A Quality Model For Unintentional Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

S.Muthuramalingam and R.Rajaram [70] presented a novel algorithm for clustering of nodes by transmission range based clustering (TRBC).This algorithm does topology management by the usage of coverage area of each node and power management based on mean transmission power within the context of wireless ad-hoc networks. By reducing the transmission range of the nodes, energy consumed by each node is decreased and topology is formed. A new algorithm is formulated that helps in reducing the system power consumption and prolonging the battery life of mobile nodes. Formation of cluster and selection of optimal cluster head and thus forming the optimal cluster taking weighted metrics like battery life, distance, position and mobility is done based on the factors such as node density, coverage area, contention index, required and current node degree of the nodes in the clusters.

Preetee K. Karmore & Smita M. Nirkhi [71] proposed a MANET has no clear line of defense so, it's accessible to each legitimate network nodes and malicious nodes. A number of the nodes could also be stingy, for instance, by not forwarding the packets to the destination, thereby saving the battery power. Some others might act malicious by launching security attacks like region or hack the data. Ancient means of protective networks with firewalls and coding code isn't any longer ample. Therefore, intrusion detection system is needed that monitor the network, find malicious node and notifies alternative node within the network to avoid malicious node i. e. IDS detect malicious activities within the networks. The researchers have enforced k-means clump algorithmic rule of knowledge mining for economical detection of intrusions within the MANET traffic and conjointly generated region attacks within the network. In data processing, clump is that the most significant unattended learning method accustomed notice the structures or patterns in an exceedingly assortment of unlabeled knowledge. The researchers have used the K-means algorithmic rule to cluster and analyze the info during this paper. The simulation of the projected technique is performed in NS2 machine and also got the result.

Cynthia Jayapal and Sumathi Vembu [72] presented associate degree adjective service discovery protocol that enhances the performance of service discovery. The prevailing service discovery procedures, uses either centralized, distributed or hybrid architectures. This architecture use totally different strategies of service registration, advert, selection, discovery modes and state maintenance to boost the service discovery performance; however they use the traditional strategies for choosing a core node that aids altogether the service discovery phases. Their main focus is to use associate degree adjective core node election mechanism that changes whenever the load will increase and is additionally strong against network failures. This enhances the performance of discovery remaining to the reduction in frequent handoffs. The researchers used a distributed directory based mostly service discovery mechanism that operates in a very proactive mode with service advertisements to the core node and selects a supplier based each on distance and repair capability of the supplier. Their simulation results show that their adjective service discovery theme performs higher in terms of service discovery success quantitative relation, management message over head, discovery delay and therefore the range of hand offs, when put next to traditional schemes.

I-Shyan Hwang and Wen-Hsin Pang [73] presented an Energy efficient communication in mobile ad hoc networks (MANET) is a very stringent issue due to the power-constraint of battery in each mobile node. Therefore, designing a suitable energy efficient multicast routing protocol to conserve power as much as possible while still achieving good system performance is a challenge. In this research the researchers proposed an energy efficient clustering technique (EECT) for multicast routing protocol, which each node uses weight cost function based on the transmission power level, residual power and node speed to form cluster in the neighboring area and the node with the minimum weight value is selected as the clusterhead. The EECT can alleviate the energy consumption because the communication between clusterhead and member is adjustable with appropriate power level. The tree-based MAODV and the mesh-based ODMRP ad hoc multicast routing protocols are adapted to the EECT being executed on the each clusterhead. Simulation results demonstrate the adaptation of MAODV and ODMRP using EECT have better system performance than MAODV and ODMRP in terms of total energy consumption, mean end-to-end delay, and mean hop count, packet delivery ratio and percentage of alive nodes for different multicast group size and mobility.

Stefano Basagni et.al [74] presented work issues the comparative performance analysis of protocols for agglomeration and strength of formation in unexpected networks characterized by an outsized range of resource-constrained nodes. Typical samples of these networks square measure wireless sensing element networks. The DCA protocol represented those protocols whose backbone construction methodology relies on choosing nodes as cluster heads then connation them to create a connected backbone. The algorithmic rule planned by Shanghai dialect and Li has been chosen to exemplify those algorithms that build a connected backbone then prune away redundant nodes. Finally, the algorithmic rule by Wan et al. has been thought-about here for its additional theoretical properties of manufacturing a backbone with a relentless approximation issue, linear time quality and best message quality. So as to get a backbone moderately tiny at affordable price the researchers propose associate degree sweetening of the DCA algorithmic rule, termed DCA-S, which enriches the DCA backbone construction with a recently planned and resource effective scarification rule. DCA-S results in a strong backbone go on size thereto generated by the Wan et al. protocol while not considerably degrading the performance in terms of all the opposite relevant metrics.

I. Er and W. K. Seah [75] presented a mobility-based d-hop clump rule (MobDHop) that forms variable-diameter clusters supported node quality pattern in MANETs. The researchers introduced a brand new metric to live the variation of distance between nodes over time so as to estimate the relative quality of 2 nodes. The researchers conjointly calculable the steadiness of clusters supported relative quality of cluster members. In contrast to alternative clump algorithms, the diameter of clusters isn't restricted to 2 hops. Instead, the diameter of clusters is versatile and determined by the steadiness of clusters. Nodes that have similar moving pattern area unit sorted into one cluster. The simulation results presented that MobDHop has stable performance in indiscriminately generated eventualities. It forms lesser clusters than Lowest-ID and MOBIC rule within the same state of affairs. Finally, MobDHop is wont to give Associate in underlying stratified routing structure to deal with the quantifiability of routing protocol in substantial MANETs.

T. Ohta, S. Inoue, and Y. Kakuda [76] proposed clustering scheme for ad hoc networks is aimed at managing a number of mobile devices by utilizing hierarchical structure of the networks. In order to construct and maintain an effective hierarchical structure in ad hoc networks where mobile devices may move at high mobility, the following requirements must be satisfied. (1) The role of each mobile device for the hierarchical structure is adaptive to dynamic change of the topology of the ad hoc networks. The role of each mobile device should thus change autonomously based on the local information. (2) The overhead for management of the hierarchical structure is small. The number of mobile devices in each cluster should thus be almost equivalent. This paper proposed an adaptive multihop clustering design for extremely MANET. The results obtained by extensive simulation experiments show that the proposed scheme does not depend on mobility and node degree of mobile devices in the network, which satisfy the above requirements.

P. Basu, N. Khan, and T. D. C. Little [77] presented a completely unique relative quality metric for MANETs. It’s supported the quantitative relation of power levels as a result of serial receptions at every node from its neighbors. The researchers planned a distributed clump algorithmic rule, MOBIC, supported the employment of this quality metric for choice of cluster heads, and demonstrate that it ends up in a lot of stable cluster formation than the "least cluster head change" version of the accepted Lowest-ID clump algorithmic rule (Chiang et al., 1997). The researchers exposed reduction of the maximum amount as 33% within the rate of cluster head changed to the employment of the planned techniques. In a Mobile Ad-Hoc Network that uses ascendable cluster-based services, network performance metrics like outturn and delay area unit tightly not to mention the frequency of cluster reorganization. Therefore, the researchers believe that victimization MOBIC may result is a lot of stable configuration, and so yield higher performance.

F.D.Tolba et.al [78] proposed within the context of MANETs routing, the researchers recommend a clump formula known as property, Energy and Mobility driven Clustering Algorithm (CEMCA). The goal of CEMCA consist in befittingly selecting the cluster head to cut back routing overhead. So as to cut back traffic and energy consumption, the management messages are sent only if required, in keeping with the speed of the node. Every node includes a quality that indicates its suitableness as a cluster head. This quality takes into consideration the node property, battery energy and quality. These parameters are important for the soundness of the cluster. Simulation experiments are meted out to validate their formula in terms of stability of the clusters and therefore their members and the quality of the property. The outcome of result has been compared to a previous approach known as Weight Clustering Algorithm (WCA) and that they show that CEMCA is acting higher.

Abbas El Gamal et.al [79] developed algorithms for minimizing the energy required to transmit packets in a wireless environment. It is motivated by the following observation: In many channel coding schemes it is possible to significantly lower the transmission energy by transmitting packets over a long period of time. Based on this observation, the researchers shown that for a variety of scenarios the offline energy-efficient transmission scheduling problem reduces to a convex optimization problem. Unlike for the special case of a single transmitter-receiver pair studied the problem does not, in general, admit a closed-form solution when there are multiple users. By exploiting the special structure of the problem, however, the researchers are able to devise energy-efficient transmission schedules. For the downlink channel, with a single transmitter and multiple receivers, the researchers devise an iterative algorithm, called MoveRight, which yields the optimal offline schedule. The MoveRight algorithm also optimally solves the downlink problem with additional constraints imposed by packet deadlines and finite transmit buffers. For the uplink (or multi-access) problem MoveRight optimally determines the offline time-sharing schedule. A very efficient online algorithm, called Move Right Express, that uses a surprisingly small look-ahead buffer is proposed and is shown to perform competitively with the optimal offline schedule in terms of energy efficiency and delay.

Amit Kumar et.al [80] presented a network simulator software program that has forecasted the performance of a network without the actual network being present. In simulators, the computer network is typically modeled through the devices, traffic e.t moreover the presentation has been also examined. Usually, consumers can be subsequently customizing the simulator to complete their definite analysis needs. The proposed simulator is developed to implement a distributed clustering algorithm for ad hoc networks. A node that consumes minimum energy among its one-hop neighbors is selected as the cluster head. The heads get changed as their weights change in the network. The change in the network scenario is reflected in the table for ready reference.

Chinara, S. & Rath, S.K. [81] Proposed energy efficient mobility adaptive distributed clustering algorithm for mobile ad hoc network. Node mobility in the dynamic network has a remarkable effect on cluster stability. In order to reduce the initial cluster setup time of the dynamic network with frequently changing topology, the researchers consider a single node parameter as the cluster head selection criteria. That is the average displacement of individual nodes in the network is computed by keeping track of its total displacement in last n time units. As the selected cluster heads form the routing backbone of the dynamic network, better stability is ensured by preferring low mobile nodes to act as cluster heads. A new energy consumption model has been proposed for the cluster heads that has been taken into account and the network traffic, density of cluster clients and the transmission energy exploited to converse the member nodes. A better cluster stability and a low maintenance overhead are aimed to achieve by electing volunteer and non-volunteer cluster heads.

Shahzad Ali and Sajjad Madani [82] presented a Distributed Efficient Multi hop Clustering (DEMC) protocol for mobile WSN. An overpowering mainstream of present investigation on sensor networks reflect on static networks merely, whereas the researchers proposed mobile environment. DEMC is distributed, works well with mobile nodes, and has a recovery mechanism that is used to reduce the packet loss during inter cluster communication. The recovery mechanism also improves the connectivity between cluster heads during inter cluster communication. On average, each node sends less than one message during clustering, and does not rely on periodic hello messages. As a result reducing number of transmissions leads to energy efficiency.

S.V.Manisekaran et.al [83] presented a Wireless Sensor Network (WSN), energy optimization is an important factor to increase the lifetime of the network. Existing approaches mainly discuss on routing data towards the sink and also do concentrate on static wireless sensor network. As these approaches consume more energy, this paper introduces Mobile Adaptive Distributed Clustering Algorithm (MADCA) that can minimize the energy consumption and also support mobile nodes. This algorithm achieves energy optimization by clustering the nodes, based on similarity of data. Also the nodes which have low data sending rate are allotted a sleep duty cycle for some period. In order to support mobile nodes, the clusters are rebuilt according to the clustering period. Thus it reduces the burden of sink and improves the lifetime of the network. This scenario is simulated using Network Simulator NS2 and performance is analyzed. Simulation results show that MADCA is efficient in terms of control overhead, average end-to-end delay, average packet delivery ratio and energy consumption when compared to a recently proposed approach based on clustering.

Yan Zhang & Jim Mee Ng [84] proposed a distributed group mobility adaptive (DGMA) clustering algorithm for mobile ad hoc networks (MANETs) on the basis of a revised group mobility metric, spatial dependency, which is derived from the linear distance of a node's movement instead of its instantaneous speed and direction. In particular, it is suitable for reflecting group mobility pattern where group partitions and mergence are prevalent behaviors of mobile groups. The proposed clustering scheme aims to form stable clusters by prolonging cluster lifetime and reducing the clustering iterations even in a highly dynamic environment. Simulation results show that the performance of the proposed framework is superior to another widely used clustering approach, the Lowest-ID clustering scheme, in terms of average clusterhead lifetime, average resident time and number of cluster reaffiliation.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now