Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
|
|
- Roderick Preston
- 8 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 ABSTRACT Design and load balancing of a novel routing protocol for UWSN Shashank Yadav, Kusum Gupta,Ajay SinghYadav SRM University NCR CAMPUS, Ghaziabad shashank.it43@gmail.com doi : /ijacit The beautiful and mystical ocean remains one of the most unexplored and inaccessible regions on earth. Underwater sensor networks are envisioned to enable applications for oceanographic data collection, pollution monitoring, and onshore exploration, disaster prevention. This paper introduces a novel routing protocol for underwater sensor networks and a proposed method for load balancing. Node deployment and Location Identification is also discussed for underwater environment Energy is one of the most important factor for sensors because this is very difficult to change the battery Load balancing is one of the most important issue discussed in this paper. Keywords: Load balancing, UWSN, Sensor networks. 1. Introduction One major application of sensor networks is in the investigation of complex and uninhabited under water surfaces; such sensor networks are called the Underwater Wireless Sensor Networks (UWSN). The novel networking paradigm of UWSN is facing a totally different operating environment than the ground based wireless sensor networks. This introduces new challenges such as huge propagation delays, and limited acoustic link capacity with high attenuation factors. Underwater Sensor Networks (UWSNs) are proposed as a means for oceanic observation, offering new capabilities such as real time monitoring, remote configuration, and improved robustness. Underwater sensor networks are envisioned to enable applications for oceanographic data collection, pollution monitoring, and onshore exploration, disaster prevention. Self -organize an autonomous network which can adapt to the characteristics of the ocean environment. This paper is divided by six sections. In section 1given a basic introduction of UWSN, section 2 is related to the basic properties of acoustic communication. In section 3 provide the overview of and architecture of UWSN, section 4 is shown the load balancing mechanism. And section 5show the simulation and results, finally give the conclusion of the paper in section Applications of UWSN The applications of UWSN are vast and may vary from short term to long term applications and systems. The short term systems are usually associated with the quick exploration tasks, for example, an investigation around ship wreckage, while the long term system is usually used in monitoring and environmental data gathering. Received on March 2013, Published on April
2 1. Ocean sampling networks 2. Environmental monitoring 3. Under sea explorations 4. Disaster prevention 5. Distributed tactical surveillance 6. Mine reconnaissance 2. Related work and literature survey Acoustic communications depend on many factors such as path loss, noise, multi-path, Doppler spread, and high and variable propagation delay. All these aspects establish the temporal and spatial variability of the acoustic channel. The available bandwidth of the underwater acoustic channel is very limited and it s depending on both range and frequency. In long-range systems and short- range system these factors lead to low bit rates. In addition, the communication range is reduced as compared to the terrestrial radio channel. 2.1 Basics of Acoustic Communication Acoustic communications depend on many factors such as path loss, noise, multi-path, Doppler spread, and high and variable propagation delay. All these aspects establish the temporal and spatial variability of the acoustic channel. The available bandwidth of the underwater acoustic channel is very limited and it s depending on both range and frequency. In long-range systems and short- range system these factors lead to low bit rates. In addition, the communication range is reduced as compared to the terrestrial radio channel. 2.2 Architecture of UWSN There are many underwater sensor networks architecture possible. The communication architectures introduced here are used as a basis for discussion of the challenges associated with underwater acoustic sensor networks. The underwater sensor network topology is an open research issue in itself that needs further analytical and simulative investigation from the research community. 2.3 Communication Architecture The architecture of on-line system can be identified with one of three broad categories 1. Two-Dimensional Static Network, 2. Three-Dimensional Static Network 3. Three-Dimensional Static Network with Mobile AUVs. 2.4 Two Dimensional Static Sensor Networks The first category of UWSNs is very similar to the GBSNs where the sensor nodes are lying at almost the same level of elevation as the name indicates, i.e. the sensor nodes are lying on the bottom of the ocean or anchored to the ocean bed. Underwater sensor nodes are interconnected to one or more underwater sinks (uw-sinks) by means of wireless acoustic links. UW - sinks, as shown in figure 3.1, are network devices in charge of relaying data from the ocean bottom network to a surface station. Shashank Yadav et al 18
3 Figure 1: Architecture of Two- Dimensional Static UWSN A different approach can be to anchor sensor devices to the bottom of the ocean. In this architecture, depicted in Figure 3.2, each sensor is anchored to the ocean bottom and equipped with a floating buoy that can be inflated by a pump. Figure 2: Architecture of Three-Dimensional Static UWSN AUVs can function without tethers, cables or remote control, and therefore they have a multitude of applications in oceanography, environmental monitoring, and underwater resource study. Previous experimental work has shown the feasibility of relatively inexpensive AUV submarines equipped with multiple underwater sensors that can reach any depth in the ocean. Hence, they can be used to enhance the capabilities of underwater sensor networks in many ways. Shashank Yadav et al 19
4 Figure 3: Architecture of Three Dimensional with Mobility UWSN. 2.5 Design and load balancing Load Balancing about distributing the network's load evenly among the nodes. The weight factor computes the probability of connecting to a node based on its hop-distance and number of children (load) when energy level is constant. Calculate the minimum weighting factor for each node. 2.6 Routing Algorithms Here the node broadcast data in upper hemisphere. The communication range of a node is assumed to be uniform in all directions, which means it covers a sphere where the node is the center with a range radius proportional to its transmission power. The important assumption is the symmetrical property of the channel i.e. if a node A is able to hear node B, then node B can hear also node A. Nodes are fixed in a location using anchors or buoys which means no movement is assumed, since the adopted architecture for UWSNs is the Static Three- Dimensional one. The architecture, as mentioned earlier, is widely used in long term applications such as ocean sampling and environmental monitoring. However, some relative movement is expected but it is unlikely to affect the constructed routes or the operation of the routing algorithm. 3. Algorithm Step 1: A node will broadcast connection request in upper hemisphere. (Because our goal is to send the data from node to sink) Step 2: It will receive ACK from the node who is interested for the connection. (Only interested node) Step 3: (Received ACK should have three fields) Node will calculate minimum weight factor w by using the formula. Shashank Yadav et al 20
5 weigt factor w = (e l )/E Node will evaluate the interested nodes for connections by the comparing the calculated value of on the behalf of these (Load, distance, energy) factors of all nodes and connect accordingly. (If any ACK has directly comes from the sink then it will directly connected to the sink) Step 4: It will send ACK to the selected node in step 3. Step 5: node will transmit data to the node to which it got connected. Step 6: node will wait for ACK of that data PKT which was sent. Step 7: If ACK is received in time T then go to step 6. Step 8: If no ACK, go to step Minimum Weight Calculation (for Load Balancing) In this algorithm, three fields are necessary for calculation of weight to each node. We know that the effect of load is exponential and assume the hop distance is linear. Load l: No. of nodes transmitting data to this interested node. Hop-Distance h: no. of hops between node and sink. Energy level E: energy saved at particular node. weigt factor w = 4. Simulation and result (e load op distence)/energy This chapter will present the results from simulations conducted on the proposed Routing algorithms and give a brief analysis of the result.show the effect and relationship between load, hop-distance and energy level of node. 4.1 Load Balancing By using the equation of weight factor, generate the graph between Load and hop-distance when energy is constant. And check the weight factor at different hop distance. Shashank Yadav et al 21
6 weight factor Design and load balancing of a novel routing protocol for UWSN Table 1: Weighting factor when energy is constant hopdistance1 hopdistance2 hopdistance3 hopdistance Load Figure 4: Graph between no. of children (Load) and hop-distance when energy is 1 (100%). Figure 4 shows that relational ship between Load (no. of children) and weight factor. When load increases then the value of weight factor is also increase. Load increases exponentially while the effect of hop distance is linear. At the hop distance 1, when load 1 then the value of weight factor is 2.718, at load 2 weight factor 7.389, at load 3 weight factor and when load is 4 then weight factor is This result shows that if 10.6 loads increased then its effect is exponential. As an example, Node 400 had about 46 children connected, but using the weight factor, it now supports only 19 children. However, other nodes have to share this load, which in this case is taken up by Node 361 which is supporting 26 children instead of a zero as per the previous distribution. Shashank Yadav et al 22
7 Before using the Weight factor (No Load Balancing) Figure 6: Number of Children and Load Balancing In figure 6 shows that load is divided equally all the nodes on the behalf of their weight factor. It has previously explained that weight factor decides on the three main factors, like energy level, hop distance and load. These factors decide that whose node can bear maximum load on the node with efficient manner. After using the Weight factor (With Load Balancing) Figure 7: Number of Children and Load Balancing All the nodes are sending their packets hop by hop to the sink, while these nodes have to relay those packets on behalf of the entire network. The relaying task cost these nodes more energy than any other node in the network, which makes them die earlier than others. As a result of that, the life span in the network is limited by this group of nodes, regardless of the load balancing scheme used in the network. Shashank Yadav et al 23
8 5. Conclusion This work targeted the implementation of routing layers in UWSNs. The design requirements were imposed mainly because of the different working environment of UWSNs. In this paper a new algorithms is proposed for underwater sensor networks communication mechanisms and load balancing. There are three main factors like energy level, hop distance and load (no. of children). The weight factor computes the probability of connecting to a node based on its hop-distance and number of children (load) when energy level is constant. Calculate the minimum weighting factor for each node with using different factors. When Node will be select minimum weight factor it means that node will select that parent who has maximum energy level, minimum load and minimum hop distance. It means that those node has minimum weight factor will be select as a parent so load will be balanced at each node. When all the nodes are sending their packets hop by hop to the sink, while these nodes have to relay those packets on behalf of the network if the entire network has balanced load at each node then packet can easily arrives from one hop to another hop and there will no more traffic at any single node because load will be distributed. Due to the load balancing, the performance of entire networks will be increased. 6. References 1. F. Akyildiz, D. Pompili and T. Melodia, (2004), Challenges for efficient communication in underwater acoustic sensor networks, SIGBED Review, 1, pp E. M. Sozer, M. Stojanovic and J. G. Proakis, (2000), Underwater acoustic networks, Oceanic Engineering, IEEE Journal of, 25, pp J. Partan, J. Kurose and B. N. Levine, (2006), A survey of practical issues in underwater networks," in WUWNet '06: Proceedings of the 1st ACM International Workshop on Underwater Networks, pp J.Heide mann, W.Ye, J.Wills, A.Syed, and Y.Li. Research, (2006), Challenges and Applications for Underwater Sensor Networking, IEEE Wireless communication and Networking Conference, April J.H.Cui, J. Kong, M.Gerla, and S.Zhou, (2006), Challenges: Building Scalable Mobile Underwater Wireless Sensor Networks for Aquatic Applications. IEEE Network, Special Issue on Wireless Sensor Networking, 20(3), pp F.S ch ill, U.R.Zi mme r, an d J.Trump f. Visible, (2004), Spectrum Optical Communication and Distance Sensing for Underwater, Application s. In Proc. Australasian Conf. Robotics and Automation, May Shashank Yadav et al 24
A Cluster Based Delay Tolerant MAC Protocol for Underwater Wireless Sensor Network
A Cluster Based Delay Tolerant MAC Protocol for Underwater Wireless Sensor Network Zhanyang Zhang Computer Science Department, College of Staten Island/City University of New York Staten Island, New York,
More informationChallenges for Efficient Communication in Underwater Acoustic Sensor Networks
Challenges for Efficient Communication in Underwater Acoustic Sensor Networks Ian F. Akyildiz, Dario Pompili, Tommaso Melodia Broadband & Wireless Networking Laboratory School of Electrical & Computer
More informationRestricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and
More informationPropsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationUnderwater Sensor Networks for Water Quality Monitoring Project Final Report Feng Zhang
Underwater Sensor Networks for Water Quality Monitoring Project Final Report Feng Zhang Abstract Wireless sensor networks (WSNs) have been growing rapidly in the past few years. Lots of research has been
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationAN EFFICENT TIME SYNCHRONIZATION AND SECURE DATA FORWARDING SCHEME IN UNDERWATER NETWORK
AN EFFICENT TIME SYNCHRONIZATION AND SECURE DATA FORWARDING SCHEME IN UNDERWATER NETWORK 1 PADMA PRIIYAA S R M, 2 SARANYA P 1 PG Student (M.E-Communication and Networking), Department of Electronics and
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationHyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationSensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationA Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationDefining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationWireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
More informationImplementation of Neighbor Discovery Protocol for Underwater Acoustic Communications
Implementation of Neighbor Discovery Protocol for Underwater Acoustic Communications Manjula R. Bharamagoudra *, SunilKumar S. Manvi Wireless Information System Research Lab, Department of Electronics
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationSimulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationA survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationQoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationA Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationtelemetry Rene A.J. Chave, David D. Lemon, Jan Buermans ASL Environmental Sciences Inc. Victoria BC Canada rchave@aslenv.com I.
Near real-time transmission of reduced data from a moored multi-frequency sonar by low bandwidth telemetry Rene A.J. Chave, David D. Lemon, Jan Buermans ASL Environmental Sciences Inc. Victoria BC Canada
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationAutonomous Fault Detection and Recovery System in Large-scale Networks
Autonomous Fault Detection and Recovery System in Large-scale Networks Raheel Ahmed Memon 1, Yeonseung Ryu, Abdul Qadir Rahimoo Abstract In networks like Combat ship data network, the Ethernet is required
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationAnalysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationEffective Communication in Schools of Submersibles
Oceans 06, Singapore (authors manuscript do not distribute) Effective Communication in Schools of Submersibles Felix Schill & Uwe R. Zimmer Research School of Information Sciences and Engineering Autonomous
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationPath Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
More informationSlow Adaptive OFDMA Systems Through Chance Constrained Programming
www.ijcsi.org 213 Slow Adaptive OFDMA Systems Through Chance Constrained Programming N. Revathy 1, T.Guhan 2 1 Assistant Professor, Department of Computer Applications, Karpagam College of Engineering,
More informationHybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring
International Journal of Computer Sciences and Engineering Vol.-4(4), PP(25-29) April 2016, E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4,
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationPERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
More informationA Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks
A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,
More informationNOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
More informationEnvironmental Monitoring Using Sensor Networks
Environmental Monitoring Using Sensor Networks... 2. Dezember 2010 Communication Systems Seminar HS10 Prof. Dr. Burkhard Stiller Institut für Informatik Universität Zürich Overview From Environmental Monitoring
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationA Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationTechnologies Supporting Smart Meter Networks
Technologies Supporting Smart Meter Networks Isamu Kitagawa Shinichi Sekiguchi The power crisis that Japan confronted in the wake of the Great East Japan Earthquake in 2011 underscored the need for managing
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationAN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationNanoMon: An Adaptable Sensor Network Monitoring Software
NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationDynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationLecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationINTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
More informationEnvironmental Effects On Phase Coherent Underwater Acoustic Communications: A Perspective From Several Experimental Measurements
Environmental Effects On Phase Coherent Underwater Acoustic Communications: A Perspective From Several Experimental Measurements T. C. Yang, Naval Research Lab., Washington DC 20375 Abstract. This paper
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationCOMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
More informationEnergy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network
Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract A Wireless Sensor Network(WSN) is a energy and security constraint
More informationMesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries
Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American
More informationSJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
More information