this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum transmit power and code length to decrease the near-far impact. UW-MAC objective is to obtain three goals i.e. low channel access delay, high network throughput and low energy consumption. It is shown that UW-MAC maintains to simultaneously obtain limited channel access delay, high network throughput and low energy consumption in deep water communications, which are not critically influenced by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC) protocol which
The big and small networks we shall study all have two-dimensional configurations that can detect applications in land-based networks. We shall also explore our study to a three-dimensional network by studying an USN. Here, we have the issue to understand first the underwater physical atmosphere for acoustic propagation and thus the effect to data communication. This would also permit us to detect the suitable channel model which we shall integrate into our underwater topology for the study and network coding analysis. However a queuing analysis includes much time in mathematics for the time limit of this study, we have resorted to simulation. Of all the simulation languages existed in the research world, I have selected RIVERBED (Optimized Network Engineering Tools) [OPNE14] to be our simulation simulator because that its hierarchical modeling technique builds it simple to utilize and our research group already has a lot of expertness about exploiting RIVERBED.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
The shortcomings of conventional bus architectures are in terms of scalability and the ever increasing
demand of more bandwidth. And also the feature size of sub-micron domain is decreasing making it
difficult for bus architectures to fulfill the requirements of modern System on Chip (SoC) systems. Network
on chip (NoC) architectures presents a solution to the earlier mentioned shortcomings by employing a
packet based network for inter IP communications. A pivotal feature of NoC systems is the topology in
which the system is arranged. Several parameters which are topology dependent like hop count, path
diversity, degree and other various parameters affect the system performance. We propose a novel
topology forNoC architecture which has been thoroughly compared with the existing topologies on the
basis of different network parameters.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
The big and small networks we shall study all have two-dimensional configurations that can detect applications in land-based networks. We shall also explore our study to a three-dimensional network by studying an USN. Here, we have the issue to understand first the underwater physical atmosphere for acoustic propagation and thus the effect to data communication. This would also permit us to detect the suitable channel model which we shall integrate into our underwater topology for the study and network coding analysis. However a queuing analysis includes much time in mathematics for the time limit of this study, we have resorted to simulation. Of all the simulation languages existed in the research world, I have selected RIVERBED (Optimized Network Engineering Tools) [OPNE14] to be our simulation simulator because that its hierarchical modeling technique builds it simple to utilize and our research group already has a lot of expertness about exploiting RIVERBED.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
The shortcomings of conventional bus architectures are in terms of scalability and the ever increasing
demand of more bandwidth. And also the feature size of sub-micron domain is decreasing making it
difficult for bus architectures to fulfill the requirements of modern System on Chip (SoC) systems. Network
on chip (NoC) architectures presents a solution to the earlier mentioned shortcomings by employing a
packet based network for inter IP communications. A pivotal feature of NoC systems is the topology in
which the system is arranged. Several parameters which are topology dependent like hop count, path
diversity, degree and other various parameters affect the system performance. We propose a novel
topology forNoC architecture which has been thoroughly compared with the existing topologies on the
basis of different network parameters.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ijasuc
Mobility in wireless networks has paved way for a new paradigm of communication in this era. Exploiting
the optimal routing technique for hybrid wireless networks which brings in a balance of the overheads in
infrastructure based and infrastructure less network is essential. Routing protocol design for hybrid
wireless network is critical in order to improve the performance and reliability of the network.
Opportunistic Routing (OR) technique attempts to deal with unreliable transmissions by utilizing the
broadcast nature of the wireless medium. Due to multi-hop nature of ad hoc networks, Opportunistic
Routing provides lesser throughput than expected when minimum hop count metric is used. To combat the
above limitations, an Extremely Opportunistic Routing(ExOR) scheme with Expected Transmission
count(ETX) metric is proposed and implemented in a hybrid scenario. The simulation study reveals that
this routing technique efficiently utilizes resources and improves the end-to-end throughput and packet
delivery ratio in hybrid wireless networks.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
Wireless Ad-Hoc Mesh Networks are characterized by static nodes connected in a mesh topology. A routing
protocol discovers and maintains the route for successful transmission of data in a network. The routing
protocol should also provide load balancing and fault tolerance for improved network performance. In
Free Space Optical networks (FSO) line of sight (LOS) should be maintained between the two
communicating nodes. In a multihop scenario maintaining LOS during routing is a challenge. In this paper
we propose a routing protocol Quality of Service-Directional Routing Protocol (QDRP) - which assures a
certain level of performance to a data flow in terms of delay and implemented on FSO MANET. Through
simulations it is observed that QDRP chooses the path with the least delay and performs satisfactorily
under varying node densities and transmission rates achieving end to end delay of .14 s and packet delivery
percentage of 96% when simulated for an area of 1300 m *1300 m for 100 nodes. This work explores the
potential of the proposed routing protocol for free space optical mesh networks. QDRP is compared with
ORRP (Orthogonal Rendezvous Routing Protocol) and AODV (Ad-Hoc on Demand Distance Vector), a
reactive protocol which is also implemented in free space optical environment. We support our conclusions
that QDRP gains in terms of packet delivery percentage, end to end delay and goodput.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...IJNSA Journal
The transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion negatively affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ) algorithm is a more popular technique used in the VoIP network to reduce delays. In operation, the PQ is to use the method of sorting algorithms, search and route planning to classify packets on the router. Thus, this packet classifying method can result in repetition of the process. And this recursive loop leads to the next queue starved. In this paper, to solving problems, there are three phases namely queuing phase, classifying phase and scheduling phase. The PQ algorithm technique is based on the priority. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text); that can reduce recursive loop and starvation. After the incoming packet is classified, the packet will be sent to the packet buffering. In addition, to justify the research objective of the PQ improved algorithm will be compared against the algorithm existing PQ, which is found in the literature using metrics such as delay, packets drop and packet losses. This paper described about different execution long process in Priority (PQ) and our algorithm. Our Algorithm is to simplify process execution Algorithm that can cause starvation occurs in PQ algorithm.
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkCSCJournals
A novel path tracing scheme is described in this paper which is known as Prime number encoding scheme using Benes network. In this scheme every data packet consist a label which is default 1 and every node consist of a prime number tag, as this data packet pass through the network label will be multiplied with the tag of the node. Prime number multiplication is done with encoder. At the receiver end factorization is done which gives the information of travelled path. In this scheme optical cross connects (OXC) is replaced with the Benes network which gives the better result than OXC. System having Benes network gives less attenuation than OXC and complexity of the system also decreases.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ijasuc
Mobility in wireless networks has paved way for a new paradigm of communication in this era. Exploiting
the optimal routing technique for hybrid wireless networks which brings in a balance of the overheads in
infrastructure based and infrastructure less network is essential. Routing protocol design for hybrid
wireless network is critical in order to improve the performance and reliability of the network.
Opportunistic Routing (OR) technique attempts to deal with unreliable transmissions by utilizing the
broadcast nature of the wireless medium. Due to multi-hop nature of ad hoc networks, Opportunistic
Routing provides lesser throughput than expected when minimum hop count metric is used. To combat the
above limitations, an Extremely Opportunistic Routing(ExOR) scheme with Expected Transmission
count(ETX) metric is proposed and implemented in a hybrid scenario. The simulation study reveals that
this routing technique efficiently utilizes resources and improves the end-to-end throughput and packet
delivery ratio in hybrid wireless networks.
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionIJCNCJournal
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
Wireless Ad-Hoc Mesh Networks are characterized by static nodes connected in a mesh topology. A routing
protocol discovers and maintains the route for successful transmission of data in a network. The routing
protocol should also provide load balancing and fault tolerance for improved network performance. In
Free Space Optical networks (FSO) line of sight (LOS) should be maintained between the two
communicating nodes. In a multihop scenario maintaining LOS during routing is a challenge. In this paper
we propose a routing protocol Quality of Service-Directional Routing Protocol (QDRP) - which assures a
certain level of performance to a data flow in terms of delay and implemented on FSO MANET. Through
simulations it is observed that QDRP chooses the path with the least delay and performs satisfactorily
under varying node densities and transmission rates achieving end to end delay of .14 s and packet delivery
percentage of 96% when simulated for an area of 1300 m *1300 m for 100 nodes. This work explores the
potential of the proposed routing protocol for free space optical mesh networks. QDRP is compared with
ORRP (Orthogonal Rendezvous Routing Protocol) and AODV (Ad-Hoc on Demand Distance Vector), a
reactive protocol which is also implemented in free space optical environment. We support our conclusions
that QDRP gains in terms of packet delivery percentage, end to end delay and goodput.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALG...IJNSA Journal
The transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion negatively affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ) algorithm is a more popular technique used in the VoIP network to reduce delays. In operation, the PQ is to use the method of sorting algorithms, search and route planning to classify packets on the router. Thus, this packet classifying method can result in repetition of the process. And this recursive loop leads to the next queue starved. In this paper, to solving problems, there are three phases namely queuing phase, classifying phase and scheduling phase. The PQ algorithm technique is based on the priority. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text); that can reduce recursive loop and starvation. After the incoming packet is classified, the packet will be sent to the packet buffering. In addition, to justify the research objective of the PQ improved algorithm will be compared against the algorithm existing PQ, which is found in the literature using metrics such as delay, packets drop and packet losses. This paper described about different execution long process in Priority (PQ) and our algorithm. Our Algorithm is to simplify process execution Algorithm that can cause starvation occurs in PQ algorithm.
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkCSCJournals
A novel path tracing scheme is described in this paper which is known as Prime number encoding scheme using Benes network. In this scheme every data packet consist a label which is default 1 and every node consist of a prime number tag, as this data packet pass through the network label will be multiplied with the tag of the node. Prime number multiplication is done with encoder. At the receiver end factorization is done which gives the information of travelled path. In this scheme optical cross connects (OXC) is replaced with the Benes network which gives the better result than OXC. System having Benes network gives less attenuation than OXC and complexity of the system also decreases.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Many intellectual property (IP) modules are present in contemporary system on chips (SoCs). This could provide an issue with interconnection among different IP modules, which would limit the system's ability to scale. Traditional bus-based SoC architectures have a connectivity bottleneck, and network on chip (NoC) has evolved as an embedded switching network to address this issue. The interconnections between various cores or IP modules on a chip have a significant impact on communication and chip performance in terms of power, area latency and throughput. Also, designing a reliable fault tolerant NoC became a significant concern. In fault tolerant NoC it becomes critical to identify faulty node and dynamically reroute the packets keeping minimum latency. This study provides an insight into a domain of NoC, with intention of understanding fault tolerant approach based on the XY routing algorithm for 4×4 mesh architecture. The fault tolerant NoC design is synthesized on field programmable gate array (FPGA).
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
The advent of System-on-Chip (SoCs), has brought about a need to increase the scale of multi-core chip networks. Bus Based communications have proved to be limited in terms of performance and ease of scalability, the solution to both bus – based and Point-to-Point (P2P) communication systems is to use a communication infrastructure called Network-on-Chip (NoC). Performance of NoC depends on various factors such as network topology, routing strategy and switching technique and traffic patterns. In this paper, we have taken the initiative to compile together a comparative analysis of different Network on Chip infrastructures based on the classification of routing algorithm, switching technique, and traffic patterns. The goal is to show how varied combinations of the three factors perform differently based on the size of the mesh network, using NOXIM, an open source SystemC Simulator of mesh-based NoC. The analysis has shown tenable evidence highlighting the novelty of XY routing algorithm.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
Abstract : As the network size increases the probability of congestion occurrence at nodes increases. This is because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses. In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing (IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput and packet delivery fraction. Keywords- DSDV, Hybrid protocol, AODV, IAODV, MANET
As you know Sci Hub is sometimes down due to some technical issue, So you can visits the new Sci Hub New Domain with its Extension. ThesisScientist.com is New domain alternative of Sci Hub.
If Sci Hub website not working properly than you will move toward to others websites like ThesisScientist.com. It is the best website for downloading free papers and thesis and Free Journals
Computer network is a distributed system consisting of loosely coupled computers and other
devices. Any two of these devices, which we will from now on refer to as network elements or
transmitting elements, can communicate with each other through a communication medium. In
order for these connected devices to be considered a communicating network, there must be a set
of communicating rules or protocols each device in the network must follow to communicate wit
another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short. Figure 1.1 shows a computer
network
Java is a general-purpose; object oriented programming language developed by Sun Microsystems of USA in 1991. This language was initially called “Oak” by James Gosling, but was renamed “Java” in 1995. Java (with a capital J) is a high-level, third generation programming language, like C, Fortran, Smalltalk, Perl, and many others.Java was initially designed to solve on a small scale could also be applied to the Internet on a large scale. This realization caused the focus of Java to switch from consumer electronic to Internet Programming.Java was designed for the development of software for consumer electronic devices like TVs, VCRs, Toasters, Microwaves ovens and such other electronics devices.Java is a first programming language that is not tied to any particular hardware or operating system. Programs developed in Java can be executed anywhere on any system.
Project Evaluation and Estimation in Software DevelopmentProf Ansari
Cost-benefit analysis
It mainly comprise two steps
Identify and estimating all of the costs and benefits of carrying out the project and operating the delivered application.
Expressing these costs and benefits in common units
We need to evaluate the net benefit, that is, the difference between the total benefit and the total benefit and the total cost of creating and operating the system.
We can categorize cost according to where they originate in the life of the project.
Stepwise Project planning in software developmentProf Ansari
The following activities are:
Identify objectives and practical measures of the effectiveness in meeting those objectives.
Establish a project authority
Stakeholder analysis – identify all stakeholders in the project and their interests
Modify objectives in the light of stakeholder’s analysis
Establish methods of communication with all parties
2.4
Entity Integrity Constraint:
It states that in a relation no attribute of a primary key (K) can have a null value. If a K consists of a single attribute, this constraint obviously applies on this attribute, so it cannot have the Null value. However, if a K consists of multiple attributes, then none of the attributes of this K can have the Null value in any of the instances.
Referential Integrity Constraint :
This constraint is applied to foreign keys. Foreign key is an attribute or attribute combination of a relation that is the primary key of another relation. This constraint states that if a foreign key exists in a relation, either the foreign key value must match the primary key value of some tuple in its home relation or the foreign key value must be completely null.
Normalisation in Database management System (DBMS)Prof Ansari
Normalization is a technique to organize the contents of the table for transactional database and data warehouse.
First Normal Form :
Seeing the data in the example in the book or assuming otherwise that all attributes contain the atomic value, we find out the table is in the 1NF.
Second Normal Form :
Seeing the FDs, we find out that the K for the table is a composite one comprising of empId, projName. We did not include the determinant of fourth FD, that is, the empDept, in the PK because empDept is dependent on empId and empID is included in our proposed PK. However, with this PK (empID, projName) we have got partial dependencies in the table through FDs 1 and 3 where we see that some attributes are being determined by subset of our K which is the violation of the requirement for the 2NF. So we split our table based on the FDs 1 and 3 as follows :
It is a semantic data model that is used for the graphical representation of the conceptual database design. The semantic data models provide more constructs that is why a database design in a semantic data model can contain/represent more details. With a semantic data model, it becomes easier to design the database, at the first place, and secondly it is easier to understand later. We also know that conceptual database is our first comprehensive design. It is independent of any particular implementation of the database, that is, the conceptual database design expressed in E-R data model can be implemented using any DBMS. For that we will have to transform the conceptual database design from E-R data model to the data model of the particular DBMS. There is no DBMS based on the E-R data model, so we have to transform the conceptual database design anyway.
The schemas as it has been defined already; is the repository used for storing definitions of the structures used in database, it can be anything from any entity to the whole organization. For this purpose the architecture defines different schemas stored at different levels for isolating the details one level from the other.
Different levels existing pat different levels of the database architecture pare expressed below with emphasis on the details of all the levels individually. Core of the database architecture is the internal level of schema which is discussed a bit before getting into the details of each level individually.
INTRODUCTION TO Database Management System (DBMS)Prof Ansari
shared collection of logically related data, designed to meet the information needs of multiple users in an organization. The term database is often erroneously referred to as a synonym for a “database management system DBMS)”. They are not equivalent and it will be explained in the next section.
Master thesis on Vehicular Ad hoc Networks (VANET)Prof Ansari
The increasing demand for wireless devices and wireless communication tends to research on self-organizing, self-healing networks without the interference of any pre-established or centralized infrastructure/authority [2]. The networks with the absence of any pre-established or centralized authority are known as Ad hoc networks [4]. Ad hoc Networks are the kind of wireless networks that uses multi-hop radio relay.There are many comparative studies and surveys that compare various ad hoc routing in VANET environment. The simulations performed in these comparative studies are very basic do not incorporate with a large number of nodes in real Vehicular Ad hoc Network environment. The main aim of our dissertation work is to firstly investigate the reactive and proactive routeing protocols than examine the performance of selected reactive routing protocols i.e. Destination Sequence Distance Vector Routing (DSDV), Ad hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Dynamic Source Routing (DSR)by taking three performance metrics like network load, throughput and end-to-end delay with varying number of mobile nodes or vehicle node densityOPNET: Optimized Network Engineering Tool (OPNET) is a commercial network simulator environment used for simulations of both wired and wireless networks [20]. Several different OPNET versions have been released over the last few years; the latest version of OPNET is the OPNET 16.0. At present OPNET is licensed under Riverbed technologies. It allows the user to design and study the network communication devices, protocols, individual applications and also simulate the performance of routing protocol. It supports many wireless technologies and standards such as, IEEE 802.11, IEEE 802.15.1, IEEE 802.16, IEEE 802.20 and satellite networks. OPNET IT Guru Academic Edition is available for free to the academic research and teaching community.
Master Thesis on Vehicular Ad-hoc Network (VANET)Prof Ansari
In present, many people during the public died each year in vehicle accidents, therefore in almost countries some safety data i.e. traffic lights & velocity limits are applied, simply however it is not a better solution. Also government and number of automation industries regarded that vehicular safety is real challenging task [1]. Then equally result, to enhance people traffic safety of a new progressed particular technology is formulated i.e. VANET [4]. It is progress type of MANET (Mobile Ad-hoc Network). VANET manages a network within which vehicles are act nodes and applied as mobile nodes to construct a robust infrastructure-less ad-hoc network. In Figure 1 illustrates the basic components of VANET architecture. It builds the network among Inter-Vehicle, Vehicle-to-Roadside and Inter-Roadside communicating networks [4]. Moreover, apart from accidental-safety and security types, there are also broad varieties of applications in VANET are available and potential that can extend passenger comfort like predictable mobility by GPS, web browsing and information modify and so on. Vehicular Ad-hoc Network (VANET) is a novel formulated form of Mobile Ad-hoc Network (MANET), where moving nodes are vehicles same automobiles, cars, buses etc [2].
Read/Write control logic:
The Read/Write Control logic interfaces the 8251A with CPU, determines the functions of the 8251A according to the control word written into its control register.
It monitors the data flow.
This section has three registers and they are control register, status register and data buffer.
The active low signals RD, WR, CS and C/D(Low) are used for read/write operations with these three registers.
When C/D(low) is high, the control register is selected for writing control word or reading status word.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
The VB6 IDE (Integrated Development Environment) is a very simple and fully featured IDE. If you start out programming in VB6 you may end up being too spoiled to ever appreciate a more complicated and less functional IDE like most C++ IDEs. One feature which sets VB6 apart from various IDEs is the simplicity of its approach to GUI (Graphical User Interface) design.
As a general rule: Play with it. You're very unlikely to break anything that matters, so just explore and experiment with the IDE, and you'll learn more.
ppt on blogging and In order to make money blogging you’re going to need to have a blog. While this is pretty obvious it is also a stumbling block for many PreBloggers who come to the idea of blogging with little or no technical background.blogging ppt presentation
Software Engineering is the set of processes and tools to develop software. Software Engineering is the combination of all the tools, techniques, and processes that used in software production. Therefore Software Engineering encompasses all those things that are used in software production like :
Programming Language
Programming Language Design
Software Design Techniques
Tools
Testing
Maintenance
Development etc.
These days object-oriented programming is widely being used. If programming languages will not support object-orientation then it will be very difficult to implement object-oriented design using object-oriented principles. All these efforts made the basis of software engineering.
E-Commerce is defined as the paperless exchange of business information using Electronic Data Interchange (EDI), electronic mail (e-mail), computer bulletin boards, Electronic Funds Transfer (EFT), and other, similar technologies.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
UAN (Underwater Acoustic Network)
1. For more info Https://www.ThesisScientist.com
CHAPTER 1
INTRODUCTION
1.1 Overview
With the advancement in acoustic modem technology that enabled high-rate reliable
communications, current research concentrates on communication between several remote
instruments within a network atmosphere [2]. Research on underwater networking has
become an attractive, interesting and challenging area today because of its support to the
applications i.e. pollution monitoring, oceanographic data collection, disaster prevention,
offshore exploration and assisted navigation [1]. We can describe underwater acoustic
networking as the enabling technique for these applications. Underwater acoustic (UWA)
networks are normally configured by acoustically linking autonomous underwater
vehicles, bottom sensors and a surface station, which offers a connection to an on-shore
control centre [1].
In conventional operation, network nodes utilize the store-forward techniques, and
network transmission performance is constrained by the capacity of some bottleneck
connections. With respect to the Maximum Flow Minimum Cut theory, the transmission
rate between the receivers and transmitters cannot increase the maximum network flow.
So the conventional multipath routing often cannot arrive the upper bound of the
maximum flow. Comes network coding which breaks the conventional way of data
transmission [4]. With network coding, the intermediary nodes no longer just send packets
only. They are permitted to process the packets, and integrate two or many income packets
into one or many output packets for transmission. This builds it possible to utilize less
network bandwidth to forward the same amount of information. At last, the actual packets
can be retrieved in their destinations [3].
Network coding technology is a discovery in network communication area [4]. It has been
broadly studied in current years because of its powerful advantages of enhancing the
throughput of the network, decreasing transmission times, increasing end-to-end
performance and offering a high degree of network flexibility. It can also save bandwidth,
2. For more info Https://www.ThesisScientist.com
balance traffic load and enhance the network security. Routing Protocols and algorithms
depending on network coding are applied to wireless or wired communication. With its
capability of enhancing network performance, it could also be used to ad-hoc networks,
wireless multi-hop networks, wireless sensor networks and particularly underwater sensor
networks.
Fig 1.1:Underwater Sensor Architecture
UAN (Underwater Acoustic Network) is an application of wireless networks which
utilizes acoustic as the data transmission medium in underwater atmosphere [5]. As
compared to terrestrial radio channel, underwater channel has several natural loss factors
i.e. Doppler shift, ocean noise, multipath impact and transmission fading. These unique
UAN features cause high bit rate, long propagation delay, restricted bandwidth and
restricted energy, and build it hard to obtain efficient data transmission [4].
1.2.1 Network Coding Algorithms
Network coding idea is first introduced by R. Ahlswede et al. From the information flow
point of view, they showed that in a multicast network with a single source and many
3. For more info Https://www.ThesisScientist.com
sinks, the maximum network throughput as determined by the max-flow min-cut theory
can be obtained by utilizing a simple network coding; the bandwidth can be saved also [4,
7].
The basic feature of network coding is the optimal processing of different transmission
data. This should be directly reflected by the different design of coding techniques, and
the code structure is the main concern. So the actual research in network coding primarily
concentrates on the coding algorithms, the enhancement of performance brought by a
coding technique and the complexity degree of the coding algorithm. The code structure
algorithm design should ensure the targeted nodes can decode the actual packets after they
obtained a specific amount of coded packets. During this time, the coding complexity
should be decreased. The coding structure algorithms studied so far can be classified into
three categories: algebraic coding, linear coding and random coding [7]. A construction
of linear coding was introduced for its practicability and simplicity. A multicast network is
developed and it is shown that the max-flow bound can be arrived through a linear coding
multicast. Linear coding also involves the polynomial time algorithm. But perhaps the
easiest form is the coding based on the XOR operation i.e., just perform the Exclusive-OR
operation on the bits of two packets. There are several XOR-based protocols i.e. ROCX
(Routing with Opportunistically Coded eXchanges) and COPE. In the introduced
algebraic framework-based coding mechanism a polynomial algorithm was utilized to
solve network issues and an algebraic tool was offered to the network coding research. A
randomized network coding for numerous source multicast networks was proposed in
where the success possibility [6, 7].
1.2.2 Topologies
The network topology is a necessary issue we require to assume when studying network
coding. One would observe that a regular configuration often provides network coding.
We shall classify and summarize below some general topologies utilized in the network
coding research [12].
1) Linear Topology
In the linear topology, each node has one upstream node and one downstream node to
transmit or obtain data. A routing technique depending on network coding has been
4. For more info Https://www.ThesisScientist.com
introduced for 6 nodes. Another study only utilizes three node but with a queuing model in
the middle for comparison of the NC model and non-NC model. A simple three node
wireless linear topology can also be transformed to a butterfly configuration. In the
introduced PCMRDT (Practical Coding based Multi-hop Reliable Data Transfer) protocol,
simulations of a multi-hop linear topology were carried out to measure performance of
delay and the no. of packets transferred per data packet [18].
2) X topology
In this topology, there are 5 nodes occupying the centre and ends of the letter X. Studies
have indicated that network coding can enhance the coding gain in the X topology. A
double decoding mechanism was introduced to enhance the network throughput in both
the slightly lousy and loss-free networks [18].
3) Butterfly Topology
The butterfly topology may be the most widely utilized topology in the network coding
research. The network coding idea was first introduced utilizing the multicast butterfly
topology. The same model was also employed to propose random network coding and
linear network coding. A queuing analysis of the butterfly network was carried out, and
the NC performance was compared with classic routing. A theoretical coding model was
studied for coding-aware-based routing on the butterfly network. The performance of end-
to-end delay of butterfly topology was inquired, and it was concluded that network coding
can have a big effect on delay performance. Another research utilized network coding to a
altered underwater network and experiment with practical underwater device [18].
4) Diamond Topology
The diamond topology is often utilized to emphasize the high error recovery features of
random network coding. The advantage of effective error recovery rate was depicted in
and the coding technique was applied to underwater networks employing VBF (Vector
Based Forwarding) routing. The diamond topology was also utilized and enforced in a real
UASN (Underwater Acoustic Sensor Network) model [2]
5) Random Topology
Additionally, the regular topologies, some researchers have used network coding to
random topologies. A algorithms suite for network CLONE (Coding with LOss
awareNEss) operation was introduced by proposing enough redundancy in local network
5. For more info Https://www.ThesisScientist.com
coding operations. Simulation is the primary tool for performance measurement. One
research measured the throughput performance of single-path routing and coding-aware
multipath routing depending on a 15-node random wireless configuration. Others also
examined the effect of network coding on the MAC (Medium Access Control) protocol
depending on the CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
scheme and carried out simulations on a configuration with 50 randomly-distributed
nodes[17.]
1.2.3 Routing Protocols with Network Coding
Coding-based routing protocols are practical implementation of network coding.
Researchers have noted that the integration of localized NC and route selection would
further enhance the wireless networks performance. Much research has-been performed to
integrate routing and coding in both practical analysis and theoretical system design.
There are two general classes: coding-aware routing and coding-based routing. The
difference between themes whether the coded packets come from the same information
flow.
1.2.3.1Coding-Based Routing Protocols (Intra-Flow Coding)
Coding-based routing is also called intra-flow network coding where routers can only
code packets from the same flow. In the coding-based protocol with MORE (MAC-
independent Opportunistic Routing & Encoding) the source divides the file into batches of
K packets. Before sending, the source combines the K packets into a linear combination
randomly and floods the coded packets. MORE is also been checked in a 20-node wireless
network, and compared with the conventional best path routing known as ExOR, which is
an Opportunistic Multi-Hop Routing for Wireless Networks. The result indicates that
MORE can dramatically enhance the network throughput.
One MORE issue is that a sending node does not know how much coded packets they
should send. So a destination may obtain several redundancy packets which do not consist
any new information and has to loss all of them. The useless packets are a waste of the
transmission bandwidth. For solving this issue, a novel NC-based protocol CCACK
(Cumulative Coded Acknowledgment) was introduced. This novel NC-based protocol
enables nodes to acknowledge the obtained coded packets of their upstream nodes. This
6. For more info Https://www.ThesisScientist.com
would void the unessential transmission accordingly for saving the bandwidth.
Performance measurements results indicate that CCACK importantly enhances throughput
as compared to MORE. Finally, the OMNC (Optimized Multipath Network Coding)
exploits rate control technique to assign the optimal encoding and broadcast rate to all
nodes, and accordingly to control the network congestion.
1.2.3.2 Coding-Aware Routing Protocols (Inter-Flow Coding)
Inter-flow coding enables the intermediary nodes to code packets from several flows.
COPE is the first protocol to utilize network coding in wireless mesh networks. The
protocol has used the network coding theory on a practical uni-cast network. Acceding
layer is embedded between the MAC layer and the IP layer. Every node can overhear its
neighboring packets, record any packets it obtained for a specified period and flood
packets reception report it has to its neighbors. The router will XOR many packets
together and transfers the coded packets in a single transmission. Performance
measurement of COPE on a 20–node wireless network indicates that network throughput
is improved a lot. Although COPE can determine coding opportunities on the chosen
routing path, many other powerful coding opportunities are usually ignored. This is
because the routing and coding in COPE are not dependent. It looks for coding
opportunities passively however it cannot change the route selection. To obtain a further
gain, a routing protocol ROCX (Routing with Opportunistically Coded eXchanges) was
introduced. A metric known as the ECX (Expected Coding Transmission)is utilized to
catch the expected no. of coded transmissions required for a successful interchange of
packets between two nodes through an intermediary node. ROCX analyses the network
coding opportunities with a linear optimization algorithm. The evaluation results indicated
that ROCX can further decrease the no. of transmissions in COPE. Since this protocol
needs every intermediary node to have a very high calculation capacity. Integrating
network coding with routing selection within the network can generate more coding
opportunities initiatively. Examples are the Rate RCR (Adaptive Coding Aware Routing)
and CAMR(Coding Aware Multipath Routing).
1.2.3.3 Network Coding in MAC and TCP
7. For more info Https://www.ThesisScientist.com
In addition to integrating network coding with routing protocols, some researchers also
begin to implement network coding in other protocol layers i.e. the TCP (Transmission
Control Protocol) layer and the MAC layer. BEND is a practical MAC layer coding
technique in multi-hop networks which is also the first exploration of the broadcast
behavior of wireless channels In protocols i.e. COPE, network coding can only be done at
joint nodes within the routing path. BEND permits all neighbors of a node to overhear the
packet transmission and send the packets by only one of these neighbors. dSeveral
topologies ddwere utilized to measure BEND and to compare IEEE 802.11 with COPE.
The results indicate that BEND can obtain a higher throughput and coding ratio. For
making network coding compatible with the sliding window and retransmission schemes
of TCP, a new mechanism is introduced to incorporate network coding into TCP layer In
their mechanism, the source transfer a random but linear combinations of packets in the
sliding window. Instead of forwarding an ACK for every packet decoded successfully, the
sink will forward an ACK to show the no. of coded packets already obtained. An adaptive
W mechanism was introduced to adaptively control the packets waiting time recorded in a
buffer. By utilizing this technique, a tradeoff between TCP throughput and packet over
head has been obtained.
1.2.4 Underwater Networks
Underwater sensor networks are different from terrestrial networks in various different
aspects. One of the differences is the communication media. Unlike the terrestrial
networks utilizing electromagnetic waves to interact, underwater networks often utilize
acoustic wave Currently, the applications and researches on underwater network coding
are still at their stage of growth however the network coding technology is not as
developed as air wireless communications [22]. We only discovered a handful of
concerned papers. Network coding technique depending on VBF (Vector Based
Forwarding) routing for USN has been introduced. Simulations indicated that multipath
forwarding with network coding mechanism is more effective for error recovery as
compared to single-path and even multiple-path forwarding without the use of network
coding. Several routing techniques with network coding have been compared for
providing an underwater acoustic channel model. The numerical results indicate that
8. For more info Https://www.ThesisScientist.com
network coding technique has a better performance of transmission delay in the situation
of high traffic loads. A novel mechanism of network coding utilizing implicit
acknowledgement is also introduced to reduce nodes power consumptions. Network
coding has also been used to a 2-D “cluster string topology”. The results indicate that
network coding has the benefits in good energy consumption and high error recovery. A
guideline and parameter setting in network coding is also offered. As an extension of the
work of, the network coding algorithm is employed to a real underwater sensor network
utilizing both software and hardware. The results showed that network coding enhanced
the packet delivery ratio and throughput in underwater sensor network. Network coding
was also carried out in a practical underwater device in shallow water with low data rates
(inter-transmission time of 2s to 20s). The performances of an altered underwater butterfly
network are measured. The experiment results are offered and examined.
Additionally, the stationary two-dimensional underwater networks three-dimensional
networks with acoustic wireless nodes are continuously utilized to determine ocean
phenomena which the two dimensional network may not be capable to realize in an
adequate way. In three-dimensional underwater networks, sensor nodes float at different
depth levels for observing a provided phenomenon. Furthermore, the underwater channel
is rather different from the terrestrial channel. A review was carried out on the available
network technology and its suitability to underwater acoustic channels [21].
An integration of interference avoidance and network coding technique in underwater
atmosphere was investigated. Performances have been measured and compared with
CDMA/CA scheme. The results indicate NC is more efficient and consumed less energy.
In the work surveyed above, often only one or two network performances aspects are
studied. There was no comprehensive measurement of network coding and the discussion
of their tradeoff.
1.2.5 Benefits of Network Coding
We can briefly explain below some of the generally claimed advantages of network
coding in the papers we survey. Appendix A also surveys some papers that have offered
arguments/proofs/examples to these different claims [18].
1) Achieving maximum flow:
9. For more info Https://www.ThesisScientist.com
It is aware that the theoretically maximum flow of an interaction network often cannot be
obtained because of the availability of bottleneck connections in the network. With
network coding, the traffic flow going through the bottleneck connection can be increased
without having to increase the bandwidth (data flow rate) of the physical connection.
Thus, the maximum flow of the network can be obtained [12].
2) Improving throughput: The significance of this advantage is basis to network coding.
Utilizing network coding, packets can be coded in one packet for transmission and the
throughput is enhanced consequently. Observe that throughput is not only enhanced as a
consequence of (1); it can also be incremented in other scenario because of network
coding. For instance, the actual packets can be recovered even a small no. of packets are
missing. Another instance in SectionA2 (in Appendix A) is also offered to show how
enhanced throughput can be obtained.
3) Balancing traffic flow and saving bandwidth: Multicasting with network coding can
sufficiently use the connection paths in a communication network, hence obtaining an
even traffic network distribution and balancing the traffic load.
4) Improving reliability Higher reliability is the most obliging advantage of network
coding particularly in mobile and/or lousy networks. Utilizing network coding, many
original packets that are linearly independent of each other can be coded together to make
a group of new coded packets. The recipient is capable to decode the real packets so long
as an enough no. of encoded packets are achieved. The loss of a small no. of packets does
not need retransmissions. The results indicate the network coding technique can decrease
the times of packet retransmission in comparison of other mechanism.
5) Enhancing security. Another network performance would be enhanced by network
coding security. The coding feature improves the complications of cracking information
from the network. However a node can decode the packets only if it obtained a sufficient
no. of coded packets, an eavesdropper is not capable to receive the helpful information
even through it can overhear one or many coded packets. A wiretap model utilizing linear
network coding was introduced where wire tappers cannot obtain the transferred
information even if they are permitted to access the transmission channels.
1.3 Motivation and Objectives
10. For more info Https://www.ThesisScientist.com
However Allseed et al. introduced the network coding concept in year 2000, it has been
studied by several researchers in various aspects. From our literature review, we observed
that the network coding performance can change with different network configurations.
Selecting an appropriate topology and suitable coding nodes can build a better usage of
network coding. Furthermore, most of the papers only measure only one or two network
performance aspects. It would be required to have a comprehensive measurement of the
networks on each mainly promised advantages of network coding, and to view if these
advantages can be all obtained in the same configuration and situations. If not, what
tradeoffs are in the network coding implementation to communication networks.
Our literature survey also indicate that the general design objectives of underwater
networks are increasing throughput among nodes, educing energy consumption, saving
bandwidth and enhancing network reliability. However these seem to be the benefits of
network coding also, we would like to apply network to underwater networks to look if
the underwater networks performance can be enhanced [17].
The ocean is a volatile and complex atmosphere where the signal can attenuate because of
diffusion loss and energy absorption during its transmission. Thus, the channel model is
quite different from terrestrial channel models. We would like to set up an underwater
channel model in RIVERBED Simulator for our simulation and future usage. As a basic
goal of this thesis in view of the above discussion, we would like to verify the promised
advantages of network coding. Particularly, we would like
1) To have a more comprehensive and systematic evaluation of network coding on some
selected configurations.
2) To compare data network communication without and with network coding in terms of
their performances and study the trade offs in these performances [18].
3) To measure the performance of a wireless underwater acoustic network utilizing
network coding to view if the same advantages can be obtained.
1.4 Methodologies and Approaches
For achieving our goals, we require to first understand the operation descriptions of
network coding so that we can integrate them into our network queuing model and
measure the performance appropriately. Through the literature survey, we hope to get the
11. For more info Https://www.ThesisScientist.com
knowledge and operation descriptions related to different regions involving the routing
protocols with network coding, the coding algorithms, and the network coding application
to multi-hop network, wireless sensor network and underwater acoustic networks.
At first, we shall utilize static configurations in our network coding study because we can
select by inspection which intermediary nodes in the network should perform the coding
operation. We shall assume some regular configurations in this thesis and realize their
network performances [18].
However there can be several possible configurations, we would be selective to take a few
famous ones in the literature. We initiate with the butterfly configuration and the multi-
relay topology which are small networks of continuous configurations, We have not
selected the single node nor the three-node linear network utilized by several researchers
because they are a subset of the two selected candidates that have more characteristics for
us to study and to compare with networks without coding for understanding the tradeoffs.
We shall study the queuing nature of a coding node and the network performance i.e. end
to end delay and network throughout. Then we select some big regular configurations for
seeing and understanding how network performance would change when utilizing
different configurations and/or bigger networks [12].
The big and small networks we shall study all have two-dimensional configurations that
can detect applications in land-based networks. We shall also explore our study to a three-
dimensional network by studying an USN. Here, we have the issue to understand first the
underwater physical atmosphere for acoustic propagation and thus the effect to data
communication. This would also permit us to detect the suitable channel model which we
shall integrate into our underwater topology for the study and network coding analysis.
However a queuing analysis includes much time in mathematics for the time limit of this
study, we have resorted to simulation. Of all the simulation languages existed in the
research world, I have selected RIVERBED (Optimized Network Engineering Tools)
[OPNE14] to be our simulation simulator because that its hierarchical modeling technique
builds it simple to utilize and our research group already has a lot of expertness about
exploiting RIVERBED.
RIVERBED has a sophisticated workstation-based atmosphere for the modeling and
simulation of communication systems, networks and protocols for verifying the described
12. For more info Https://www.ThesisScientist.com
operations of some protocol and to examine their performance. On the other side, it is
comparatively easy to utilize once its design ideas are understood. RIVERBED contains
four major components: Project Editor, Node Editor, Process Editor and Packet Editor
[OPNE14]. Project Editor is utilized to make the network topology and offer the basic
analysis abilities and simulation. With the Node Editor, we can make a node with several
objects and describe several interfaces. The Process Editor contains various states linked
with transition situations; the process behavior is mentioned utilizing C/C++ language.
The Packet Editor is utilized to describe the packet internal structure which can have
various different formats and fields. The debugging tool is another very helpful
characteristic of RIVERBED we shall utilize to do debugging of our simulation codes as
well as setting up and verifying the underwater channel specified above.
1.5 Contributions
The important contributions of this thesis are:
1. The queuing performance measurement of coding nodes.
2. The network performance measurement of a multi relay network, a small butterfly
network and a bigger network when utilizing network coding, as well as the tradeoffs in
performance depending on these studies.
3. The network coding application to an underwater acoustic network and its performance
measurement and enhancement.
4. The RIVERBED modeling of an underwater channel depending on available
mathematical models so that the network performances of an underwater network can be
measured and enhanced.
1.6 Layout of Thesis
In this section describes brief insights on the dissertation work by showing the
organization of the other Chapters. There are six chapters presented in this dissertation
report that are describes as follows:
Chapter 1:.This chapter describes a detail overview of basic concepts behind the
emerging area of Underwater Acoustic Sensor Network , overview, network coding
13. For more info Https://www.ThesisScientist.com
algorithm, Topologies, Benefits of network coding, problem statement and methodology,
contributions.
Chapter 2: This chapter describes a detail explanation of various works conducted on
different protocols and simulators. It also describes the state of the art.
Chapter 3: This chapter describes a detailed background study, challenges ,assumptions.
Chapter 4: This chapter describes the operation details coding of operation at a node and
along the network data path. Then we implement them in the RIVERBED process models
and node models that are utilized in our simulations in the paper. Any general
consideration utilized in our performance analysis and evaluation are offered at the end.
Chapter 5: The chapter describes the network coding may improve the network
throughput, decrease end-to-end delay and enhance the reliability of the network. In this
chapter, we shall investigate these benefits of network coding in small networks as well as
big networks. We shall also compare the scenarios with and without network coding.
Before we do that, we shall first provide information on our simulation and performance
evaluations.
Chapter 6: This chapter describes the conclusion and future work of this dissertation
study.
CHAPTER 2
LITERATURE REVIEW
2.1Literature Review
Wireless acoustic sensor networks are helpful in a variety of applications i.e. tracking,
localization and home applications i.e. baby alarm systems. In these applications, the
networks are needed to position acoustic sources utilizing acoustic sensor arrays and this
has been employed in several security and environmental applications. In this paper [1]
,
various basic key aspects of underwater acoustic communications are inquired. Different
architectures for two-dimensional and three-dimensional USNs are talked about, and the
features of the underwater channel are described. The main issues for the development of
effective networking solutions posed by the underwater atmosphere are described and a
14. For more info Https://www.ThesisScientist.com
cross-layer technique to the combination of all communication functionalities is proposed.
Moreover, open research challenges are talked about and possible solution techniques are
outlined. Network coding is a method where, rather than simply relaying the packets of
information they achieve, the network nodes will take many packets and integrate them
together for transmission. This can be utilized to achieve the maximum possible
information flow in a network. Network coding is a area of coding theory and information
theory. Network coding can enhance robustness, throughput, security and complexity [2]
.
In [3]
this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for
UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum
transmit power and code length to decrease the near-far impact. UW-MAC objective is to
obtain three goals i.e. low channel access delay, high network throughput and low energy
consumption. It is shown that UW-MAC maintains to simultaneously obtain limited
channel access delay, high network throughput and low energy consumption in deep water
communications, which are not critically influenced by multipath. Fatma Bouabdallah and
Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC)
protocol which offers high bandwidth and low energy consumption. By restricting
Subcarrier Spacing Df and Guard Interval g T they have indicated that the low energy
consumption can be obtained. Subcarrier Spacing should be selected so that the sub-
carriers are orthogonal to each other, meaning that cross-talk among the sub-carriers is
removed or in other words Inter-Carrier interference (ICI) is neglected. Guard Interval is
inserted to neglect inter symbol disruption. A large no. of closely spaced orthogonal sub-
carrier signals to carry data. The data is classified into many parallel data channels or
streams, one for each subcarrier [4]
.
The writers introduced a new multi-path routing algorithm, which considering the energy
and distance into account to determine the path of transmission. The algorithm balances
the network energy consumption, increases the network’s lifetime and enhances energy
efficiency. HMRLEACH algorithm put the energy on the first priority when selects the
path of transmission. HMR-LEACH algorithm would decrease the single path to energy
depletion process, increasing the network lifetime Period. Sink broadcast control package
first in a frequency to find the adjacent clusters, which refer to cluster that directly
transmit converged data to Sink. Then the adjacent clusters flood its own colour coded
15. For more info Https://www.ThesisScientist.com
information to non-adjacent cluster in the same frequency and proceed to flood until the
broadcast coverage of the whole network. If a cluster has obtained only one color-coded, it
indicates that the cluster has only one path leading to BS. If obtain multiple color-coded,
showing that the cluster can be multi-paths to transmit data to sink nodes [5]
. Depending on
energy consumption analysis for LEACH in underwater channel, the writers introduced a
new mechanism for cluster-head selection to assure nodes energy load balance by
assuming the distance to SINK and residual energy of candidate nodes. A cluster based
network can be divided into disjoint clusters. Every cluster contains one cluster head and
several member nodes. Every cluster head gathers data from its member nodes and relays
the processed data. Depending on the analysis of energy of LEACH protocol in
underwater channel, a clustering mechanism for choosing and putting sensor nodes into
operation in every round is also introduced by utilizing a time metric, according which the
nodes throughout the network broadcast ADV, to assure the node with more energy to
become cluster head. Then it neglects selecting nodes with lower residual energy and bad
position as cluster-heads and then offers the energy load’s proportionality of sensor node
[6]
. In [7]
, they introduce a new energy effective MAC protocol known as NOGO-MAC
(Node Grouped OFDMA MAC) which depend on orthogonal frequency division multiple
accesses (OFDMA) and exploit the physical feature that propagation loss of acoustic wave
based on the distance more heavily at high frequency as compared to at low frequency. In
the introduced scheme, sensor nodes are collected according to the distance to sink node.
Then, every group utilizes a different frequency band in such a manner that sensor nodes
which are nearer to the sink node utilize higher frequency band and farther ones utilize
lower frequency band. The introduced technique not only enables all sensor nodes to
manage the signal-to-noise ratio above a specific needed level, but also decreases entire
transmission power consumption. Additionally, an adaptive sub channel allocation is used
for improving data transmission rate. In a WSN the sensor nodes are partitioned into many
clusters according to the sink position. At first, a sensor node in the cluster is elected in a
random way as the cluster head. Periodically, the sensor nodes in the same cluster will
forward its data to the head. The head combines the gathered data and then, forward these
data directly to the sink node. The process that sensor nodes forward the data to the head,
the head combined the gathered data and then, forward these data directly to the sink node
16. For more info Https://www.ThesisScientist.com
is termed as a round. After a round, every cluster will choose a new head. Maximal-energy
mechanism chooses a head which consists the maximal energy of this cluster [8]
. In [9]
the
writers investigate the CHs selection in a distributed atmosphere i.e. MANET. They
obtain new results on the algorithmic complexity of two variants of the CH selection: size-
constrained clustering and distance-constrained clustering. The first variant such as
distance constrained chooses a group of CHs such that each network node is either a CH
or is positioned within distance h hops away from the closest CH. The second variant such
as size-constrained limits the maximum size of every cluster to members. A third variant,
integrating the distance and size constraints, is also shown. The distance-constrained CH
selection can determine a smaller CH set in comparison of the size-and-distance-
constrained selection. In this paper, a new, token-based medium access control (TMAC)
solution for underwater acoustic broadcast is proposed. TMAC offers a solution to the
synchronization issue, assuring efficient communication. TDMA protocols partition a time
interval called a frame into time slots. Every time slot is allocated to a communication
source. TDMA protocols in underwater acoustic networks need strict synchronization.
This TMAC solution neglects the requirement for synchronization and thus underwrites
successful communication [10]
. Borja Peleato and Milica Stojanovic introduced Distance-
Aware Collision Avoidance Protocol (DACAP) a non-synchronized protocol that permits
a node to utilize different hand-shake lengths for different recipients so as to decrease the
average handshake duration. This is obtained by taking benefit of both the greater
obtained power over short connections, and the computed distance between the nodes.
DACAP is a collision avoidance protocol that is simply scalable to the changing no. of
nodes and the network coverage region, and can be analyzed for a specific network with
very few restraints on the nodes. And it offers higher throughput in comparison of Slotted
FAMA with similar power efficiency [11]
. In [12]
this paper, deployment methods of USN
and gateway nodes for two-dimensional communication architecture in Underwater
Acoustic Wireless Sensor Networks (UWSNs) are introduced. In the sensor deployment
mechanism, underwater sensor nodes are deployed in two rows along the coastline, which
is of localization available, complete coverage and connectivity and scalable. In the
gateway deployment mechanism, the gateway deployment is simulated as an optimization
issue, by finding the underwater gateway nodes locations needed to achieve a provided
17. For more info Https://www.ThesisScientist.com
design goal, which can be minimal required delay and minimal required energy
consumption. The writers measure the performance of the mechanism by extensive
simulations utilizing the OPNET network simulator. The connectivity and coverage are
significant standards of the sensor deployment techniques in underwater acoustic wireless
sensor networks (UWSNs). In [13]
this paper, the writers mainly research on the
deployment of underwater sensors in UWSNs. The benefits and drawbacks of some
available algorithms are examined and an enhanced algorithm is offered, which can obtain
the complete connectivity and coverage. Moreover, integrating with the localization
problem, they deliberate a novel deployment programmed, which is of complete
connectivity and coverage, localization available and scalable. The writers evaluate the
performance of the programmed by extensive simulations utilizing the OPNET network
modeller. Unlike that of terrestrial sensor networks, the physical layer design of
Underwater Acoustic Sensor Networks (UW-ASNs) faces far more issues due to the
restricted band-width, refractive properties of the medium, extended multipath, severe
fading and large Doppler shifts. This paper considers a tutorial overview of the physical
features of acoustic propagation, modulation techniques and power efficiency that are
related to the physical layer design for UWASNs, and examines the design consideration
on every aspect. In the end, it presents various open research problems, targeting to
encourage research attempts to lay down fundamental basis for the growth of new
advanced underwater networking schemes in the near future [14]
. LEACH protocol was
introduced in [15]
. This is one of the clustering routing protocols in WSNs. The benefit of
LEACH is that every node has the equal possibility to be a cluster head, which builds the
energy dissipation of every node be comparatively balanced. In LEACH protocol, time is
partitioned into several rounds, in every round, all the nodes contend to be cluster head
according to a pre-specified criterion. In [16]
this paper they introduce the new cluster head
selection protocol i.e. HEECH. This protocol chooses a best sensor node in terms of
distance and energy as a cluster head. The introduced protocol assumes the distance
among cluster heads and BS in multi hop and thus can solve the unbalancing energy
consumption issue. As compared to the LEACH, cluster heads in HEECH can utilize
cluster heads of high level for data transmission. Hence energy consumption is balanced
between the cluster heads and thus the network lifetime is increased. In HEECH, every
18. For more info Https://www.ThesisScientist.com
cluster heads directly forwards a beacon message to the BS to announce itself left energy
when the energy level is going to be changed. Then BS is immediately broadcasts the
obtained beacon message to the cluster heads positioned at the lower level of the cluster
head that its energy has changed to declare its energy amount. Simulation Results indicate
that the HEECH increases the lifetime of network about 9% and 56% in comparison of the
HEED and LEACH respectively. A major concentration on the Acoustic Telemetry Group
at Woods Hole Oceanographic Institution (WHOI) has been the development of
underwater acoustic communication networks. Same as a cellular telephone network, an
acoustic network contains a no. of modems or nodes which adaptively transmit digital data
packets between scientific sensors and a viewing point or data collection. An important
milestone in the growth of such a network has been the latest establishment of a
multichannel adaptive recipient for coherent underwater communications. In paper [17]
,
conventionally, FEC (Forward Error Correction) and ARQ (Automatic Repeat Request)
techniques have been employed to tackle channel errors. In ARQ-based techniques, a
sender resends a packet if it obtains some feedback from either the destination node or
next-hop that the packet has been dropped, or if it observes a timeout. In the underwater
acoustic channel, an ARQ-based technique may induce long waiting time before a
dropped packet can be retransferred, hence exacerbating the long delays already caused by
the slow propagation speed. On the other side, FEC-based techniques add additional
redundancy to the packet before transmission. With limited bandwidth and energy
restraints, as well as a highly dynamic channel, the right amount of redundancy may be
hard to determine. In current years, network coding has become a very active research
field. With network coding, an intermediary node may integrate packets that it has prior
obtained; this yields to higher robustness against packet drops, however the destination
node would still be capable to extract the actual packets when it achieves an enough no. of
packets that meets specific properties. It has been indicated to be a promising scheme that
could powerfully help networks obtain high packet delivery ratio (PDR) as well as lower
packet delays and energy efficiency linear network coding encoded packet is a linear
integration of the actual packets, and all computations are done over a finite field for any
provided set of actual packets. Acoustic waves are specifically pleased to underwater
water wireless communication because of the comparatively low absorption in underwater
19. For more info Https://www.ThesisScientist.com
atmospheres. The pathless, multipath and noise effects of the underwater terrain on
acoustic waves are explained in [20]
with comparison to optical and electromagnetic
waves. They introduce engineering counter measures in the form of physical layer
schemes i.e. Direct Sequence Spread Spectrum and multicarrier modulation i.e. orthogonal
frequency division multiplexing (OFDM) to mitigate the impact of channel non-idealities
i.e. multipath. Acoustic signals were also represented to provide lowest data rate, medium
antenna complexity and longest transmission range. Since, the impact of propagation
delay, particularly arising from this long transmission coverage, on the selection of
modulation is not treated. A network performance evaluation related to choice of medium
access control techniques (MAC) and different configurations is defined in [6]
. Chen and
Varshney [5]
, as well as Yigitel et al [31]
also provide some depth of insight into the
literature review in Quality of Service (QoS) support for wireless sensor networks
(WSNs). These works and other reviews [2,5,9,23]
without knowledge share a common theme
on the reliability of design and wireless sensor networks implementation. While this has
explored the application to various different fields, it has also generated divergent views,
resulting in deficiency of standardization and diverse application-specific needs. As
specified in [28]
, this has stripped WSNs from having a single de-facto standard MAC
protocol. While, these techniques have obtained remarkable levels of efficiency, when the
packets gain access to the medium, non-idealities of the channel take their toll on the
transferred packets and medium access control techniques can no longer ensure the
packets conditions when they reach at the sink; regardless of the QoS measures
implemented. The aforesaid references do not take cognizance of the available of these
non-idealities in the results shown hence building such results rather optimistic. According
to [14]
, incorporating non-ideal situations i.e. path loss and multipath fading into the
simulation exerts a non-negligible effect on the wireless local area networks performance.
However, the wireless acoustic signal utilized in WASNs is also subject to same intrinsic
channel impacts, this sets the stage for a similar investigation into the effect on WASN
performance The starting point for such investigation starts with a observation that the
information transmission over a channel is achieved by mapping the digital information to
a sequence of symbols which vary some features of an electromagnetic wave known as the
carrier. This procedure is known as modulation, and is responsible for message signal
20. For more info Https://www.ThesisScientist.com
transmission through the communication channel with the best possible quality [23]
. Thus
the choice of a modulation technique that is robust to channel impairments is always an
interesting concern for communication systems, and more so when the channel is a
wireless medium. The study in [24]
concentrated on traditional narrowband modulation
mechanisms i.e. quadrature amplitude modulation (QAM) and differential phase shift
keying (DPSK) and the results indicate that these techniques cannot be depend on to
mitigate network performance reduction in the existence of non-ideal channel situations.
Since, it is well established in literature [32,33]
that translating the narrowband signal to a
wideband signals before transmission decreases the impact of channel non-idealities i.e.
multipath. The traditional scheme for narrowband to wideband signal conversion is the
usage of pseudo-noise (PN) sequences and is further explained in chapter two. Worthy of
note however, is that most available research works [10,14]
acknowledge that traditional
broadband modulation techniques, otherwise known as spread spectrum mechanisms
provide excellent performance in mitigating the impact of non-ideal channel conditions,
and especially excel in importantly decreasing the impact of multipath. In [15]
, Kennedy et
al. propose the application of an alternative spread spectrum scheme to WLANs. This
optional technique is derived from the evolving field of chaos communication where the
information to be transferred is mapped to chaotic signals (rather than PN sequences)
which are robust to multipath and reputed to be inherently wideband [1,28]
. It was shown,
through noise performance comparison (AWGN), that the performance of chaos
modulation techniques is worse than those of the traditional broadband techniques with
their performance restrictions stemming from their chaotic features [18,25]
. Citing the
availability of other non-ideal application scenarios i.e. industrial application, where the
channel impairments go beyond the ideal scope of AWGN, Kennedy et al. introduce the
application of a chaos modulation technique to WLANs. They provide support to the
proposal by highlighting many benefits provided by chaos modulation techniques i.e.
demodulation without carrier synchronization as well as simple circuitry. These were also
specified to be downsides for traditional spread spectrum mechanisms. This makes a good
platform for the new work performed by Leung et.al in [22]
and the comparison in [25]
.
These works, since, concentrates on the physical layer and network performance
comparisons are not involved in the results.
21. For more info Https://www.ThesisScientist.com
CHAPTER 3
BACKGROUND STUDY
3.1 Underwater Acoustic Sensor Networks Communication Architecture
In this section, we describe the communication architecture of underwater acoustic sensor
networks. The reference architectures described in this section are used as a basis for
discussion of the challenges associated with underwater acoustic
Fig. 3.1 Architecture for 2D Underwater Sensor Networks
sensor networks [21]. The underwater sensor network topology is an open research issue
in itself that needs further analytical and simulative investigation from the research
community. In the remainder of this section, we discuss the following architectures:
Static two-dimensional UW-ASNs for ocean bottom monitoring. These are constituted
by sensor nodes that are anchored to the bottom of the ocean. Typical applications may be
environmental monitoring, or monitoring of underwater plates in tectonics [4].
Static three-dimensional UW-ASNs for ocean column monitoring. These include
networks of sensors whose depth can be controlled by means of techniques discussed in
22. For more info Https://www.ThesisScientist.com
Section II-B, and may be used for surveillance applications or monitoring of ocean
phenomena (ocean biogeochemical processes, water streams, pollution, etc).
A. Two-dimensional Underwater Sensor Networks
Reference architecture for two-dimensional underwater networks is shown in Fig. 2.1. A
group of sensor nodes are anchored to the bottom of the ocean with deep ocean anchors.
By means of wireless acoustic links, underwater sensor nodes are interconnected to one or
more underwater sinks (uw-sinks), which are network devices in charge of relaying data
from the ocean bottom network to a surface station. To achieve this objective, uw-sinks
are equipped with two acoustic transceivers, namely a vertical and a horizontal transceiver
[20]. The horizontal transceiver is used by the uw-sink to communicate with the sensor
nodes in order to: i) send commands and configuration data to the sensors (uw-sink to
sensors); ii) collect monitored data (sensors to uw-sink). The vertical link is used by the
uw links to relay data to a surface station. Vertical transceivers must be long range
transceivers for deep water applications as the ocean can be as deep as 10 km. The surface
station is equipped with an acoustic transceiver that is able to handle multiple parallel
communications with the deployed uw-sinks. It is also endowed with a long range RF
and/or satellite
Fig. 3.2 Architecture for 3D Underwater Sensor Networks
23. For more info Https://www.ThesisScientist.com
Design Criteria
The development of practical underwater networks is a difficult task that requires a broad
range of skills. Not only must the physical layer provide reliable links in all environmental
conditions, but there are a host of protocols that are required to support the network
discovery and maintenance as well as interoperability, message formation, and system
security [28]. As electromagnetic waves do not propagate well underwater, acoustics plays
a key role in underwater communication. Due to significant differences in the
characteristics of electromagnetic and acoustic channels, the design of feasible underwater
networks needs to take into account a wide variety of different constraints. The long
delays, frequency-dependence and extreme limitations in achievable bandwidth and link
range of acoustics should be of primary concern at an early design stage in addition to
power and throughput efficiency, and system reliability. These factors make underwater
networking a challenging and rewarding endeavour. In this chapter, some significant
aspects to be considered when designing an underwater communication system are
analyzed. For example, the description of the environment where the network is supposed
to be deployed, technical criteria and general assumptions [18].
3.2 Challenges
The design of underwater networks involves many topics covering physical and
networking capabilities. As acoustic channels are commonly used for underwater
communications, the main focuses in this project are the state of- the-art analysis of
commercial acoustic modems and suppliers as well as the design and possible
implementation of Medium Access with Interference Cancellation and Network Coding
(main part). While some Medium Access schemes have been successful in traditional
radio communications, they are prone to severe limitations in efficiency and scalability
when employed in the underwater environment posing many challenges to networking
protocol design. For example, in Medium Access Control (MAC) schemes which operate
entirely in the time domain (for instance, TDMA and CSMA), these disadvantages are
primarily because of the very large propagation delays [31]. Therefore, new strategies are
24. For more info Https://www.ThesisScientist.com
needed in order to account the specific features of underwater propagation. Some design
challenges for reliable data transport in UWSNs [32] could be as follows:
1. End-to-End approach does not work well due to the high channel error probability and
the low propagation speed of acoustic signals
2. Half-Duplex acoustic channels limit the choice of complex ARQ protocols
3. Too many feedback from receivers are not desirable in terms of energy consumption
4. Very large bulk data transmission is not suitable in mobile UWSNs because of the
limited communication time between any pair of sender and receiver, the low bandwidth
and the long propagation delay
3.3 Assumptions
The main goal of this project is to investigate how Medium Access with Interference
Cancellation and Network Coding perform regarding data dissemination as compared with
employed MAC techniques underwater. In this sense, some tests are conducted in order to
evaluate the performance. Consequently, general assumptions should be stated to
understand how the tests are carried out. In this project, an underwater network is simply
defined as a set of nodes which communicate using acoustics waves. The nodes are fixed
and the distance among them is considered in the long range; a typical range between
transmitter and receiver could be 1 km. Despite being a stationary network, mobile
scenarios where nodes can passively float with water currents are also taken into account
for explanations. The coverage range of a node is one hop. This means that the level of
signal which is received by next hop node is very high, otherwise, is very low. Typical
values used in mobile communications systems are 90% and 10%, respectively. So, it is
assumed that the signal from a source node will not be received by nodes whose range is
higher than one hop. Likewise, regarding the sound propagation speed, its nominal value
1500 m/s is used for calculations. Another relevant aspect which should be assumed in the
performance evaluation of Medium Access schemes is the packet length. Hence, the
packet size is set basing on two approaches. First, the transmission capacity of nodes is
considered without data redundancy. Second, the packet transmission time is equals to the
propagation delay depending on the distance between sender and receiver [30].
25. For more info Https://www.ThesisScientist.com
On the other hand, it should be mentioned that the node with greater impact on the
network is supposed to implement Interference Cancellation and Network Coding whereas
the other nodes are in charge of data packet retransmission using Interference
Cancellation. Besides, a two-way communication (upstream and downstream flows),
unlimited storage capacity of terminals and kjno packet erasures are assumed to conduct
the experiments. Finally, the dissemination process is completed when the target nodes
have received all the requested packets [31].
3.4 Target Scenario
The tests have been conducted over two scenarios:
• Scenario 1: Line-up network. The goal is to investigate how the data is disseminated
through nodes and how many time the data dissemination process takes
• Scenario 2: Meshed network. The aim is to analyze the performance of proposed MAC
methods in such common topologies: dense traffic situations in large-scale networks
3.4.1 Line-up Network
This scenario consists of 5 nodes which are aligned either vertically or horizontally. They
are named and organized from left to right as ”NODE X”. Each node is logically linked
with its upstream and downstream nodes. Figure 3.3 shows the horizontal deployment of
the line-up network.
26. For more info Https://www.ThesisScientist.com
Figure 3.3: Line-up network in horizontal deployment
Its working principle is based on disseminating data packets among nodes. Thus, two
information flows, A and B, are disseminated through the network. While flow A is
transmitted upstream by NODE 1, flow B is sent downstream by NODE 5. Note that all
nodes want both data flows. So, this scenario is an easy way to evaluate the performance
of proposed and existing MAC techniques in terms of data dissemination process.
3.4.2 Meshed Network
As in the previous scenario, the network comprises 5 nodes in a meshed topology.
However, its purpose and behavior are quite different. In this particular case, nodes are
linked logically building a meshed network with some single properties. Despite being a
meshed network, it works through two axes, x and y. The performance focuses on two
data flows, A and B, which are transmitted in parallel. Flow A is transmitted through x-
axis by NODE 2 whereas flow B is sent through y-axis by NODE 3. Note that now NODE
4 and 5 wants the data flows A and B, respectively. Also, NODE 2 and 3 broadcast their
corresponding data flows as well as NODE 1, which is in charge of broadcasting both data
flows to the rest of nodes as its the core of the network. This means that other nodes
27. For more info Https://www.ThesisScientist.com
around will received both data flows even though they are not interested. Figure 3.4
depicts a possible deployment of the meshed network.
This scenario is intended for describing a typical situation in present meshed networks
which is faced poorly efficient by current employed MAC methods due to the underwater
channel constraints. Consequently, it is a good chance to find out how proposed MAC
techniques performs in this common environment.
Figure 3.4: Meshed network deployment
3.5 Technical Criteria
From the engineering point of view, several desirable requirements should be aimed at
when designing an underwater communication system. They can vary depending on the
deployment environment and the applications. Such crucial issues can be power
consumption, throughput, reliability and scalability. In this section, some design factors
for underwater networks will be stated [33].
Signal Communication
According to previous statements, the most convenient technology for underwater
communication is upon acoustics in spite of its limiting factors. So, its channel effects
should be taken into account at an early design stage evaluating how they affect to the
design requirements. Note that range and data rate plays a key role in the selection of the
communication carrier.
28. For more info Https://www.ThesisScientist.com
Type of Cells
Depending on the environment and the distribution of nodes, omnidirectional or
directional antennas should be chosen for the design.
• Omni directional: Suitable for dynamic topologies where nodes are mobile and the
communication time between sender and receiver is limited.
• Directional: Appropriated for stationary communications where nodes are fixed. In this
scenario, the objective is to concentrate all the energy on a particular area
In this project, the nodes are supposed to transmit with omni-directional antennas though
the scenarios to conduct the tests are static, thus, the broadcast nature can be exploited.
Coverage Levels
As in each wireless communication system, the coverage study is a significant factor to
determine the system efficiency. It should fulfill the BER and SNR requirements at the
receiver to correctly demodulate the data packets. This analysis should also consider the
limiting factors of underwater propagation, sensitivity at the receiver, transmission power
and all those factors which are included in the power balance. The passive sonar equation
[33] characterizes the signal to noise ratio (SNRU) of an emitted underwater signal at the
receiver.
Underwater Deployment
The medium has strong influence on the deployment of an underwater network. In this
sense, performance varies drastically depending on depth, type of water and weather
conditions which affect seriously any underwater communications. To combat this
unpredictability, some underwater communications systems are designed for reliability
even when operating in harsh conditions and these configurations lead to sub-optimal
performance when good propagation conditions exist. Part of the challenge in optimizing
performance is to predict which environmental factors have the greatest impact. A key
element to predicting channel characteristics is correctly estimate the multipath and this is
possible only if the properties of the boundaries are carefully modeled with simulation
tools or channel measurements when possible [33].
Energy Consumption
Energy efficiency is always a major concern to prolong the network time. As nodes are
battery-powered, recharging or replacing node batteries is difficult, especially in hard-to-
29. For more info Https://www.ThesisScientist.com
access areas such as the underwater environment. In order to cope this constraint there are
two solutions: the first is energetic based on the finding of optimal frequency for
underwater communication, the second solution is formal based on the choice of MAC
protocols essentially these of routing. That second approach is the basis of this project in
investigating the viability of proposed MAC techniques in underwater networks. NB.
Another approach in order to optimize energy utilization which is gaining more and more
attention in sensor networks is the power-sleeping mode, where devices alternate between
active and sleep mode. There is proved that the combination of both radio off and
microcontroller power down mode can significantly increase the network lifetime. A
particular work [34] proposes a cooperative mechanism for data distribution that increases
system reliability, and at the same time keeps the memory consumption for data storage
low on each device using previous approach.
Bandwidth
It is well known that the frequency-dependency of the acoustic path loss imposes a
bandwidth limitation on an underwater communication system. As sound waves are much
slower than the electromagnetic the latency in communication is typically much higher.
Due to the multi-path propagation and ambient noise, the effective data rates are lower and
packet loss rate is usually much greater. There are several approaches to improve the
bandwidth efficiency. One way to achieve high throughputs over band-limited underwater
acoustic channels could be to improve the receivers by using optimal modulation and
coding techniques. Many research focus on the PSK (Phase Shift Keying) modulation,
which are a viable way of achieving high speed data transmission. This topic is also
included in this project as an important research task. For this reason, the state-of-the-art
analysis of current commercial acoustic modems will be discussed later.
Reliability
The need for reliable underwater communications is a difficult task when there are
limitations in energy consumption and storage capacity of nodes. Some critical
applications can demand data retrieval with high probability but assuring low energy
consumption. On possible approach is temporally distribute the date to be stored
cooperatively on many nodes of the network. Data replication can also be applied to
increase reliability of data retrieval process.
30. For more info Https://www.ThesisScientist.com
Underwater Wireless Transceiver
Evolutionary processes have shaped acoustic communication behaviors of remarkable
complexity. Thus, numerous researches have led to the development of innovative
receiver structures for robust underwater acoustic communication as consequences of
advances in electronics and computer technology.
Due to the underwater acoustic channel constraints, some issues like attenuation, low
power consumption, Bit Error Rate, error coding and alternative modulation strategies
should be considered in the proposition of the transceiver structure and its design. The
values of these parameters mentioned above are crucial to improve the wireless
underwater communication. Although the aim of this chapter is to describe the state-of-
the-art of commercial acoustic modems, it is also desirable to introduce some design
considerations for underwater wireless communication transceivers.
3.6 Design Considerations
As acoustic carriers are used for communications, signals are distorted by a variety of
factors; the major contributors are absorption, refraction and reflection (reverberation).
Through these three factors, the signals picked up by receivers are duplicated forms of the
original, of varying levels of strength and distorted by spreading or compression. Large
delays between transactions can reduce the throughput of the system considerably if it is
not taken into account. Also, the battery-powered network nodes limit the lifetime of the
proposed transceiver. Therefore, advanced signal processing is very important and
required to make optimum use of the transmission capabilities. To overcome these
difficulties, different modulations techniques and signaling encoding methods might
provide a feasible means for a more efficient use of the underwater acoustic channel
bandwidth. In fact, the values of the transmission loss, transmission distance and power
consumption, should be optimized to improve the wireless underwater communication and
the transceiver performance [27]. An important concern regarding wireless transceiver for
the underwater communication is its requirement of a transducer at the transmitter side.
This transducer allows to transform electrical waves into sound waves and inversely.