scholarly journals Wireless Networking Performance in IoT Using Adaptive Contention Window

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
R. M. Bhavadharini ◽  
S. Karthik ◽  
N. Karthikeyan ◽  
Anand Paul

Internet of Things (IoT) network contains heterogeneous resource-constrained computing devices which has its unique reputation in IoT environments. In spite of its distinctiveness, the network performance deteriorates by the distributed contention of the nodes for the shared wireless medium in IoT. In IoT network, the Medium Access Control (MAC) layer contention impacts the level of congestion at the transport layer. Further, the increasing node contention at the MAC layer increases link layer frame drops resulting in timeouts at the transport layer segments and the performance of TCP degrades. In addition to that, the expiration of maximum retransmission attempts and the high contentions drive the MAC retransmissions and the associated overheads to reduce the link level throughput and the packet delivery ratio. In order to deal with aforementioned problems, the Adaptive Contention Window (ACW) is proposed, which aims to reduce the MAC overhead and retransmissions by determining active queue size at the contending nodes and the energy level of the nodes to improve TCP performance. Further, the MAC contention window is adjusted according to the node’s active queue size and the residual energy and TCP congestion window is dynamically adjusted based on the MAC contention window. Hence, by adjusting the MAC Adaptive Contention Window, the proposed model effectively distributes the access to medium and assures improved network throughput. Finally, the simulation study implemented through ns-2 is compared with an existing methodology such as Cross-Layer Congestion Control and dynamic window adaptation (CC-BADWA); the proposed model enhances the network throughput with the minimal collisions.

Wireless Sensor Networks (WSN) is a group of sensor devices, which are used to sense the surroundings. The network performance is still an issue in the WSN and an efficient protocol is introduced such as LEACH. To improve the stability, LEACH with fuzzy descriptors is used in preceding research. However the existing has drawback with effective group formation in heterogeneous WSN and also it is not achieved the Super Leader Node (SLH). To overcome the above mentioned issues, the proposed system enhances the approach which is used for increasing the energy consumption, packet delivery ratio, and bandwidth and network lifetime. The proposed paper contains three phases such as grouping formation, Leader Node (LN) selection, SLN selection with three main objectives:(i) to acquire Energy-Efficient Prediction Clustering Algorithm (EEPCA) in heterogeneous WSN for grouping formation (ii)To design Low Energy Adaptive Clustering Hierarchy- Expected Residual Energy (LEACH-ERE) protocol for LN selection.(iii)To optimize the SCH selection by Particle Swarm Optimization (PSO) based fuzzy approach. The clustering formation is done by Energy-Efficient Prediction Clustering Algorithm (EEPCA) in heterogeneous WSN. It is used to calculate the sensor nodes which have shortest distance between each node. The LEACH-ERE protocol was proposed to form a Leader Node (LN) and all the nodes has to communicate with sink through LN only. New SLN is elected based on distance from the sink and battery power of the node.


2020 ◽  
Vol 10 (19) ◽  
pp. 6814
Author(s):  
Jae-Han Lim ◽  
Eun-Kyu Lee

Accurate estimation of a neighbor’s evolving position is essential to enhancing safety in intelligent transport systems. A vehicle can estimate a neighbor’s evolving position via periodic beaconing wherein each vehicle periodically broadcasts a beacon including its own kinematic data (e.g., position, speed, and acceleration). Many researchers have proposed analytic models to describe periodic beaconing in vehicular ad-hoc networks (VANETs). However, those models have focused only on network performance, e.g., packet delivery ratio (PDR), or a delay, which fail to evaluate the accuracy of estimating a neighbor’s evolving position. In this paper, we present a new analytic model capable of providing an estimation error of a neighbor’s evolving position in VANET to assess the accuracy of the estimation. This model relies on a vehicle system using periodic beaconing and a constant speed and position estimator (CSPE) to estimate a neighbor’s evolving position. To derive an estimation error, we first calculate the estimation error using a simple equation, which is associated with a probability of successful reception. Then, we derive the probability of successful reception that is applied onto the error model. To our knowledge, this is the first paper to establish a mathematical model to assess the accuracy of estimating a neighbor’s evolving position. To validate the proposed model, we compared the numerical results of the model with those of the NS-2 simulation. We observed that numerical results of the proposed model were located within the 95% confidential intervals of simulations results.


2020 ◽  
Vol 25 (6) ◽  
pp. 803-811
Author(s):  
Nadia Zerguine ◽  
Mohammed Mostefai ◽  
Zibouda Aliouat ◽  
Yacine Slimani

Mobile ad hoc networks (MANETs) consist of self-configured mobile wireless nodes capable of communicating with each other without any fixed infrastructure or centralized administration using the medium radio. Wireless technology is based on standard IEEE.802.11. The IEEE 802.11 Distributed Coordination Function (DCF) MAC layer uses the Binary Exponential Backoff (BEB) algorithm to deal with wireless network collisions. BEB is considered effective in reducing the probability of collisions but at the expense of numerous network performance measures, such as throughput and packets delivery ratio, mainly in high traffic load. Deep Reinforcement Learning (DRL) is a DL technique in which an agent can achieve a goal by interacting with the environment. In this paper, using one of the DRL models, we propose Q-learning (QL) to optimize MAC protocols' performance based on the contention window (CW) in MANETs. The intelligent proposed MISQ takes into account the number of packets to be transmitted and the collisions committed by each station to select the appropriate contention window. The performance of the proposed mechanism is evaluated by using in-depth simulations. The outputs indicate that the intelligent proposal mechanism learns various MANETS environments and optimizes performance over standard MAC protocol. The performance of MISQ is evaluated in various networks with throughput, channel access delay, and packets delivery rate as performance measures.


2017 ◽  
Vol 2017 ◽  
pp. 1-8 ◽  
Author(s):  
Trong-Minh Hoang ◽  
Van-Kien Bui ◽  
Thanh-Tra Nguyen

Security of any wireless network is always an important issue due to its serious impacts on network performance. Practically, the IEEE 802.11 medium access control can be violated by several native or smart attacks that result in downgrading network performance. In recent years, there are several studies using analytical model to analyze medium access control (MAC) layer misbehavior issue to explore this problem but they have focused on binary exponential backoff only. Moreover, a practical condition such as the freezing backoff issue is not included in the previous models. Hence, this paper presents a novel analytical model of the IEEE 802.11 MAC to thoroughly understand impacts of misbehaving node on network throughput and delay parameters. Particularly, the model can express detailed backoff algorithms so that the evaluation of the network performance under some typical attacks through numerical simulation results would be easy.


2012 ◽  
Vol 58 (1) ◽  
Author(s):  
Nor-Syahidatul N. Ismail ◽  
F. Yunus ◽  
S. H. Syed Ariffin ◽  
A. A. Shahidan ◽  
N. Fisal ◽  
...  

The design of Medium Access Control (MAC) layer in Wireless Sensor Network (WSN) is very important because it gives significant impact in network performance especially in term of energy consuming. Contention Access method which is Carrier Sense Multiple Access (CSMA) will encounter collision problem when more than one node want to access the network simultaneously. Meanwhile, the issue in slotted access which is Time Division Multiple Access (TDMA) is channel utilization when the usage of the slot is neglected and wasted in transmission network. In this paper, we propose a hybrid MAC that combines both strengths of CSMA and TDMA in one protocol while avoiding their weaknesses to improve the network performance. The simple and efficient transmission in CSMA method will be used in neighbor discovery (ND) and slot allocation (SA) process. For data transmission, non collision transmission method which is TDMA will be used and it will be changed to CSMA depending on the contention level of the channel. This proposed protocol is suitable for priority application usage where the important information will arrived at the destination in acceptable delay time.


2018 ◽  
Vol 7 (3) ◽  
pp. 1220
Author(s):  
Aditya Saxena ◽  
Jyoti Singhai ◽  
Deepak Raghuvanshi

The bandwidth-intensive network applications with aggressive quality of service (QoS) requirements requires fast and efficient networks. The wireless network performance is impacted due to multitude of data transport at uneven transmission rates on various channels and line losses leading to congestion. It is a big challenge to achieve the required QoS by managing delay, jitter, bandwidth and packet loss parame-ters on a network. This paper highlights the major causes affecting QoS and proposes an optimization technique which allocates the channel dynamically by integrating all the parameters affecting QoS across network layer, medium access control (MAC) layer and physical layer. The proposed algorithm utilizes the feedback parameters namely queueing delay, packet priority and timeout, MAC layer contention delay and packet loss ratio as inputs and a closed loop processing control for the scheduler based on fuzzy logic control (FLC). Hence, the algo-rithm is more realistic and considers the line conditions. The simulation results show that the proposed algorithm is faster and utilizes the overall network more efficiently.   


Author(s):  
R. Soundarya

Abstract: Wireless sensor networks are widely used due to its usage and advantages because it can utilize in mission critical tasks. One of the major issues in WSN is reliable data delivery without any loss and to increase network lifetime by utilizing energy efficient process. The objective of this work is to increase network lifetime at the same time ensuring high packet delivery ratio. Clustering is one of the best methods to increase network lifetime, however election process of cluster head will consume energy and reduces network performance. Therefore in proposed work, energy efficient cluster based routing protocol has been implemented which includes residual energy and distance as major parameter to form cluster. Cluster head selection will be a static process, once cluster is formed cluster head will be selected through election process after transaction the residual energy in CH will be checked with the threshold value and same CH will again act as head this reduces cluster formation and election process. In addition to provide secure data transaction MD5 algorithm has been implemented. Attack based data loss is also reduced and concentrated in proposed work to achieve objective of this work. Keywords: (SSCHS) Secure static cluster head selection, network lifetime, cluster, MD5 and Static cluster head.


2019 ◽  
Vol 8 (1) ◽  
pp. 336-342
Author(s):  
Siti Asilah Yah ◽  
Naimah Yaakob ◽  
Mohamed Elshaikh Elobaid ◽  
Ong Bi Lynn ◽  
R. Badlishah ◽  
...  

Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.


2016 ◽  
Vol 2016 ◽  
pp. 1-17
Author(s):  
Chen Chen ◽  
Hongyu Xiang ◽  
Canding Sun ◽  
Qingqi Pei

The broadcasting plays a vital role for context awareness in VANETs (Vehicular Ad Hoc Networks) whose primary goal is to improve the driving safety depending on effective information exchanging. In this paper, based on the LQG (linear quadratic Gaussian) optimal control theory, a broadcasting control scheme named LQG-CCA is proposed to improve the network throughput thus increasing the opportunities for the safety-related events to be successfully handled. By predicting the network throughput with the Kalman filter model, our LQG model is envisioned to minimize the difference between the predicted and expected throughput through the adjustment of CCA (Clear Channel Assessment) sensing threshold. Numerical results show that our proposed model can significantly improve the network performance in terms of average throughput, average End-to-End delay, and average packets delivery ratio compared with a highly cited work D-FPAV and a latest published model APPR.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 411
Author(s):  
Saba Awan ◽  
Nadeem Javaid ◽  
Sameeh Ullah ◽  
Asad Ullah Khan ◽  
Ali Mustafa Qamar ◽  
...  

In this paper, an encryption and trust evaluation model is proposed on the basis of a blockchain in which the identities of the Aggregator Nodes (ANs) and Sensor Nodes (SNs) are stored. The authentication of ANs and SNs is performed in public and private blockchains, respectively. However, inauthentic nodes utilize the network’s resources and perform malicious activities. Moreover, the SNs have limited energy, transmission range and computational capabilities, and are attacked by malicious nodes. Afterwards, the malicious nodes transmit wrong information of the route and increase the number of retransmissions due to which the SNs’ energy is rapidly consumed. The lifespan of the wireless sensor network is reduced due to the rapid energy dissipation of the SNs. Furthermore, the throughput increases and packet loss increase with the presence of malicious nodes in the network. The trust values of SNs are computed to eradicate the malicious nodes from the network. Secure routing in the network is performed considering residual energy and trust values of the SNs. Moreover, the Rivest–Shamir–Adleman (RSA), a cryptosystem that provides asymmetric keys, is used for securing data transmission. The simulation results show the effectiveness of the proposed model in terms of high packet delivery ratio.


Sign in / Sign up

Export Citation Format

Share Document