Professional Documents
Culture Documents
INTRODUCTION
1.1 OVERVIEW
Distributed network, happening earlier an insufficient year or current years the wireless tools
are developing gradually and become the unbelievable achievement. As previous relaxed
speed system have existing necessary to combine with the high quickness Systems. However
motivation behind to growing in Internet opportunity and users are possible to accepting
longer delay, for more packet damage and further routine poverty complications for of system
bottleneck. Firmly this problem was frustrated over network facility suppliers in expressions
of kind process of the continuing slow, which probably will respect such as an infeasible
description.
Communication Network
Computer Computer
Node Node
The network traffic of transportation connotation is very complex system to achieve and
effort owing to locality size, active nature, variations in demand and the large quantity of
heterogeneous mechanisms and devices elaborate from the group of electrical control to the
message and supply to the eventual customer.
The problems on the networks capabilities and data traffic management are rapidly
increasing because new components and data flow. Now direction to provide well-organized
data communication and best resource usage, it is enough to classify and implement
mechanisms that can control the data traffic in a necessary routine. The suitable mechanism
for source allocation and traffic instruction is a Quality of Service, Quest implementation.
Now this technique dissimilar data flows will have held in reserve capacity on the
associations and different ordering stages without disturbing or disturbing other data flows.
The result of this would be higher reliability and accuracy in transporting brochures packages
especially under heavy network load [1].
Identify types of traffic and their requirements: Learning the network to define the type of
traffic that is organization preceding the system then regulate the QoS necessities desirable
for the dissimilar forms of transportation.
Define traffic classes: these inactivity assemblies the traffic with similar QoS requests into
courses. For example, three classes of traffic might be defined as voice, mission-critical, and
best effort.
Define QoS policies: QoS policies meet QoS requests for intended each traffic class.
The main step in applying QoS towards identifies the traffic on network and formerly
determines QoS requirements and the importance the various traffic types. This phase
offers some high-level strategies for executing QoS in networks that maintenance for
multiple applications, delay-sensitive and bandwidth-intensive applications. These
uses may increase business processes, but bounce network resources. QoS can offer
safe, probable, quantifiable, and assured services to these requests by handling delay,
delay variation (jitter), bandwidth, and packet loss in the network.
Choose the QoS difficulties of users. Quantity the traffic on the network over and
done with congested steps. Performance CPU convention approximation on each of
Using the increase of user made on distributed network scheme, traffic congestion is one of
necessary circumstances. Owed to vast network congestion user will face the network speed
problem, real congestion control methods are desirable and mainly to solve transportation of
todays for actual extraordinary speed networks.
We altogether are in good health known about with the congested streets, and maybe
congestion is occur in the other networks such as Internet, so it is noticeably important to
have a general understanding of how and why congestion happens in distributed networks.
On the other hand, design of flow of traffic in the network is the reputation and hard
communication between different users. For an example, in a road network we would usually
expect every one driver go to select the most appropriate route, and this best route will be be
governed by upon the delays since the car user assumes to originate over and done with on
different roads. This delays will be effort be resolute by on the changes of routes arranged by
others. As dependent on the others system we can face the delayed problems.
For example, Internet is progressively occupied using internet protocol and packet
switching; hence to growth of network performance in positions of pleasant facility to
customers is stately as inspiring tricky [2]. Currently, end of the Internet systems, controlled
admission mechanism tool are applied at transports layer. Due to delay complex environment
of software uses, the necessity functioned of significance origin for satisfying quality of
services control [3]. Network traffic prepared through the help of software requests as
identified by nature and as of accidental queuing in routers here we have planned of
occurrence overcome the problem of the delay agitations. Normally the use of congestion
By the current time, Congestion is fond of an excessive concern that increases on shared
networks when numerous operators attack for usage to the similar stuffs. Think through
contiguous freeway congestion. By way of additional numerous vehicles enter on freeway
when congestion becomes substandard. Eventually, the reaction can back up into track away,
means of transference from recognition on afterward to entirely. In packet-switched webs,
packets removable on out of the chunks and files of replacing processes as they pass
determined the system. In piece, a packet-switched system is continually confirmed to as a
"scheme of arrangements Congestion characteristically readings where many associations
provender into a single relation, such now place of where local area networks is
interconnected to the wide area network links. Congestion also enlargements at routers in
central networks where nodes that are exposed into further traffic than they are aimed to
handle. Transmission control protocol/internet protocol networks are precisely vulnerable to
congestion of their basic connection-less atmosphere. Approximately are no computer-
generated routes with convinced bandwidth. Packets are familiarized by several hosts at
certain time, and individuals packets are irregular in size, which diversity forecasting traffic
flow projects and provided that certain package unbearable. Though the fact is connectionless
systems have welfares, amount of service is not any of them.
1.2 MOTIVATION
Rate Control Mechanism, this might be reached by including self-adaptation and self-
learning capability of the internet structural design. Therefore we recommend a Rate control
Metric (RCM) based on stochastic principle that identify the traffic behaviour in a better way.
This metric provides rate control in communication between nodes and routers by register the
capability of the internet connection at that, fact of communication alleviate to the congestion
that occurs into the network.
In the heterogeneous systems, outcome done expected routes that depend on the
minimum data rate of entire associations. Several packets are give directions to the route that
has minimum congestion from the network. Main objective is the heterogeneity network is, if
congestion is present into the network in that situation we can try to minimalize and remove
congestion from the specific routes and then afterward send packets from the same route. In
EECP scheme divided into multiple channel capacity that is use according to our
requirement and many arrival packets are there that way we can utilize the entire capability
of the network as regards to our requirement they will clutch the data.
Node Configuration
1.3 OBJECTIVES
In this dissertation, we have aimed to quantify and improve the energy efficiency of various
heterogeneous network topologies in our environment. Calculate the delay, with respect to
time we are needed to wait for the free routes for send the packets. Furthermore maximize
throughput of the network, how much packets will have to receive from the receiver, and
BACKGROUND
The situation has been observed that power saving will always keep on a problem to
be cracked. To answer this problem, current be necessary increasing interests in design for
wireless networks that relates on interactions between protocol stack of various layers. This is
promising solution approach of wireless sensor network called cross layer design.
Rate adaptation process is established off the channel quality estimation. A cross-
layer design [10] explores the significant performance enhancement at MAC layer and
interference estimation of this layer for optimal routing selection at network layer.
Years Description
1966 ARPA packet switching experimentation
1969 First Arpanet nodes operational
1972 Distributed e-mail invented
1973 Non-U.S. computers linked to Arpanet
1975 Arpanet transitioned to Defense Communication Agency
1980 TCP/IP experimentation began
1981 New host added every 20 days
1983 TCP/IP switchover completed
1986 NSFnet backbone created
1990 Arpanet retired
1991 Gopher introduced
1991 WWW invented
1992 Mosaic backbone privatized
1995 Internet backbone privatized
1996 OS-3 (155 Mbps) backbone built
Todays usage of distributed computing is complete likely through the huge network of
personal computers and workplaces that mark up the Internet and through help of the Internet
we can itself established the network very quickly and simply in the previous few periods.
The implements are temperately new and independent foundational to be commonly used in
the network. The idea of distributing resources inside a computer network is not novel. This
is first in progress with the usage of data access terminals on processor computers, formerly
moved into minicomputers. It is now probable in particular computers and client-server
architecture with more tiers. In which explained the working of different modules, named as,
ARPANET, The internet And last one is broadcast.
The ARPANET stand for Advanced Research Projects Agency was generated in 1958 from
the computers networks. The highest distributed computing programs existed a pair of
programs called Creeper and Reaper which completes way ended the nodes of the
ARPANET in the 1970. The Creeper come from first and consuming of the idle CPU cycles
of computers. It generated the copy itself on the next system and then deletes them from the
earlier one. It was improved to continue on all earlier computers and the Reaper was created
which travelled from end to end the same network and deleted all duplicates of the
Creeper. The nodes would be mainframes in its place of the telephone switches recycled at
the time, so that they would be smart to decide the greatest route for transfer each message.
Such as the network developed and other packet switching networks established in other
nation state, scientists initiated to search models for concerning different types of networks,
or internetworking. The Internet was born and produced from present, finally making
ARPANET by the late 1980s so that it was old in 1990. By the 1980s the Internet was static
only a fairly small group of networks for the maximum part related to military enquiry and
procedures. On the other hand, the field of computer science was increasing in institution of
higher education that required the network facilities that the ARPA sites adored. The arrival
of small, expensive personal computers in the late 1970s and particularly in 1981 with
International Business Machines (IBM) PC made number of home and office users who also
needed admission to the internet.
2.3.3 Broadband
Broadband Internet facility actually is the best used procedure of Internet access since of its
great access speeds. By way of more and more users give to Internet Service Providers, the
request improved for high-speed entrance in home environment and big business. Maximum
users were associated by narrowband analog telephone lines and a dial-up process to usage of
the mobile system. In the 1990s, the procedures of broadband service derived from
businesses that already stayed on-line to best homes and businesses in the nation state.
Broadband packages originate in all forms and dimensions, from digital Subscriber Line
(DSL) broadband to cable broadband and 3G and 4G mobile broadband.
Client process
C1 C2 C3 C4
22
S1 S2
O1 O2 O3
O4 O5
S(O4) S(O5)
Capacity of subnet
Desirable
Packet delivered
Congested
Packet send
Congestion is a problem that occurs on shared network when multiple clients access
to the same resources.
Congestion control- congestion control is an order to control the entering data in the
network itself. It is a global issue involves every router and host within the subnet. It is router
to router mechanism. Router discards packets when it cannot serve. Sender retransmits
acknowledgment until sender does not receive. Monitor system to detect when and where
places congestion can occurs.
Flow control flow control is receiver side methods that handle the speed of
transmitting data at the receiver side. Its a point to point mechanism that controls the flow of
data between of just sender and receiver. The speed of sender is very fast in the flow control.
Flow types is help to control the real congestion may include a single packet, few packets, a
large number of packets, which involve light control, medium level control, and tight control,
individually. At what time a large number of nodes transmit information; their flows will
cross at intermediate nodes. This high number of bases increases the congestion But helps to
improving the consistency.
when many nodes and packets try to send data concurrently to one another within the range at
that time loss is occur within the media due to many ways and also packet are lost. In
between packets are send from the simultaneously manner then we can say packets rate are
independent across the all nodes. [14]
Every single node uses a buffer for the packets for the future to be sent. The overflow of this
buffer reasons congestion and packets loss. This is due to high writing rate that differs in time
2.8.1 Concurrency: Concurrency is the trend for effects to take place at the similar time in
a system. It can be referred as many users are using the same resource at the same time in
a distributed network. And many servers are responding to these requests. As soon as we
are assignment software to display and controller real-world systems, we are necessity
deal with this anticipated concurrency.
2.8.2 Scalability: Scalability is the ability of the system to smoothly handle the growing
amount of work load. Scalability in the network can be achieved by applying more than
one host in the network. It can refer to various different parameters of the system: how
much additional traffic can it handle.
2.8.3 Openness: Openness denotes that the network can be easily extendable and can be
easily modified by integrating new components. The necessity for further people with
fewer training to advantage from using geospatial data in more uses: That is, the necessity
to control reserves in software and data.
Leaky Bucket Algorithm is the most commonly used controlling mechanism of Bucket has
identified leak rate for average constricted rate of Bucket has recognized depth to provide
somewhere to stay variations in arrival rate of Incoming packet is conforming if it does not
outcome in overflow Leaky Bucket algorithm can be rummage-sale to law enforcement
agency coming rate of a package stream.
The Leaky Bucket Algorithm a buffering mechanism is presented between the host
computers used to control rate and the direction to regulate the flow of traffic in a network.
This algorithm is executed such as a single-server queue using continuous service time. If the
buffer overflows then packets are rejected. In case of buffer overflow packets are thrown
away from the network.
Assume we have a bucket in which we are driving water in a random order but we have to get
water in an immovable rate, for this we will make a hole at the bottommost of the bucket. It
will confirm that water upcoming out in some fixed rate. And also if bucket will full we will
stopover pouring in it.
A simple leaky bucket algorithm can be executed using first in first out order (FIFO) queue.
A FIFO queue controls the packets. The procedure eliminates a static number of packets from
the queue at every signal of the clock. If the traffic includes of variable-length packages, the
secure manufacture rate must be based on the amount of bytes.
Computer
Packet
Unregulated
flow
Interface
containing a Bucket The bucket
leaky bucket holds packets
Regulated
flow
Network
The leaky bucket implements a constant output rate or average rate though of the burstiness
of the input. The algorithm make ensures of unknown while input is idle.
The host inserts one packet per clock on the network. These outcomes in a constant
flow of packets, and reducing congestion.
While the packets are the same size, the one packet per moment is acceptable. For variable
length packets, it is better to allow a fixed number of bytes per pulse. As a Example1024
bytes per pulse will agree one 1024-byte packet or two 512-byte packets or four 256-byte
packets on 1 pulse.
The Token Bucket Algorithm production amount is varying relating to the leaky
bucket algorithm.
The token bucket algorithm in which every bucket hold the token to resend a packet
and every packet contain the one token to enter into the bucket. If packet is lost then
token is already destroy.
Every t sec Tokens are created by a clock at the rate of one token.
The Idle hosts hold the tokens up to the maximum Size of the bucket larger bursts
later in order to show into the network.
Host computer
Tokens
The bucket
One token is Bucket holds tokens
added to the
bucket every t
Network
Leaky bucket removes the packets and Token bucket does not remove the packets
while its remove the token.
In token bucket, if they have multiple token to cover its length because of that we can
only transmitted.
The token bucket does not permit saving the packets and leaky bucket they are
allowed to save the tokens.
Leaky bucket sends packets at a normal rate, but in token bucket packets are send
sources to sink from the faster speed.
The explanation is start slow and to raise the window size as the packets are approved: slow-
start initially, the cwnd start cost was normal to 1 network section; RFC 2581 effective this
cost to 4 segments in April 1999; most newly the value was amplified when more to 10
sections through remote function call 6928 in April 2013.
The determined quantity of data in route for a novel transmission control protocol assembly is
the minimum of the rwnd and cwnd cost; a modern server can send up to 10 network
segments to the user, at which point it must stop and wait for an acknowledgment. At that
time, for each established ack, the slow-start process displays that the server can increase its
cwnd window size by one fragment for each acknowledge packet, two new packets can be
main.
Thus it is slow-start a significant issue to save in mind when we are building applications for
the browser. Well, hypertext transmission protocol and numerous other application protocols
run over transmission control protocol, and no substance the presented bandwidth, each
transmission control protocol assembly must go decided the slow-start phase. We cannot use
the whole capability of the link instantly.
As an alternative, It start with a minor congestion window and binary it for every cycle
i.e., exponential growth. As significance, the time is required to range a precise target
function of both the round trip time among and the client and server. The initial congestion
window size [16].
56 ms x [log2 (45/10)]=168ms
Thats three round trips (Fig.10) to reach 64 KB of throughput among the client and server!
The fact that the client and server may be accomplished of relocating at Mbps+ data rates has
no consequence when a new connection is recognized.
To drop the sum of time it proceeds to produce the congestion window, we can decrease the
round trip time among the user and receiver, or we can growth the preliminary congestion
window size to the new RFC 6928 value of 10 sections.
Before converged networks were common, network engineering focused on connectivity. The
rates at which data came onto the network resulted in bursty data flows. In a traditional
network, data, arriving in packets, tries to acquire and use as much bandwidth as possible at
any given time. Access to bandwidth is on a first-come, first-served (FIFO) basis. The data
rate available to any one user varies depending on the number of users accessing the network
at that time. Protocols in no converged traditional networks handle the bursty nature of data
networks. Data networks can survive brief outages. For example, when you retrieve e-mail, a
delay of a few seconds is generally not noticeable. A delay of minutes is annoying, but not
serious. Traditional networks also had requirements for applications such as data, video, and
systems network architecture (SNA). Since each application has different traffic
characteristics and requirements, network designers deployed non-integrated networks. These
non-integrated networks carried specific types of traffic: data network, SNA network, voice
network, and video network.
A converged network carries voice, video, and data traffic. These flows use the same
network facilities. Merging these different traffic streams with dramatically differing
requirements can lead to a number of problems. Key among these problems is that
voice and video traffic is very time-sensitive and must get priority.
In a converged network, constant, small-packet voice flows compete with bursty data
flows. Although the packets carrying voice traffic on a converged network are
typically very small, the packets cannot tolerate delay and delay variation as they
traverse the network. When delay and delay variations occur, voices break up and
words become incomprehensible
Cicco IOS QoS software gives the subsequent mechanisms to avoid congestion:
Traffic controlling: Traffic regulating broadcasts bursts. Once the traffic amount
ranges the arranged extreme rate, added traffic is released. The outcome is a
production rate that seems as a scored with apices and troughs.
Traffic shaping: In compare to policing, traffic shaping preserves spare packets in a
sequence and formerly programs the additional for advanced broadcast over increases
of time. The consequence of traffic determining is a round packet output rate.
There are three basic steps involved in implementing quality of system on a network:
Describe traffic programs: The action traffic collection with similar excellence of
system necessities into modules. For instance, 3 classes of traffic strength are definite
as mission-critical, voice and best power.
Define quality of system policies: quality of system strategies come across with
feature of scheme requirements for each traffic class.
2.14.2 Reliability
TCP gives a sequence number to each byte communicated, TCP uses the sequence to
reorganise the sequence when segments are out of direction and assumes a positive
acknowledgment (ACK) from the sending TCP and to remove duplicate segments. If
the ACK is not received inside a timeout interval, the data is retransmitted.
2.14.4 Multiplexing
In multiplexing transmission control protocol effort as a simultaneously when multiple
developers work within the one host. Its provides a fixed statements or ports within
every host in the network.
In Slow start and congestion avoidance, when congestion occurs in the transmission
protocol its slow down the rate of transmission of packets into the network. Slow start and
congestion avoidance both methods are implemented together.
Slow start method is continuing until the congestion is occurring in the network. Congestion
occurs in the network through when timeout of a process, duplicate acknowledgment is
occurs and these times half of the congestion window saved in slow start threshold, in time
congestion avoidance proceeds place. When congestion window is less than aur equal to the
slow start threshold, then TCP is in slow start otherwise congestion avoidance take place.
TCP can produce a duplicate acknowledgment when an out- of-order segment is established.
In that case we tell about which number of segment have received and mostly segments are
In Fast recovery if packets or segments are lost in the network due to the duplicate
acknowledgment then retransmission of segments is done. When a new segment is received,
then duplicate segment has left the network and placed in the receiver's buffer.
Fast retransmit and recovery is congestion control method that is possible to rapidly recover
lost data packets. The TCP usages a timer if packet is lost at that time we retransmit the
packet. In a time out duration dont need to send retransmission of packets. If a receiver
acquires a data segment that is out of order, it immediately leads a duplicate
acknowledgement to the sender. If the sender obtains three duplicate acknowledgements, it
undertakes that the data segment shown through the acknowledgements is lost and directly
retransmits the lost segment.
ECN feature provide a method to intermediary route is delivered the segment end to end
point on the TCP/IP based network. It is a non-compulsory feature that might be used among
two ECN acceptable endpoints. The benefit of this feature is the drop of delay and packet loss
in data communications.
ECN essential be present acceptable on both endpoints and all intermediately routes one end
to other ends are work properly. Explicit congestion notification leads into by designs the two
least-significant bits in the differentiated services (DiffServ) field of the Internet Protocol
header.
LITERATURE REVIEW
Generally network congestion occurs once, the collective demand exceed by the greater than
as associated to the manageable ability of the properties.
Congestion and safety attacks are mutual occurrences in source controlled wireless
sensor networks, especially for distributed network, somewhere a large capacity of high bit-
rate multimedia data needs to be managed by the network. Trust-based bottleneck aware
routing in WSNs is a novel investigation subject has not lectured in writings to an unlimited
scope. T-LEACH [17] is the enhanced type of the generally known data-gathering procedure,
low energy adaptive clustering hierarchy [18], which reduces the no. of cluster bean
collections and therefore covers the generation of system, likened to that of other comparable
procedures, but the situation does not takings trust & congestion into explanation. TRANS
[19] defines the set of routing protocols prepared with trust organization. In the fuzzy c-
means clustering protocol [20], Zarei et al. have recommended a fuzzy logic-based trust
approximation system for congestion controller in wireless sensor networks. Fairness
Congestion Control on behalf of dis Trustful protocol [21] is essentially an adaptation of
FCC, in which the Threshold Trust rate is used for choice making. Our previous work, which
shows a major improvement completed the Fairness Congestion Control for a dis Trustful
procedure, is considered in TFCC [22], in which road traffic movement from the source to
sink is improved by adaptive data-rate control and data routing takes place through asset of
the Link State Routing Protocol.
Yedavalli [23], introduced wireless network leads used for congestion control and
Delay acceptance in the wireless sensor networks. Queue is implemented in the wireless
sensor network using rate models.
Reddy and Reddy [24], introduced for service rate for detect the congestion from the
multihop network. Dependency of the heterogeneous protocol is also required for detect the
congestion. Multipath direction-finding protocol always objectives to complete advanced
dependability in the network.
Sheng, et al [25], introduced various type of Technologies that are support to our
everyday life this is called Internet-of-Things is becoming more important as the need for
better know our environments and make them smart increases. It is estimated that smart
PROPOSED WORK
4.1 INTRODUCTION
As the most stimulating concern in designing distributed network there is limitation from the
congestion free routes, many research efforts aim at decreasing the congestion from the
network. Consuming less congestion occurs is a primary objective in designing distributed
computing. In the proposed work we are using the heterogeneous energy efficient congestion
aware protocol for remove the congestion from the route that which we want to sends the
packets.
In order to minimize the congestion from the distributed network (Rangaswamy and
Krishnareddy(2015)[1]) proposed a traffic regulation mechanism in which they compare the
result with congestion control mechanism as defined in Cicco et al.[1] and Rate control
mechanism in term of performance analysis of throughput , bandwidth utilization and delay.
The basic terminology and short description of the existence work is as follows.
4.2.1 CICCO
CICCO et al. estimated to extent GCC streams are accomplished to follow the accessible
bandwidth, although minimizing queuing delays, and equally share the bottleneck with other
GCC or transmission control protocol flow.
GCC algorithm in runs above the user datagram protocol and it recapitulates the
audio/video frames in RTP packets. It has been executed in the open-source WebRTC that is
available in the most recent versions of the web browser Google Chrome. The google
congestion control mechanism as estimated when it flow accesses the bottleneck in
separation, this algorithm is not able to withdraw fair bandwidth utilization and flow shares
the bottleneck with transmission control protocol flow.
Recently, IETF and W3C have recognized two joint functioning groups:
1) IETF RTCWeb aims at regulating a set of protocols such as congestion control algorithm
to transport real-time flows.
2) WebRTC aims at regulating a set of HTML5 APIs to enable real-time communication
within Internet browsers.
The accept or connects the congestion rate to the source by Iupdate factor wherever it
appraises the intermission frequently.
Remnant Buffer =R=Iupdate/Mavg( (LcapTraf_RateAgg)) (3)
Now recommended novel metric rate control mechanism is developed allowing for
the current projected link capacity . It is definite as represented in equation. 5.
= 1+ R-NP/Lcap (5)
Deliberate h1 as tester time, C is the connection volume, Tp be the system delay, N0 be the
amount of contributors, and p0 be the anticipated reducing likelihood for founding the
constancy completed the designated linkage. The frame at symmetry can be expressed as W 0
= (1/p0) and RTT in signified as R0 = (N0.W0)/C. Correspondingly, sequence length at
stability can be specified as q0 = C., although the max. & min. sequence distance is signified
as Qmax = q0 + 100 and Qmin = q0 100. Later, the eigenvalue matrix of the circulated
interacting scheme is exemplified as:
bo = max (Eo) ( +.exp -1Freq.Ro)) (7)
As above equation 7, Eo is the purpose for accomplishment eigenvalue of classification
matrix, is the matrix appraised from the no. of transmitters No, and round trip time Ro,
although is additional scheme matrix seeing reason being congestion.
= {(- N0/ R0 ^2.C) , 2.C. R0 - q0 +qmin/c.(qmax - qmin). R0 ^2} (8)
The beyond equation. 8 provide the cost of which is recommend for Eq. 7. Later, if bo > 0,
before the circulated system can be measured as unbalanced. It is required to development bo
as it is extremely non-deterministic in nature outstanding to the dynamic traffic state in
viewpoint Internet construction. Consequently, in training to project a stochastic perfect, a
distributed network association is stately in its high traffic proper as bo is a non-deterministic
prescribed.
Earlier wireless cellular networks are typically deployed as homogeneous networks using a
rate control process. A homogeneous cellular system is a network of BSs/nodes in a planned
layout and a collection of User Equipments (UEs), in which all the BSs/nodes have similar
transmit Power levels, same distance patterns, receiver noise levels, and similar backhaul
connectivity to the data network.
Heterogeneous networks (HetNets), consisting of different types of node that can
improve both the coverage and capacity of a distributed network. However, from an energy
efficiency perspective they can perform poorly since a large scale deployment of small cells
together consume a significant amount of energy. Additionally, small cells are not as
N Update the
Route to
route
Ingress dest Exit?
Interface Create
Con. Y
N
Check queue
Communication
Existence?
Y N
Allow
Evaluate capacity of connection Wait
Traffic
link and
update
Y
Mavg Traf_RateAgg
Address Mapping
Apply Evaluate translation
Moving Round Y rule exist complete
R_unit (t)
Evaluate Evaluate Stamping Evaluate Egress
Stop
update of RCM Interface
RCM H-EECP
Fig. 4.1: Flow chart of heterogeneous energy efficient congestion aware protocol
RESULTS
Number of channels 4
Number of trials 7
This segment present an advantage of the projected H-EECP system examined concluded
with wide MATLAB models. In the simulation experiment, we have taken four parameters
namely queuing delay, congestion rate, and Throughput and channel capacity of the nodes.
Primarily, we have measured nodes are all significant nodes. The confidence cost of the node
is efficient intermittently afterward t seconds. The Trust Threshold level is occupied as
0.5 while min. and max. Trust values are 0 and 1 individually. The parameters are chosen as:
Sample Period=10-3, Link Capacity=1000, number of transmission control mechanism
senders =60, Desired Dropping Probability =0.1, Number of channels =4, Number of
trials=7, Timestamp rate in outbound =1000 and Timestamp rate in outbound=100 Fig 5.1
Fig. 5.1: Simulation trials Vs Throughput for Hetro-EECP, CICCO and RCM
Fig 5.2 shows the delay time while an incident arises, when the 1st packet recognized at the
base station. This condition as first package goes over the sensor nodes nearby the path that
can break wide-awake for this work. From now, subsequent packets do not necessity to
obtain the wake-up delay at every hop, and hence the end-to-end delay for the resulting
packets is considerable smaller than that of the 1st packet.
Frequency parameter
This is usages node hop mechanisms between different channels. Two variations are
explained as:
Common hopping: If nodes decide to interchange the data packets and reply the bounding
sequence after the transmission, all nodes hop permitting to the same patterns and also remain
in the similar network.
Independent hopping: Nodes dont depend on the other nodes hopping classification.
They usually follow their own bounding sequence which allows the talk of hopping
sequences.
A smallest-cost straight track ranking involving all nodes can be produced to classify the
minimum-cost tracks after sensor nodes to sink. Direction-finding the facts pack in the
direction of the sink on these minimum-cost tracks is capable as long as the rate of indication
collection is low or the network capability is correctly high. The average access controller
protocol controls the mean rate at which a sensor node can connect data to its neighbour over
a wireless network. This rate is the frequency volume.
FUTURE WORK
The proposed system that is heterogeneous energy efficient congestion aware protocol for
distributed network can be further modified for minimization of congestion through the help
of various energy efficient congestion control methods gives improved results.
[31] D. Lee and K. Chung, Adaptive duty-cycle based congestion control for home
automation networks. IEEE Trans. Consumer Electronic, vol. 56, no. 1, pp. 42 47,
2010.
[32] S. Misra, V. Tiwari and M.S. Obaida, Lacas: learning automata-based congestion
avoidance scheme for healthcare wireless sensor networks. IEEE Journal Sel Areas
Common, vol. 27, no. 4, pp. 466 79, 2009.
[33] C. LAI, Congestion Control for Transmission Control Protocol (TCP) in Wireless
Networks. August 2011.
[34] N. Mohammadizadeh, Cooperative End-to-end Congestion Control in
Heterogeneous Wireless Networks, Institute of Waterloo, Ontario, Canada, 2013.
[35] S. Landstrom, Congestion Control in Wireless Cellular Networks March 2005.
[36] G. Kaur and VK. Mishra, Performance Enhancement Heterogeneous Based EECP
for Bandwidth Utilization Proceedings of the Second International Conference on
Research in Intelligent and Computing in Engineering, vol. 10, pp. 207215, 2017.