Optimized MRMC Technique in Wireless Mesh Networks

Navreet Kaur*, Jatinder Singh Saini **
*-** Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, India.
Periodicity:October - December'2019
DOI : https://doi.org/10.26634/jwcn.8.3.17140

Abstract

A wireless Mesh network comprises of three fundamental components: hubs, portals, and software. The spatially distributed measurement hubs interface with sensors to monitor assets or their environment. Right now the improved Multiple Radios and Multiple Channels (MRMC) protocol in Wireless Mesh Networks (WMNs) is implemented based on Advanced Ant Colony Optimization (AACO) optimization scheme. AACO is utilized to give a corresponding way to every link in case of its failure. Right now mutation operator is used and the new mutation rate is created by the self-versatile methodology. The proposed approach assists to reduce the load and drops in network so utilizing the proposed methodology the Quality of Service (QOS) parameters, for example, packet delivery ratio, throughput, overheads, average end-to-end delay, average energy consumption are improved as shown in result. The improvement of 16% is shown between the existing and proposed approach in above defined features.

Keywords

Wireless Mesh Networks (WMNs), Multiple Radios and Multiple Channels (MRMC), Ant Colony Optimization (ACO), Advanced Ant Colony Optimization (AACO).

How to Cite this Article?

Kaur, N., and Saini, J. S. (2019). Optimized MRMC Technique in Wireless Mesh Networks. i-manager’s Journal on Wireless Communication Networks , 8(3), 38-45. https://doi.org/10.26634/jwcn.8.3.17140

References

[1]. Al-Nakhala, N., Riley, R., & Elfouly, T. (2015). Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed. Computer Networks, 79, 30-38. https://doi.org/ 10.1016/j.comnet.2014.12.011
[2]. Chamberland, S. (2005). Point of presence design in Internet protocol networks with performance guarantees. Computers & Operations Research, 32(12), 3247-3264. https://doi.org/10.1016/j.cor.2004.05.010
[3]. Chaudhry, A. U., Ahmad, N., & Hafez, R. H. (2012). Improving throughput and fairness by improved channel assignment using topology control based on power control for multi-radio multi-channel wireless mesh networks. EURASIP Journal on Wireless Communications and Networking, 2012(1), 155. https://doi.org/10.1186/ 1687-1499-2012-155
[4]. Diarrassouba, I., Lourimi, A., Mahjoub, A. R., & Youssef, H. (2013). Hose workload based exact algorithm for the optimal design of virtual private networks. Computer Networks, 57(14), 2766-2774. https://doi.org /10.1016/j.comnet.2013.06.009
[5]. Goścień, R., Walkowiak, K., & Klinkowski, M. (2015). Tabu search algorithm for routing, modulation and spectrum allocation in elastic optical network with anycast and unicast traffic. Computer Networks, 79, 148- 165. https://doi.org/10.1016/j.comnet.2014.12.004
[6]. Han, S., Kim, M., Lee, B., & Kang, S. (2015). Fast Directional Handoff and lightweight retransmission protocol for enhancing multimedia quality in indoor WLANs. Computer Networks, 79, 133-147. https://doi.org /10.1016/j.comnet.2014.12.019
[7]. Hassan, D. S., Fahmy, H. M., & Bahaa-ElDin, A. M. (2014). RCA: Efficient connected dominated clustering algorithm for mobile ad hoc networks. Computer Networks, 75, 177-191. https://doi.org/10.1016/j.comnet .2014.10.010
[8]. Hsu, T. H., & Wu, J. S. (2008). An application-specific duty cycle adjustment MAC protocol for energy conserving over wireless sensor networks. Computer Communications, 31(17), 4081-4088. https://doi.org/10. 1016/j.comcom.2008.08.010
[9]. Kim, J., & Park, K. H. (2009). An energy-efficient, transport-controlled MAC protocol for wireless sensor networks. Computer Networks, 53(11), 1879-1902. https: //doi.org/10.1016/j.comnet.2009.03.002
[10]. Liu, Y. Y., Hong, J., & Yue, G. X. (2006). Routing protocol with optimal location of aggregation point in wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 13(1), 1-5. https://doi. org/10.1016/S1005-8885(07)60070-3
[11]. Ma, X. X., & Qin, Z. G. (2008). Partition and multipath transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network. Computer communications, 31(14), 3059-3063. https://doi.org/10. 1016/j.comcom.2008.05.037
[12]. Magurawalage, C. M. S., Yang, K., Hu, L., & Zhang, J. (2014). Energy-efficient and network-aware offloading algorithm for mobile cloud computing. Computer Networks, 74, 22-33. https://doi.org/10.1016/j.comnet. 2014.06.020
[13]. Mahmood, M. A., Seah, W. K., & Welch, I. (2015). Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks, 79, 166-187. https://doi.org/10.1016/j.comnet.2014.12.016
[14]. Quintero, A., & Castro, H. (2007). A location routing protocol based on smart antennas for ad hoc networks. Journal of Network and Computer Applications, 30(2), 614-636.https://doi.org/10.1016/j.jnca.2006.01.004
[15]. Wan, Z., Deng, R. H., Bao, F., & Ananda, A. L. (2007). Access control protocols with two-layer architecture for wireless networks. Computer Networks, 51(3), 655-670. https://doi.org/10.1016/j.comnet.2006.05.009
[16]. Wang, N. C., & Lee, C. Y. (2009). A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks. Journal of Network and Computer Applications, 32(6), 1153-1166. https://doi.org/10.1016 /j.jnca.2009.06.001
[17]. Wang, P., Cai, Y., Huang, J., & Xu, X. (2006). A hierarchical multicast protocol in mobile IPv6 networks. Computer communications, 30(1), 144-152. https://doi. org/10.1016/j.comcom.2006.08.004
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.