Date post: | 14-Apr-2018 |
Category: |
Documents |
Upload: | karthik-sharma |
View: | 212 times |
Download: | 0 times |
of 148
7/29/2019 Wireless Merged.doc
1/148
Proceedings of TEQIP-II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
157
H-shaped Coaxial Fed Microstrip Patch Antenna for BluetoothApplications
Nidhi Raj R1, Nithin Sethumadhavan2, Rakesh V3, Sharaz K M4, Srijith K514
Student, Department of ECE, Federal Institute of Science and Technology
Angamaly, Ernakulam 683 577, Kerala, India
[email protected], [email protected], [email protected], [email protected] Professor, Department of ECE, Federal Institute of Science and Technology
Angamaly, Ernakulam 683 577, Kerala, India
AbstractA patch antenna is a type of radio antenna with a low
profile, which can be mounted on a flat surface. It consists of a
flat rectangular sheet or "patch" of metal, mounted over a
larger sheet of metal called a ground plane. Microstrip patch
antenna is used in many applications such as Bluetoothtechnology, mobile phones and other short range applications
due to their properties like low weight, easy to integrate,
compactness etc. This paper includes the study of an H shapedcoaxial fed microstrip patch antenna which is proposed forBluetooth applications at 2.4GHz frequency. The effect of
different physical parameters of antenna on frequency of
operation, bandwidth, return loss and the effect of addition of
slots on those parameters has been included in the study. Acompact size patch antenna with dielectric substrate FR4 with
r=4.4 is used. The simulations are done on HFSS 13.0
simulation software.
KeywordsMicrostri p patch antenna, FR4, H shaped patch, u-slot
I. INTRODUCTIONThe BLUETOOTH technology provides short
range of wireless connections between electronicdevices like computers, mobile phones and manyothers thereby exchanging voice, data and video.The rapid increase in communication standards hasled to great demand for antennas with low realestate, low profile and size, low cost of fabricationand ease of integration with feeding network [1].
Microstrip patch antennas are widely usedbecause they are of light weight, compact, easy tointegrate and cost effective. The radiationmechanism arises from discontinuities at each
truncated edge of the microstrip transmissionline. The radiation at the edges causes the antennato act slightly larger electrically than its physicaldimensions, so in order for the antenna to
be resonant, a length of microstrip transmission lineslightly shorter than one-half a wavelength at thefrequency is used[2]. A patch antenna is usuallyconstructed on a dielectric substrate, using the samematerials and lithography processes used tomake printed circuit boards. However, the serious
problem of patch antennas is their narrowbandwidth due to surface wave losses and large sizeof patch for better performance[3].
In this paper, a compact size patch antenna isproposed with dielectric substrate as FR4 withr=4.4 and dimensions of the patch are adjusted toimprove the parameters like return loss and
bandwith.
The effect of addition of slot on bandwidth hasbeen carefully analyzed. An optimum position for
feed to get maximum bandwidth for the H shapedpatch antenna with U-slot is proposed in this study.
The simulations are performed using HFSS 13.0
which is a high performance full wave EM field
simulator for arbitarary 3D volumetric passive device
modelling that takes advantage of the familiar
Microsoft Windows graphical user interface. It
integrates simulation, visualization, solid modelling,
and automation in an easy to learn environment where
solutions to 3D EM problems are quickly and
accurately obtained.
II.DESIGNCONSIDERATIONS
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]7/29/2019 Wireless Merged.doc
2/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
158
A. H-shaped patch without slotA. The proposed structure[1] of the antenna is
shown in Fig 1. The antenna is simulated on anFR4 substrate with a dielectric constant of 4.4. The
thickness of the substrate is 6.7 mm. The size ofthe antenna is 80 80 mm2 , which is suitable for
most Bluetooth devices. Rectangle shaped patchesare cut at middle to form shaped patch antennaand width of each arm is 25mm.
Fig. 1: Geometry of Patch antenna without slot
B.H-shaped patch with single U-Shaped slotNow a U shaped slot is created on antenna with
suitable dimensions as shown in Fig. 2. The slotcontains no conductive material like other parts ofantenna. Initially a patch antenna is created with the
dimensions previously discussed i.e. an H shapedstructure with 80 mm length, width of each leg 20mmand a gap of 20 mm is created on a FR4 substratehaving a thickness of 6.7 mm. The size of substrate andground plane is selected as 100mm 80mm. The Hshape is made at the centre part of substrate in order tosimplify the calculation.
Fig. 2: Patch antenna with U-Shaped slot
C.H shaped patch with dual U-Shaped slotsHere one slot is the mirror image of other so that
design complications can be avoided (Fig.3). The size
of each slot is made same as discussed in the previous
section.
Fig. 3: H-shaped patch antenna with dual slots
III.SIMULATIONRESULTSA. Without slot
The antenna has minimum reflected power at the
designed frequency i.e. at 2.4GHz. The bandwidth
obtained is small, around 30 MHz.
7/29/2019 Wireless Merged.doc
3/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
159
Fig. 4: Return loss
B. With single slotUpon introducing a slot bandwidth is found to
increase. A study is conducted by varying the feed
position, width and position of slot and the effect of
variation of these parameters on bandwidth is tabulated
in Table 1 and is shown in Fig.5.
TABLE 1:VARIATION OF PARAMETER AGAINST WIDTH OF SLOT
Fig. 5: Effect of width of slot on bandwidth
A maximum bandwidth of 252.4MHz is attained for
slot width of 05mm.
C. With dual slotInitially in this part of study, the length of slot is
varied. Each value of length has two different
bandwidths, say BW1 and BW2. The BW1 value
decreases slightly as length increases from 27mm, but
after certain value it increases so it reaches a maximum
value at 58mm. In case of BW2, it decreases from the
beginning itself at length = 45mm, the value of return
loss decreases below 10dB results in zero bandwidth.
But there after it increases and reaches a value of
80MHz.
Width
(mm)
Freq
(GHz)
Return
Loss(db)
Impedance
( )
Bandwidth
(GHz)
0.1 2.33 -15.6224 37.33-7.014j 0.0879
0.2 2.301 -15.2942 35.72-3.69j 0.0814
0.5 2.301 -14.34 36.14-9.14j 0.2524
1 2.301 -13.93 35.2-11.6j 0.1198
1.5 2.317 -14.21 37.5-15.1j 0.0916
1.8 2.269 -14.13 38.42-16.7j 0.0887
2 2.33 -14.3 34.3-5.98j 0.0939
7/29/2019 Wireless Merged.doc
4/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
160
Hence it is possible to attain a maximum value of 345.3
MHz (for BW2) at length = 50mm if we use two slots
of equal dimension. But the frequency of operation isshifted to 4.77 GHz. Fig. 6 shows the variation of BW2
against the variation of length. It clearly indicates a
sudden increase in bandwidth (BW2) to a value of
345.3MHz which is well above the bandwidth of
ordinary patch antenna.
TABLE 2:VARIATION OF PARAMETERS AGAINST LENGTHOF SLOT
Fig. 6: Effect of length of slot on bandwidth
IV.CONCLUSIONSThe performance parameters are analyzed for the
optimized dimensions and the proposed antenna workswell at the required 2.4GHz BLUETOOTH frequency
band. The effect on bandwidth upon introduction of slot
is noted down carefully in the study. The bandwidth
significantly improves when slots are added. For a
normal H shaped patch antenna the observed bandwidth
was 30MHz. The bandwidth was increased to 252.4
MHz when a single slot is introduced. The bandwidth
further increased to 345.3 MHz with the introduction of
two slots. For the dual slotted patch antennas, two
frequencies of operation were observed. Both were
shifted slightly from the designed operating frequency.
ACKNOWLEDGMENT
The authors wish to acknowledge the Chairman,FISAT and the Principal, FISAT for providing the
necessary laboratory facilities. We would also liketo thank Mrs. P R Mini, HOD, ECE, FISAT for herconstant support and encouragement.
REFERENCES
[1] Design of coaxial fed microstrip patch antenna for 2.4 Ghz Bluetoothapplications (Govardhani Immadi, Nanilbabu, G.Anupama, M.Mani,2009-11 CIS journal volume 2,No.12 Dec 2012)
[2] The Basics of Patch AntennasBy D. Orban and G.J.K. Moernaut[3] Balanis, C. A., Antenna Theory Analysis and Design, John Wiley &
Sons, 3rd edition, 2005.
Length
(mm)
Freq
GHz
Return
Loss(db)Impedance
Bandwith
GHz
271.755 -12.333 33.86-7.53j 0.0552
3.056 -16.27 34.9+11.69j 0.1087
321.755 -12.0478 33.88-7.54j 0.0531
3.0402 -13.096 35.6+5.3j 0.0687
38
1.771 -11.7128 30.3+2j 0.0514
3.04 -11.305 35.6+5.3j 0.04
45 1.755 -12.184 33.9-7.9j 0.0577
3.008 -9.47 33.43+22.8j -
501.7711 -13.8711 30+2.8j 0.0679
4.7751 -14.0782 73.67-53.8j 0.3453
58
1.739 -28.0354 38.92-18.9j 0.0704
3.9076 -22.1353 120.3-166j 0.08
7/29/2019 Wireless Merged.doc
5/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
161
[4] Users guide High Frequency Structure Simulator, ANSOFTCORPORATION
[5] D.M. Pozar, D.H. Schaubert, 'Microstrip Antenna, The Analysis andDesign of Microstrip Antennas andArray'. New York, IEEE Press,
1995.[6] Dr. Otman El Mrabet, High Frequency Structure Simulator (HFSS)
Tutorial
7/29/2019 Wireless Merged.doc
6/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
162
A Survey on Contributing Entities for SeamlessStreaming
Namitha Murugesh and Gowri Shankar
Dept of Computer Science and EngineeringB M S College of Engineering
Bangalore, India
Abstract A growing number of mobile users require
uninterrupted audio/video streaming while they are moving
through the heterogeneous networks. They expect seamless
mobility as they move with their devices equipped with multiple
interfaces across different wireless infrastructures, spanning
from Bluetooth, IEEE 802.11 (WiFi) to cellular 3G or 4G
networks. The provisioning of mobile multimedia services in this
novel scenario is still a very challenging task due to the diversenature of the different networks and end user devices. One of the
most challenging problems is supporting the continuous
provisioning of multimedia flows i.e., service continuity during
handoffs when a wireless device disconnects from one network
and re-connects to a new one. In particular vertical handoff
situations that occur when mobile devices dynamically change
not only their access points but also the wireless access
technology/infrastructure they are using, e.g., from WiFi to 3G
possibly requiring dynamic content adaptation. This survey
concentrates on various dynamic content adapting techniques,
protocols that aid in streaming, handoff procedures that affect
continuity in streaming and proxy nodes that are used tomaximize the QoS and experience of user.
Keywords- content adaptation; ubiquitous; heterogeneous
networks; streaming; verti cal handoff
I. IntroductionAn evolving trend is that the customer is equipped with a
mobile device (e.g. laptop, smart phone, tablet pc etc.) which isused to stream videos from the internet as the user wanders.Innovations in wireless technology dramatically improved theway people communicate untethered and on the move. Thepresent 4G technology promises faster data rates. The user willnot only have to use a single device anywhere, anytime toaccess seamlessly all types of media existing in the internet. Toensure this process to be a pleasant experience from the user's
side an important intermediate technology has to be developedthat will adapt and formulate the content according to thetransmission characteristics of the end-to-end communicationpath and to the capabilities of the displaying device. Themassive heterogeneity in terms of terminal/network capabilitiesand user expectations requires efficient solutions for theadaptation and transport of modern media in an interoperableand universal fashion. The Hypertext Transfer Protocol(HTTP) is widely used on the internet and it has also become aprimary protocol for the delivery of multimedia content.Additionally, Standards Developing Organizations (SDOs)
such as MPEG have developed various technologies formultimedia transport and encapsulation, e.g., MPEG2-TS(Transport Stream) and MPEG4 file format. MPEG-DASHDynamic Adaptive Streaming over HTTP (DASH), also knownas MPEG-DASH, enables high quality streaming of mediacontent over the Internet delivered from conventional HTTPweb servers is in the process of standardization. At the same
time, many other SDOs such as the IETF, IEEE and 3GPPhave provided various protocols to deliver multimedia content.
Adaptation is a process which repackages the content beingstreamed according to the present eco-system characteristics.Here the eco-system consists of the end-user device, networkcharacteristics, content requested for streaming and theintermediate nodes like proxy. Different combinations of theseentities would affect the QoE (Quality of Experience) of theuser. The end user's device's screen size, computationalcapacity, battery power, available bandwidth, loss due towireless network play an important role in deciding the finalversion of the content viewed by the user. In an ongoingstreaming application when a user roams from one network to
another network the network parameters change and thesession has to be transferred seamlessly. When the userwanders through heterogeneous networks vertical handofftakes place. The transfer of session must be done seamlesslysuch that the user does not experience an interruption with theservice. The efficiency of the adaptation system is many waysrelated to the handoff procedures. The combinations of bothactivities play a vital role in the QoE of the user. Researchers inRef. [1] explain how QoE could be improved by both networkQoS and application QoS management.
The survey focuses on the different technologies,mechanisms and protocols that help to adapt the content beingstreamed from the source to the client in a seamless way as the
client roams around in a heterogeneous network. Section IIdescribes the codecs and video formats that aid in contentadaptation. Section III describes the different transportprotocols that are used for streaming. Section IV explores thedifferent handoff procedures. Section V explores the role ofproxy in content adaptation
7/29/2019 Wireless Merged.doc
7/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
163
II.Content Formats and their impacton adaptation
The major issues to be addressed when adapting the contentare the diversity of the multimedia content coupled with the
variety of internet connections utilized to access it. Adaptationis the process that would bridge the gap between the content atthe source and the client's expected content. Instead of havingeach medium stored in multiple representations, each matchingthe characteristics of a probable end-device and the bandwidthavailable, the source can provide only one or a fewrepresentations and rely on the adaptation functionality todeliver the content in the appropriate form at the receiver.Thus, users gain access to a great variety of media, virtuallywith any possible combination of connection and device type.The adaptation process is flexible enough to both hide theadaptation details from the typical user and give the power userthe means to customize the adaptation process according to the
users needs, through an explicit adaptation policy.Transcoding is a process where the content is re-coded into
a new format. The transcoded video streams can have a lowerspatial resolution, a lower temporal resolution, a lower quality,or even a different compression standard [2]. The new formatis decided based on the target devices capability and constraintsthat are present in the network connection. In transcoding thecontent is decompressed completely or to an intermediate formand again recoded into a form that is decodable by the clientsdevice. A single source sequence is kept in the video storageand different versions are created on-the-fly upon request usingtranscoding methods. An intermediate solution in [3] providingtranscoding at a low complexity by the aid of control streams isproposed.
The Scalable Video Coding (SVC) in H.264 [4],[5] wasdeveloped in response to the growing need for highercompression of moving pictures for various applications suchas videoconferencing, digital storage media, televisionbroadcasting, Internet streaming, and communication. It is alsodesigned to enable the use of the coded video representation ina flexible manner for a wide variety of network environments.Here in SVC the content is encoded once and can be decodedin several layers to suit the requirements of the target deviceand network conditions. It is a coding standard in which thevideo is coded with a base layer video stream meant forconnections with basic terminal capabilities or low bandwidthnetwork conditions. The residual information between the baselayer and the original content is then encoded to form one ormore enhancement layers. Additional enhancement layers canbe integrated with the base layer for scaling up the quality ofstream. Thus giving the user the flexibility to choose thequality of stream that can be received. SVC extension of theH.264/AVC standard has achieved significant improvements incoding efficiency with an increased degree of supportedscalability relative to the scalable profiles of prior video codingstandards. MPEG-4/AVC outperformed MPEG-2 in terms ofthroughput, packet delays, packet loss and jitter. Performanceof mobile video streaming in different scenarios depending on
the users movement speeds and video coding standards werepresented in [6]. The authors in [7] propose a dynamicadaptation scheme of SVC to optimally adapt video streamover heterogeneous networks using the MPEG-21 Digital ItemAdaptation (DIA) tool. MPEG-21 DIA framework provides
systematic solutions in choosing the optimal adaptationoperation to given conditions and supports interoperable videoadaptation. Their experiment results showed that the proposedadaptation scheme provides QoS-enabled delivery andconsumption of SVC with time-varying constraints of network,terminal, and user preference, in a robust and efficient way. In[8] Razib Iqbal and Shervin S show that the adaptationoperations can be quicker, when adaptation systems aredesigned to adapt contents according to the encoding structurebut in an intermediary node following a codec-independenttechnique. The adaptation is performed on-demand based on itsgeneric Bit stream Syntax Description (gBSD). Their approachwas to avoid conventional cascaded or multiple pre-coded bitstream adaptations.
To sum it all up, the major downside of transcoding is theadditional complexity needed to re-encode the video sequencein its new form. Scalable coding is less efficient compared tosingle layer coding when one fidelity version of the videostream should be transmitted. The layering is an unnecessaryoverhead. On the other hand layered coding gives flexibility inchoosing the quality of content dynamically which plays animportant role in seamless continuous streaming.
III. TRANSPORT PROTOCOLSThe content requested for can reach the client by different
transport protocols. The popular protocols are RTSP, RTMP
and HTTP. RTSP is specifically designed to be used fordelivering streaming media. Trick-play modes such as fast-forward or rewind, using VCR-like controls are supported withRTSP unlike HTTP which works best when segments are sentin sequential order. Viewing can also begin the moment thefirst bits reach the RTSP player; meaning that a 2- or 10-second segment delay doesnt affect RTSP delivery. Adobeuses a proprietary messaging protocol called RTMP (Real-Time Messaging Protocol) for its delivery from Flash MediaServer (FMS) to users Flash Player in-browser playback. It isa variant of RTSP. In multicasting scenarios RTSP can supportmulticasting by delivering a single feed to many users, withouthaving to provide a separate stream for each of them. HTTP isa true one-to-one delivery system. RTMP like RTSP is defined
as a protocol that saves the state of session. From the first timea client player connects until the time it disconnects, thestreaming server keeps track of the clients actions or statesfor commands such as play or pause. When a session betweenthe client and the server is established, the server beginssending video and audio content as a steady stream. Thisbehaviour continues and repeats until the server or player clientcloses the session. Recent advancements also accommodate forpotential brief interruptions in the server-client connection,allowing for a small amount of content to be played back froma local buffer. Encryption is another hallmark of RTMP, as
7/29/2019 Wireless Merged.doc
8/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
164
RTMP encrypted (RTMPE) protects packets on an individualbasis (more on this later). Some HTTP-based solutions arebeginning to address integrated digital rights management(DRM), but the majority of HTTP delivery cannot supportencryption at a packet level. The tunnelling feature in RTMP
called RTMPT allows RTMP to be encapsulated within HTTPrequests. This allows RTMP to traverse firewalls by appearingto be HTTP traffic on Port 80. HTTP streaming has gainedpopularity in recent years for the following reasons. Largersegments of multimedia can now be delivered efficiently usingHTTP. Support for HTTP in the present Internet infrastructureis favourable. CDNs have evolved to serve multimediaservices. HTTP is firewall friendly because almost all firewallsare configured to support its outgoing connections. HTTPstreaming is light on the server since the client manages thestreaming without having to maintain a session state on theserver. The popular streaming platforms that use HTTPstreaming as their underlying delivery method are ApplesHTTP Live Streaming[9], Microsofts Smooth Streaming[10]
and Adobes HTTP Dynamic Streaming[11]. However, eachimplementation uses different manifest and segment formatsand therefore to receive the content from each server, a devicemust support its corresponding proprietary client protocol. Astandard for HTTP streaming of multimedia content wouldallow a standard-based client to stream content from anystandard-based server, thereby enabling interoperabilitybetween servers and clients of different vendors. MPEG-Dynamic Adaptive Streaming (DASH) [12] is being developedto facilitate the idea of a common ecosystem of content andservices that will be able to provision a broad range of devicessuch as PCs, TVs, laptops, set-top boxes, game consoles,tablets, and mobiles phones. The multimedia content is
captured and stored on an HTTP server and is delivered usingHTTP. The content exists on the server in two parts: MediaPresentation Description (MPD), which describes a manifest ofthe available content, its various alternatives, their URLaddresses, and other characteristics; and segments, whichcontain the actual multimedia bitstreams in the form of chunks,in single or multiple files. To play the content, the DASH clientfirst obtains the MPD. The MPD can be delivered using HTTP,email, thumb drive, broadcast, or other transports. By parsingthe MPD, the DASH client learns about the program timing,media-content availability, media types, resolutions, minimumand maximum bandwidths, and the existence of variousencoded alternatives of multimedia components, accessibilityfeatures and required DRM, media-component locations on the
network, and other content characteristics. Using thisinformation, the DASH client selects the appropriate encodedalternative and starts streaming the content by fetching thesegments using HTTP GET requests. After appropriatebuffering to allow for network throughput variations, the clientcontinues fetching the subsequent segments and also monitorsthe network bandwidth fluctuations. Depending on itsmeasurements, the client decides how to adapt to the availablebandwidth by fetching segments of different alternatives (withlower or higher bitrates) to maintain an adequate buffer. TheMPEG-DASH specification only defines the MPD and the
segment formats. The delivery of the MPD and the media-encoding formats containing the segments, as well as the clientbehaviour for fetching, adaptation heuristics, and playingcontent, are outside of MPEG-DASHs scope. Streaming pathsin heterogeneous networks include IEEE 802.11 wireless as
well as 3G/4G mobile networks. TCPs shortcomings onwireless paths degrade the performance and QoS for highdefinition media streaming while the actual bandwidthprovisioning on those networks is no longer the limiting factor.Due to physical packet loss and large propagation delay thetransport protocol suffers from significant underutilization ofthe available bandwidth. For dynamic HTTP streaming thisunderutilization translates directly into unnecessary qualityreduction. In order to improve the quality of dynamicstreaming on wireless networks, Manuel Gorius, YongtaoShuai and Thorsten Herfet [13] implement a novel transportprotocol - Predictably Reliable Realtime Transport (PRRT), aprotocol layer that efficiently supports the reliability requiredby multimedia services under their specific time constraint. The
dynamic adaptive streaming also will be benefited with thisapproach.
IV.HANDOFF-PROCEDURESWhen the mobile user wanders out of the coverage area of
the present network and into coverage area of a differentwireless network a handoff has to take place between thenetworks. The handoff can be a homogeneous also known ashorizontal handoff if the two networks have similarcharacteristics e.g. between two Wi-Fi spots. If thecharacteristics of the networks are different it is called aheterogeneous or vertical handover e.g. form Wi-Fi to 4Gcellular network. The techniques used for managing handover
can be classified depending on the layer of the network stack atwhich the handover is done. The possible classes are handoverat network, transport or application layer. Mobility at thenetwork layer is provided by Mobile IP [14]. This class ofhandoff is efficient regarding the period the stream isinterrupted on down side the multimedia session cannot beadapted to the parameters of the new access network. Also MIPpresents poor scalability and high packet loss. The transportlayer handoff continues the transport connection during thenetwork switch while changing the associated IP address.Transport layer mobility management is achieved through theMobile Stream Control Transmission Protocol (mSCTP) [15].mSCTP resolved the problem of packet loss encountered at
network layer mobility by pausing the transmission duringmobility induced disconnections. mSCTP offers an efficienthandover management by using optimization of the path-transition and failover mechanism. The disadvantage ofmSCTP is that it does not address context aware quality ofservice. Several mechanisms for mobility support at applicationlayer have also been defined. If the handover is triggeredbefore losing connectivity, the application layer mobilityperforms better than the other two solutions. This approachoffers another important advantage, because the multimediasession parameters can be adapted to the available resourcesfrom the connected network. The specifications for application
7/29/2019 Wireless Merged.doc
9/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
165
layer mobility were defined by 3GPP working group. Theydeveloped a multimedia session continuity (MMSC) [14]framework for session transfer between packet switchednetworks (PS) in conjunction with the session transfer betweenpacket switched networks and circuit switched network (CS),
standardized already as Voice Call Continuity (VCC). ElenaApostol and Valentin Cristea [15] propose architecture thathandles multimedia streaming adaptation, session managementand takes into consideration user profiles and a set of quality ofservice criteria. To ensure session continuity when a usermoves from one network to another this architecture supportshandover at the application layer which offers a better qualitycontrol than the majority of mobility solutions. Sessioncontinuity during handover by integrating mSCTP into the3GPP IMS [18] architecture is presented in [19]. IMS is theservice control layer to add QoS control and context-awarefunctions.
V.PROXYAn intermediate node between the server and the client
identified as appropriate for performing the content adaptation,store and forward is called the proxy. The proxy or gateway,receives instructions from the receiver prior to the streamsinitiation, regarding the parameters of the adaptation process.For the mobile devices featured with lower bandwidth networkconnectivity, transcoding can be used to reduce the object sizeby lowering the quality of a multimedia object. In view of themonolithic transcoders which only provide transcodingservices and have limited performances due to the unknowndata types and protocols in the prior research the authors of[20] propose the architecture of versatile transcoding proxy(VTP). Based on the concept of the agent system, the VTP
architecture can accept and execute the transcoding preferencescript provided by the client or the server to transform thecorresponding data or protocol according to the user'sspecification. Media cloud services offer a unique opportunityfor alleviating many of the technical challenges faced bymobile media streaming, especially for applications withstringent latency requirements. A novel cloud-assistedarchitecture is proposed in [21] for supporting low-latencymobile media streaming applications such as online gamingand video conferencing. A media proxy at the cloud isenvisioned to calculate the optimal media adaptation decisionson behalf of the mobile sender, based on past observations ofpacket delivery delays of each stream. The proxy-based
intelligent frame skipping problem is formulated within theMarkov Decision Process (MDP) framework, which capturesboth the time-varying nature of video contents as well as burstyfluctuations in wireless channel conditions. The optimal frameskipping policy is calculated using the stochastic dynamicprograming (SDP) approach, and is shown to consistentlyoutperform greedy heuristic schemes. In general, the sizes ofmultimedia files are much larger than those of regularwebpages. It is unlikely that a steaming proxy server canconstantly store entire contents of multimedia files in itsmemory. As a result, the streaming proxy server needs to splitindividual multimedia files into segments and only store
popular segments in its memory. Researchers had proposedvarious ways to do the segmentation. However, the sizes ofindividual segments are often fixed once the segmentation isdone. Tsozen Yeh and Zongwei Yang [22] argue that the sizesof individual segments should vary according to their
popularity. A popular segment can have a longer length so theoverall performance can be increased accordingly. A noveldesign, Dynamic Segment Size (DSS), which dynamicallyadjusts the length of segments by their popularity, is proposed.The design is applied to a sophisticated algorithm, Adaptiveand Lazy Segmentation (ALS), which performs the work ofsplitting multimedia files into segments and handling memoryreplacement in a streaming proxy server. The advantages thatcome with the adoption of the proxy solution is that it can belocated at the most critical position in the end-to-end path. Thecomplexity of the proxy architecture is significantly higher andrequires gateways with powerful CPUs and a lot of memory.The degree of the receivers participation in the adaptationprocess can dictate the applicability and the effectiveness of the
proxy adaptation scheme.
VI.CONCLUSIONThough there are numerous research efforts in adapting
streaming media according to the network characteristics andend-user equipment. Seamless transfer of the on-going sessionas the client wanders through heterogeneous networks is still achallenging process. Here we have surveyed the differentcomponents of the framework required to achieve a seamlesscontent adaptation during a streaming service
(1) References[1] Ricky K. P. Mok, Edmond W. W. Chan, and Rocky K. C. Chang,
Measuring the Quality of Experience of HTTP Video Streaming,IEEE International Symposium on Integrated Network Management(IM), 2011 IFIP, 2011,pp. 485-592.
[2] Amon. P, Haoyu Li, Hutter. A, Renzi. D ans Battista. S, ScalableVideo Coding and Transcoding, IEEE International Conference onAutomation, Quality and Testing, Robotics, pp. 336-341, May 2008.
[3] Glenn Van Wallendael, Jan De Cock, and Rik Van de Walle, FastTranscoding For Video Delivery By Means Of A Control Stream,Conference on Image Processing (ICIP), 2012 19th IEEE International,pp. 733-736, 2012.
[4] Advanced video coding for generic audiovisual services, ITU-T-REC-H.264, ITU-T,Jan-2012.
[5]
Heiko Schwarz, Detlev Marpe and Thomas Wiegand, Overview of theScalable Video Coding Extension of the H.264/AVC Standard, IEEETrans. on Circuits and Systems for Video Technology, vol. 17, no. 9,September -2007.
[6] Saleh Abdallah-Saleh, Qi Wang and Christos Grecos, Evaluation ofMobile Video Streaming in Heterogeneous Wireless Networks,Telecommunications Forum (TELFOR), 2011 19th, pp. 262-265,November-2011.
[7] Haechul Choi, Jung Won Kang and Jae-Gon Kim, Dynamic andinteroperable adaptation of SVC for QoS-enabled streaming, IEEETrans. on Consumer Electronics, vol.53, pp. 384-389, May 2007.
[8] Iqbal, R. and Shirmohammadi, S, MPEG-21 based temporal videoadaptation for heterogeneous devices and mobile environments, IEEE
7/29/2019 Wireless Merged.doc
10/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
166
International Conf. on Multimedia and Expo, 2009. ICME 2009, pp.1845-1846, 2009.
[9] R. Pantos and E.W. May, HTTP Live Streaming, IETF Internet draft,work in progress, Mar. 2011.
[10] Microsoft, IIS Smooth Streaming Transport Protocol, Sept. 2009;http://www.iis.net/community/files/media/smoothspecs/[MS-
SMTH].pdf.
[11] http://www.adobe.com/products/httpdynamicstreaming[12] Sodagar, I, The MPEG-DASH Standard for Multimedia Streaming
Over the Internet, MultiMedia, IEEE, vol. 18, pp. 62 67, April-2011.
[13] Gorius. M, Yongtao Shuai and Herfet. T, Dynamic media streamingover wireless and mobile IP networks, IEEE International Conferenceon Consumer Electronics - Berlin (ICCE-Berlin), pp. 158-162,September 2011.
[14] Xinyi Wu and Gang Nie, Design and Simulation of an EnhancedHandover Scheme in Heterogeneous Mobile IPv6 Networks,Conference on Information Processing, pp. 448-451, July 2009.
[15] ukasz Budzisz, Ramon Ferrus and Ferran Casadevall, Designprinciples and performance evaluation of mSCTP-CMT for transport-layer based handover, Vehicular Technology Conference,pp. 1-5, 2009.
[16] The Third Generation Partnership Project, Feasibility Study onMultimedia Session Continuity. VCC Release 8, June 2008,
[17] Elena Apostol and Valentin Cristea, Multimedia Mobility Serviceacross Heterogeneous Environments, International Conference onEmerging Intelligent Data and Web Technologies, pp. 172-177,September 2011.
[18] TS 23.328, IP Multimedia Subsystem, 3GPP, Release 6.[19]Nguyen Huu Thanh, Le Thi Hang, Ngo Quynh Thu, Vu Van Yem,
Nguyen Xuan Dung, Multimedia Session Continuity with Context-Aware Capability in IMS-based Network, International Symposium. onWireless Communication Systems, pp. 383-387, September-2009.
[20] Jung-Lee Hsiao, Hao-Ping Hung and Ming-Syan Chen, VersatileTranscoding Proxy for Internet Content Adaptation, IEEE Transactionson Multimedia, pp. 646- 658, 2008.
[21] Xiaoqing Zhu, Jiang Zhu, Rong Pan, Prabhu, M.S and Bonomi. F,Cloud-assisted streaming for low-latency applications, InternationalConference on Computing, Networking and Communications (ICNC),pp: 949- 953, 2012.
[22] Tsozen Yeh and Zongwei Yang, Using dynamic segmentationadjustment to improve the performance of streaming proxyservers,IEEE International Symposium on Broadband MultimediaSystems and Broadcasting (BMSB), pp. 15, 2012.
7/29/2019 Wireless Merged.doc
11/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
167
CPW Fed Slot Antenna for Wideband ApplicationsDeepthi V1, Gayathri N2, Meeranath R3, Merin Alexander4, Srijith K514
Student, Department of ECE, Federal Institute of Science and TechnologyAngamaly, Ernakulam 683 577, Kerala, India
[email protected], [email protected]
4
5Assistant Professor, Department of ECE, Federal Institute of Science and Technology
Angamaly, Ernakulam 683 577, Kerala, India
AbstractA Coplanar Waveguide (CPW) fed slot antenna for
wideband applications is presented. The simulations were
performed for S11 and the radiation patterns. The structure was
modified for increasing the bandwidth and then the parameterswere measured. In order to examine the performances of this
antenna, a prototype was designed at frequency 2.4 GHz and
simulated with various widths of slots on both sides by HFSS
software package. The simulation result of bandwidth is 1.98GHz which covers the standard frequency of IEEE 802.11 b/g
and WiMAX.
KeywordsCoplanar waveguide, Return loss, radiation pattern,slot antenna.
I. INTRODUCTIONMicrostrip slot antennas are used in satellite and
communication application because of its lightweight
and ease of integration with monolithic microwave
integrated circuits. Microstrip antennas can be divided
into two basic types by structure, namely microstrip
patch antenna and microstrip slot antenna [1,2]. The
slot antennas can be fed by microstrip line, slot line and
CPW [3,4]. The CPW is the feeding which side-plane
conductor is ground and center strip carries the signal.
In this paper, we proposed the slot antenna fed by CPW
at a designed frequency of 2.4 GHz and for the
frequency range from 1.96-3.94GHz which covers the
standard frequency of IEEE 802.11 b/g (2.4-2.4835
GHz) and WiMAX (2.3-3.6 GHz).
II.ANTENNASTRUCTUREThe antenna is designed at 2.4GHz with the
symmetric structure, as shown in Fig 1. This
antenna is designed on RT/Duroid 5880, the
substrate with thickness (h) of 1.575mm and
dielectric constant r of 2.2. The coplanarwaveguide (CPW) is designed to be 50 ohms inorder to match the characteristic impedance of
transmission line. The dimension of the slotantenna is referred to the guide wavelength gwhich given by,
reff
g
fc
(2.1)where reff is the effective dielectric constant.
2
1rreff
(2.2)In this case, g at frequency 2.4 GHz is 98.81
mm. The total length of slot antenna (L1+L2+W2)is 0.81 g(80.0mm) and width of slot (H1; H2) is0.1 g (10.5 mm). For matching impedance with
characteristic impedance of transmission line 50ohms, the gap (W1), width of the center strip (W2)and length of CPW line (H3) are 0.5 mm, 2.4mm
and 23 mm, respectively.
III.DESIGNPROCEDUREThe design procedure for the proposed CPW fed
slot antenna is described here. This slot antenna
composed of two small slots on the ground planethat are left and right slots. For each case, the gap
mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]7/29/2019 Wireless Merged.doc
12/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
169
(W1), width of the center strip (W2) and length ofCPW line (H3) are fixed to 0.5 mm, 2.4mm and 23
mm, respectively.
A.Design ITwo slots (left and right slot) with equal length and
width:
The parameters of this structure are as following:
L1 = L2 = 38.8mm
H1 = H2 = 10.5mm
Fig 1.Structure of CPW fed slot antenna for Design1.
B.Design IITwo slots with equal width and unequal length (Fig. 2).
The parameters of this structure are as follows:
L1 = 43.8mm; L2 = 33.8mm
H1 = H2 = 10.5mm
Fig 2. Structure of CPW fed slot antenna for Design2.
C.Design IIITwo slots with unequal length and width (Fig.3):
The parameters of this structure are as following:
L1 = 43:8mm; L2 = 33:8mm
H1 = 7:8; H2 = 4:1mm
Fig 3. Structure of CPW fed slot antenna for Design3.
D.Design IVThree slots of length (L3) 10mm and width (H3)
5mm are introduced to increase the bandwidth ofthe slot antenna. Three slots are introduced adjacentto the left slot as shown in fig 4.
7/29/2019 Wireless Merged.doc
13/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
170
Fig 4. Structure of CPW fed slot antenna for Design4.
IV.SIMULATIONRESULTSThe simulated return losses for various designs are
shown in Fig 5 (a) to (d). While varying the length the
variation in bandwidth is as shown in Fig 5 (b).
(a)
(b)
(c)
(d)
Fig. 5. Simulated return loss S11 of the four designs (a) (d)
The decrease in width of the slots changes bandwidth as
shown in Fig. 5 (c). The addition of slots adjacent to the
left slots increases the bandwidth as shown in Fig 5 (d).
The simulation results are listed in table 1.
TABLE 1
SIMULATION RESULTS OF CPW-FED SLOT ANTENNA FOR DIFFERENT
DESIGNS.
7/29/2019 Wireless Merged.doc
14/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
171
L1
(mm)
L2
(mm)
H1
(mm)
H2
(mm)
Bandwidth
(-10dB)
GHz
Return
Loss
(dB)
Before introducing slots adjacent to the left slot
38.8 38.8 10.5 10.5 1.00 -80.0
43.8 33.8 10.5 10.5 0.95 -23.5
43.8 33.8 07.8 04.1 1.60 -22.0
After introducing slots adjacent to the left slot
43.8 33.8 07.8 4.1 1.96 -25.5
The radiation patterns in the x-z plane for the differentdesigns are shown in Fig 6 and 7.
Fig 6. Radiation pattern for design 1,2,3 for different values of at 2.4GHz.
Fig 7. Radiation pattern for design 4 for different values of at 2.4 GHz.
V. CONCLUSIONSThe design of slot antenna fed by CPW is
considered on the basic structure. It is proved by
varying the length and the width of the slot forachieving the wideband for use in WLANapplications. This paper shows the maximum
bandwidth of 1.65 GHz at design frequency of 2.4GHz. The wideband is created with the differentlength and the different width of the slot antenna.
ACKNOWLEDGMENT
The authors wish to acknowledge the Chairman,FISAT and the Principal, FISAT for providing the
necessary laboratory facilities. We would also liketo thank Mrs. P R Mini, HOD, ECE, FISAT for herconstant support and encouragement.
REFERENCES[7] Benson, F. A. and T. M. Benson, Fields Waves and Transmission
Lines, Chaman and Hall,1991.[8] Balanis, C. A., Antenna Theory Analysis and Design, John Wiley &
Sons, Inc., 1997.
7/29/2019 Wireless Merged.doc
15/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
172
[9] Giauffret, L., J.-M. Laheurte, and A. Papiernik,Study of variousshapes of the coupling slot in CPW-fed microstrip antenna, IEEETrans. Antennas Propagation, Vol. 45, No. 4, 642-647,1997.
[10] Bhobe, A. U. and C. L. Holloway, Wide-band slot antennas withCPW- feed line: hybride and log-periodic design, IEEE Trans.
Antennas Propagation ,Vol. 52, No. 10, 2545-2554, 2004.[11] Wang, C.-J., Member, IEEE, J.-J. Lee, and R.-B. Huang, Member,
IEEE, Experimental studies of a miniaturized CPW-fed slot antennawith the dual-frequency operation, IEEE Antennas and Wireless
Propagation Letters,Vol.2,2003.
Abstract In mobile ad hoc networks (MANETs), nodesmove freely and link/node failures are common, which leadsto frequent network partitions. When a network partitionoccurs, mobile nodes in one partition are not able to accessdata hosted by nodes in other partitions, and hencesignificantly degrade the performance of data access. To dealwith this problem, we apply data replication techniques.Existing data replication solutions in both wired or wirelessnetworks aim at either reducing the query delay or improvingthe data availability, but not both. As both metrics areimportant for mobile nodes, we propose schemes to balance
the trade-offs between data availability and query delay underdifferent system settings and requirements. Extensivesimulation results show that the proposed schemes canachieve a balance between these two metrics and providesatisfying system performance.
I ndex TermsData replication, data availability, datamodification, network monitoring, query delay, mobile ad hocnetwork (MANET).
Architecture
.
1. INTRODUCTION IN mobile ad hoc networks (MANETs), since mobile
nodes move freely, network partition may occur, wherenodes in one partition cannot access data held by nodesin other partitions. Thus, data availability (i.e., the
number of successful data accesses over the total
number of data accesses) in MANETs is lower than thatin conventional wired networks. Data replication has
been widely used to improve data availability indistributed systems, and we will apply this technique toMANETs By replicating data at mobile nodes whichare not the owners of the original data, data availabilitycan be improved because there are multiple replicas inthe network and the probability of finding one copy ofthe data is higher. Also, data replication can reduce thequery delay since mobile nodes can obtain the datafrom some nearby replicas. However, most mobile
nodes only have limited storage space, bandwidth, andpower, and hence it is impossible for one node tocollect and hold all the data considering theseconstraints.
By taking these issues into consideration, we expectthat mobile nodes should not be able (or willing) toreplicate all data items in the network (more discussionsin Appendix A, which can be found on the ComputerSociety Digital Libraryhttp://doi.ieeecomputersociety.org/10.1109/TPDS.2011.222)
B. One solution to improve the data accessperformance considering the resource constraints ofmobile nodes is to let them cooperate with each other;That is, contribute part of their storage space to hold
Dr.M.Jayaprasad, Sunita.T.N, Jyothi.B.K
Principal , RGIT College, Bangalore, M.Tech Student, Dept of Computer Science, RGIT, Bangalore,[email protected],[email protected]
Balancing the Query Delay In Mobile ad-hocNetworks With High DataAvailability
7/29/2019 Wireless Merged.doc
16/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
173
data of others When a node only replicates part of thedata, there will be a trade-off between query delay anddata availability. For example, replicating most datalocally can reduce the query delay, but it reduces thedata availability since many nodes may end upreplicating the same data locally, while other data itemsare not replicated by anyone. To increase the dataavailability, nodes should not replicate the same datathat neighboring nodes already have. However, thissolution may increase the query delay since some nodesmay not be able to replicate the most frequentlyaccessed data, and have to access it from neighbors.Although the delay of accessing the data fromneighbors is shorter than that from the data owner, it ismuch longer than accessing it locally.
In this paper, we propose new data replication
techniques to address query delay and data availability
issues. As both metrics are important for mobile nodes,
we propose techniques to balance the trade-offsbetween data availability and query delay under
different system settings and requirements. Simulation
results show that the proposed schemes can achieve a
balance between these two metrics and provide
satisfying system performance.
The rest of the paper is organized as follows: The
next section presents some preliminaries of data
replication. In Section 3, we describe the proposed
schemes in detail. Section 4 evaluates the proposed
schemes through extensive simulations and Section 5
concludes the paper.
2. DATA REPLICATIONData replication has been extensively studied in the
web environment and distributed database systems (See
Appendix B, available in the online supplemental
material, for detailed literature review). However, most
of them either do not consider the storage constraint or
ignore the link failure issue. Before addressing these
issues by proposing new data replication schemes, we
first introduce our system model.
In a MANET, mobile nodes collaboratively share
data. Multiple nodes exist in the network and they send
query requests to other nodes for some specified data
items. Each node creates replicas of the data items and
maintains the replicas in its memory (or disk) space.
During data replication, there is no central server that
determines the allocation of replicas, and mobile nodes
determine the data allocation in a distributed manner.
The MANET studied in this paper can be represented
as an undirected graph G(V,E) where the set of vertices
V represent the mobile nodes in the network, and E V
V is the set of edges in the graph, which represents
the physical or logical links between the mobile nodes.
Two nodes that can communicate directly with each
other are connected by an edge in the graph. Let N
denote a network of m mobile nodes, N,N, ...Nm and
let D denote a collection of n data items d,d, ... ,dn
distributed in the network. For each pair of mobile
nodes Ni and Nj, let tij denote the delay of transmitting
a data item of unit-size between these two nodes.
Similar to [4], we assume that the delay function
defines a metric space; that is, they are nonnegative,
symmetric, and satisfy the triangle inequality. Links
between mobile nodes may fail and the link failure
probability between Ni and Nj is denoted as fij, which
is equal to fji as we assume symmetric links. The failed
links may cause network partitions. Queries generatedduring network partition may fail because the requested
data items are not available in the partition to which the
requester belongs.
Each node maintains some amount of data locally
and the node is called the original owner of the data.
Each data item has one and only one original owner.
For simplicity, we assume that data items are not
updated and can be used to extend the proposed scheme
to handle data update or data consistency issues. To
improve the data availability, these data items may be
replicated to other nodes. Because of limited memory
size, each node can only host C(C< n) replicas besides
its original data. The data replication problem, either
7/29/2019 Wireless Merged.doc
17/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
174
optimizing the query delay or optimizing the
availability, has been proved to be a reduction from the
metric incapacitated facility location problem, which is
known to be NP-hard (see Appendix C, available in the
online supplemental material). Therefore, instead of
trying to find a complex algorithm that is not practical
to solve or approximate the problem, we use heuristics
that can provide satisfying performance with much less
computation overhead.
The following notations are used in this paper.
N: the set of mobile nodes in the network.
m: the total number of mobile nodes.
D: the set of available data items in thenetwork.
n: the total number of data items.
s i: the size of d i.
3. THE PROPOSED DATAREPLICATION SCHEMES
In this section, we propose several schemes to
address the data replication problem based on
heuristics. Before presenting these heuristics, we first
use an example to illustrate the basic ideas.
3.1A Motivating ExampleSuppose a network has only two nodes N1 and N2.
These two nodes may access four data items d1, ... ,d4with equal size, and each node only has enough space
to host two data items. we assume that the access
probability of a mobile node to a data item is available.
According to the Dynamic Access Frequency and
Neighborhood (DAFN) scheme proposed by Hara
neighboring nodes should try to remove duplicated data
items to save storage space and increase data
availability. In the first replication step, nodes replicate
the data that they are interested in, and hence both
nodes replicate d1 and d2 locally. In the second step of
DAFN, when two neighboring nodes have the same
data item di, the node that has a lower access
probability should replace di with the next most
frequently accessed data. Therefore, N1 replaces d2 with
d3 and N2 replaces d1 with d4. The final replication
result is: N1 hosts d1 and d3 whereas N2 hosts d2 and d4.
From this example and verified by simulations in
DAFN is a good scheme because duplicated data can be
removed from neighboring nodes and the memory sizecan be used effectively. However, the data availability
may be affected when the link failure probability is
high.DAFN scheme because DAFN does not consider
two important factors: the link stability between mobile
nodes and the query delay. Due to the complexity of the
data replication problem shown in Appendix C,
available in the online supplemental material, we
propose some heuristics.
Heuristics. Because mobile nodes have limited
memory, it is impossible for them to hold all their
interested data items. As a result, they have to rely on
other nodes to get some data. If mobile nodes only host
their interested data, it is possible that some data items
are replicated by every node while some other data
items are not replicated by anyone. Therefore, it is
important for mobile nodes to cooperate with each other
and contribute part of their memory to hold data for
other nodes. The problem is to determine the memory
space that a mobile node should contribute because bad
cooperation may actually degrade the performance, asshown in the above example.
We have the following heuristics: For a mobile node,
if its communication links to other nodes are stable,
more cooperation with these nodes can improve the
data availability; if the links to other nodes are not very
stable it is better for the node to host most of the
interested data locally. The above heuristic mainly
addresses the issue of data availability. For query delay,
it is better to allocate data near the interested nodes.
The degree of cooperation affects both the dataavailability and the query delay. In the following, we
propose various schemes to achieve various
performance goals.
7/29/2019 Wireless Merged.doc
18/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
175
3.2The Greedy Data Replication SchemeOne naive greedy data replication scheme is to
allocate the most frequently accessed data items until
the memory is full. However, this naive scheme,
referred to as Greedy, does not consider the data size
difference between different data items. The data size
should be considered because smaller data require less
memory space, and hence replicating them can save
some memory space for other data items. Therefore, a
better greedy scheme is to calculate the data access
frequency of a data item dkby normalizing it against the
data size, i.e., aik/sk.
This greedy scheme, referred to as Greedy-S, lets
node Ni repeatedly pick the data item with the largest
aik/sk value from the data set that has not yet been
replicated at Ni until no more data can be replicated in
the memory. One drawback of the greedy scheme is
that it does not consider the cooperation between the
neighboring nodes and hence its performance may be
limited. We present the performance analysis and
numerical results in Appendix D, available in the online
supplemental material. The following sections present
schemes that apply different levels of cooperation
between neighboring nodes following our heuristics.
3.3The One-To-One Optimization (OTOO) SchemeIn this scheme, each mobile node only cooperates with
at most one neighbor to decide which data to replicate.
Suppose node Ni and Nj are neighboring nodes. Ni
calculates the combined access frequency value of N i
and Nj to data item dk at Ni, denoted as CAFij, by
using the following function:
CAFk ij = (aik+ ajk(1-fij))/si
(1)
Similarly Nj calculates its combined access frequency
to dkwith the following function:
CAFk ji = (ajk+ aik(1-fij))/si
(2)
We also need to consider the increased data
availability due to neighboring nodes. If the neighboring
node Nj of Ni has already replicated the data and the link
failure probability between Ni and Nj is low, Ni is less
likely to replicate this data because it can always get the
data from Nj. However, if the link failure probability is
high, Ni may like to replicate the data locally. Therefore,
we define a priority value for node N i to replicate data dk
given its neighboring node Nj, denoted as Pij, by using
the following function:
Pij= CAFk ij wij
(3)
where wij indicates the impact on data availability by
the neighboring node and the link failure probability.
The value ofwij is calculated as follows:
wij = {
Each node sorts the data according to the priority
value P and picks data items with the highest P to
replicate in its memory until no more data items can be
replicated. The P value function is designed so that
1. it considers the access frequency from aneighboring node to improve data availability;2. it considers the data size. If other criteria are
the same, the data item with smaller size isgiven higher priority for replicating because thiscan improve the performance while reducingmemory space;
3. it gives high priority to local data access, andhence the interested data should be replicatedlocally to improve data availability and reducequery delay;
4. it considers the impact of data availability fromthe neighboring node and link quality.
Thus, if the links between two neighboring nodes are
stable, they can have more cooperations in data
1
if data dk is not replicated at Nj.
if data dk is replicated at Nj,
7/29/2019 Wireless Merged.doc
19/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
176
replication.
It is possible that according to OTOO, node Ni should
host dj but Ni is separated from nodes that have dj
because of network partitions. In this situation, Ni
selects the next best candidate (data item) according to
the replication scheme. This rule is also applied to otherreplication schemes proposed in the following. The
detailed pseudo-code and descriptions of the OTOO
scheme and the following schemes are provided in
Appendix E, available in the online supplemental
material.
3.4The Reliable Neighbor (RN) Scheme.OTOO considers neighboring nodes when making data
replication choices. However, it still considers its ownaccess frequency as the most important factor because
the access frequency from a neighboring node is
reduced by a factor of the link failure probability. To
further increase the degree of cooperation, we propose
the Reliable Neighbor scheme which contributes more
memory to replicate data for neighboring nodes. In this
scheme, part of the nodes memory is used to hold datafor its Reliable Neighbors. For node Ni, a neighboring
node Nj is considered to be Nis reliable neighbor if
1-fij > T,
where T is a threshold value. Let nb(i) be the set of
Nis reliable neighbors. The total contributed memorysize of Ni, denoted as Cc(i), is set to be
Cc(i) = Cmin(1, (1-fij)/) (4)
Where is a system tuning factor which affects the
memory allocated to itself and its neighbors.
Intuitively, Ni contributes more memory if its links with
neighboring nodes are more stable. The two extreme
cases are: 1) when Cc(i) = C, N i contributes all its
memory to hold data for neighboring nodes;
2) when fij= 1, Njnb(i), Ni does not contribute any
memory. The reason behind the RN scheme is that when
links to neighboring nodes of Ni are stable, Ni can hold
more data for neighboring nodes as they also hold data
for Ni. Because links are stable, such cooperation can
improve the data availability. If links are not stable, data
on neighboring nodes have low availability and may
incur high-query delay. Thus, cooperation in this case
cannot improve data availability and nodes should be
more selfish in order to achieve better performance.
The data replication process works as follows: Node
Ni first allocates its most interested data to its memory,
up to C-Cc(i) memory space. Then all the rest of the
data are sorted according to P to a list called theneighbors interest list. The P value of Ni to dkis definedas
(5)
The memory space of Cc(i) is used to allocate data with
the highest P values. There may be some overlap
between Nis interested data and the allocated datainterested by Nis neighbors. If during the allocation, adata item is already in the memory, this data item will
not be allocated again and the next data item on the
neighbors interest list is chosen instead.
3.5Reliable Grouping (RG) SchemeOTOO only considers one neighboring node when
making data replication decisions. RN further considers
all one-hop neighbors. However, the cooperations inboth OTOO and RN are not fully exploited. To further
increase the degree of cooperation, we propose the
reliable grouping scheme which shares replicas in large
7/29/2019 Wireless Merged.doc
20/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
177
and reliable groups of nodes, whereas OTOO and RN
only share replicas among neighboring nodes. The basic
idea of the RG scheme is that it always picks the most
suitable data items to replicate on the most suitable
nodes in the group to maximize the data availability and
minimize the data access delay within the group.
In the RG scheme, there is no redundant replication
until every data item is replicated at least once.
Therefore, the maximum degree of cooperation within
the reliable group can be achieved. Because the function
for selecting the best node to place each data replica
considers the access delay between the query node and
the nearest replication node in the group, the RG scheme
can reduce the number of hops that the data need to be
transferred to serve the query.
Due to the page limitation, the detailed protocol
description and a comprehensive performance
complexity and bound analysis of the proposed schemes
are presented in Appendices E and F, available in the
online supplemental material.
4. PERFORMANCE EVALUATIONS
In this section, we evaluate the performance of the
proposed schemes: OTOO, RN2 (RN with =2), RN8(RN with =8), RN16 (RN with =16), and RG by
comparing them with the DAFN scheme and theGreedy scheme through extensive simulations.
4.1Simulation SetupWe have developed a simulator based on CSIM 19 to
evaluate the performance of the data replication
schemes. At the beginning of the simulation, m nodes
are placed randomly in a 2500 m 2500 m area. The
radio range is set to be D. If two nodes Ni and Nj are
within the radio range (i.e., D(i,j)
7/29/2019 Wireless Merged.doc
21/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
178
can also be used as a metric of system power
consumption. This is because in wireless
communication, data transmission is the key factor
affecting the system power consumption compared to
other factors such as disk or CPU operations Therefore,
if there is more query traffic, more energy consumption
is expected. If one replication scheme generates less
traffic, it is more power efficient.
When a query for data dk is generated by node Ni, if
dk can be found locally, or at a node that is reachable
through single or multi-hops, this access is considered
successful. The query delay is the number of hops from
Ni to the nearest node that has dk multiplied by the data
size, and query traffic is defined as all messages
involved to serve the query. If dkis in the local memory
of Ni, the query delay and query traffic are both 0. Most
system parameters are listed in Table 2.
4.2Simulation ResultsExperiments were run using different workloads and
system settings. The performance analysis presented
here is designed to compare the effects of different
workload parameters such as Zipf parameter, network
size, radio range, memory size, and node mobility (due
to the space limitation, the effects of different mobility
models are provided in Appendix G, available in the
online supplemental material). For each workload
parameter (e.g., the mean update arrival time or the
mean query generate time), the mean value of the
measured data is obtained by collecting a large number
of samples such that the confidence interval is
reasonably small. In most cases, the
4.2.1 F ine-Tuning TrIn Fig. 2, we evaluate the effects of T r, which affects
the number of cooperative neighbors in the RN scheme
and the RG scheme. Larger Trresults in smaller number
of cooperative neighbors, and vice versa. We can seethat Tr has more significant effects on the performance
of RN2 (RN with = 2) than RN8 and RN16, becauseRN2 contributes the largest portion of the memory size
to neighbors. The performance of the RG scheme is
also affected by Tr, because the change of Tr affects the
number of nodes in a reliable group. From Fig. 2a, we
can see that when Tr < 0.4, as long as Tr increases, the
data availability of RG, RN8, and RN16 are decreasing
while the data availability of RN2 is increasing; when
0.4 < Tr < 0.6, all schemes have a decreasing trend in
data availability as Tr increases; similar trend can be
found when Tr > 0.6. In Fig. 2b, when T r changes from
0.2 to 0.4, RG and RN2 have a large decrease in query
delay; however, when Tr becomes larger than 0.4, all
four schemes have stable and small delay decrease.
When Tr is around 0.6, all schemes have relatively
stable performance, which means the change of T r does
not have significant effect on the relative performance
of different data replication schemes. Thus, we use T r =
0.6 in the following
4.2.2 Fine-Tuning By controlling the link failure probability can be
adjusted. When the link failure probability deceases,
data availability increases as shown in Fig. 3. We
choose = 0.95 to achieve a balance among allreplication schemes.
As can be seen from the figure, DAFN has high-
query delay because it tries to avoid duplicated data
among neighboring nodes. Even if a data item is
popular among two neighboring nodes, it is still
allocated at only one of the neighboring nodes.
Therefore, many accesses have to be satisfied by the
querying neighboring nodes, which increase the query
delay. For similar reasons, the query delay of RG is also
high. However, RG considers all nodes in a reliable
group during data replication. It organizes data better
within each reliable group, which helps RG achieve
higher data availability
4.2.3 Effects of the Zipf Parameter ()In this section, we evaluate the effects of the Z ipf
parameter on the system performance. As
7/29/2019 Wireless Merged.doc
22/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
179
increases, more accesses focus on hot data items and
data availability is expected to increase.
Fig. 4 demonstrates the effects of the Z ipf parameter
on the system performance when nodes have
different access pattern. Fig. 4a shows that the proposed
schemes outperform the DAFN scheme in terms of dataavailability in most cases. The reasons are as follows:
first, our schemes consider the link failure probability
when replicating data (for OTOO and RN) or
organizing groups (for RG); second, the OTOO and RN
schemes avoid replicating data items that are not
frequently accessed by using the P value. On the other
hand, the DAFN scheme does not consider the link
failure probability and it sometimes replicates data
items with low-access frequency instead of frequently
accessed data items, as shown in the example in Section
3.1.
Fig. 4b shows the query delay of different schemes. The
DAFN scheme is outperformed by the proposed
schemes in all situations. This shows that our schemes
can achieve better performance in terms of data
availability and query delay. From Fig. 4b, we can also
find that the relation of query delay is RG > RN2 >
RN8RN16 > OTOO. This shows that when nodeshave different interests, to achieve a low-query delay, it
is better for them to host the data that they areinterested in, and cooperation among them does not
show significant advantage.
Fig. 5 shows the effects of the Zipf parameter on
the system performance when nodes have the same
access pattern. We can see from Fig. 5 that all the
proposed schemes perform much better than the DAFN
scheme in terms of data availability and all the
proposed schemes in most situations perform better
than DAFN in terms of query delay. Greedy-S performs
better than Greedy because it gives higher priority todata items with smaller size, and thus more important
data can be replicated and the performance is improved.
Comparing RN2, RN8, RN16, OTOO, and RG, we find
that the relation of their data availability is RG > RN2 >
RN8 > RN16 OTOO (RG performs the best asexpected) while the relations of their query delay is RG
> RN2 > RN8 > RN16 > OTOO (OTOO performs the
best). This clearly shows the trade-offs between these
two performance metrics. Higher degree of cooperation
improves the data availability, but it also increases the
query delay because more data items need to be
retrieved from neighboring nodes. This figure also
gives us directions on how to achieve certain
performance goals. If high data availability is required,
nodes should be more cooperative with neighboring
nodes so that more data can be replicated in the
network. If low-query delay is more important, nodes
should be more selfish so that requests can be servedlocally instead of by neighboring nodes.
Since RN2, RN8, and RN16 exhibit similar
performance when other parameters change, to make
the simulation figures clear, we will only use RN8 to
represent the RN schemes.
Fig:Tranferring the Files From One to Another node
7/29/2019 Wireless Merged.doc
23/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
180
4.2.4 Effects of the Number of Nodes in theNetwork (m)
The number of nodes in the network indicates the
node density of the network. When the number of nodes
increases, the density of the network increases and itbecomes better connected and the data availability
increases. Fig. 6 shows the effects of the number of
nodes on the system performance. In Fig. 6a, we can
see that when there are only 100 nodes in the network,
all schemes have relatively lower data availability due
to the sparse network connectivity. As the number of
nodes increases, nodes have more opportunities to get
the data from their neighboring nodes, and all schemes
have performance improvements in terms of data
availability as expected. When the network density
further increases, e.g., in a 500-nodes scenario, the data
availability of all schemes approaches to 0.9. Similar
observations can be found in Fig. 6b. Therefore, we
choose m =300 as the default setting to see the effects of
different schemes on the system performance.
4.2.5 Effects of the Radio Range (D)Fig. 7 shows the effects of the radio range on the system
performance under different access pattern. When the
radio range increases, the network is better connectedand the data availability is expected to increase. Fig. 7a
shows that all schemes perform as expected. The
proposed schemes perform much better than DAFN
when the radio range is small. When the radio range is
very large, different schemes have similar data
availability. This is because the network partition is very
rare in this situation and most data can be found in a
reachable node.
Figs. 7b and 7c show that the query delay and query
traffic increase as the radio range increases. This is
because when the network is better connected, some
previously unavailable data can be found at faraway
nodes. The proposed schemes always result in lower
query delay and traffic than the DAFN scheme. When
the radio range is extremely small, the query delay of all
schemes reduces to near zero, since it is hard to find a
neighbor with such small radio range and almost all
requests are served locally.
4.2.6 Effects of Memory Size (C)In this section, we evaluate the system performance
when the memory size (C) changes. As C increases,
more data can be hosted by a node and the data
availability increases. Similarly, more data can be found
locally as C increases and the query delay and query
traffic decrease.
Fig. 8 shows that when nodes have different access
patterns, the proposed schemes increase the dataavailability while providing lower query delay and
query traffic compared to the DAFN scheme. The
difference of data availability for OTOO, RN8, Greedy,
Greedy-S, and DAFN is not very large because when
nodes have different access pattern, they can simply
replicate their interested data locally to achieve a high
data availability. Thus, the room for improvement is
small. RG, however, organizes data replications within
each reliable group. It can provide more different data
items in each group. Thus, its data availability is much
higher than other schemes.
7/29/2019 Wireless Merged.doc
24/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
181
Fig:Replicating The data items
5. CONCLUSIONS
In MANETs, due to link failure, network partitions are
common. As a result, data saved at other nodes may not
be accessible. One way to improve data availability isthrough data replication. In this paper, we proposed
several data replication schemes to improve the data
availability and reduce the query delay. The basic idea is
to replicate the most frequently accessed data locally
and only rely on neighbors memory when thecommunication link to them is reliable.
Extensive performance evaluations demonstrate that
the proposed schemes outperform the existing solutions
in terms of data availability and query delay. Results
also show that there is a fundamental trade-off betweendata availability and query delay. Higher degree of
cooperation improves the data availability, but it also
increases the query delay because more data need to be
retrieved from neighboring nodes.
REFERENCES
[1]Data Replication for Improving Data Accessibilityin Ad Hoc Networks, IEEE Trans. MobileComputing,vol. 5, no. 11, pp. 1515-1532, Nov. 2006
[2] Supporting Cooperative Caching in Ad HocNetworks, IEEE Trans. Mobile Computing, vol. 5, no.1pp. 77-89,Jan. 2006.
[3] Benefit-Based Data Caching in Ad Hoc Networks,IEEE Trans. Mobile Computing, vol. 7, no. 3, pp. 289-
304, Mar. 2008
[4] Approximation Algorithms for Data Placement inArbitrary Networks, Proc. 12th Ann.ACM-SIAMSymp. Discrete Algorithms (ACM-SIAM)
[5] Consistency Management Strategies for DataReplication in Mobile Ad Hoc Networks, IEEE Trans.Mobile Computing, vol. 8, no. 7, pp. 950-967
[6] Replica Allocation in Ad Hoc Networks withPeriodic Data Update, Proc. Intl Conf. MobileData Management (MDM),2002.
[7] Data Consistency for Cooperative Caching inMobile Environments, Computer vol. 40,no. 4, pp. 60-
66, Apr. 2007.
[8] Effective Replica Allocation in Ad Hoc Networks
for Improving Data Accessibility, Proc. IEEEINFOCOM,
[9] A Powerful Tool for Building System Models,Proc. 33rd Conf. Winter Simulation
7/29/2019 Wireless Merged.doc
25/148
Proceedings of TEQIP II sponsored National Conference on Wireless Communication, Signal Processing, Embedded Systems-WiSE
2013
182
Securing the Wireless Sensor Network Communication
Thaseen Taj1, Shambhu Prasad Sah 2,1
Assistant Professor,Dept of CSE,Don Bosco Institute of Technology,Bangalore ,Karnataka,India
2Assistant Professor, Dept of CSE, Graphics Era Hill University
Bhimtal,Nainital,Uttarkhand,India
Abstract: Wireless sensor networks are a new type of networked
systems, characterized by severely constrained computational
and energy resources, and an ad hoc operational environment.
When wireless sensor networks are deployed in a hostile terrain,
security becomes extremely important, as they are prone to
different types of malicious attacks. Due to the inherent
resource limitations of sensor nodes, existing network securitymethods, including those developed for Mobile Ad-Hoc
Networks, are not well suitable for wireless sensor networks. As
a crucial issue security in wireless sensor networks has attracted
a lot of attention in the recent year. This paper made a thoroughanalysis of the major security issue and implemented the most
secure AES-256 algorithm for effectively securing the network
and hence encrypting and decrypting data transferred between
the nodes in a wireless sensor network.
Keywords: Wireless sensor network; AES; Decryption
Encryption; Initialization Vector; security; threat; attack;
benchmark
I. INTRODUCTION
A. WIRELESS SENSOR NETWORKWireless Sensor Network (WSN) consists of
hundreds or thousands of self organizing, low-power, low cost wireless nodes and is used in avariety of applications such as military sensing and
tracking, environmental monitoring, disastermanagement, etc. But when WSN is deployed inopen, un-monitored, hostile environment [1], or
operated on an unattended mode, sensor nodes will
be exposed to the risk of being captured by anactive adversary. So with the demandingconstraints of nodes limited capability, the keyissue for WSN is designing viable security
mechanisms for the protection of confidentiality,integrity and authentication to prevent maliciousattacks, involved. Besides the inherent limitations
in communication and computing, the deploymentnature of sensor networks makes them morevulnerable to various attacks. Largely deployed
sensor nodes may cover a huge area further
exposing them to attackers who may capture andreprogram the individual nodesas shown in
Fig.1. The adversary may use its own formula of
attacking and induce the network to accept them aslegitimate nodes. Falsification of original data,extraction of private sensed data, hacking of
collected network readings and denial of serviceare also certain possible threats to the security andthe privacy of the sensor networks. Though
hardware and software improvements may addressmany of such security issues, but development of
new supporting technologies and securityprinciples are challenging research issues inWSNs.
mailto:[email protected]:[email protected]7/29/2019 Wireless Merged.doc
26/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
Fig 1. Scenario of wireless sensor nodes deployment
B. AES SYSTEMAn AES system is a symmetric-key system in
which the sender and receiver of a message sharea single, common key, which is used to encryptand decrypt the message. The data length of a key
or message may be chosen to be any of 128 or 256
bits.The AES encryption/decryption algorithmsare shown in Table AES operates on a 4x4 array
of bytes (referred to as state). The algorithmconsists of performing four different simpleoperations. Those are as follows:
SubBytesShiftRowsMixColumnsAddRoundKey
SubBytes perform byte substitution which isderived from a multiplicative inverse of a finitefield. ShiftRows shifts elements from a given row
by an offset equal to the row number. TheMixColumns step transforms each column usingan invertible linear transformation. Finally, the
AddRoundKey step takes a 4x4 block from aexpanded key (derived from the key), and XORsit with the state.
AES is composed of four high-level steps. Theseare:
1.Key Expansion2.Initial Round
3.Rounds
4.Final Round
The Key Expansion step is performed using
Rijndaels key schedule. The Initial Roundconsists only of an AddRoundKey operation. TheRounds step consists of a SubBytes, ShiftRows,
MixColumns, and an AddRoundKey operation.The number of rounds in the Rounds step variesfrom 10 to 14 depending on the key size. Finally,
the FinalRound performs a SubBytes, ShiftRows,and an AddRoundKey operations.
Decryption in AES is done by performing theinverse operations of the simple operations inreverse order.
The structure of AES is as shown in the figure-2.Hence for the AES algorithm, the length of the
input block and the output block is same. It is apoint to be noted here that no weak or semi-weakkeys have been identified for the AES algorithmand there is no restriction on key selection, only
the Key Expansion routine for 256-bit CipherKeys is slightly different than for 128- and 192-bitCipher Keys. Here in this application we are using
256 bit key AES, in which there are 14 iterationscalled the round key- for being used in the laststage of AES. First three stages are Sub Bytes,Shift Rows and Shift Columns. The design and
strength of all key lengths of the AES algorithm(i.e., 128, 192 and 256) are sufficient to protect
classified information up to the SECRET level.TOP SECRET information will require use ofeither 192 or 256 key lengths.Design of AES is
highly conservative that enables us to demonstrateits security against all known types of active and
passive attacks
7/29/2019 Wireless Merged.doc
27/148
Proceedings of National Conference on Wireless Communication, Signal Processing, Embedded Systems-WISE 2013
Figure 2. Structure of AES
II. SENSOR NETWORK SECURITY ISSUE
Two of the most security-oriented applications ofwireless sensor networks are military and medicalsolutions. Due to the nature of the military, it is
obvious that the data (sensed or disseminated) is ofa private nature and is required to remain this wayto ensure the success of the application. Enemy
tracking and targeting are among the most usefulapplications of wireless sensor networks in militaryterms. The most up to date work can be found on
the Defense Advanced Research Projects Agency(DARPA) website [2, 3]. The choice of which
security services to implement on a given sensormainly depends on the type of application and itssecurity requirements. Amongst these weexamined:
Authenticity - it makes possible that the messagereceiver is capable of verifying the identity themessage sender, hence preventing that likely
intruder n