i-manager's Journal on Wireless Communication Networks (JWCN)


Volume 7 Issue 1 April - June 2018

Research Paper

Taguchi Design of Experiments Approach to Find the Most Significant Factor of DYMO Routing Protocol in Mobile AD HOC Networks

P. M. Manohar* , Pallam Setty S.**
* Research Scholar, Department of Computer Science Engineering, JNTUK, Andhra Pradesh, India.
** Professor, Department of Computer Science and System Engineering, AUCE (A), Andhra University, Visakhapatnam, Andhra Pradesh, India.
Manohar, P. M., Setty, S. P. (2018). Taguchi Design of Experiments Approach to Find the Most Significant Factor of DYMO Routing Protocol in Mobile Ad Hoc Networks. i-manager's Journal on Wireless Communication Networks, 7(1), 1-11. https://doi.org/10.26634/jwcn.7.1.14971

Abstract

Mobile Ad hoc Network (MANET) attracted many proficient researchers because of its various features. In MANETs, routing is a challenging issue because of route changes and link breaks. Among the reactive routing protocols in MANETs, Dynamic MANET On-demand (DYMO) routing protocol is selected because it is scalable for larger networks and it has less routing overhead. Drawback of DYMO routing protocol is that it does not support for smaller networks with low mobility speed. In this paper, we apply Taguchi Design of Experiments approach to identify the most significant factor that enhance (Quality of Service) QoS performance of DYMO routing protocol for smaller networks with low mobility by considering Route Request Wait Time(RRWT),Route Timeout(RT), Route Request Retries(RRT)as influencing parameters of DYMO routing protocol. The impact of three influential factors on two QoS performance metrics i,e Average Throughput and Packet Delivery Ratio has been evaluated. The experiments are run on NS2 simulator and the results are analyzed through Statistical tool Minitabusing Main Effects Plot, Response Table and validated using Normal probability plot of Residuals, Residual Histogram, Residuals vs Fits, Residuals vs Order. The Route Request Wait Time (RRWT) is identified as the most significant factor among the other factors for enhancing QoS of DYMO routing protocol for smaller and medium network sizes.

Research Paper

Implementation of Traffic Engineering Technique in MPLS Network using RSVP

Nisha R.* , N. Usha Bhanu**
* M.E (Communication Systems), Department of Electronics and Communication Engineering, Valliammai Engineering College, Chennai, Tamil Nadu, India.
** Associate Professor, Department of Electronics and Communication Engineering, Valliammai Engineering College, Chennai, Tamil Nadu, India.
Nisha, R., Bhanu, U. N. (2018). Implementation of Traffic Engineering Technique in MPLS Network using RSVP. i-manager's Journal on Wireless Communication Networks, 7(1), 12-16. https://doi.org/10.26634/jwcn.7.1.15000

Abstract

This paper proposes TE (Traffic Engineering) in MPLS (Multi Protocol Label Switching) networks to provide alternate data path link when the network is congested. TE automatically creates and maintains a label switch path networks using RSVP (Resource Reservation Protocol).RSVP reserves the bandwidth along the path from the source to destination. The main novelty of this paper is implementing MPLS TE that it provides a combination of ATM's TE capabilities along the CoS (Class of service) at layer 2.5 to reduce latency and to improve the speed. The tunnel formation along the LSP (Label Switch Path) for forwarding packets and is simulated using GNS3 tool. The simulation results for MPLS network with OSPF(Open Shortest Path First ) and with two tunnels achieves a round trip time of 36milliseconds for data packet size of 8000 bytes faster than existing network with reduced latency and high speed. This paper provides backup and elimination of redundancy tunnels by implementing Fast Rerouting technique in router.

Research Paper

Performance Evaluation of Advanced Congestion Control Mechanisms for COAP

Chandra Sekhar Sanaboina* , Tejeswar Eluri**
* Assistant Professor, Department of Computer Science and Engineering, JNTUK, Kakinada, Andhra Pradesh, India.
** M.Tech Student, Department of Computer Science and Engineering, JNTUK, Kakinada, Andhra Pradesh, India.
Sanaboina, C. S., Eluri, T. (2018). Performance Evaluation of Advanced Congestion Control Mechanisms for COAP. i-manager's Journal on Wireless Communication Networks, 7(1), 17-28. https://doi.org/10.26634/jwcn.7.1.14863

Abstract

In Internet of Things (IoT), the simple IPv6 capable electronic devices with limited hardware resources like memory and power resources are called constrained devices. Congestion is a major issue in network communications of these devices. To solve congestion in networks of constrained devices, Internet Engineering Task Force (IETF) had designed Constrained Application Protocol (CoAP). CoAP deals congestion with a basic Congestion Control (CC) mechanism called Default CoAP. Afterward, CoCoA and CoCoA+, an Internet-draft-recommendations, has been introduced as the elective CC mechanisms for CoAP. However, limited evaluations had done on these CC mechanisms of CoAP. In this paper, the performance evaluation of Default CoAP, CoCoA, and CoCoA+ Congestion control mechanisms are evaluated through Simulations in different network topologies and varied in different Link Delivery Ratios (LDR) of sensor nodes in constant traffic scenario by using Cooja Simulator. The simulation results are generated and CoCoA+ shows a better performance in constant traffic scenario comparing to Default CoAP and CoCoA.

Research Paper

Design of Hexagonal Antenna using Meander Fractal Geometry for Wideband Applications

Sumeet Singh Bhatia* , Harpreet Kaur**, Shashi B. Rana***
* Research Scholar, Department of Electronics and Communication Engineering, Yadavindra College of Engineering, Punjabi University, Bathinda, Punjab, India.
** PG Scholar, Department of Communication Engineering, GNDU, Regional Campus, Gurdaspur, Punjab, India.
*** Assistant Professor, Department of Electronics and Communication Engineering, Guru Nanak Dev University Regional Campus Gurdaspur, Punjab, India.
Bhatia, S. S., Kaur, H., Rana, S. B. (2018). Design of Hexagonal Antenna using Meander Fractal Geometry for Wideband Applications. i-manager's Journal on Wireless Communication Networks, 7(1), 29-39. https://doi.org/10.26634/jwcn.7.1.15369

Abstract

A design of hexagonal antenna using Meander fractal geometry for wideband applications is investigated and presented in this paper. Partial ground plane is used in the proposed design, which is further modified by varying its length from 7mm to 10mm and it is fed by a microstrip transmission line whose width is also varied from 1mm to 1.8mm, for achieving the wideband characteristics. The overall size of proposed antenna is 44.92 × 45mm2; it operates over the frequency ranges of 2.89 – 6.09 GHz and 7.35 – 8.65 GHz, suitable for WiMAX (3.4 – 3.69 GHz), WLAN (5.15 – 5.35 GHz and 5.72 – 5.82 GHz), point to point high speed wireless communication (5.925 – 8.5 GHz) and X-band for satellite communications (7.25 – 8.39 GHz). Reasonable agreement has been reported between the simulated and measured results. Proposed antenna shows the omnidirectional and dipole-like radiation pattern at the various frequency bands and also shows the good value of gain throughout the operating frequency range. In addition, the effects of the length of partial ground plane and the width of transmission line on the performance of proposed antenna is analyzed and discussed in detail.

Review Paper

Managing Data Privacy in Smart Health and Smart Vehicle

Kahkashan Siddavatam* , Sonal Bankar**, Sulbha Yadav***
*-*** Assistant Professor, Department of Computer Engineering, Lokmanya Tilak College of Engineering, Navi Mumbai, Maharashtra, India.
Siddavatam, K., Bankar, S., Yadav, S. (2018). Managing Data Privacy in Smart Health and Smart Vehicle. i-manager's Journal on Wireless Communication Networks, 7(1), 40-46. https://doi.org/10.26634/jwcn.7.1.15319

Abstract

The services provided by multiple IoT devices require certain amount of personal information to be gathered, processed and exchanged. The personal information data can be considered as secondary data and this data generated can be sensitive in nature. Thus data privacy needs to be ensured. Different IoT domains have different methods to keep privacy of data. A security framework encompassing these domains must be created for data protection. This paper focused on some models suggested for privacy of data of certain IoT applications such as Smart Health, Smart Vehicles. Here, we analysed diverse privacy protection approaches adopted based upon dissimilar data in different IoT application domains.