methods is done by simulating them and examining their
behavior. In the simulations in the following section, the effects of different gateway
advertisement intervals are evaluated. In comparing the gateway discovery approaches, the
evaluation has been done according to the following two metrics:
_ The packet delivery ratio is defined as the number of received data packets divided by the
number of generated data packets.
_ The end-to-end delay is defined as the time a data packet is received by the destination minus
the time the data packet is generated by the source.
4. RESULTS AND DISCUSSIONS
In this section the effect of varying gateway advertisement intervals is evaluated. Since gateway
advertisements are not sent in the reactive gateway discovery approach, the results for this
approach are constant and independent of the advertisement interval. Each data point is an
average value of 10 runs with the same communication model, but different randomly generated
movement patterns.
4.1. Packet Delivery Ratio
Table 3 shows the packet delivery ratio of three gateway discovery methods of are proactive,
reactive and hybrid:
Table 3. The value of packet delivery ratio
Interval(s) 2 10 20 30 40 50 60
Proactive 99.84 99.8379 99.842 99.82 99.815 99.795 99.825
Reactive 99.81 99.81 99.81 99.81 99.81 99.81 99.81
Hybrid 99.85 99.835 99.815 99.825 99.82 99.8275 99.835
The values of the Table 3 are from the analysis of the out.tr file of the simulation environment.
Figure 3 shows the packet delivery ratio with advertisement intervals between 2 and 60 seconds.
As the figure shows, the packet delivery ratio is very high (above 99.8 %) for all three gateway
discovery approaches. The figure also shows that the difference between the three approaches is
very small. However, the proactive and hybrid approaches have some larger packet delivery
6. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
6
ratio than the reactive approach, especially with short advertisement intervals. The reason is that
the short advertisement intervals result in more gateway information (RREP_I and GWADV
packets).
A mobile node that receive a RREP_I or a GWADV message, update its route entry for the
gateway. Therefore, it is more likely for the mobile nodes to have fresher and shorter routes to a
gateway and thereby minimizing the risk for link breaks. Link breaks can result in lost data
packets since the source continues to send data packets until it receives a RERR message from
the mobile node that has a broken link. The longer the route is (in number of hops), the longer
times it can take before the source receive a RERR and hence, more data packets can be lost.
When the advertisement interval increases, a mobile node receives less gateway information and
consequently it does not update the route to the gateway as often as for short advertisement
intervals. Therefore, the positive effect of periodic gateway information is decreased as the
advertisement interval increases.
Packet delivery ratio vs. Advertisement interval
99.76
99.78
99.8
99.82
99.84
99.86
2 10 20 30 40 50 60
Advertisement interval (s)
Packet
delivery
ratio
(%)
Proactive
Reactive
Hybrid
Figure 3. Combine Packet delivery ratio
4.2 Average End-to-end Delay
Table 4 show the average end to end delay of the three gateway discovery methods that are:
Table 4. The value of average end to end delay
Interval(s) 2 10 20 30 40 50 60
Proactive 19.235 19.435 19.512 19.615 19.665 19.725 19.7521
Reactive 20.5 20.5 20.5 20.5 20.5 20.5 20.5
Hybrid 19.465 19.256 19.3 19.3524 19.3649 19.3755 19.2689
Figure 5 shows the average end-to-end delay with advertisement intervals between 2 and 60
seconds. As the figure shows, the average end-to-end delay is less for the proactive and hybrid
approaches than for the reactive approach. The reason is that the periodic gateway information
sent by the gateways allows the mobile nodes to update their route entries for the gateways more
often, resulting in fresher and shorter routes. With the reactive approach a mobile node
continues to use a route to a gateway until it is broken. In some cases this route can be pretty
7. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
7
long (in number of hops) and even if the mobile node is much closer to another gateway it does
not use this gateway, but continues to send the data packets along the long route to the gateway
further away until the route is broken. Therefore, the end-to-end delay increases for these data
packets, resulting in increased average end-to-end delay for all data packets. The figure also
shows that the average end-to-end delay is decreased slightly for short advertisement intervals
when the advertisement interval is increased. At the first thought this might seem unexpected.
However, it can be explained by the fact that very short advertisement intervals result in a lot of
control traffic which lead to higher processing times for data packets at each node. Moreover,
since the AODV messages are prioritized over data packets, these have to wait in the routing
queue until the AODV messages are sent, resulting in higher end-to-end delay.
Average end-to-end delay vs. Advertisement interval
18.6
18.8
19
19.2
19.4
19.6
19.8
20
20.2
20.4
20.6
2 10 20 30 40 50 60
Advertisement interval (s)
Average
end-to-end
delay
(ms)
Proactive
Reactive
Hybrid
Figure 5. Combine Average End to End Delay
5. CONCLUSION
In this research, three methods for detection of these gateways have been presented,
implemented and compared. The three methods for gateway detection are referred to as reactive,
proactive and hybrid gateway discovery. The comparison between these methods provides us
useful information. In this paper, the individual description of the three different gateway
methods (that reactive, proactive and hybrid) of packet delivery ratio and average end-to-end
delay. Next it analyze the comparison of the gateway methods.
Regarding the packet delivery ratio, the result is largely the same, regardless of which gateway
discovery method is used. As for the average end-to-end delay, the proactive and hybrid
methods perform slightly better than the reactive method.
The results presented are valid for the specific scenario used in this work. Therefore, one cannot
tell which of the gateway discovery methods the best one for every possible scenario is. There
are many factors that can be changed and their impact should be investigated. Unfortunately the
scope of this paper made it impossible to deal with more than a part of these interesting issues.
8. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
8
References
[1] Comer D.E. Internetworking With TCP/IP Volume I: Principles, Protocols, and Architectures,
fourth edition, 2000.
[2] Clausen T.; Jacquet P.; Laouiti A.; Minet P.; Muhlethaler P.; Qayyum A.; Viennot L.
Optimized Link State Routing Protocol, IETF Internet Draft, July 2002. Work in progress.
[3] Perkins C.; Belding-Royer E.M.; Das S. Ad hoc On-Demand Distance Vector(AODV) Routing,
IETF Internet Draft, Jan 2002.Work in progress.
[4] Johnson D.B.; Maltz D.A.; Hu Y.; Jetcheva J.G. The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks (DSR), IETF Internet Draft, Feb 2002.Work in progress.
[5] Haas Z.J.; Pearlman M.R.; Samar P. The Zone Routing Protocol (ZRP) for Ad Hoc Networks,
IETF Internet Draft, July 2002.Work in progress.
[6] Johnson D.B.; Maltz D.A. Dynamic Source Routing in Ad HocWireless Networks, in: Mobile
Computing (Imielinski T. and Korth H.), chapter 5, pages 153-181.Kluwer Academic Publishers,
1996.
[7] Bernard M. Gateway Detection and Selection for Wireless Multihop Internet Access, Master’s
thesis, (Olching, Germany), 2002.
[8] Holland G.; Vaidya N. Analysis of TCP Performance over Mobile Ad Hoc Networks,in
Proceedings of IEEE/ACM MOBICOM, 1999.
[9] Hong X.; Xu K.; Gerla M. Scalable Routing Protocols for Mobile Ad Hoc Networks,IEEE
Network, July/August 2002.
[10] Jönsson U.; Alriksson F.; Larsson T.; Johansson P.; Maguire G.Q. MIPMANET - Mobile IP for
Mobile Ad Hoc Networks, in Proceedings of the Workshop onMobile Ad Hoc Networking and
Computing (MobiHoc), Boston, USA, 2000.
[11] Schiller J. Mobile Communications, 2000.
[12] Xi J.; Bettstetter C.Wireless Multihop Internet Access: Gateway Discovery, Routing and
Addressing, in Proceedings of the International Conference on Third GenerationWireless and
Beyond (3Gwireless’02), San Francisco, USA, May 2002.
[13] McCanne S.; Floyd S. ns Network Simulator. http://www.isi.edu/nsnam/ns/. Fall K; Varadhan
K., and the VINT project. The ns manual.
[14] The MANET web page, http://www.ietf.org/html.charters/manet-charter.html.
[15] The Mobile Ad Hoc Networks, http://en.wikipedia.org/wiki/Mobile_ad-hoc_network.htm.
[16] Wireless Embedded Systems, Computer Science Department, University of California at
Berkeley,“Self-organized wireless sensor network,”August,2001.Available at
http://webs.cs.berkeley.edu/800demo.
[17] A Study of Mobile Ad-Hoc Network Architectures and Technologies .David Blount, Submitted
for MSc National University of Ireland, Cork, April 2004
[18] Abhishek Patil, Amit Sahoo “Routing Protocols for Ad-Hoc Wireless Networks “Dept. of
Electrical & Computer Engineering ,Michigan State University .
[19] Mobile Ad Hoc Networks, Asis Nasipuri, Department of Electrical &Computer Engineering, the
University of North Carolina at Charlotte Charlotte, NC 28223-0001
[20] Clausen .T , Dearlove .C “The Optimized Link-State Routing Protocol version 2” The OLSRv2
Design Team MANET Working Group ,Internet draft , March 6, 2006.
[21] Haas, Z.J., Pearlman, M.R. and Samar, P., "Intrazone Routing Protocol (IARP)," IETF Internet
Draft, draft-ietf-manet-iarp-02.txt, July 2002.
[22] Haas, Z.J., Pearlman, M.R. and Samar, P., "Interzone Routing Protocol (IERP)," IETF Internet
Draft, draft-ietf-manet-ierp-02.txt, July 2002.
9. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
9
Authors
Tapan Kumar Godder received the Bachelor’s, Master’s and M.Phil degree in
Applied Physics & Electronics from Rajshahi University, Rajshahi. In 1994, 1995
and 2007, respectively. He is courrently Associate Professor in the department of
ICE, Islamic University, Kushtia-7003, Bangladesh. He has seventeen published
papers in international and national journals. His areas of interest include
internetworking, AI & mobile communication.
M M Hassain is professor in the department of Applied Physics and Electronics
Engineering, Rajshahi University, Rajshahi 6205, Bangladesh. He is currently
honorable Vice-Chancellor in Pabna Science and Technology University, Pabna,
Bangladesh.
M. Mahbubur Rahman received the Bachelor’s and Master‘s Degree in
Physics, Rajshahi University, in 1983, 1994 and PhD degree in Computer
Science & Engineering in 1997. He is courrently Professor in the department of
ICE, Islamic University, Kushtia-7003, Bangladesh. He has twenty four
published papers in international and national journals. His areas of interest
include internetworking, AI & mobile communication.
Md. Sipon Miah received the Bachelor’s and Master‘s Degree in the Department
of Information and Communication Engineering from Islamic University,
Kushtia, in 2006 and 2007, respectively. He is courrently Lecturer in the
department of ICE, Islamic University, Kushtia-7003, Bangladesh. Since 2003, he
has been a Research Scientist at the Communication Reasearch Laboratory,
Department of ICE, Islamic University, Kushtia, where he belongs to the spread-
spectrum research group. He is pursuing research in the area of internetworking
in wireless communication. He has four published paper in international and one
national journals in the same areas. His areas of interest. Include Wireless
Communications, optical fiber communication, Spread Spectrum and mobile
communication.
S K Mondal received the Bachelor’s, and Master’s degree in Applied Physics & Electronics from
Rajshahi University, Rajshahi. In 1994, and 1995 respectively. He is courrently Associate Professor in the
department of CSE, Islamic University, Kushtia-7003, Bangladesh.