Excessive usage of internet by most of the applications that use internet of things (IoT) has resulted in need for high bandwidth network. Light fidelity (LiFi) is one such network having bandwidth in terms of GigaHertz, but LiFi has a limited propagation range hence it can be deployed only in the local area. When IoT nodes are connected using LiFi network in the local area they start pushing large data to the cloud there by arising need for flow control. Some of the IoT applications such as patient monitoring systems and nuclear systems, generate critical data. The protocol for flow control in this case should be based on priority of data since critical data with high priority have to be transmitted first. We develop a flow control protocol named priority based flow control protocol (PFCP) by providing priority to flows that carry critical data especially in IoT system that use LiFi network. We evaluate performance of different transmission control protocol (TCP) variants and modify TCP variant that yields maximum goodput according to the priority based protocol developed and demonstrate that flows that carry critical data are given priority compared to non-prioritized flows.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
This document proposes two schemes, the deadline cost (DC) scheme and the deadline shortest queue first (DSQF) scheme, to improve the rate of data meeting its deadline with minimal data transmission cost in a wireless mesh network of IoT gateways. The DC scheme selects the cheapest gateway that meets the data deadline, while DSQF selects the fastest gateway, with the other metric as the secondary factor. The schemes aim to reduce overall data transmission costs compared to traditional greedy cost and shortest queue first schemes. According to tests, the proposed schemes can meet over 98% of data deadlines while reducing costs by 5.74% on average.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
This document proposes two schemes, the deadline cost (DC) scheme and the deadline shortest queue first (DSQF) scheme, to improve the rate of data meeting its deadline with minimal data transmission cost in a wireless mesh network of IoT gateways. The DC scheme selects the cheapest gateway that meets the data deadline, while DSQF selects the fastest gateway, with the other metric as the secondary factor. The schemes aim to reduce overall data transmission costs compared to traditional greedy cost and shortest queue first schemes. According to tests, the proposed schemes can meet over 98% of data deadlines while reducing costs by 5.74% on average.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Hybrid NarrowBand-internet of things protocol for real time data optimization IJECEIAES
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices
across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has
been granted and this QoS feature and there are no implementations of such feature in real networks. In
this paper,we evaluate the capacity to provide QoS of these priority bits in various scenarios. We show that
under very heavy or very low network load, these bits have a limited effect on the delay
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The document summarizes research on Internet of Things (IoT) technologies. It discusses key concepts of IoT like connecting devices anytime/anywhere and the "DNA" of IoT. It also outlines various hardware technologies, communication protocols, software, data serialization methods and application domains of IoT. The conclusion emphasizes that IoT integrates traditional technologies to create new applications and calls for multidisciplinary collaboration to further IoT research.
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down the network performance. This paper presents a congestion management strategy considering real time activities in today’s smart web. With the SW context, cooperative packet recovery using resource reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data consistency between various access points of smart web hotspot. Using a real world scenario, it was confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in scalable workload environments, continuous packet drops at the event of congestion remains obvious. This is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP) which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP connection between servers at the remote core layer and the access layer was carried out while using selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a previous study. Considering network service availability, this was found to be dependent on fault-tolerance of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about 0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec. The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and optimality for realistic loads in Smart web contexts.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
This document discusses the challenges faced when using TCP in mobile ad hoc networks (MANETs). Some key challenges include: media access control issues like hidden terminals; power constraints of mobile nodes; frequent topology changes due to node mobility; multipath fading increasing the likelihood of path breaks; and misinterpreting packet losses as congestion rather than broken routes. TCP was designed for wired networks and assumes packet losses are always due to congestion, which does not hold in MANETs where losses can be from broken routes. Overall, TCP performs poorly in MANETs due to these challenges.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
This document presents a study on implementing a steganographic method (covert channel) to hide secret data in the IP identification field. The implementation was carried out using the Network Simulator 3 (NS-3).
The document first provides background on covert channels and discusses their application in TCP/IP layers for VoIP. It then analyzes each TCP/IP layer for their technical difficulty, generality, and reachability for covert channels. Specifically, the network layer presents opportunities due to unused or optional bits in the IP header.
The implementation hides the word "hello" by encoding each character into the IP identification field of successive packets. The simulation confirms successful transmission of the hidden message across the point-to-
The document discusses the introduction to Internet of Things (IoT). It defines IoT and describes its characteristics, physical and logical design, enabling technologies, and deployment levels. The physical design covers IoT devices, protocols, and communication layers. The logical design includes functional blocks, communication models, and APIs. Enabling technologies include wireless sensor networks, cloud computing, big data analysis, communication protocols, and embedded systems. IoT deployment levels range from single node local systems to multi-node systems with local coordination and cloud-based storage, analysis and applications.
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
This document discusses connecting wireless sensor networks to TCP/IP protocol stacks to improve quality of service in ubiquitous wireless sensor networks. It first provides background on wireless sensor networks and issues with directly using TCP/IP in such networks due to their constrained resources and wireless links. It then examines existing approaches like using application-level gateways and delay tolerant networks. The document proposes using an onboard gateway approach to connect different network types while adopting TCP/IP protocol stacks in wireless sensor networks. This would help integrate sensor networks with external TCP/IP networks and allow improved quality of service in ubiquitous wireless sensor environments.
A novel token based approach towards packet loss controleSAT Journals
This document summarizes a research paper that proposes a novel congestion control mechanism called Stable Token-Limited Congestion Control (STLCC). STLCC monitors inter-domain traffic rates and limits the number of tokens to control congestion and improve network performance. The authors implemented STLCC in a prototype application and found that it was effective at controlling packet loss and improving network performance compared to other congestion control methods. They concluded that STLCC can automatically measure and reduce congestion to allocate network resources stably.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Priority based flow control protocol for internet of things built on light fidelity
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Hybrid NarrowBand-internet of things protocol for real time data optimization IJECEIAES
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and receiving data in real time. This research proposes a hybrid NarrowBand-IoT (NB-IoT) protocol designed using NarrowBand communication network technology with optimization of data communication using MQTT and HTTP protocols. In this research, the hybrid NB-IoT protocol has the best packet loss value of 0.010% against the HTTP NB-IoT protocol which has a value of 0.017%, and the MQTT NB-IoT protocol of 0.024%. The hybrid NB-IoT protocol has a latency value of 8.7 seconds compared to the HTTP NB-IoT protocol which has a latency of 10.9 seconds. Meanwhile, the throughput value of the hybrid NB-IoT protocol is 158906.1 byte/s and is better than the MQTT NB-IoT protocol which is only 158898.6 bytes/s.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices
across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has
been granted and this QoS feature and there are no implementations of such feature in real networks. In
this paper,we evaluate the capacity to provide QoS of these priority bits in various scenarios. We show that
under very heavy or very low network load, these bits have a limited effect on the delay
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The document summarizes research on Internet of Things (IoT) technologies. It discusses key concepts of IoT like connecting devices anytime/anywhere and the "DNA" of IoT. It also outlines various hardware technologies, communication protocols, software, data serialization methods and application domains of IoT. The conclusion emphasizes that IoT integrates traditional technologies to create new applications and calls for multidisciplinary collaboration to further IoT research.
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down the network performance. This paper presents a congestion management strategy considering real time activities in today’s smart web. With the SW context, cooperative packet recovery using resource reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data consistency between various access points of smart web hotspot. Using a real world scenario, it was confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in scalable workload environments, continuous packet drops at the event of congestion remains obvious. This is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP) which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP connection between servers at the remote core layer and the access layer was carried out while using selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a previous study. Considering network service availability, this was found to be dependent on fault-tolerance of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about 0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec. The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and optimality for realistic loads in Smart web contexts.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
This document discusses the challenges faced when using TCP in mobile ad hoc networks (MANETs). Some key challenges include: media access control issues like hidden terminals; power constraints of mobile nodes; frequent topology changes due to node mobility; multipath fading increasing the likelihood of path breaks; and misinterpreting packet losses as congestion rather than broken routes. TCP was designed for wired networks and assumes packet losses are always due to congestion, which does not hold in MANETs where losses can be from broken routes. Overall, TCP performs poorly in MANETs due to these challenges.
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
This document presents a study on implementing a steganographic method (covert channel) to hide secret data in the IP identification field. The implementation was carried out using the Network Simulator 3 (NS-3).
The document first provides background on covert channels and discusses their application in TCP/IP layers for VoIP. It then analyzes each TCP/IP layer for their technical difficulty, generality, and reachability for covert channels. Specifically, the network layer presents opportunities due to unused or optional bits in the IP header.
The implementation hides the word "hello" by encoding each character into the IP identification field of successive packets. The simulation confirms successful transmission of the hidden message across the point-to-
The document discusses the introduction to Internet of Things (IoT). It defines IoT and describes its characteristics, physical and logical design, enabling technologies, and deployment levels. The physical design covers IoT devices, protocols, and communication layers. The logical design includes functional blocks, communication models, and APIs. Enabling technologies include wireless sensor networks, cloud computing, big data analysis, communication protocols, and embedded systems. IoT deployment levels range from single node local systems to multi-node systems with local coordination and cloud-based storage, analysis and applications.
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
This document discusses connecting wireless sensor networks to TCP/IP protocol stacks to improve quality of service in ubiquitous wireless sensor networks. It first provides background on wireless sensor networks and issues with directly using TCP/IP in such networks due to their constrained resources and wireless links. It then examines existing approaches like using application-level gateways and delay tolerant networks. The document proposes using an onboard gateway approach to connect different network types while adopting TCP/IP protocol stacks in wireless sensor networks. This would help integrate sensor networks with external TCP/IP networks and allow improved quality of service in ubiquitous wireless sensor environments.
A novel token based approach towards packet loss controleSAT Journals
This document summarizes a research paper that proposes a novel congestion control mechanism called Stable Token-Limited Congestion Control (STLCC). STLCC monitors inter-domain traffic rates and limits the number of tokens to control congestion and improve network performance. The authors implemented STLCC in a prototype application and found that it was effective at controlling packet loss and improving network performance compared to other congestion control methods. They concluded that STLCC can automatically measure and reduce congestion to allocate network resources stably.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Priority based flow control protocol for internet of things built on light fidelity (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Priority based flow control protocol for internet of things built on light fidelity
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 4, August 2022, pp. 4449~4456
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i4.pp4449-4456 4449
Journal homepage: http://ijece.iaescore.com
Priority based flow control protocol for internet of things built
on light fidelity
Belathuru Ramanna Vatsala, Vidyaraj Chitradurga
Department of Computer Science and Engineering, The National Institute of Engineering, Mysore, India
Article Info ABSTRACT
Article history:
Received Jun 10, 2021
Revised Dec 16, 2021
Accepted Jan 11, 2022
Excessive usage of internet by most of the applications that use internet of
things (IoT) has resulted in need for high bandwidth network. Light fidelity
(LiFi) is one such network having bandwidth in terms of GigaHertz, but LiFi
has a limited propagation range hence it can be deployed only in the local
area. When IoT nodes are connected using LiFi network in the local area
they start pushing large data to the cloud there by arising need for flow
control. Some of the IoT applications such as patient monitoring systems and
nuclear systems, generate critical data. The protocol for flow control in this
case should be based on priority of data since critical data with high priority
have to be transmitted first. We develop a flow control protocol named
priority based flow control protocol (PFCP) by providing priority to flows
that carry critical data especially in IoT system that use LiFi network. We
evaluate performance of different transmission control protocol (TCP)
variants and modify TCP variant that yields maximum goodput according to
the priority based protocol developed and demonstrate that flows that carry
critical data are given priority compared to non-prioritized flows.
Keywords:
Congestion window
Flow control
Internet of things
LiFi
Transmission control protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Belathuru Ramanna Vatsala
Department of Computer Science and Engineering, The National Institute of Engineering
Manandavadi Road, Mysore, Karnataka, India
Email: vatsalabr@nie.ac.in
1. INTRODUCTION
Internet of things (IoT) applications such as smart hospitals, smart security systems, home
automation system, smart education systems, generate large amount of data which need to be transmitted as
quickly as possible since they have minimum storage capacity [1]. As a consequence, there is a need for
wireless network with large bandwidth. Visible light communication (VLC) is a potential solution for this
with bandwidth in terms of GigaHertz. Light fidelity (LiFi) is wireless technology with VLC as physical
medium. The propagation range of LiFi is around 10 meters and also light cannot penetrate through walls
hence it is suitable for indoor environments [2]. IoT applications which can be deployed indoor such as
hospital wards, home security systems, and nuclear plants can avail IoT setup upon VLC physical medium.
Moreover, VLC is secure since the data is not breached and it is also safe to human eyes.
Since the IoT nodes built on LiFi use high bandwidth only in local area, need for flow control arises
when these data are to be transmitted to outside LiFi network which may have comparatively low bandwidth
thus, requiring suitable flow control protocol. The flow control protocol in this case should be light weight to
accommodate processing constraint of IoT nodes. Context aware applications such as IoT based health
monitoring systems [3], nuclear systems and surveillance systems generate data which can be critical at
times, these data are to be given priority during data transmission. Our research work is focused on
developing flow control protocol based on priority named priority based flow control protocol (PFCP) by
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 4449-4456
4450
modifying the transmission control protocol (TCP) protocol such that prioritized flows avail large window
size during congestion compared to other flows. The major contribution of our work is to provide good
quality service in terms of goodput, packet delivery ratio to prioritized flows when congestion is anticipated
in IoT environment built on high bandwidth LiFi network
Some of the IoT protocols such as lightweight RESTful applications [4], and constrained application
protocol (CoAP) [5], are deployed using user datagram protocol (UDP) since it is free from timeouts and
retransmissions. However, middle boxes like firewall do not allow UDP flows. This resulted in usage of TCP
in IoT applications such as CoAP [6], advanced message queuing protocol (AMQP) [7], message queue
telemetry transport (MQTT) [8], and hypertext transfer protocol version 2 (HTTP/2) [9]. We use TCP in our
work since it is a prominent protocol with reliability, in-order packet delivery and flow control also, it
ensures secure and reliable transmission. Moreover, for applications such as critical health care and military
Surveillance systems UDP is not suitable as it lacks quality of service (QoS) requirement like guaranteed
delivery. Hence TCP can be a promising transport layer protocol for IoT with guaranteed delivery and flow
control. Our work is carried out in three stages: i) First, we evaluate performance of TCP variants namely,
NewReno [10], Vegas [11], Veno [12], Bic [13], Scalable [14], Hybla [15], HighSpeed TCP (HTCP) [16],
HighSpeed [17], Illinois [18], Yeah [19], Westwood [20] and Westwood plus [21] in single flow IoT
environment built on LiFi and find out the variant that yields maximum goodput; ii) Second, we demonstrate
that the variant (yielding high goodput) does not guarantee any priority to flows in multi flow environment
and some flows randomly monopolies; and iii) Third, we modify this TCP variant according to the priority-
based protocol developed and demonstrate that flows that carry critical data are given priority compared to
non-prioritized flows when congestion is anticipated. This paper is organized into 6 sections with focus on:
related work in section 2, proposed PFCP algorithms in section 3, simulation setup for PFCP in section 4,
results and discussions in section 5 and conclusion in section 6
2. RELATED WORK
Several flow control and congestion control algorithms are proposed for IoT paradigm. A
mechanism for congestion control in IoT called packet discarding based on node clustering (PDNC) is
suggested in [22], where congestion is controlled by discarding selected packets. The packets to discard are
based on data size larger than 60 bytes or with time to live field 0. This method ensures lower packet loss
percentage and lower end to end delay in comparison with the original method.
A network system is proposed in [23], where the authors concentrate on information centric
networking based architecture instead of existing transmission control protocol/internet protocol (TCP/IP)
based architecture. Here a dynamic congestion control mechanism is used to transmit the data packet. A data
packet is delivered with appropriate time delay according to priority level, life time and content popularity.
Caching partition is made based on content popularity. Congestion rate is reduced through diminished data
traffic and high performance is achieved with low packet drop rate, high cache hit rate and throughput.
TCP congestion control for IoT over heterogeneous network model called Siam is designed in [24]
using Markov decision process. Here congestion window is updated by calculating probability of packet loss
and packet delay. Congestion window size is reduced during CA_Loss state where packets sent are lost due
to congestion and CA_Recovery state where duplicate sequence numbers are received. The results of
simulation show maximum window size, in-flight bytes and transmitted bytes for Siam compared to TCP
variants veno, scalable, yeah, illinois and westwood plus.
An adaptive congestion control for IoT is proposed in [25] by improving random early detection
(RED) algorithm based on Bell type fuzzy membership function. This algorithm automatically adjusts the
probability of packet loss according to the network environment. The packets with lower curve probability
are discarded, which can reduce congestion and improve utilization of link compared to RED which discards
packets with high linear probability. The proposed algorithm assures high throughput, low packet loss and
delay compared to S-RED, F-RED, BLUE and RED algorithms.
A policy for congestion control based on IoT is introduced in [26] where the transmission rate is
adjusted according to the requirement of IoT device by combining both reactive and proactive congestion
control policies. Here a new congestion window initialization mechanism is proposed based on changes in
available bandwidth and delay. Initial window size is made as BW/α where BW is available bandwidth and α
is sensitivity factor instead of 1 maximum segment size (MSS). The proposed method also includes
adaptation of TCP to utilize available bandwidth according to the application demand and also maintains
steady state by incrementing congestion window by a factor x, where x is calculated based on the product of
current round-trip time (RTT) and slow start threshold (ssthresh). The proposed method yields better results
in terms of throughput and inter-protocol fairness.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Priority based flow control protocol for internet of things built on light fidelity (Belathuru Ramanna Vatsala)
4451
A congestion avoidance routing protocol based on priority is proposed in [27] for IoT based wireless
body area networks. Here data traffic is classified into two types normal and emergency traffic, emergency
packets are labeled with priority and are scheduled for transmission by using shortest hop count route. The
proposed protocol assures that emergency packets are routed with minimum delay and higher throughput.
A link level flow control protocol based on priority is specified in IEEE standard 802.1Qbb [28], it
is applicable for data center bridging network. When receiver buffer overflows, it sends pause frame to
sender nodes. The pause frame contains pausing time interval. PFCP allows different pausing time based on
class of service, which is derived based on individual priority of flows.
3. PROPOSED PFCP ALGORITHMS
PFCP algorithms are developed at source, destination and router level, source level algorithm is
shown in Figure 1. The applications such as health monitoring system, temperature tracking in nuclear
systems that are running at the source IoT device calculate the priority of the flow based on criticality of data
and furnishes this information to underlying transport protocol. Options field used for priority in the header is
marked as ‘prio’ if it is of high priority based on information received from application layer. Destination
level algorithm is shown in Figure 2. The receiver copies the priority information of the received segment
into its corresponding acknowledgment packet (ACK) segment. The PFCP is designed in such a way that
there is minimum computation at source and destination as they are constrained with respect to memory and
processing capabilities.
Router level algorithm is shown in Figure 3. The router checks the queue occupancy and if current
queue size is below the threshold Th, then enters flow control phase otherwise it will be in normal phase,
during flow control phase ACK segments marked with ’prio’ are not disturbed but segments not marked with
‘prio’ are to undergo window tailoring. In this phase receiver window size of segments not marked with
‘prio’ is tailored proportionate to available bandwidth as mentioned in (1):
𝐵𝐴 = 𝐵𝑊 − 𝑈
𝑊𝑟𝑛 = 𝐵𝐴/𝐵𝑊 ∗ 𝑊𝑟
𝑊𝑟 = 𝑀𝑎𝑥𝑖𝑚𝑢𝑚 (𝑊𝑟𝑛, 1 𝑀𝑆𝑆) (1)
where BA is available bandwidth, BW is Bandwidth of the link, U is used bandwidth, Wr is receiver window
size, and Wrn is new receiver window calculated. The set of equations make sure that Wr is at least made
equal to 1 MSS. The reduction in the receiver window size of non-prioritized segments alleviates congestion
and more bandwidth is given to packets with high priority there by achieving flow control based on priority.
The flow diagram of the protocol is depicted in Figure 4.
Figure 1. PFCP algorithm at source node
Figure 2. PFCP algorithm at destination node Figure 3. PFCP algorithm at router
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 4449-4456
4452
Figure 4. PFCP flow diagram
4. RESEARCH METHOD: SIMULATION SETUP FORPFCP
IoT system is built over LiFi containing VLC links in NS3 by using IoT protocol stack and VLC
module [29]. It consists of ten source nodes (S1 to S10), ten sink nodes (R1 to R10) connected via two
gateway nodes (G1 and G2) in dumbbell shape topology as shown in Figure 5. Network layer protocol for
IoT namely 6LoWPAN [30], is installed on all nodes with IPV6 addressing scheme. The source nodes are
connected to gateways through VLC channels. Transmitter and Receiver devices are attached to each VLC
channel. The two gateway nodes are connected using point to point wired Link. The Sink nodes are also
connected to gateway through point-to-point wired links. The network parameter values used for simulation
are as shown in Table 1. BulkSend applications namely flow1to flow10 are run between source nodes S1 to
S10 and receiver nodes R1 to R10 respectively. The channels are set with error model such that receiver error
value (Rerror) is 0.0 in first case and 0.1 in second case.
Figure 5. Simulation topology
Table 1. Network parameters
Parameters Value
Bandwidth and channel delay between source and gateway 10 Mbps, 0.01 ms
Bandwidth and channel delay between gateways 2 Mbps, 45 ms
Bandwidth and channel delay between sink and gateway 2 Mbps, 45 ms
Receiver error value (Rerror) 0.0 and 0.1
Packet Size 1024 Bytes
Socket Buffer size 4 MB
5. RESULTS AND DISCUSSION
The simulation is run in three stages: stage 1, stage 2 and stage3. In stage 1, only flow 1 is run
between source node S1 and sink node R1 (single flow), the simulation is run for 100 seconds in both error
free and error prone cases (Rerror 0.0 and Rerror 0.1) by considering the TCP variants viz NewReno, Vegas,
5. Int J Elec & Comp Eng ISSN: 2088-8708
Priority based flow control protocol for internet of things built on light fidelity (Belathuru Ramanna Vatsala)
4453
Veno, Bic, Scalable, Hybla, HTCP, HighSpeed, Illinois, Yeah, Westwood and Westwood plus. Figure 6
shows the plot of goodput values for TCP-variants considered in the research work with respect to flow 1. It
is evident from the resulting graph that TCP-HighSpeed exhibits highest goodput of 364.63 Kbps in first case
and fairly well i.e., 33.19 Kbps in second case since it is basically designed to increase throughput in high
bandwidth network like VLC. Hence we use TCP high speed in the next stages of simulation.
Figure 6. Goodput of TCP Variants in error free and error prone network
In the second stage flow1 to flow10 are run between source nodes S1 to S10 and receiver nodes R1
to R10 respectively (multi flow). The simulation is run for 100 seconds using TCP HighSpeed as the
transport layer protocol. The goodput of each flow from flow1 to flow10 is plotted as shown in Figure 7
in both cases. It is noticed that flow4, flow10 and flow1 exhibit maximum goodput of 215.55 Kbps,
213.46 Kbps and 203.96 Kbps respectively in error free case and flow5, flow8 and flow3 exhibit maximum
goodput of 18.62 Kbps, 15.89 Kbps and 14.28 Kbps respectively in error prone case. This random flow
monopolization behavior of TCP makes it infeasible for the scenarios where we need to prioritize particular flows
that are critical.
Figure 7. Goodput of flows with TCP Highspeed in error free and error prone network
The packet delivery ratio (PDR) of each flow is as depicted in Figure 8, It is apparent that flow 2
exhibits PDR of 99.02% which is slightly more than other flows in error free case, and PDR of flow1 is
83.57% in error prone case (highest among all flows). Thus, we observe maximum PDR for some random
flows in TCP HighSpeed. In the third stage, PFCP is employed on all source, router and receiver nodes by
modifying TCP HighSpeed. Flow4 and flow 9 are made prioritized flows out of the 10 flows. The simulation
is run for 100 seconds. The goodput of each flow from flow1 to flow10 is plotted as shown in Figure 9 in
both cases. It is apparent from the plot that flow 9 and flow 4 have highest goodput of 426.24 Kbps and
416.48 Kbps respectively in error free case and 52.4 Kbps and 51.96 Kbps in 10% error prone case compared
289,25 290,64
364,63
264,4
185,06
276,25 288,07
212,43 212,32
289,25
324,07
192,46
15,89 30,52 33,19 18,08 18,67 35,71 25,33 15,79 18,4 16,01 22,32 20,41
0
50
100
150
200
250
300
350
400
Goodput
TCP Variants
Goodput (in Kbps) with Rerror=0.0
203,96 211,91
193,06
215,55
195,61 186,09 191,43 183 194,53
213,46
14,06 10,81 14,28 10,42 18,62 12,37 13,33 15,89 9,37 13,62
0
50
100
150
200
250
Goodput
TCP Highspeed flows
Goodput (in Kbps) with Error=0.0
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 4449-4456
4454
to other flows. This is due to tailoring of receiver window for non-prioritized flows during congestion. Thus,
flows that carry critical data assure highest data transmission compared to non-prioritized flows
Figure 8. PDR of flows with TCP HighSpeed in error free and error prone network
Figure 9. Goodput of flows with PFCP in error free and error prone network
The packet delivery ratio (PDR) of each flow employing PFCP is shown in Figure 10. Flow 4 and
flow9 have PDR of 100% and 99.97% which is slightly more than that of other flows. Thus, PFCP also
ensures maximum PDR for prioritized flows compared to non-prioritized flows. The results prove that in
TCP HighSpeed flows monopolies randomly whereas prioritized flows dominate when PFCP is employed.
Figure 10. PDR of flows with PFCP in error free and error prone network
98,81 99,02 98,84 98,89 98,69 98,72 98,69 98,66 98,79 98,77
83,57 81,52 84,18 81,07 81,33 78,23 81,49 80,16 76,82 80,7
0
20
40
60
80
100
120
Padket
Delivery
Ratio
TCP HighSpeed Flows
PDR (in %) with Error=0.0 PDR (in %) with Error=0.1
198,7 198,74 198,78
416,48
198,7 198,78 198,66 198,76
426,24
198,7
31,11 49,56
2,7
51,96 50,7 24,9 32,49 47,97 52,4
3,45
0
100
200
300
400
500
Goodput
PFCP Flows
Goodput (in Kbps) with Error=0.0 Goodput (in Kbps) with Error=0.1
96,41 98,17 97,66 100 96,56 96,73 96,7 96,76 99,97 96,7
81,68 81,95 75,61 82,11 82,19 80,97 79,59 79,76 81,97
74,47
0
20
40
60
80
100
120
Packet
Delivery
Ratio
PFCP Flows
PDR (in %) with Error=0.0 PDR (in %) with Error=0.1
7. Int J Elec & Comp Eng ISSN: 2088-8708
Priority based flow control protocol for internet of things built on light fidelity (Belathuru Ramanna Vatsala)
4455
6. CONCLUSION AND FUTURE ENHANCEMENTS
Modification to TCP protocol called PFCP is suggested to cater to the need of priority for flows that
carry critical data in IoT environment built on LiFi. The protocol developed is aimed at reducing the receiver
window size of non-prioritized flows without affecting that of prioritized flows to enforce flow control
during congestion. At first, TCP variants viz NewReno, Vegas, Veno, Bic, Scalable, Hybla, HTCP,
HighSpeed, Illinois, Yeah, Westwood and Westwood plus were evaluated with reference to the performance
parameter goodput in both error free and error prone cases in IoT with VLC medium for a single flow
scenario. It was found that in error free case, TCP HighSpeed achieves highest goodput of 364.63 Kbps and
also performs well in error prone case with goodput of 33.19 Kbps compared to other flows. Later, in multi
flow environment TCP HighSpeed was used as a transport layer protocol to evaluate goodput and PDR of
each flow and it was noticed that some flows monopolize the network, even though they are not associated
with any priority. Finally, PFCP has been employed by modifying TCP High speed. This approach assures
that flows with priority have increased goodput and slightly increased PDR compared to non-prioritized
flows. The protocol developed can be implemented in real time for IoT applications that require priority
during transmission. The protocol can be augmented with security since IoT devices are prone to attacks and
also the memory and processing constraints of IoT systems must be considered during this enhancement
REFERENCES
[1] A. Ghasempour, “Internet of things in smart grid: architecture, applications, services, key technologies, and challenges,”
Inventions, vol. 4, no. 1, pp. 22–33, Mar. 2019, doi: 10.3390/inventions4010022.
[2] H. Haas et al., “Introduction to indoor networking concepts and challenges in LiFi,” Journal of Optical Communications and
Networking, vol. 12, no. 2, p. A190, Feb. 2020, doi: 10.1364/JOCN.12.00A190.
[3] A. O. Bang and U. P. Rao, “Context-aware computing for IoT: history, applications and research challenges,” Springer Singapore,
2021, pp. 719–726.
[4] L. Richardson and S. Ruby, RESTful web services. O’Reilly, 2008.
[5] IETF, “rfc7252 - IETF Tools,” datatracker.ietf.org. https://tools.ietf.org/html/rfc7252 (accessed Feb. 02, 2020).
[6] C. Bormann, S. Lemay, H. Tschofenig, K. Hartke, B. Silverajan, and B. Raymor, “CoAP (constrained application protocol) over
TCP, TLS, and WebSockets,” IETF. https://tools.ietf.org/id/draft-ietf-core-coap-tcp-tls-11.html (accessed Feb. 03, 2020).
[7] ISO, “ISO/IEC 19464:2014(en), Information technology,” iso.org. https://www.iso.org/obp/ui/#iso:std:iso-iec:19464:ed-1:v1:en
(accessed Feb. 03, 2020).
[8] ISO, “ISO/IEC 20922:2016(en), Information technology,” iso.org. https://www.iso.org/obp/ui/#iso:std:iso-iec:20922:ed-1:v1:en
(accessed Feb. 03, 2020).
[9] and M. T. M. Belshe, R. Peon, “Hypertext transfer protocol version 2 (HTTP/2),” May 2015. doi: 10.17487/RFC7540.
[10] S. Floyd, T. Henderson, and A. Gurtov, “Rfc3782: The NewReno modification to TCP’s fast recovery algorithm,” IETF, 2004.
https://datatracker.ietf.org/doc/rfc3782/ (accessed Feb. 03, 2020).
[11] L. S. Brakmo and L. L. Peterson, “TCP Vegas: end to end congestion avoidance on a global Internet,” IEEE Journal on Selected
Areas in Communications, vol. 13, no. 8, pp. 1465–1480, 1995, doi: 10.1109/49.464716.
[12] Cheng Peng Fu and S. C. Liew, “TCP Veno: TCP enhancement for transmission over wireless access networks,” IEEE Journal on
Selected Areas in Communications, vol. 21, no. 2, pp. 216–228, Feb. 2003, doi: 10.1109/JSAC.2002.807336.
[13] Lisong Xu, K. Harfoush, and Injong Rhee, “Binary increase congestion control (BIC) for fast long-distance networks,” in IEEE
INFOCOM 2004, 2004, vol. 4, pp. 2514–2524, doi: 10.1109/INFCOM.2004.1354672.
[14] T. Kelly, “Scalable TCP,” ACM SIGCOMM Computer Communication Review, vol. 33, no. 2, pp. 83–91, Apr. 2003, doi:
10.1145/956981.956989.
[15] C. Caini and R. Firrincieli, “TCP Hybla: a TCP enhancement for heterogeneous networks,” International Journal of Satellite
Communications and Networking, vol. 22, no. 5, pp. 547–566, Sep. 2004, doi: 10.1002/sat.799.
[16] D. Leith and R. Shorten, “H-TCP: TCP for high-speed and long-distance networks,” Procceedings of PFLDnet, 2004.
[17] S. Floyd, “HighSpeed TCP for large congestion windows,” RFC Editor, RFC3649. Dec. 2003, doi: 10.17487/rfc3649.
[18] S. Liu, T. Başar, and R. Srikant, “TCP-Illinois: A loss and delay-based congestion control algorithm for high-speed networks,”
ACM International Conference Proceeding Series, 2006, doi: 10.1145/1190095.1190166.
[19] A. Baiocchi, A. P. Castellani, and F. Vacirca, “YeAH-TCP: yet another highspeed TCP,” Proc. PFLDnet, 2007.
[20] S. Mascolo, C. Casetti, M. Gerla, M. Y. Sanadidi, and R. Wang, “TCP westwood,” in Proceedings of the 7th annual international
conference on Mobile computing and networking - MobiCom ’01, 2001, pp. 287–297, doi: 10.1145/381677.381704.
[21] L. A. Grieco and S. Mascolo, “Performance evaluation and comparison of Westwood+, New Reno, and Vegas TCP congestion
control,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 25–38, Apr. 2004, doi: 10.1145/997150.997155.
[22] N. H. B. Halim, N. B. Yaakob, and A. B. A. M. Isa, “Congestion control mechanism for internet-of-things (IOT) paradigm,” in
2016 3rd International Conference on Electronic Design (ICED), Aug. 2016, pp. 337–341, doi: 10.1109/ICED.2016.7804663.
[23] R. Sukjaimuk, Q. N. Nguyen, and T. Sato, “Dynamic congestion control in information-centric networking utilizing sensors for
the IoT,” in 2018 IEEE Region Ten Symposium (Tensymp), Jul. 2018, pp. 63–68, doi: 10.1109/TENCONSpring.2018.8691983.
[24] T. Toprasert and W. Lilakiataskun, “TCP congestion control with MDP algorithm for IoT over heterogeneous network,” in 2017
17th International Symposium on Communications and Information Technologies (ISCIT), Sep. 2017, pp. 1–5, doi:
10.1109/ISCIT.2017.8261189.
[25] L. Chen and J. Cao, “Adaptive congestion control of internet of things based on improved RED algorithm,” in 2018 Chinese
Automation Congress (CAC), Nov. 2018, pp. 295–298, doi: 10.1109/CAC.2018.8623124.
[26] L. P. Verma and M. Kumar, “An IoT based congestion control algorithm,” Internet of Things, vol. 9, Mar. 2020, doi:
10.1016/j.iot.2019.100157.
[27] K. M. Awan et al., “A priority-based congestion-avoidance routing protocol using IoT-based heterogeneous medical sensors for
energy efficiency in healthcare wireless body area networks,” International Journal of Distributed Sensor Networks, vol. 15,
no. 6, Jun. 2019, doi: 10.1177/1550147719853980.
[28] IEEE Standard, “802.1Qbb-2011 - IEEE Standard for Local and metropolitan area networks--media access control (MAC) bridges
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 4449-4456
4456
and virtual bridged local area networks--Amendment 17: Priority-based flow control,” 802.1Q-2005), IEEE Std 802.1Q-2011
(Revision of IEEE Std. 2011, doi: 10.1109/IEEESTD.2011.6032693.
[29] A. Aldalbahi, M. Rahaim, A. Khreishah, M. Ayyash, and T. D. C. Little, “Visible light communication module: an open source
extension to the ns3 network simulator with real system validation,” IEEE Access, vol. 5, pp. 22144–22158, 2017, doi:
10.1109/ACCESS.2017.2759779.
[30] J. Hu, D. Culler, and S. Chakrabart, “6lowpan: incorporating IEEE 802.15. 4 into the IP architecture,” IPSO Alliance.WhitePaper.
pp. 1–17, 2009.
BIOGRAPHIES OF AUTHORS
Belathuru Ramanna Vatsala Assistant Professor, Department of Computer
Science and Engineering, The National Institute of Engineering, Mysore, Karnataka, India.
Teaching and research interest areas are internet of things, computer architecture, compiler
design, microprocessors, embedded systems and computer networks. Presented papers in
Conferences and published papers in International Journals. Awarded with Elite Certificate
with gold medal printed on it for scoring 90% in NPTEL online Course on “Introduction to
Internet of Things”. She can be contacted at email: vatsalabr@nie.ac.in.
Vidyaraj Chitradurga Professor, Department of Computer Science and
Engineering, The National Institute of Engineering, Mysore, Karnataka, India. Research and
Teaching Interest areas are Quantum Computing, Software Engineering Computer Networks,
Wireless networks, Storage Area Networks and Internet of Things. Presented papers in
various Conferences and published papers in reputed International journals. She is life
member of Indian society for Technical Education, Fellow member of Institute of Engineers.
Received best paper awards for research papers. She has guided and is guiding research
scholars. She has given several technical talks in various institutions. She can be contacted at
email: vidyarajc@nie.ac.in.