• Title/Summary/Keyword: number of nodes

Search Result 2,151, Processing Time 0.027 seconds

A Scalable Explicit Multicast Protocol for MANETs

  • Gossain Hrishikesh;Anand Kumar;Cordeiro Carlos;Agrawal Dharma P.
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.294-306
    • /
    • 2005
  • Group oriented multicast applications are becoming increasingly popular in mobile ad hoc networks (MANETs). Due to dynamic topology of MANETs, stateless multicast protocols are finding increased acceptance since they do not require maintenance of state information at intermediate nodes. Recently, several multicast schemes have been proposed which scale better' with the number of multicast sessions than traditional multicast strategies. These schemes are also known as explicit multicast (Xcast; explicit list of destinations in the packet header) or small group multicast (SGM). In this paper, we propose a new scheme for small group' multicast in MANETs named extended explicit multicast (E2M), which is implemented on top of Xcast and introduces mechanisms to make it scalable with number of group members for a given multicast session. Unlike other schemes, E2M does not make any assumptions related to network topology or node location. It is based on the novel concept of dynamic selection of Xcast forwarders (XFs) between a source and its potential destinations. The XF selection is based on group membership and the processing overhead involved in supporting the Xcast protocol at a given node. If the number of members in a given session is small, E2M behaves just like the basic Xcast scheme with no intermediate XFs. As group membership increases, nodes may dynamically decide to become an XF. This scheme, which can work with few E2M aware nodes in the network, provides transparency of stateless multicast, reduces header processing overhead, minimizes Xcast control traffic, and makes Xcast scalable with the number of group members.

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

  • Karimi, Hamid;Kargahi, Mehdi;Yazdani, Nasser
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.413-434
    • /
    • 2010
  • Wireless sensor networks are usually characterized by dense deployment of energy constrained nodes. Due to the usage of a large number of sensor nodes in uncontrolled hostile or harsh environments, node failure is a common event in these systems. Another common reason for node failure is the exhaustion of their energy resources and node inactivation. Such failures can have adverse effects on the quality of the real-time services in Wireless Sensor Networks (WSNs). To avoid such degradations, it is necessary that the failures be recovered in a proper manner to sustain network operation. In this paper we present a dynamic Energy efficient Real-Time Job Allocation (ERTJA) algorithm for handling node failures in a cluster of sensor nodes with the consideration of communication energy and time overheads besides the nodes' characteristics. ERTJA relies on the computation power of cluster members for handling a node failure. It also tries to minimize the energy consumption of the cluster by minimum activation of the sleeping nodes. The resulting system can then guarantee the Quality of Service (QoS) of the cluster application. Further, when the number of sleeping nodes is limited, the proposed algorithm uses the idle times of the active nodes to engage a graceful QoS degradation in the cluster. Simulation results show significant performance improvements of ERTJA in terms of the energy conservation and the probability of meeting deadlines compared with the other studied algorithms.

Evaluation of the 7th AJCC TNM Staging System in Point of Lymph Node Classification

  • Kim, Sung-Hoo;Ha, Tae-Kyung;Kwon, Sung-Joon
    • Journal of Gastric Cancer
    • /
    • v.11 no.2
    • /
    • pp.94-100
    • /
    • 2011
  • Purpose: The 7th AJCC tumor node metastasis (TNM) staging system modified the classification of the lymph node metastasis widely compared to the 6th edition. To evaluate the prognostic predictability of the new TNM staging system, we analyzed the survival rate of the gastric cancer patients assessed by the 7th staging system. Materials and Methods: Among 2,083 patients who underwent resection for gastric cancer at the department of surgery, Hanyang Medical Center from July 1992 to December 2009, This study retrospectively reviewed 5-year survival rate (5YSR) of 624 patients (TanyN3M0: 464 patients, TanyNanyM1: 160 patients) focusing on the number of metastatic lymph node and distant metastasis. We evaluated the applicability of the new staging system. Results: There were no significant differences in 5YSR between stage IIIC with more than 29 metastatic lymph nodes and stage IV (P=0.053). No significant differences were observed between stage IIIB with more than 28 metastatic lymph nodes and stage IV (P=0.093). Distinct survival differences were present between patients who were categorized as TanyN3M0 with 7 to 32 metastatic lymph nodes and stage IV. But patients with more than 33 metastatic lymph nodes did not show any significant differences compared to stage IV (P=0.055). Among patients with TanyN3M0, statistical significances were seen between patients with 7 to 30 metastatic lymph nodes and those with more than 31 metastatic lymph nodes. Conclusions: In the new staging system, modifications of N classification is mandatory to improve prognostic prediction. Further study involving a greater number of cases is required to demonstrate the most appropriate cutoffs for N classification.

ESBL: An Energy-Efficient Scheme by Balancing Load in Group Based WSNs

  • Mehmood, Amjad;Nouman, Muhammad;Umar, Muhammad Muneer;Song, Houbing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4883-4901
    • /
    • 2016
  • Energy efficiency in Wireless Sensor Networks (WSNs) is very appealing research area due to serious constrains on resources like storage, processing, and communication power of the sensor nodes. Due to limited capabilities of sensing nodes, such networks are composed of a large number of nodes. The higher number of nodes increases the overall performance in data collection from environment and transmission of packets among nodes. In such networks the nodes sense data and ultimately forward the information to a Base Station (BS). The main issues in WSNs revolve around energy consumption and delay in relaying of data. A lot of research work has been published in this area of achieving energy efficiency in the network. Various techniques have been proposed to divide such networks; like grid division of network, group based division, clustering, making logical layers of network, variable size clusters or groups and so on. In this paper a new technique of group based WSNs is proposed by using some features from recent published protocols i.e. "Energy-Efficient Multi-level and Distance Aware Clustering (EEMDC)" and "Energy-Efficient Multi-level and Distance Aware Clustering (EEUC)". The proposed work is not only energy-efficient but also minimizes the delay in relaying of data from the sensor nodes to BS. Simulation results show, that it outperforms LEACH protocol by 38%, EEMDC by 10% and EEUC by 13%.

Analysis of Effects of Hidden Nodes and CCA Deferment Algorithm on IEEE 802.15.4 Performance Using ns-2 Simulator (ns-2 시뮬레이터를 이용한 은닉 노드와 CCA 지연 알고리즘이 IEEE 802.15.4 네트워크의 성능에 미치는 영향 분석)

  • Lee, Kang-Woo;Hyun, Gyu-Wan;Shin, Youn-Soon;Ahn, Jong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.393-406
    • /
    • 2009
  • This paper introduces two functions added to the current version of ns-2 simulator for better accuracy of IEEE 802.15.4 network simulations. The first one is to automatically place hidden nodes over the ring topology in which the coordinator is centered, when the number of hidden nodes and total number of nodes is given. Collisions of signals can be distinguished into the trace file according to the ways of participation of hidden nodes. The second one is the CCA deferment algorithm described in IEEE 802.15.4-2006 standard which is not implemented in the current version of ns-2. Owing to these additional functions, we can carry out the precise analysis of the performance effects of hidden nodes and CCA deferment algorithm on 802.15.4 networks. Simulation results present at least 66% of performance degradation in throughput and drastic increase of collision probability up to 90% from 65% by just a single hidden node. Besides, 2006 standard for CCA deferment algorithm gives 19% lower collision probability and 38% higher performance.

A Genetic Algorithm for the Traveling Salesman Problem Using Prufer Number (Prufer 수를 이용한 외판원문제의 유전해법)

  • 이재승;신해웅;강맹규
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.41
    • /
    • pp.1-14
    • /
    • 1997
  • This study proposes a genetic algorithm using Pr(equation omitted)fer number for the traveling salesman problem(PNGATSP). Nearest neighbor nodes are mixed with randomly selected nodes at the stage of generating initial solutions. Proposed PNGATSP adopts a few ideas which are different from traditional genetic algorithms. For instance, an exponential fitness function and elitism are used and Pr(equation omitted)fer number is used for encoding TSP. Genetic operators are selected by experiments, which make a good solution among four combinations of conventional genetic operators and new genetic operators. For respective combinations, robust set of parameters is determined by the experimental designing approach. The feature of Pr(equation omitted)fer number code for TSP and the search power of GA using Pr(equation omitted)fer number is analysed. The best is a combination of OX(order crossover) and swap, which is superior to the other experimented combinations of genetic operators by 1.0%∼12.8% deviation.

  • PDF

A Border Line-Based Pruning Scheme for Shortest Path Computations

  • Park, Jin-Kyu;Moon, Dae-Jin;Hwang, Een-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.939-955
    • /
    • 2010
  • With the progress of IT and mobile positioning technologies, various types of location-based services (LBS) have been proposed and implemented. Finding a shortest path between two nodes is one of the most fundamental tasks in many LBS related applications. So far, there have been many research efforts on the shortest path finding problem. For instance, $A^*$ algorithm estimates neighboring nodes using a heuristic function and selects minimum cost node as the closest one to the destination. Pruning method, which is known to outperform the A* algorithm, improves its routing performance by avoiding unnecessary exploration in the search space. For pruning, shortest paths for all node pairs in a map need to be pre-computed, from which a shortest path container is generated for each edge. The container for an edge consists of all the destination nodes whose shortest path passes through the edge and possibly some unnecessary nodes. These containers are used during routing to prune unnecessary node visits. However, this method shows poor performance as the number of unnecessary nodes included in the container increases. In this paper, we focus on this problem and propose a new border line-based pruning scheme for path routing which can reduce the number of unnecessary node visits significantly. Through extensive experiments on randomly-generated, various complexity of maps, we empirically find out optimal number of border lines for clipping containers and compare its performance with other methods.

Performance of an Interworking on the VLC (VLC에서 이동망간 연동성 성능분석)

  • Wang, Ye;Zhang, Xiao-Lei;Chen, Weiwei;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.9-16
    • /
    • 2011
  • This paper represents an interworking architecture for keeping the VLC audio quality between Worldwide Interoperability for Microwave Access (WiMAX) and IEEE 802.11 Mobile Ad hoc Network (MANET) where both mobile routers and mobile nodes are moving dynamically. Systematic performance analysis on the interworking architecture has been conducted by using OPNET simulator to show the results such as Packet Delivery Ratio (PDR) and throughput. Based on simulation results, when the number of MANET nodes is small, PDR remains relatively stable even though data packets increase. However, with the many MANET nodes, PDR decreases as data traffic increases. Throughput is affected by the number of MANET nodes. Especially when the MANET node density has increased further, throughput is much higher, but it is not affected by the mobility speed. However, FTP download and upload response time is not affected much by both the number of MANET nodes and the mobility speed.

Evaluation of the Effects of a Grouping Algorithm on IEEE 802.15.4 Networks with Hidden Nodes

  • Um, Jin-Yeong;Ahn, Jong-Suk;Lee, Kang-Woo
    • Journal of Communications and Networks
    • /
    • v.16 no.1
    • /
    • pp.81-91
    • /
    • 2014
  • This paper proposes hidden-node aware grouping (HAG) algorithm to enhance the performance of institute of electrical and electronics engineers (IEEE) 802.15.4 networks when they undergo either severe collisions or frequent interferences by hidden nodes. According to the degree of measured collisions and interferences, HAG algorithm dynamically transforms IEEE 802.15.4 protocol between a contention algorithm and a contention-limited one. As a way to reduce the degree of contentions, it organizes nodes into some number of groups and assigns each group an exclusive per-group time slot during which only its member nodes compete to grab the channel. To eliminate harmful disruptions by hidden nodes, especially, it identifies hidden nodes by analyzing the received signal powers that each node reports and then places them into distinct groups. For load balancing, finally it flexibly adapts each per-group time according to the periodic average collision rate of each group. This paper also extends a conventional Markov chain model of IEEE 802.15.4 by including the deferment technique and a traffic source to more accurately evaluate the throughput of HAG algorithm under both saturated and unsaturated environments. This mathematical model and corresponding simulations predict with 6%discrepancy that HAG algorithm can improve the performance of the legacy IEEE 802.15.4 protocol, for example, even by 95% in a network that contains two hidden nodes, resulting in creation of three groups.

Dynamic Probabilistic Flooding Algorithm based-on the Number of Child and Sibling Nodes in Wireless Sensor Networks (무선 센서 네트워크에서 자식 노드 수와 형제 노드 수에 따른 동적 확률기반 플러딩 알고리즘)

  • Jeong, Hyo-Cheol;Yoo, Young-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.499-504
    • /
    • 2010
  • The flooding is the simplest and effective way to disseminate a packet to all nodes in a wireless sensor network (WSN). However, basic flooding makes all nodes transmit the packet at least once, resulting in the broadcast storm problem in a serious case, in turn network resources become severely wasted. Particularly, power is one of the most valuable resources of WSNs as nodes are powered by battery, then the waste of energy by the basic flooding lessens the lifetime of WSNs. In order to solve the broadcast storm problem, this paper proposes a dynamic probabilistic flooding that utilizes the neighbor information like the number of child and sibling nodes. Simulation results show that the proposed method achieves a higher packet delivery ratio with the similar number of duplicate packets as compared to existing schemes.