INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 65    Submit Your Rating     Cite This   Download        Certificate

AACO BASED MRMC TECHNIQUES IN MESH NETWORKS

    2 Author(s):  NAVREET KAUR, DR. JATINDER SINGH SAINI

Vol -  10, Issue- 2 ,         Page(s) : 165 - 171  (2020 ) DOI : https://doi.org/10.32804/RJSET

Abstract

A wireless Mesh network consists of three main components: nodes, gateways, and software. The spatially distributed measurement nodes interface with sensors to monitor assets or their environment. In this research work the optimized MRMC protocol in WMNs is implemented on the basis of AACO optimization scheme. AACO is used to provide a reciprocal path for every link in case of its failure. In this method mutation operator, is used and the new mutation rate is generated by the self-adaptive approach The proposed approach helps to reduce the load and drops in the network, so using the proposed methodology the QOS parameters such as packet delivery ratio, throughput, overheads, average end-to-end delay, average energy consumption are quite improved as shown in the result section. The improvement of 16% is shown between the existing and proposed approach in above defined features.

[1]. Chaudhry, A.U.; Ahmad, N.; Hafez, R.H.M.; “Improving throughput and fairness by improved channel assignment using topology control based on power control for multi-radio multichannel wireless mesh networks”, Wireless Communications and Networking, 2012, pp: 2-26
[2]. Jiong Jina, Marimuthu Palaniswamia,  Bhaskar Krishnamachari: Rate control for heterogeneous wireless sensor networks: Characterization, algorithms and performance:Computer Networks, Issue 17(2012), Pages 3783-3794 
[3]. JavadAkbariTorkestani:An energy-efficient topology construction algorithm for wireless sensor networks: Computer Networks, Volume 57, Issue 7,2013, Pages 1714-1725 
[4]. IbrahimaDiarrassouba, Ali Lourimi, Ali RidhaMahjoub, Habib Youssef: Hose workload based exact algorithm for the optimal design of virtual private networks:Computer Networks, Volume 57, Issue 14, 2013, Pages 2766-2774 
[5]. Chathura M. SarathchandraMagurawalagea, Author Vitae, Kun Yanga, Author Vitae, Liang Hub, Author Vitae, JianmingZhangc, ,Energy-efficient and network-aware offloading algorithm for mobile cloud computing: Computer Networks, Volume 74, Part B,2014, 22-33 
[6]. Dina S.M. Hassan, Hossam M.A. Fahmy, Ayman M. Bahaa-ElDin :RCA: Efficient connected dominated clustering algorithm for mobile ad hoc: Computer Networks, Volume 75, Part A, 24 , 2014, Pages 177-191 
[7]. RóżaGoścień, Krzysztof Walkowiak, MirosławKlinkowski: Tabu search algorithm for routing, modulation and spectrum allocation in elastic optical network with anycast and unicast traffic :Computer Networks, Volume 79, 2015, Pages 148-165
[8]. Noor Al-Nakhala, ,Ryan Riley , TarekElfouly: Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed: Computer Networks, Volume 79, 2015, Pages 30-38 
[9]. Steven Chamberland,Point of presence design in Internet protocol networks with performance guarantees, Computers & Operations Research. 32(2005) 3247-3264. 
[10]. Ping Wang, YunzeCai, Jinjie Huang,XiaomingXu, A hierarchical multicast protocol in mobile IPv6 networks, Computer Communications. 30(2006) 144- 152. 
[11]. Yue-yang LIU, Hong JI,Guang-xin YUE,Routing protocol with Optimal Location of Aggregation Point in Wireless Sensor Networks, The Journal of China Universities of Posts and Telecommunications. 13(2006) 1-5. 
[12]. Alejandro Quintero, Da Yu Li, Harold Castro, A location routing protocol based on smart antennas for ad hoc network, Journal of Network and Computer Applications. 30(2007) 614-636. 
[13]. Zhiguo Wan, Robert H. Deng, FengBao,Akkihebbal L. Ananda, Access control protocols with two-layer architecture for wireless networks, Computer Networks.51(2007) 655-670.
[14]. Tz-Heng Hsu,Jyun-Sian Wu, An application-specific duty cycle adjustment MAC protocol for energy conserving over wireless sensor networks, Computer Communications. 31(2008) 4081-4088. 
[15]. Xin-Xin Ma,Zhi-Guang Qin, Partition and multi-path transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network, Computer Communications. 31(2008) 3059-3063. 
[16]. Jaesub Kim, Kyu Ho Park, An energy-efficient, transport-controlled MAC protocol for wireless sensor networks, Computer Networks. 53(2009) 1879- 1902. 
[17]. Neng-Chung Wang,Chao-Yang Lee, A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks, Journal of Network and Computer Applications. 32(2009) 1153-1166.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details