Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10027006
I. Singh, N. Singh
Device-to-device (D2D) communication is recognised as an emerging technology used in the cellular networks with many advantages such as peer-to-peer (P2P) services, higher spectral efficiency, enhanced throughput and higher data transmission capacity for the fourth generation (4G) and beyond cellular networks. To attain the rising demands of the cellular users, there is always a need to enhance the network transmission capacity of cellular networks. In Long-Term Evolution (LTE) and LTE-Advanced (LTE-A) networks, the study of D2D communications is being interested in academia, industry person and standardisation bodies. In near future, there will be billions of connected user equipment. The next generation networks (NGNs) that to be heterogeneous in nature and demanding higher data rates, lesser delays, enhanced system transmission capacity and better throughput with large coverage. As accessible licensed spectrum assets are limited and for the survival of mobile network operators, it is required to facilitate users as per their rising demands. This survey paper explores the detailed literature of D2D communication for cellular network including their classification based on spectrum used, comparison with other short-distance wireless communication technologies, mobile data traffic growth prediction, advantage and disadvantages, applications and the open issues with work done so far.
{"title":"A compendious study of device-to-device communication underlaying cellular networks","authors":"I. Singh, N. Singh","doi":"10.1504/ijmndi.2019.10027006","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10027006","url":null,"abstract":"Device-to-device (D2D) communication is recognised as an emerging technology used in the cellular networks with many advantages such as peer-to-peer (P2P) services, higher spectral efficiency, enhanced throughput and higher data transmission capacity for the fourth generation (4G) and beyond cellular networks. To attain the rising demands of the cellular users, there is always a need to enhance the network transmission capacity of cellular networks. In Long-Term Evolution (LTE) and LTE-Advanced (LTE-A) networks, the study of D2D communications is being interested in academia, industry person and standardisation bodies. In near future, there will be billions of connected user equipment. The next generation networks (NGNs) that to be heterogeneous in nature and demanding higher data rates, lesser delays, enhanced system transmission capacity and better throughput with large coverage. As accessible licensed spectrum assets are limited and for the survival of mobile network operators, it is required to facilitate users as per their rising demands. This survey paper explores the detailed literature of D2D communication for cellular network including their classification based on spectrum used, comparison with other short-distance wireless communication technologies, mobile data traffic growth prediction, advantage and disadvantages, applications and the open issues with work done so far.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90857626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10029885
Ayoade A. Owoade, I. Osunmakinde
This research develops the ant colony system (ACS) survivability model based on capacity efficiency and fast restoration to swiftly resolve node-node failure problems for increasing quality of service. The resilience of the swarm model was tested on such failures at different locations on 20, 26 and 30 node wireless networks. The proposed ACS-based capacity efficiency model was able to generate near optimal paths, the bandwidth required for fast rerouting, the transmission delay and the transmission time for re-routing voice messages. Increased multiple node failures revealed that transmission delay is high when insufficient bandwidth is used for message transmission. Further experiments revealed that the higher the number of nodes on the network, the higher the bandwidth required to transmit a message effectively. Hence, the ACS-based capacity efficiency model therefore outperforms the Dijkstra algorithm, adaptive and reactive restoration models in terms of speed of transmission, transmission delay and running time complexity. The new solution paths generated from these experiments demonstrated that the proposed swarm technology is feasible for current business applications that require high speed/broadband networks.
{"title":"Surviving node-node failures within wireless networks for a near optimal ant colony system message re-routing","authors":"Ayoade A. Owoade, I. Osunmakinde","doi":"10.1504/ijmndi.2019.10029885","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10029885","url":null,"abstract":"This research develops the ant colony system (ACS) survivability model based on capacity efficiency and fast restoration to swiftly resolve node-node failure problems for increasing quality of service. The resilience of the swarm model was tested on such failures at different locations on 20, 26 and 30 node wireless networks. The proposed ACS-based capacity efficiency model was able to generate near optimal paths, the bandwidth required for fast rerouting, the transmission delay and the transmission time for re-routing voice messages. Increased multiple node failures revealed that transmission delay is high when insufficient bandwidth is used for message transmission. Further experiments revealed that the higher the number of nodes on the network, the higher the bandwidth required to transmit a message effectively. Hence, the ACS-based capacity efficiency model therefore outperforms the Dijkstra algorithm, adaptive and reactive restoration models in terms of speed of transmission, transmission delay and running time complexity. The new solution paths generated from these experiments demonstrated that the proposed swarm technology is feasible for current business applications that require high speed/broadband networks.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75916476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10027010
M. D'Arienzo, S. Romano
The paper presents a framework for the design and implementation of dynamic sensor networks. The focus is on minimising the costs associated with deploying such networks, while at the same time making available a fully fledged set of functions. This is achieved by leveraging a modular design based on an easily programmable, cost-effective micro-controller that can be interfaced with a set of heterogeneous sensors and wireless technologies. A real-world implementation of the proposed architecture is described. Our preliminary in-field performance measurements show that such a system can manage, with a high degree of precision and in real-time, a sustained rate of data gathered from mobile units.
{"title":"A cost effective solution for the deployment of wireless sensor networks","authors":"M. D'Arienzo, S. Romano","doi":"10.1504/ijmndi.2019.10027010","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10027010","url":null,"abstract":"The paper presents a framework for the design and implementation of dynamic sensor networks. The focus is on minimising the costs associated with deploying such networks, while at the same time making available a fully fledged set of functions. This is achieved by leveraging a modular design based on an easily programmable, cost-effective micro-controller that can be interfaced with a set of heterogeneous sensors and wireless technologies. A real-world implementation of the proposed architecture is described. Our preliminary in-field performance measurements show that such a system can manage, with a high degree of precision and in real-time, a sustained rate of data gathered from mobile units.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86588716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10027011
Hongsen Zou, Ang Li, Chen Ao, Puning Zhang, Ning Li, Zheng Wang
In order to minimise the delay of data aggregation scheduling, a task classification aware data aggregation scheduling algorithm is proposed. Through the multi-power and multi-channel approach of sensor nodes, maximum independent sets are used to construct network topology structure based on data aggregation backbone tree. According to the scheduling priority, the data aggregation scheduling within clusters is achieved by approximating the greedy algorithm. Besides, combined with sparse coefficient, sensing task type reduces the amount of data transmission, and then the level of cluster head nodes in the network is used to achieve data aggregation scheduling between clusters. Numerical results show that the proposed algorithm can reduce cluster heads data traffic and energy consumption, while shortening the data aggregation delay and enhancing the network survivability.
{"title":"Task classification-aware data aggregation scheduling algorithm in wireless sensor networks","authors":"Hongsen Zou, Ang Li, Chen Ao, Puning Zhang, Ning Li, Zheng Wang","doi":"10.1504/ijmndi.2019.10027011","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10027011","url":null,"abstract":"In order to minimise the delay of data aggregation scheduling, a task classification aware data aggregation scheduling algorithm is proposed. Through the multi-power and multi-channel approach of sensor nodes, maximum independent sets are used to construct network topology structure based on data aggregation backbone tree. According to the scheduling priority, the data aggregation scheduling within clusters is achieved by approximating the greedy algorithm. Besides, combined with sparse coefficient, sensing task type reduces the amount of data transmission, and then the level of cluster head nodes in the network is used to achieve data aggregation scheduling between clusters. Numerical results show that the proposed algorithm can reduce cluster heads data traffic and energy consumption, while shortening the data aggregation delay and enhancing the network survivability.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"136 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86404963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10029888
Gibson Chengetanai, I. Osunmakinde
A mobile ad hoc network (MANET) is formed by a group of mobile nodes which communicate using wireless links. MANETs are usually deployed in environments where it is difficult to deploy telecommunications, such as in emergency rescue operations. MANET networks are very flexible, as new nodes join and other nodes leave arbitrarily, hence finding an optimal path to route data packets in MANET networks is a challenging domain. This paper presents a review on MANET optimisation routing areas to reveal hidden and less researched areas on swarm-based optimisation routing. The research findings can be used as a reference guide to understand swarm-based optimisation routing techniques in wireless networks. A framework covering various sub-themes on MANET routing optimisation has been developed. Exploration of the generated open research questions can be beneficial in the development of intelligent software critical to optimise mobile network solutions to satisfy network providers and subscribers needs.
{"title":"Swarm intelligence on MANET routing issues: an empirical study revealing latent research topics","authors":"Gibson Chengetanai, I. Osunmakinde","doi":"10.1504/ijmndi.2019.10029888","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10029888","url":null,"abstract":"A mobile ad hoc network (MANET) is formed by a group of mobile nodes which communicate using wireless links. MANETs are usually deployed in environments where it is difficult to deploy telecommunications, such as in emergency rescue operations. MANET networks are very flexible, as new nodes join and other nodes leave arbitrarily, hence finding an optimal path to route data packets in MANET networks is a challenging domain. This paper presents a review on MANET optimisation routing areas to reveal hidden and less researched areas on swarm-based optimisation routing. The research findings can be used as a reference guide to understand swarm-based optimisation routing techniques in wireless networks. A framework covering various sub-themes on MANET routing optimisation has been developed. Exploration of the generated open research questions can be beneficial in the development of intelligent software critical to optimise mobile network solutions to satisfy network providers and subscribers needs.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78642748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10029889
N. Meghanathan
Mobile sensor networks (MSNs) are characteristic of dynamically changing topology due to node mobility. The traditional least overhead routing approach (LORA) to simulate MSNs cannot be applied to quantitatively assess measures of complex network analysis (like assortativity): for example, the assortativity index of one network snapshot need not be the assortativity index of another network snapshot. In this paper, we propose an 'ensemble' approach to collect the underlying information (like the degrees of the end vertices of the links) of the network snapshots over a period of time, and assess the targeted analytical measure (like assortativity index) of the MSN on this ensemble data that will be a representative of the topological changes over the entire simulation time period. The ensemble approach abstracts the node and edge ids and uses only the actual node-level metric values as the basis to calculate the network-level metric of interest.
{"title":"An ensemble approach to analyse mobile sensor networks","authors":"N. Meghanathan","doi":"10.1504/ijmndi.2019.10029889","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10029889","url":null,"abstract":"Mobile sensor networks (MSNs) are characteristic of dynamically changing topology due to node mobility. The traditional least overhead routing approach (LORA) to simulate MSNs cannot be applied to quantitatively assess measures of complex network analysis (like assortativity): for example, the assortativity index of one network snapshot need not be the assortativity index of another network snapshot. In this paper, we propose an 'ensemble' approach to collect the underlying information (like the degrees of the end vertices of the links) of the network snapshots over a period of time, and assess the targeted analytical measure (like assortativity index) of the MSN on this ensemble data that will be a representative of the topological changes over the entire simulation time period. The ensemble approach abstracts the node and edge ids and uses only the actual node-level metric values as the basis to calculate the network-level metric of interest.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88500930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1504/ijmndi.2019.10027007
Shilpa Litake, P. Mukherji
The seamless vertical handover among different wireless systems are required to offer high quality services. It is attained by the developing standard IEEE 802.21 media independent handover (MIH) services. In this paper, single AP scanning, fast ranging and preregistration (SFP) approach is used in which the target AP is chosen based on the proposed idle capacity and signal strength with hybrid PS-GS algorithm. After selecting the target base station (BS), the handover decision algorithm based on SINR enabled with utilising RSSI, available bandwidth and monetary cost. In the proposed vertical handover scenario, the MAC overhead is minimised by reducing the scanning time. The efficiency of the proposed approach is evaluated in terms of scanning time, handover interruption time, handover latency, packet loss, packet delay and throughput. When compared with the existing handover procedures, better results obtained in the proposed handover procedure. The outcomes demonstrate that the hybrid algorithm retains a maximum capacity to escape from local optimums with faster convergence than the standard PSO and GSA.
{"title":"SFP-based vertical handover with MIH services for integrated Wi-Fi and WIMAX networks","authors":"Shilpa Litake, P. Mukherji","doi":"10.1504/ijmndi.2019.10027007","DOIUrl":"https://doi.org/10.1504/ijmndi.2019.10027007","url":null,"abstract":"The seamless vertical handover among different wireless systems are required to offer high quality services. It is attained by the developing standard IEEE 802.21 media independent handover (MIH) services. In this paper, single AP scanning, fast ranging and preregistration (SFP) approach is used in which the target AP is chosen based on the proposed idle capacity and signal strength with hybrid PS-GS algorithm. After selecting the target base station (BS), the handover decision algorithm based on SINR enabled with utilising RSSI, available bandwidth and monetary cost. In the proposed vertical handover scenario, the MAC overhead is minimised by reducing the scanning time. The efficiency of the proposed approach is evaluated in terms of scanning time, handover interruption time, handover latency, packet loss, packet delay and throughput. When compared with the existing handover procedures, better results obtained in the proposed handover procedure. The outcomes demonstrate that the hybrid algorithm retains a maximum capacity to escape from local optimums with faster convergence than the standard PSO and GSA.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72977889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-04DOI: 10.1504/IJMNDI.2018.10015841
Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty
Web services are highly requested in mobile communications to provide seamless connectivity between mobile devices and the cloud server. Web service reliability becomes the most demanding feature, which provides low communication overhead and ensures retrieving the appropriate response to avoid the duplicate request execution problem. In addition, it overcomes the request timeout problem that is one of the most affected issues in the mobile experience. This paper proposes two approaches to achieve the reliable web services consumption, Reliable mobile agent and WebSocket approach (MAWS) and reliable middleware and WebSocket approach (MWS). The two approaches are hybrid between the mobile agent and middleware approaches with WebSocket open connection communication protocol. These approaches recover the data loss because of the intermittent connections, overcomes the timeout problem. Moreover, it enhances the mobile experience by achieving web service consumption reliability.
{"title":"Achieving web services reliability in mobile cloud computing","authors":"Amr S. Abdelfattah, T. Abdelkader, El-Sayed M. El-Horbaty","doi":"10.1504/IJMNDI.2018.10015841","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10015841","url":null,"abstract":"Web services are highly requested in mobile communications to provide seamless connectivity between mobile devices and the cloud server. Web service reliability becomes the most demanding feature, which provides low communication overhead and ensures retrieving the appropriate response to avoid the duplicate request execution problem. In addition, it overcomes the request timeout problem that is one of the most affected issues in the mobile experience. This paper proposes two approaches to achieve the reliable web services consumption, Reliable mobile agent and WebSocket approach (MAWS) and reliable middleware and WebSocket approach (MWS). The two approaches are hybrid between the mobile agent and middleware approaches with WebSocket open connection communication protocol. These approaches recover the data loss because of the intermittent connections, overcomes the timeout problem. Moreover, it enhances the mobile experience by achieving web service consumption reliability.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"61 1","pages":"235"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82778483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-04DOI: 10.1504/IJMNDI.2018.10015835
G. Shanthi, M. Durga
In MANET, trust-based routing algorithm is the major protocol for selecting optimal route path. The optimal path is selected based on the available maximum path trust value in the network and the transmission is occurred through this selected trust path. This kind of transmission should be securable and energy efficient. So, in this paper we have exhibited a trust model for routing with identity-based cryptography in MANET. For effective course way choice we have proposed cognitive agent-based trust model. Cognitive agents are the self-sufficient projects which sense the environment, follow up on nature, and utilise its information to accomplish their goal(s). This cognitive agent is developed with the behaviours-observations-beliefs (BOB) model to assess the convictions or trust esteem for every node in MANET. For securable transmission, likewise we have proposed identity-based cryptography. In identity-based cryptosystem, confirmation of client's legitimacy is accomplished by its one of a unique identifier (ID). Private key produces from a private key generator (PKG) while the public key is acquired from client's ID. From the simulation results, we show that better packet delivery ratio, energy consumption, throughput compared to the previous work.
{"title":"Cognitive-based routing model with identity-based cryptography in MANET","authors":"G. Shanthi, M. Durga","doi":"10.1504/IJMNDI.2018.10015835","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10015835","url":null,"abstract":"In MANET, trust-based routing algorithm is the major protocol for selecting optimal route path. The optimal path is selected based on the available maximum path trust value in the network and the transmission is occurred through this selected trust path. This kind of transmission should be securable and energy efficient. So, in this paper we have exhibited a trust model for routing with identity-based cryptography in MANET. For effective course way choice we have proposed cognitive agent-based trust model. Cognitive agents are the self-sufficient projects which sense the environment, follow up on nature, and utilise its information to accomplish their goal(s). This cognitive agent is developed with the behaviours-observations-beliefs (BOB) model to assess the convictions or trust esteem for every node in MANET. For securable transmission, likewise we have proposed identity-based cryptography. In identity-based cryptosystem, confirmation of client's legitimacy is accomplished by its one of a unique identifier (ID). Private key produces from a private key generator (PKG) while the public key is acquired from client's ID. From the simulation results, we show that better packet delivery ratio, energy consumption, throughput compared to the previous work.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"4 1","pages":"207"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88641485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-04DOI: 10.1504/IJMNDI.2018.10012970
Gurpreet Singh Chhabra, Gurudutta Verma, P. S. Patheja
A mobile ad hoc network is a collection of mobile nodes with the versatile environment. Since the node varies at each time it is difficult to design the routing protocol in terms of qualities such as energy efficient, routing overhead, bandwidth capabilities and so on. Various researches has been undertaken to make a reliable routing protocol for proper communication. On considering this, we designed a routing protocol based on the fuzzy and ant colony algorithm for a multipath network. In this, fuzzy is used to determine the node qualities with the node value based on energy, nodes signal strength and mobility. Then the ant colony optimisation helps to reach the destination shortly from the multiple paths with the distance from source to destination and the node value from fuzzy. On combining these two methods the routing protocol was proposed and it compared with the existing MMQARP routing protocol. The simulation result shows that the proposed method gives high performance efficiency in transferring the data from source to destination with the high packet delivery ratio, less delay and high jitter.
{"title":"Efficient fuzzy ant colony-based multipath QoS aware routing protocol in mobile ad hoc network","authors":"Gurpreet Singh Chhabra, Gurudutta Verma, P. S. Patheja","doi":"10.1504/IJMNDI.2018.10012970","DOIUrl":"https://doi.org/10.1504/IJMNDI.2018.10012970","url":null,"abstract":"A mobile ad hoc network is a collection of mobile nodes with the versatile environment. Since the node varies at each time it is difficult to design the routing protocol in terms of qualities such as energy efficient, routing overhead, bandwidth capabilities and so on. Various researches has been undertaken to make a reliable routing protocol for proper communication. On considering this, we designed a routing protocol based on the fuzzy and ant colony algorithm for a multipath network. In this, fuzzy is used to determine the node qualities with the node value based on energy, nodes signal strength and mobility. Then the ant colony optimisation helps to reach the destination shortly from the multiple paths with the distance from source to destination and the node value from fuzzy. On combining these two methods the routing protocol was proposed and it compared with the existing MMQARP routing protocol. The simulation result shows that the proposed method gives high performance efficiency in transferring the data from source to destination with the high packet delivery ratio, less delay and high jitter.","PeriodicalId":35022,"journal":{"name":"International Journal of Mobile Network Design and Innovation","volume":"97 1","pages":"225"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}