by using the concept of pipelining & segmentation liNe deluge. .... Qiang Wang, Yaoyao Zhu, and Liang Cheng, Lehigh University, Ireprogramming Wireless ...
Available online at www.sciencedirect.com
ScienceDirect Procedia Computer Science 78 (2016) 859 – 866
,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\ 3ULYDF\,&,63 'HFHPEHU 1DJSXU,1',$
6HOHFWLYH 6HFXUHG&RGH'LVWULEXWLRQ$SSURDFKIRU0XOWLKRS :LUHOHVV6HQVRU1HWZRUNV 9HHQD*XOKDQHD/DWHVK0DOLNE Research Scholar, Dept. of Computer Science and enginnering, G.H.Raisoni College of Engineering, Nagpur, India. Professor and Head of Dept. Computer Science and enginnering, G.H.Raisoni College of Engineering, Nagpur, India.
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© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license 7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 (http://creativecommons.org/licenses/by-nc-nd/4.0/). 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,&,63 Peer-review under responsibility of organizing committee of the ICISP2015
Keywords:$XWKHQWLFDWLRQ YHULILFDWLRQ&RGH'LVWULEXWLRQ0XOWLKRS:LUHOHVV6HQVRU1HWZRUNV:61 RYHUWKHDLUSURJUDPPLQJ2$3
,QWURGXFWLRQ 6XSSRUWLQJFDSDELOLW\RIUHSURJUDPWKHUHPRWHVHQVRUQRGHVRYHUWKHDLUKDVKLJKOLJKWHGLW¶VLPSRUWDQFHLQWKH UHFHQWUHVHDUFKRI:61:LUHOHVVVHQVRUQHWZRUNVDUHXVXDOO\VHWXSIRUH[WHQGHGSHULRGRIWLPHDQGWKHQRGHVLQ WKH ILHOG DUH QHFHVVLWDWH WR PRGLI\ VRIWZDUH FRGH GXULQJ WKHLU OLIHWLPH LQ RUGHU WR VXSSRUW QHZ UHTXLUHPHQWV 1HWZRUN UHSURJUDPPLQJ DOORZ IRU RYHUWKHDLU VRIWZDUH XSGDWHV LQ VHQVRU QHWZRUNV 5HPRWHO\ SDWFK RU XSJUDGH 3ODWIRUPVRSHUDWLQJV\VWHPVRIVHQVRUQRGHVHWF
9HHQD*XOKDQH7HO E-mail address: veena.gulhane#UDLVRQLQHW
1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of organizing committee of the ICISP2015 doi:10.1016/j.procs.2016.02.074
860
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
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³SROLWHJRVVLS´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eluge Summary 'HOXJHLVWKHIDVWHVWQHWZRUNUHSURJUDPPLQJSURWRFRODVFRPSDUHGWR;13013 02$3,WLVUHOLDEOHGDWD GLVVHPLQDWLRQ SURWRFRO H[WHQVLYHO\ XVHG LQ WKH 7LQ\26 HQYLURQPHQW ,W LV D WKUHHSKDVH KDQGVKDNLQJ SURWRFRO DGYHUWLVH±UHTXHVW±GDWD GLYLGHVWKHGDWDLQWRSDJHVDQGSDFNHWV SHULRGLFDOO\DGYHUWLVHVLQLWVQHLJKERXUKRRG 8QFRQWUROODEOH QDWXUH RI LWV XQGHUO\LQJ DOJRULWKP QRW YHU\ HQHUJ\ HIILFLHQW 6LQFH PRWHV DXWRPDWLFDOO\ XSGDWH D QHZHUYHUVLRQRIWKHFRGHIURPWKHLUQHLJKERUVLIWKHUHDUHnGLIIHUHQWYHUVLRQVRIWKHFRGHREMHFWLQWKHILHOGWKH FRGHRQHDFKLQGLYLGXDOPRWHLVUHSURJUDPPHGXSWRn-1 WLPHV7KHUHLVQRZD\WRNQRZWKHFXUUHQWVWDWXVRIWKH UHSURJUDPPLQJDVLWVSUHDGVDFURVVWKHILHOGEHFDXVH'HOXJH2IIHUVQRIHHGEDFNWRWKHRSHUDWRU 2.2. Different Issues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
861
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
SUHYHQWVWKHSDFNHWFROOLVLRQV XOWLPDWHO\VROYHVWKHKLGGHQWHUPLQDOSUREOHPZKLFKLVDPDMRULVVXHLQZLUHOHVV FRPPXQLFDWLRQV >+LGGHQ WHUPLQDO SUREOHP LI WZR QRGHV DUH RXW RI WKH WUDQVPLVVLRQ UDQJH RI HDFK RWKHU WKXV ³KLGGHQ´ WR HDFK RWKHU ZKHQ WKH\ VHQG SDFNHWV DW WKH VDPH WLPH LW PD\ UHVXOW LQ SDFNHW FROOLVLRQV DW DQ\ QRGH ORFDWHGZLWKLQWKHLQWHUVHFWLRQDUHDRIWKHVHVHQGHUV@6ROYLQJKLGGHQWHUPLQDOSUREOHPE\XVLQJ70$&LPSURYHV WKHSHUIRUPDQFHRI0$&DVFDUULHUVHQVLQJLH&60$FDQQRWSUHYHQWFROOLVLRQV 3.1. Network Creation & Clustering Model
)LJ1HWZRUN6WUXFWXUH
3.2. Simulation Setup & Parameters Considered ,Q WKLV UHVHDUFK ZRUN WR HYDOXDWH SHUIRUPDQFH RI SURSRVHG SURWRFRO VLPXODWLRQ HQYLURQPHQW KDV EHHQ FUHDWHG XVLQJ201HW:HKDYHWHVWHGWKHSURWRFROIRUQRGHV QXPEHURIQRGHVFDQEHYDULHGIURP1RGHVDUH DUUDQJHG LQ UDQGRP IDVKLRQ5DQGRP WRSRORJ\ ZLWK YDU\LQJ GHQVLW\ GLVWDQFH EHWZHHQ QRGHV LV IHHWV IHHWV7KHYDOXHVRIVLPXODWLRQSDUDPHWHUVFRQVLGHUHGDUHOLVWHGLQWDEOH 7DEOH6LPXODWLRQ6HWXS SDUDPHWHUVFRQVLGHUHG
6LPXODWLRQ6HWXS 1RRIQRGHV
WLF>@±WLF>@
1RGH$UUDQJHPHQW
&OXVWHUV
'LVVHPLQDWLQJWKH,PDJH
WLF>@
0HGLXP$FFHVV&RQWURO
70$&
3DUDPHWHUV 2EMHFW6L]H'LVVHPLQDWLQJ,PDJH6L]H
.%SDJHV
3DJHVL]H
DERXW.%SDJH
3URSDJDWLRQ7LPH'LVVHPLQDWLRQ7LPH
7 VHF
$GYHUWLVHPHQWUDWH
PVJVVHFRQG
'HOXJHSXVKHV
aE\WHVVHFRQGRQDYHUDJH
3.3. Evaluation, Network Configuration & Initialization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±WLF>@1RRIFOXVWHUVWLF>@'LVVHPLQDWLQJWKH,PDJH
862
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
)LJ1HWZRUN&RQILJXUDWLRQ ,QLWLDOL]DWLRQ
)LJ7LQ\263DFNHW$GYHUWLVHPHQW%URDGFDVW&OXVWHU
)LJ3DJH'LVVHPLQDWLRQ
863
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
)LJ6LPXODWLRQ&RPSOHWHG:KROH1HWZRUN5HSURJUDPPHG
&RPSDUDWLYH$QDO\VLV*UDSKLFDO5HVXOWV )LQGLQJV 7DEOH([SHULPHQWDOUHVXOWV
6GHOXJ H
'HOXJH
6GHOXJH
'HOXJH
6GHOXJH
'HOXJH
6GHOXJH
'HOXJH
6GHOXJH
(QHUJ\ FRQVXPSWLRQ P- IRU VHFXUHGFRGH GLVVHPLQDWLRQ 6GHOXJH
$1RGHV9V $GYHUWLVLQJWLPH
3DJHV9V&RPSOHWLRQ 7LPH
1RGHV9V 'LVVHPLQDWLRQ7LPH
$YHUDJH(QHUJ\ &RQVXPSWLRQ
&RPSOHWLRQ 7LPHPV IRU VHFXUHGFRGH GLVVHPLQDWLRQ
7DEOH VKRZV WKH H[SHULPHQWDO UHVXOWV FRPSDUDWLYH DQDO\VLV EHWZHHQ 'HOXJH DQG WKH SURSRVHG FRGH GLVVHPLQDWLRQDSSURDFK6GHOXJHLQWHUPVRIDGYHUWLVLQJWLPHFRPSOHWLRQWLPHGLVVHPLQDWLRQWLPHDYHUDJHHQHUJ\ FRQVXPSWLRQFRPSOHWLRQWLPH HQHUJ\FRQVXPSWLRQIRUVHFXUHGFRGHGLVVHPLQDWLRQ 4.1 Comparative Analysis 7DEOH&RPSDUDWLYH$QDO\VLV )LQGLQJV
864
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
3DUDPHWHU
'HOXJH
6GHOXJH
)LQGLQJV
$YHUDJH&RPSOHWLRQ7LPHWRGLVVHPLQDWH3DJHV
&RPSOHWLRQ7LPH3DJH
'LVVHPLQDWLRQ7LPHIRUQRGHV
$YHUDJH(QHUJ\&RQVXPSWLRQ
$YHUDJHQRRI$GYHUWLVHPHQW1RRI DGYHUWLVHPHQWVE\HDFKQRGHWRLQLWLDOL]HWKH1:
7DEOHVKRZVFRPSDUDWLYHDQDO\VLVRIGHOXJH SURSRVHG6GHOXJHWKHLPSDFWRISURSRVHGDUFKLWHFWXUHKDVEHHQ VKRZQLQWHUPVRIWKHHYDOXDWLRQPHWULFVOLNHDYHUDJHQRRIDGYHUWLVHPHQWFRPSOHWLRQWLPHGLVVHPLQDWLRQWLPH DYHUDJHHQHUJ\FRQVXPSWLRQ 4.2 Graphical Results )LJXUHVKRZVFRPSDUDWLYHDGYHUWLVLQJWLPHIRUQRGHV ILJXUHVKRZVFRPSOHWLRQWLPHRIQRGHV ILJXUH VKRZVDYHUDJHHQHUJ\FRQVXPSWLRQ)LJXUHVKRZVWKHQRGHV9VFRPSOHWLRQWLPHDQGHQHUJ\FRQVXPSWLRQE\ HDFKQRGHIRUWKHVHFXULW\UHODWHGSURFHVVOLNHNH\HVWDEOLVKPHQWHQFU\SWLRQGHFU\SWLRQYHULILFDWLRQHWF:HKDYH WLQ\ (&& WR DXWKHQWLFDWH YDOLGDWH WKH XVHUVQRGHV E\ H[FKDQJLQJ WKH NH\V EHWZHHQ QRGHV .H\ *HQHUDWLRQ.H\ VHWXSYHULILFDWLRQ VLJQDWXUHJHQHUDWLRQSURFHVVHV
)LJ1RGH9V$GYHUWLVLQJ7LPH
)LJ1RGH9V'LVVHPLQDWLRQ7LPH
865
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
)LJ$YHUDJH(QHUJ\&RQVXPSWLRQ
)LJ7LPHPV IRU6HFXUHG&RGH'LVVHPLQDWLRQ
)LJ(QHUJ\&RQVXPSWLRQPM IRU6HFXUHG&RGH'LVVHPLQDWLRQ
4.3. Findings )URPWKHFRPSDUDWLYHDQDO\VLVRIGHOXJH SURSRVHG6GHOXJHZHFDQVKRZWKHLPSDFWRISURSRVHGDUFKLWHFWXUHLQ WHUPVRIWKHHYDOXDWLRQPHWULFVOLNHDYHUDJHQRRIDGYHUWLVHPHQWFRPSOHWLRQWLPHGLVVHPLQDWLRQWLPH DYHUDJH HQHUJ\FRQVXPSWLRQ x $YHUDJHQRRI$GYHUWLVHPHQWUHTXLUHGE\HDFKQRGHWRLQLWLDOL]HWKH1:LVOHVVDVFRPSDUHGWR VLPSOH'HOXJH
866
Veena Gulhane and Latesh Malik / Procedia Computer Science 78 (2016) 859 – 866
x x x x
$YHUDJH &RPSOHWLRQ 7LPH WR GLVVHPLQDWH 3DJHV OHVV WKDQ 'HOXJH ZKLFK KHOSV WR LQVWDOO XSGDWHVUDSLGO\ 'LVVHPLQDWLRQ7LPHIRUQRGHVLVOHVVWKDQ'HOXJH $YHUDJH(QHUJ\&RQVXPSWLRQLVUHGXFHG HQHUJ\FDQEHFRQVHUYHLQ6GHOXJHZKLFKZLOOLQFUHDVH WKHOLIHWLPHRI1HWZRUN 7KHDYHUDJHHQHUJ\FRQVXPSWLRQ &RPSOHWLRQ7LPHIRU.H\VHWXSYHULILFDWLRQ VLJQDWXUHJHQHUDWLRQ YHULILFDWLRQLVPM PVUHVSHFWLYHO\
&RQFOXVLRQ 7KH SURSRVHG DSSURDFK LH 6GHOXJH XVHV PDQ\ FRQFHSWV RI 'HOXJH LQ DGGLWLRQ WR 0$& SURWRFRO LQVWHDG RI VLPSOH &60$ VHOHFWLRQ VXSSRUW VHFXUHG KHWHURJHQHRXV VXSSRUW XQOLNH GHOXJH ,W LV PRUH HQHUJ\ HIILFLHQW PRWHVVKRXOGQRWEHZDLWIRUWKHLUUHTXHVWVWREHIXOILOOHGDVZHKDYHXVHG70$&LQVWHDGRI&60$LQ'HOXJHKHQFH DODUJHDPRXQWRILGOHOLVWHQLQJGRHVQRWWDNHVSODFH7KHVLPXODWLRQFDQEHH[WHQGXSWRQRGHVWRHYDOXDWHWKH SURWRFROEHKDYLRU 5HIHUHQFHV 4LDQJ:DQJ