SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Association of Scientific Innovation and Research (IASIR) 
(An Association Unifying the Sciences, Engineering, and Applied Research) 
International Journal of Emerging Technologies in Computational 
and Applied Sciences (IJETCAS) 
www.iasir.net 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 185 
ISSN (Print): 2279-0047 
ISSN (Online): 2279-0055 
RELIABLE DATA COMMUNICATION OVER MOBILE ADHOC NETWORK USING WEAC PROTOCOL WITH ARQ TECHNIQUE 
A. Kamatchi*, Dr. Annasaro Vijendran# 
*Ph.D( Part time) Scholar, Department of Computer Science, Karpagam University, Coimbatore, India. 
#Director, MCA Department, SNR & Sons College, Coimbatore, India. 
_________________________________________________________________________________________ 
Abstract: Error control techniques are very hot research topics in mobile adhoc networks. This paper deals with Performance of ARQ (Automatic Repeat reQuest) mechanism in mobile adhoc network using WEAC (Warning Energy Awareness Clusterhead) Protocol. Error control techniques are very popular in all types of networks. In Wireless network many types of Error control techniques are used. Automatic Repeat reQuest is one of the major error control techniques in wireless network. In this technique the erroneous packet will be retransmitted. Hence Loss of data is eliminated and it provides opportunity for reliable data delivery. This paper analyzes the famous three ARQ protocols and their performance in many circumstances and the advantages of various types in ARQ. The results of this paper shows that the amount of loss of data is eliminated using ARQ and it leads reliable data communication over noisy channels. 
Keywords: ARQ Technique, WEAC Protocol, Mobile adhoc network. 
_________________________________________________________________________________________ 
I. Introduction 
A Mobile adhoc network contains mobile hosts prepared with wireless communication devices. The data transmission of a single mobile node is received by all nodes within its transmission range.[9][10] If two mobile nodes are out of their transmission ranges in the ad hoc networks, other mobile nodes placed between them can forward their messages, which effectively builds connected networks among the mobile nodes in the deployed area. Due to the mobility of wireless hosts, each host needs to be equipped with the capability of an autonomous system, or a routing function without any statically established infrastructure or centralized administration. The mobile hosts can move arbitrarily and can be turned on or off without notifying other hosts. The mobility and autonomy introduces a dynamic topology of the networks not only because end-hosts are transient but also because intermediate hosts on a communication path are transient.[2][4] 
Fig. 1: Architecture of Mobile adhoc Network 
II. WEAC Protocol 
The Warning Energy Awareness Clusterhead (WEAC)/Virtual Base Station On-demand (VBS-O) routing protocol is proposed in this work. A mobile node is selected from a set of nominees to act as a temporary base station for a period of time within its zone. In each cluster, a token is used to assign the channel among contending Mobile Terminals. A clusterhead supports multiple classes of services and also manages to minimize collisions. Here the
A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 
190 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 186 
characteristics and performance of the WEAC protocol are studied and evaluated by simulation. It is shown that both it scales well to large networks of mobile stations and is proved to perform well for non-real time traffic[7]. 
III. ARQ Technique 
Error control techniques are used to provide reliable communications over noisy channels[5][8]. The commonly used techniques are Forward Error Correction (FEC), Automatic Repeat reQuest (ARQ) or a combination of them called hybrid-ARQ. In ARQ, data is protected by error detecting codes. If the receiver detects errors, the corresponding frame will be retransmitted[6]. 
i) Stop-and-Wait (SW) – Stop and wait for acknowledgement. 
ii) Go-Back-N(GBN) - Go next without acknowledgement 
iii) Selective Repeat (SR). - Go next without acknowledgement 
Fig. 2: ARQ Architecture 
In SW, after sending a frame, the transmitter waits for feedback. A new frame is transmitted only when a positive acknowledgment (ACK) for the current frame is received. In contrast to SW, both GBN and SR protocols transmit frames continuously without waiting for acknowledgment messages. So GBN and SR are collectively called continuous ARQ protocols. 
GBN is designed to operate without a re-ordering buffer at the receiver. Whenever a frame is missing or erroneous, the receiver simply discards all subsequent frames and sends no feedback for these discarded frames. So the transmitter has to retransmit all frames, starting with the erroneous one. If the error rate is high, the GBN protocol is inefficient. 
In SR, only lost frames are retransmitted. Subsequent frames, which are correctly received, are stored in the receiver buffer so that the frames are sent to higher layer in the correct order. Because only lost frames are retransmitted, SR protocol is more efficient, resulting in higher throughput. Therefore there is a trade-off between bandwidth and buffer space. Depending on the availability of these resources, GBN or SR protocol will be used[1][3]. 
IV. Go Back N Protocol 
This paper analyzes Go Back N protocol which is used to overcome the inefficiency of Stop-and-Wait ARQ . In this technique sender continues sending enough frames to keep channel busy while waiting for ACKs a window of Ws outstanding frames is allowed m-bit sequence numbers are used for both – frames and ACKs, and Ws = 2m-1. 
Fig. 3: Go Back N Protocol
A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 
190 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 187 
Assume: Ws= 4 
1) Sender sends frames one by one 
2) Frame 3 undergoes transmission error – receiver ignores frame 3 and all subsequent frames 
3) Sender eventually reaches max number of outstanding frames, and takes following action: 
Go Back N=Ws frames and retransmit all frames from 3 onwards. 
V. ARQ Feedback Types 
i) cumulative 
ii) cumulative+selective 
iii) cumulative+sequence 
i) If there are positive acknowledgements in the beginning of the ARQ transmission window, construct the cumulative part. If there are no negative acknowledgements, then a single cumulative feedback message is created. 
ii) If there are remaining negative acknowledgements (optionally followed by positive and other negative acknowledgements), which we cannot send by using the cumulative part, then we have to choose a map type. To make a decision, we construct the sequence maps and calculate whether the selective maps can acknowledge more blocks. The maximum number of blocks to acknowledge selectively is 64 and it should be a multiple of 16. As for the sequence part, there is a limit for a sequence length and the number of sequences we can send in one message. As a choice is made, we ”attach” map(s) to the cumulative part constructed at the previous stage. Eventually, we will have either the cumulative+ sequence or cumulative+selective feedback type. 
iii). Note that we can reach this stage in two cases. The first one is when there are no positive acknowledgements 
in the beginning of the ARQ transmission window and there is no way to create cumulative, cumulative+ 
selective, or cumulative+sequence types. The second case to reach this stage is when neither cumulative+ 
selective nor cumulative+sequence feedback types encode all the blocks[11][12]. 
Fig. 4: ARQ Feedback Types 
Fig. 5: Constructing sequence maps
A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 
190 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 188 
GO BACK N(cumulative+sequence feeback type) 
 Sender keeps copy of up to Ws outstanding packets . 
- k-bit sequence number, SN in packet header. 
 When the receiver notices a missing/erroneous frame. 
- It discards all frames with greater SNs and sends no ACK. 
 Sender timeout(i): 
- Retransmit all the frames in its sending window(packet I and all frames after that with higher SNs) 
 Cumulative ACK 
- ACK(i): ACK all packets up to, including SN #i 
Efficiency of Go Back N with transmission errors - Approximate analysis 
Assume: N= S TO=N*DTP 
DTP 
• When an error occurs the entire window of N packets must be retransmitted. Let X = the number of packets sent per successful transmission 
E[X] = 1*(1-P) + (X+N)*P 
= 1 + N*P/(1-P) 
Efficiency = 1/E[X] 
Simulation Results 
 Data rate - 25 kbps 
 Carrier frequency - 20 kHZ 
 Source-Destination distance - 1 km 
 Source power level - 94 dB 
 Sound speed - 1500 m/s 
 Packet size - 500 bits 
 Fragmentation/packing- ON 
 PDU size - as large as possible 
 CRC/ARQ - ON 
 ARQ feedback - standalone 
 ARQ feedback types - Cumulative+sequence 
 ARQ block size - 16 B 
 ARQ window - 1024 
 ARQ block rearrangement- ON 
 ARQ deliver in order - ON 
Fig. 6: Uplink throughput (no errors, no ARQ).
A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 
190 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 189 
Fig. 7: Uplink throughput (errors, ARQ). 
Fig. 8: Uplink throughput (errors, no ARQ). 
Fig. 9: Uplink throughput (no ARQ block rearrangement, large PDU).
A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 
190 
IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 190 
VI. Conclusion 
This paper proposes ARQ Technique in wireless network to improve the performance of data transmissions in mobile adhoc network. Network simulation results shows that under mobile adhoc network scenario using WEAC Protocol takes advantage of ARQ technique to reduce the number of dropped packets at relaying nodes, thus can improve the throughput of the network. 
The proposed solution is based on how to prioritize normal PDUs, ARQ feedbacks, and retransmissions. The simulation results have also revealed the importance of the ARQ block rearrangement functionality. This paper also deals with Go Back N algorithm and its performance over mobile adhoc network. The efficiency of Go Back N algorithm over wireless network also analyzed. 
This paper also demonstrates that a connection must choose sufficiently large ARQ transmission window size to utilize the allocated resources. While large ARQ blocks can utilize resources even with a small ARQ window, small ARQ blocks, such as those of 16 and 32 bytes, require much larger ARQ window. The proposed lightweight, yet efficient, algorithms are used to select the ARQ feedback type and to build block sequences for the cumulative+sequence feedback type. The analysis of the simulation results for the ARQ feedback types has revealed an importance of the feedback type. 
The future research works will aim to study the optimal parameters of the ARQ mechanism, which is especially the case for the ARQ-enabled QoS connections. It is also important to compare the results provided by the ARQ mechanism and the HARQ mechanism. 
References 
[1] A. G. i Fabregas and G. Caire, “Coded modulation in the block-fading channel: coding theorems and code construction,” IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 91–114, Jan. 2006. 
[2] A. Stefanov and E. Erkip, “Cooperative coding for wireless networks”, IEEE Trans. Commun., vol. 52, no. 9, pp. 1470-1476, Sep. 2004. 
[3] D. Daley and D. Vere-Jones, An Introduction to the Theory of Point Processes. Springer, 2003. 
[4] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. New York: Cambridge University Press, 2005. 
[5] J. Li, C. Blake, D. De Couto, H. Lee, and R. Morris, “Capacity of adhoc wireless networks”, In ACM MobiCom’01, July 2001. 
[6] M. Dianati, X. Ling, K. Naik, and X. Shen, “A node-cooperative ARQ scheme for wireless ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 46, pp. 1032–1044, May 2006. 
[7] M. Haenggi and D. Puccinelli, “Routing in ad hoc networks: a case for long hops,” IEEE Commun. Mag., vol. 43, no. 10, pp. 93 – 101, oct. 2005. 
[8] M. Haenggi, “On distances in uniformly random networks,” IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3584–3586, Oct. 2005. 
[9] M. Janani, A. Hedayat, T. E. Hunter and A. Nostratinia, “Coded cooperation in wireless communications: space-time transmission and iterative decoding,” IEEE Trans. Signal Processing, vol. 52, no. 2, pp. 362-371, Feb. 2004. 
[10] M. Sikora, J. Laneman, M. Haenggi, D. Costello, and T. Fuja, “Bandwidth- and power-efficient routing in linear wireless networks,” IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2624 –2633, june 2006. 
[11] P. Gupta and P. R. Kumar, “The capacity of wireless networks”, IEEE Transactions on Information Theory, IT-46(2):388–404, March 2000. 
[12] R. J. Lavery, “Throughput optimization for wireless data transmission,” M. S. Thesis, Polytechnic University, June 2001.

Weitere ähnliche Inhalte

Was ist angesagt?

A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precodingadeelrazi
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP Networks
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksMulticasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP Networks
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksEditor IJMTER
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...IRJET Journal
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationMojtaba Esfandiari
 
Ad Hoc Probe
Ad Hoc ProbeAd Hoc Probe
Ad Hoc Probenutikumar
 
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...IJERA Editor
 
Modified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manetModified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manetIAEME Publication
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...theijes
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT Comparing ICH-leach and Leach Descendents on Image Transfer using DCT
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT IJECEIAES
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...IJECEIAES
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
 
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...sinaexe
 

Was ist angesagt? (20)

A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEA NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCE
 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP Networks
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksMulticasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP Networks
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP Networks
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
 
Ad Hoc Probe
Ad Hoc ProbeAd Hoc Probe
Ad Hoc Probe
 
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
 
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...
Improving Power Efficiency in Cooperative Diversity and MIMO Systems by Using...
 
Modified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manetModified rts cts exchange mechanism for manet
Modified rts cts exchange mechanism for manet
 
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
Evaluation of STBC and Convolutional Code Performance for Wireless Communicat...
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT Comparing ICH-leach and Leach Descendents on Image Transfer using DCT
Comparing ICH-leach and Leach Descendents on Image Transfer using DCT
 
Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...Distributed differential beamforming and power allocation for cooperative com...
Distributed differential beamforming and power allocation for cooperative com...
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
An energy efficient geographic routing protocol design in vehicular ad-hoc ne...
 
Kg2518001805
Kg2518001805Kg2518001805
Kg2518001805
 

Andere mochten auch (19)

Ijetcas14 516
Ijetcas14 516Ijetcas14 516
Ijetcas14 516
 
Ijebea14 229
Ijebea14 229Ijebea14 229
Ijebea14 229
 
Aijrfans14 224
Aijrfans14 224Aijrfans14 224
Aijrfans14 224
 
Ijebea14 253
Ijebea14 253Ijebea14 253
Ijebea14 253
 
Aijrfans14 293
Aijrfans14 293Aijrfans14 293
Aijrfans14 293
 
Ijetcas14 316
Ijetcas14 316Ijetcas14 316
Ijetcas14 316
 
Ijetcas14 472
Ijetcas14 472Ijetcas14 472
Ijetcas14 472
 
Ijetcas14 390
Ijetcas14 390Ijetcas14 390
Ijetcas14 390
 
Ijetcas14 580
Ijetcas14 580Ijetcas14 580
Ijetcas14 580
 
Ijetcas14 504
Ijetcas14 504Ijetcas14 504
Ijetcas14 504
 
Ijetcas14 489
Ijetcas14 489Ijetcas14 489
Ijetcas14 489
 
Ijebea14 275
Ijebea14 275Ijebea14 275
Ijebea14 275
 
Ijetcas14 483
Ijetcas14 483Ijetcas14 483
Ijetcas14 483
 
Ijetcas14 458
Ijetcas14 458Ijetcas14 458
Ijetcas14 458
 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
 
Aijrfans14 288
Aijrfans14 288Aijrfans14 288
Aijrfans14 288
 
Ijetcas14 385
Ijetcas14 385Ijetcas14 385
Ijetcas14 385
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 524
Ijetcas14 524Ijetcas14 524
Ijetcas14 524
 

Ähnlich wie Ijetcas14 572

Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Journals
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Publishing House
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layereSAT Publishing House
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication  Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication Editor IJCATR
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationCollision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationEditor IJCATR
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.IRJET Journal
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfYAAKOVSOLOMON1
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Journals
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkIJSRD
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingDr. Amarjeet Singh
 
Automatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) ProtocolsAutomatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) Protocolstheijes
 
The novel techniques for data dissemination in vehicular
The novel techniques for data dissemination in vehicularThe novel techniques for data dissemination in vehicular
The novel techniques for data dissemination in vehicularIAEME Publication
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 

Ähnlich wie Ijetcas14 572 (20)

Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Uw as ns design challenges in transport layer
Uw as ns design challenges in transport layerUw as ns design challenges in transport layer
Uw as ns design challenges in transport layer
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication  Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication
 
Collision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular CommunicationCollision Avoidance Protocol for Inter Vehicular Communication
Collision Avoidance Protocol for Inter Vehicular Communication
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdf
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
Automatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) ProtocolsAutomatic Repeat Request (Arq) Protocols
Automatic Repeat Request (Arq) Protocols
 
The novel techniques for data dissemination in vehicular
The novel techniques for data dissemination in vehicularThe novel techniques for data dissemination in vehicular
The novel techniques for data dissemination in vehicular
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 

Mehr von Iasir Journals (20)

ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 

Kürzlich hochgeladen

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfEr. Suman Jyoti
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Kürzlich hochgeladen (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Ijetcas14 572

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 185 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 RELIABLE DATA COMMUNICATION OVER MOBILE ADHOC NETWORK USING WEAC PROTOCOL WITH ARQ TECHNIQUE A. Kamatchi*, Dr. Annasaro Vijendran# *Ph.D( Part time) Scholar, Department of Computer Science, Karpagam University, Coimbatore, India. #Director, MCA Department, SNR & Sons College, Coimbatore, India. _________________________________________________________________________________________ Abstract: Error control techniques are very hot research topics in mobile adhoc networks. This paper deals with Performance of ARQ (Automatic Repeat reQuest) mechanism in mobile adhoc network using WEAC (Warning Energy Awareness Clusterhead) Protocol. Error control techniques are very popular in all types of networks. In Wireless network many types of Error control techniques are used. Automatic Repeat reQuest is one of the major error control techniques in wireless network. In this technique the erroneous packet will be retransmitted. Hence Loss of data is eliminated and it provides opportunity for reliable data delivery. This paper analyzes the famous three ARQ protocols and their performance in many circumstances and the advantages of various types in ARQ. The results of this paper shows that the amount of loss of data is eliminated using ARQ and it leads reliable data communication over noisy channels. Keywords: ARQ Technique, WEAC Protocol, Mobile adhoc network. _________________________________________________________________________________________ I. Introduction A Mobile adhoc network contains mobile hosts prepared with wireless communication devices. The data transmission of a single mobile node is received by all nodes within its transmission range.[9][10] If two mobile nodes are out of their transmission ranges in the ad hoc networks, other mobile nodes placed between them can forward their messages, which effectively builds connected networks among the mobile nodes in the deployed area. Due to the mobility of wireless hosts, each host needs to be equipped with the capability of an autonomous system, or a routing function without any statically established infrastructure or centralized administration. The mobile hosts can move arbitrarily and can be turned on or off without notifying other hosts. The mobility and autonomy introduces a dynamic topology of the networks not only because end-hosts are transient but also because intermediate hosts on a communication path are transient.[2][4] Fig. 1: Architecture of Mobile adhoc Network II. WEAC Protocol The Warning Energy Awareness Clusterhead (WEAC)/Virtual Base Station On-demand (VBS-O) routing protocol is proposed in this work. A mobile node is selected from a set of nominees to act as a temporary base station for a period of time within its zone. In each cluster, a token is used to assign the channel among contending Mobile Terminals. A clusterhead supports multiple classes of services and also manages to minimize collisions. Here the
  • 2. A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 190 IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 186 characteristics and performance of the WEAC protocol are studied and evaluated by simulation. It is shown that both it scales well to large networks of mobile stations and is proved to perform well for non-real time traffic[7]. III. ARQ Technique Error control techniques are used to provide reliable communications over noisy channels[5][8]. The commonly used techniques are Forward Error Correction (FEC), Automatic Repeat reQuest (ARQ) or a combination of them called hybrid-ARQ. In ARQ, data is protected by error detecting codes. If the receiver detects errors, the corresponding frame will be retransmitted[6]. i) Stop-and-Wait (SW) – Stop and wait for acknowledgement. ii) Go-Back-N(GBN) - Go next without acknowledgement iii) Selective Repeat (SR). - Go next without acknowledgement Fig. 2: ARQ Architecture In SW, after sending a frame, the transmitter waits for feedback. A new frame is transmitted only when a positive acknowledgment (ACK) for the current frame is received. In contrast to SW, both GBN and SR protocols transmit frames continuously without waiting for acknowledgment messages. So GBN and SR are collectively called continuous ARQ protocols. GBN is designed to operate without a re-ordering buffer at the receiver. Whenever a frame is missing or erroneous, the receiver simply discards all subsequent frames and sends no feedback for these discarded frames. So the transmitter has to retransmit all frames, starting with the erroneous one. If the error rate is high, the GBN protocol is inefficient. In SR, only lost frames are retransmitted. Subsequent frames, which are correctly received, are stored in the receiver buffer so that the frames are sent to higher layer in the correct order. Because only lost frames are retransmitted, SR protocol is more efficient, resulting in higher throughput. Therefore there is a trade-off between bandwidth and buffer space. Depending on the availability of these resources, GBN or SR protocol will be used[1][3]. IV. Go Back N Protocol This paper analyzes Go Back N protocol which is used to overcome the inefficiency of Stop-and-Wait ARQ . In this technique sender continues sending enough frames to keep channel busy while waiting for ACKs a window of Ws outstanding frames is allowed m-bit sequence numbers are used for both – frames and ACKs, and Ws = 2m-1. Fig. 3: Go Back N Protocol
  • 3. A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 190 IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 187 Assume: Ws= 4 1) Sender sends frames one by one 2) Frame 3 undergoes transmission error – receiver ignores frame 3 and all subsequent frames 3) Sender eventually reaches max number of outstanding frames, and takes following action: Go Back N=Ws frames and retransmit all frames from 3 onwards. V. ARQ Feedback Types i) cumulative ii) cumulative+selective iii) cumulative+sequence i) If there are positive acknowledgements in the beginning of the ARQ transmission window, construct the cumulative part. If there are no negative acknowledgements, then a single cumulative feedback message is created. ii) If there are remaining negative acknowledgements (optionally followed by positive and other negative acknowledgements), which we cannot send by using the cumulative part, then we have to choose a map type. To make a decision, we construct the sequence maps and calculate whether the selective maps can acknowledge more blocks. The maximum number of blocks to acknowledge selectively is 64 and it should be a multiple of 16. As for the sequence part, there is a limit for a sequence length and the number of sequences we can send in one message. As a choice is made, we ”attach” map(s) to the cumulative part constructed at the previous stage. Eventually, we will have either the cumulative+ sequence or cumulative+selective feedback type. iii). Note that we can reach this stage in two cases. The first one is when there are no positive acknowledgements in the beginning of the ARQ transmission window and there is no way to create cumulative, cumulative+ selective, or cumulative+sequence types. The second case to reach this stage is when neither cumulative+ selective nor cumulative+sequence feedback types encode all the blocks[11][12]. Fig. 4: ARQ Feedback Types Fig. 5: Constructing sequence maps
  • 4. A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 190 IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 188 GO BACK N(cumulative+sequence feeback type)  Sender keeps copy of up to Ws outstanding packets . - k-bit sequence number, SN in packet header.  When the receiver notices a missing/erroneous frame. - It discards all frames with greater SNs and sends no ACK.  Sender timeout(i): - Retransmit all the frames in its sending window(packet I and all frames after that with higher SNs)  Cumulative ACK - ACK(i): ACK all packets up to, including SN #i Efficiency of Go Back N with transmission errors - Approximate analysis Assume: N= S TO=N*DTP DTP • When an error occurs the entire window of N packets must be retransmitted. Let X = the number of packets sent per successful transmission E[X] = 1*(1-P) + (X+N)*P = 1 + N*P/(1-P) Efficiency = 1/E[X] Simulation Results  Data rate - 25 kbps  Carrier frequency - 20 kHZ  Source-Destination distance - 1 km  Source power level - 94 dB  Sound speed - 1500 m/s  Packet size - 500 bits  Fragmentation/packing- ON  PDU size - as large as possible  CRC/ARQ - ON  ARQ feedback - standalone  ARQ feedback types - Cumulative+sequence  ARQ block size - 16 B  ARQ window - 1024  ARQ block rearrangement- ON  ARQ deliver in order - ON Fig. 6: Uplink throughput (no errors, no ARQ).
  • 5. A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 190 IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 189 Fig. 7: Uplink throughput (errors, ARQ). Fig. 8: Uplink throughput (errors, no ARQ). Fig. 9: Uplink throughput (no ARQ block rearrangement, large PDU).
  • 6. A. Kamatchi et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 9(2), June-August, 2014, pp. 185- 190 IJETCAS 14-572; © 2014, IJETCAS All Rights Reserved Page 190 VI. Conclusion This paper proposes ARQ Technique in wireless network to improve the performance of data transmissions in mobile adhoc network. Network simulation results shows that under mobile adhoc network scenario using WEAC Protocol takes advantage of ARQ technique to reduce the number of dropped packets at relaying nodes, thus can improve the throughput of the network. The proposed solution is based on how to prioritize normal PDUs, ARQ feedbacks, and retransmissions. The simulation results have also revealed the importance of the ARQ block rearrangement functionality. This paper also deals with Go Back N algorithm and its performance over mobile adhoc network. The efficiency of Go Back N algorithm over wireless network also analyzed. This paper also demonstrates that a connection must choose sufficiently large ARQ transmission window size to utilize the allocated resources. While large ARQ blocks can utilize resources even with a small ARQ window, small ARQ blocks, such as those of 16 and 32 bytes, require much larger ARQ window. The proposed lightweight, yet efficient, algorithms are used to select the ARQ feedback type and to build block sequences for the cumulative+sequence feedback type. The analysis of the simulation results for the ARQ feedback types has revealed an importance of the feedback type. The future research works will aim to study the optimal parameters of the ARQ mechanism, which is especially the case for the ARQ-enabled QoS connections. It is also important to compare the results provided by the ARQ mechanism and the HARQ mechanism. References [1] A. G. i Fabregas and G. Caire, “Coded modulation in the block-fading channel: coding theorems and code construction,” IEEE Trans. Inf. Theory, vol. 52, no. 1, pp. 91–114, Jan. 2006. [2] A. Stefanov and E. Erkip, “Cooperative coding for wireless networks”, IEEE Trans. Commun., vol. 52, no. 9, pp. 1470-1476, Sep. 2004. [3] D. Daley and D. Vere-Jones, An Introduction to the Theory of Point Processes. Springer, 2003. [4] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. New York: Cambridge University Press, 2005. [5] J. Li, C. Blake, D. De Couto, H. Lee, and R. Morris, “Capacity of adhoc wireless networks”, In ACM MobiCom’01, July 2001. [6] M. Dianati, X. Ling, K. Naik, and X. Shen, “A node-cooperative ARQ scheme for wireless ad hoc networks,” IEEE Transactions on Vehicular Technology, vol. 46, pp. 1032–1044, May 2006. [7] M. Haenggi and D. Puccinelli, “Routing in ad hoc networks: a case for long hops,” IEEE Commun. Mag., vol. 43, no. 10, pp. 93 – 101, oct. 2005. [8] M. Haenggi, “On distances in uniformly random networks,” IEEE Trans. Inf. Theory, vol. 51, no. 10, pp. 3584–3586, Oct. 2005. [9] M. Janani, A. Hedayat, T. E. Hunter and A. Nostratinia, “Coded cooperation in wireless communications: space-time transmission and iterative decoding,” IEEE Trans. Signal Processing, vol. 52, no. 2, pp. 362-371, Feb. 2004. [10] M. Sikora, J. Laneman, M. Haenggi, D. Costello, and T. Fuja, “Bandwidth- and power-efficient routing in linear wireless networks,” IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2624 –2633, june 2006. [11] P. Gupta and P. R. Kumar, “The capacity of wireless networks”, IEEE Transactions on Information Theory, IT-46(2):388–404, March 2000. [12] R. J. Lavery, “Throughput optimization for wireless data transmission,” M. S. Thesis, Polytechnic University, June 2001.