SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 2, April 2021, pp. 1830~1838
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i2.pp1830-1838  1830
Journal homepage: http://ijece.iaescore.com
Best strategy to control data on internet-of-robotic-things in
heterogeneous networks
Wisam Mahmood Lafta1
, Ahmed A. Alkadhmawee2
, Mohammed A. Altaha3
1
Department of Computer Science, University of Technology, Iraq
2
College of Education for Human Sciences, University of Basrah, Iraq
3
College of Veterinary, University of Basrah, Iraq
Article Info ABSTRACT
Article history:
Received Apr 4, 2020
Revised Aug 7, 2020
Accepted Nov 6, 2020
The control and transmission of huge data constitute an immense challenge
in various types of networks (wired and wireless). Congestion caused by the
high traffic and low throughput of huge data continues to be major problems
in a heterogeneous platforms such as internet of things (IoT) technology and
internet-of-robotic-things (IoRT). The heterogeneous network requires new
models and mechanisms to deal with the increased challenges posed by IoT
and IoRT. Accordingly, eliminating the issues that emerge has compelled
finding improved solutions as a new strategy. This study proposed a new
strategy called routing information and distance vector (RIDV) to create the
best improvement of a heterogeneous network. The RIDV strategy activates
the routing information protocol (RIPv2) on a router in wire network parallel
with the ad-hoc on-demand distance vector (AODV) protocol on the wireless
network. The RIDV strategy is used to solve the problems of the diversity of
heterogeneous networks as the basis of the infrastructure IoRT technology.
Hence, this strategy can reduce or avoid congestion through the use of
enhanced and effective best routing protocols. Simulation results using
OPNET show that the proposed method improved the quality of service
(QoS) compared with other related strategies and AODV and RIPv1
protocols in terms of data drop, traffic drop, queue delay, and throughput.
Keywords:
Internet of robotic things
Internet of things
On-demand distance vector
OPNET
Routing information protocol
This is an open access article under the CC BY-SA license.
Corresponding Author:
Wisam Mahmood Lafta
Department of Computer Science
University of Technology
Baghdad, Iraq
Email: 10861@uotechnology.edu.iq
1. INTRODUCTION
The increasing number of smart devices and robot machines is become necessary to control the
influence of developments in various application fields. Robotic devices, drones and autonomous vehicles
augmented are the technologies which will provide the next phase of development of IoT applications [1].
Internet of things (IoT) and Internet-of-Robotic-Things (IoRT) applications are expected to steadily grow
upon networks because a substantial part of human life has become connected to the internet based on the
urgent need related to the technological revolution [2, 3].The Internet is defined as a collection of wired and
wireless networks described as a heterogeneous network [4-6]. The majority of the studies on heterogeneous
networks have been conducted based on one type of network (i.e., either wire or wireless) [7, 8]. The
traditional methods use transmission control protocol (TCP) standard with wire networks and user datagram
protocol (UDP) designed to utilized with wireless networks [9-11]. The TCP and UDP protocols are mostly
used for the important applications of IoT and IoRTin heterogeneous networks. The concepts of IoRT and
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1831
IoT are compatible with the same requirements of heterogeneous networks and technical protocols in IEEE
802.11 MAC and 802.16 MAC (WiMAX), as shown in Figure 1 [12].
Figure 1. Internet of robotic things
The scalability router creates a smart environment based on hyperconnectivity to build an excellent
IoT network and IoRT applications. The methods or strategies are necessary by selecting the only solutions
to understand the high performance and meet the requirements of the good network. These aspects may be a
crucial element in building a dynamic global network infrastructure. IoRT applications scenarios must be
approached for real-life full-scale testbeds, models and practical systems [13]. IoRT is considered important
and complex application because they contain a large amount of data. IoRT applications often suffer from not
applying a dynamic style to deal with slow data transmission and congestion.The main parameters such as
delay, traffic load and network throughput represent critical issues for the IoRT application [14]. Therefore,
designing an effective strategy that achieves real-time data transmission control smoothly is a major
challenge for IoRT applications.
The best elements of IoRT applications are the ad-hoc on-demand distance vector (AODV) and the
routing information protocol (RIP) protocols [15]. The RIP and AODV protocols are mostly used separately
and present best results if they are applied in wireless networks. The proposed approach aims to update and
establish new dealing methods to improve IoRT applications. The proposed method uses TCP and UDP as
standard protocols compatible with the properties of the data transmitted, thereby making the network
organized and harmonious with the packaging type (e.g., sound,.video, .ftp). Some of the best elements of
heterogeneous networks are the AODV and RIP protocols, which are used in heterogeneous network
applications, such as IoRT applications [16].
The proposed method creates a new working mechanism that retuns the dynamic properties in the
AODV and RIPv2 protocols. This new mechanism aims to select the best performance by obtaining new
routings strategies that enhance communication. The new routing mode makes a unified path table process
that distinguishes the routing and distance vector (RIDV) algorithm.
The remainder of this paper is organized as follows. Section 2 explains the features of the distance
vector routing algorithm (DVRA), which demonstrates the dynamic properties of the best protocols, such as
RIP and AODV. Section 3 focuses on the steps of the RIDV algorithm and its work mechanisms to choose
the only performance that makes its work unrestricted. Section 4 discusses the results of the proposed
strategy with important parameters. Section 5 concludes this study with an explanation of the scalable
networks through the results obtained.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1832
2. SYSTEM MODEL
2.1. DVRA
DVR is a metric use to determine the best route across a network by counts a number of hops.
DVRA makes networks reliable according to what is recorded within the priority table by transferring the
packet from the main node to the target. The subsequent hope (router device) should be determined in the
table of priorities [17]. The RIP and AODV protocols are the most important interference and control in
DVRA. These two protocols are supported in the majority of campus LAN networks [18]. The RIP protocol
is a standard protocol used in routing protocol from small to medium TCP/IP networks to apply a distance-
vector algorithm [19]. More than one route between two or more nodes make a router select a method to
calculate the shortest path. The RIP protocol is implemented on the router to achieve the network function
regularly. One of the significant features that enhance the effectiveness of routers is RIP.The RIP protocol
can be classified as follows:
 RIP version 1 (RIPv1) uses broadcast UDP data packets based on a statistic routing [20].
 RIP version 2 (RIPv1) is a dynamic routing that uses multicast packets to exchange routing information
with support authentication [21].
The current study discusses the RIP v2. This feature belongs to the dynamic routing protocol to
reduce the network traffic that fits with the characteristics of AOVD. The software of RIP sends routing
information updates every 30 seconds to create a routing table. Adevice running RIP can receive a default
network via an update from another device that is also running RIP or the main device using the DVRP
strategy. In both ways, the default network is advertised between at least two devices using the DVRP
strategy.
2.2. Dynamic routing protocol
The dynamic algorithm is based on the counting of all possible paths that link with the source to the
target [22]. The table router's information for the entire network is updated by supported information from its
immediate neighbors [23]. Thereafter, the router shares the information with all network mobile nodes and
exchange information between neighbours' nodes at regular intervals [24]. The AODV protocol is one of the
foremost prominent reactive routing protocols and good application on the dynamic routing algorithm.
The AODV protocol uses “HELLO” messages to enhance the reliability of obtainable paths [25].
The "HELLO" messages is period local broadcasts from a source node to inform all nearby mobile nodes in a
wireless network.This message may even be used to update the local network to avoid connectivity issues of
the node [26]. The procedure of the "HELLO" message is organized by the knowledge table to select the path
updated periodically to obviate congested or failed paths. The first request is route requests (RREQs). There
after, wait to answer the second request, which is route replies (RREPs) as shown in Figure 2. If the link is
interrupted or broken, then the answer will be route errors (RERRs) [27]. This dynamic protocol interacts
with the wireless network environment (mobile nods). The confirmed information from the interactive
commands and by investing during a positive aspect connect it with another dynamic environment
represented by a wired network environment (routers) [28]. The confirmed information from the wireless
network environment by interactive commands of the AODV protocol connect with another dynamic
environment represented by a wire network environment using the RIPv2 protocol.
Figure 2. Dynamic performance RREQs and RREPs
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1833
3. RIDV STRATEGY
RIDV can also be a strategy generation from two algorithms to formulate a new algorithm and
support the positive side and disregard or disable the negative aspects of the previous algorithms, there by
forming an efficient algorithm called RIDV. Networks are treated equally (wired and wireless networks)
within the primary hop count networks where a packet crosses, and route discovery with route maintenance,
as shown in Figure 3.
Figure 3. Flowcherat of RIDV strategy
The RIDV algorithm can be explained through the following steps:
Step 1: Source node sends broadcast request to RREQ.
Step 2: If node is a router - Setting the router on RIPv2
Step 3: Else go to step 1 //the source node.
Step 4: Receive a message including the route table with new information.
Step 5: Update the routing table by refreshing to add one hop for each advertised.
Step 6: Selecting the new next node using the AODVprotocol.
Step 7: Search for the best routing path using DVRA.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1834
Step 8: If (destination node within the routing table), then go to step 10.
Step 9: Else (go to step 6).
Step 10: Maintenance routing table shown in Figure 4.
Step 11: Return the result go to step 4 //sending the unified routing paths table to the router because of the
implementation of the same path routing map algorithm (DVR with DRP).
Figure 4. Route maintenance with time
4. SIMMULATION RESULTS AND ANALYSIS
The following results are presented within the factors applied in a heterogeneous network that is
work on IoRT environment as shown in Table 1. Figure 5 shows the dynamic mobility of the IoRT systems
and data management represented by the source node m25. The mobile device sends different instructions to
other nodes from m1 to m15. These nodes (e.g., robot or smart mobiles nodes) may be connected with an
access point (i.e., node 3, node 2) through two routers in OPNET. The simulation is used to perform and
analyze different routing protocols, such as RIPv2 and RIPv1 with AODV, to generate a new RIVD strategy
by applying 15 mobile nodes and by having three different scenarios in an area of 2000×1500 m. In the
results between the first scenarios, the RIPv2 protocol is activated only in routers. In the second scenario,
protocols (RIPv1 default protocol in router) are not activated with the proposed new RIVD strategy to
measure the different factors.
Table 1. Elements of the network
Environment Details type
Mobile node 16 source & destination
Router 2 Wire
Access point 2 Wired& wireless
Maximum packet in queue 50 packets size
Network interface type IoRT application
Topographical area 2000X 1500 sq.m
Routing protocol RIPv2&AODV RIDV
Number of scenarios 3 With the same conditions
Simulation time 20 Mints
Packet Size 260 MB
Simulator OPNET 14.5
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1835
Figure 5. IoRT environment
4.1. Data drop in LAN
Figure 6 shows that RIDV (blue line) is equal to zero compared with other scenarios that did not
lose any packets through the process by time average. The new result from the new proposed strategy led to
the disposal of the loss data.
Figure 6. Data drop in LAN
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1836
4.2. Traffic drop IP
Figure 7 evidently shows that the RIDV strategy curves the lowest. The focus on the blue curves
with other curves means its best result as the packets’/sec less loss achieved in the RIDV strategy in the
properties of IP traffic. By achieving this factor, network congestion is avoided.
Figure 7. Traffic drop IP
4.3. Queue delay
Queue is an important parameter in measuring the delay in any network and congestion pointer.
Moreover, achieving the speed of the network depends on the lowest delay and network stability. Figure 8
shows that the blue line is the best one to determine the speed and slowness of communication by measuring
the accumulated load on point to point in the queue.
Figure 8. Queue delay
4.4. Throughput in the wireless LAN
The second best pointer in the network is the throughput. Figure 9 shows that the blue line is the
highest one compared with the others. That is, the processes work with excellent output. Increased network
productivity indicates its strength and effectiveness, particularly with wireless networks because it is more
vulnerable to noise.
Int J Elec & Comp Eng ISSN: 2088-8708 
Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta)
1837
Figure 9. Throughput in the wireless LAN
The above results imply the dynamic mobility of RIDV algorithm gives high flexibility to the IoRT
enviroment.The RIP and AODV protocol tables were united into one table if these protocols were activated
concurrently. Accordingly, they will end with diminishing time and reduced congestion, thereby resulting
avoid a collision in the passage of information from the mobile source (user) to the mobile destination (robot)
using the available dynamic property.
5. CONCLUSION
The internet of robotic things (IoRT) requires research into the area of seamless heterogeneous
platform integration, things identification (addressing and naming in IoT) and dynamic-things. The current
research is focused on IoT heterogeneous parallel processing and dynamic systems based on parallelism and
concurrency. The dynamic maintain is changing the re-configuration IoT systems in the heterogeneous
network for integration with IoRT service and composition.The problem of control in terms of avoiding
congestion and slow data transmission results from high traffic with the effect of queue delay on network
productivity. Note that the configuration required by the proposed RIDV strategy is better than RIP and
AODV that works separately. The reason is that the AODV protocol has considerable interaction with the
RIPv2 protocol owing to similar properties. The dynamic compatibility features in the RIDV strategy provide
sobriety and reliability to transmit data. In this context, RIDV strategy could be considered maintaining a
path table needed to address scalability and reliability concerns with respect to IoT technologies and IoRT
applications. The high efficiency of the new RIDV strategy makes the heterogeneous network interact with
the surroundings by controlling and transmitting information toward its targets. The implementation of the
same path map algorithm by maintaining a path table periodically gives the RIDV strategy a distinct method
of control and preference, thereby shortening the time and unified path routing table. Future studies should
activate a new RIDV strategy in different independent networks by selecting a rapid means to connect with
mobile devices in wide areas.
REFERENCES
[1] L. A. Grieco, et al., “IoT-aided robotics applications: Technological implications, target domains and open issues,”
Computer Communication, vol. 54, pp. 32-47, 2014.
[2] P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical
and Computer Engineering, vol. 2017, no. 1, pp. 1-25, 2017.
[3] K. Xu, et al., “A tutorial on the internet of things: From a heterogeneous network integration perspective,” IEEE
Network, vol. 30, no. 2, pp. 102-108, 2016.
[4] W. M. Lafta, et al., “Performance evaluation of heterogeneous network based on RED and WRED,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 3, no. 3, pp. 540-545, 2016.
[5] Q. Zhu, et al., “A mobile ad hoc networks algorithm improved AODV protocol,” Procedia Engineering, vol. 23,
pp. 229-234, 2011.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838
1838
[6] H. H. Qasim, et al., “Design and implementation home security system and monitoring by using wireless sensor
networks WSN/internet of things IOT,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 10, no. 3, pp. 2617-2624, 2020.
[7] B. Sreedevi, et al., “Implementation of Zone Routing Protocol for Heterogeneous Hybrid Cluster Routing to
Support QoS in Mobile Ad hoc Networks,” International Journal of Computer Applications, vol. 25, no. 10,
pp. 1-6, 2011.
[8] S. Patil and A. M. Bhavikatti, “Heterogeneous network optimization using robust power-and-resource based
algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4226-4237,
2019.
[9] K. Pandey and A. Swaroop, “A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs
Routing Protocols,” International Journal of Computer Science Issues, vol. 8, no. 6, pp. 432-441, 2011.
[10] W. M. Lafta, et al., “Heterogeneous Network Performance Improvement Using Proposed OLRED and OLWRED
Strategies,” International Journal of Future Computer and Communication, vol. 5, no. 5, pp. 199-204, 2016.
[11] B. S. Kang, et al., “AODV-RIP: Improved security in mobile ad hoc networks through route investigation
procedure,” Concurrency and Computation Practice and Experience, vol. 22, no. 7, pp. 816-830, 2010.
[12] H. Harman, et al., “Robot assistance in dynamic smart environments—a hierarchical continual planning in the now
framework,” Sensors (Switzerland), vol. 19, no. 22, pp. 1-33, 2019.
[13] O. Vermesan and J. Bacquet, “Cognitive Hyperconnected Digital Transformation,” River Publishers, pp. 1-310,
2017.
[14] J. Govindasamy and S. Punniakody, “A comparative study of reactive, proactive and hybrid routing protocol in
wireless sensor network under wormhole attack,” Journal of Electrical Systems and Information Technology,
vol. 5, no. 3, pp. 735-744, 2018.
[15] A. Dhaka, et al., “Gray and Black Hole Attack Identification Using Control Packets in MANETs,” Procedia
Computer Science, vol. 54, pp. 83-91, 2015.
[16] R. van Glabbeek, et al., “Modelling and verifying the AODV routing protocol,” Distributed Computing, vol. 29,
no. 4, pp. 279-315, 2016.
[17] Z. S. Mahmood, et al., “The Directional Hierarchical AODV (DH-AODV) routing protocol for wireless mesh
networks,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems
Engineering (ICCNEEE), Khartoum, 2016, pp. 224-229.
[18] A. Syarif, et al., “Adding gateway mode for R-AODV routing protocol in hybrid ad hoc network,” TENCON 2011 -
2011 IEEE Region 10 Conference, Bali, 2011, pp. 169-173.
[19] S. G. Thorenoor, “Dynamic routing protocol implementation decision between EIGRP, OSPF and RIP based on
technical background using OPNET modeler,” 2010 Second International Conference on Computer and Network
Technology, Bangkok, 2010, pp. 191-195.
[20] A. A. Susom, “Effectiveness of routing protocols for different networking scenarios,” Advances in Science,
Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 112-121, 2018.
[21] S. G. Fernandez, et al., “Unmanned and autonomous ground vehicle,” International Journal of Electrical and
Computer Engineering (IJECE), vol. 9, no. 5, pp. 4466-4472, 2019.
[22] E. H. Houssein, “Ant-Hoc: A swarm intelligence-based routing protocol for Ad Hoc networks,” IRACST
International Journal of Computer Networks and Wireless Communication, vol. 6, no. 1, pp. 14-23, 2016.
[23] K. Chawla and K. Vats, “Different QoS Based Simulation Evaluation of TORA and GRP Routing Protocol Based
on Frequency Hopping,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 11,
pp. 523-531, 2014.
[24] A. Aneiba and M. Melad, “Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols
Using OPNET,” International Journal of Future Computer and Communication, vol. 5, no. 1, pp. 57-60, 2016.
[25] S. M. Hassan, et al., “Application of Wireless Technology for Control: A WirelessHART Perspective,” Procedia
Computer Science, vol. 105, pp. 240-247, 2017.
[26] W. Mahmood, et al., “OLWRED: Best Selected Strategy for Data Transmission in Heterogeneous Networks,”
International Journal of Computer Applications, vol. 152, no. 4, pp. 11-15, 2016.
[27] J. Song, et al., “WirelessHART : Applying Wireless Technology in Real-Time Industrial Process Control,”
2008 IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, 2008, pp. 377-386.
[28] M. S. E. Alhassan and H. Hagras, “Towards Congestion Control Approach Based on Weighted Random Early
Detection and Type-2 Fuzzy Logic System,” 2018 10th Computer Science and Electronic Engineering (CEEC),
Colchester, United Kingdom, 2019, pp. 71-74.

More Related Content

What's hot

A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles IJECEIAES
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...journalBEEI
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencySukhvinder Singh Malik
 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...IRJET Journal
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layerDeepak John
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEiosrjce
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingIRJET Journal
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...journalBEEI
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksjournalBEEI
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 

What's hot (19)

A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles A heterogeneous short-range communication platform for Internet of Vehicles
A heterogeneous short-range communication platform for Internet of Vehicles
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz FrequencyRadio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
Radio Link Analysis for 4G TD- LTE Technology at 2.3 GHz Frequency
 
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...IRJET-  	  Development of Redundant Communication Methods for Robots in Nucle...
IRJET- Development of Redundant Communication Methods for Robots in Nucle...
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Module 2 lan,data link layer
Module 2 lan,data link layerModule 2 lan,data link layer
Module 2 lan,data link layer
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Video steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTEVideo steaming Throughput Performance Analysis over LTE
Video steaming Throughput Performance Analysis over LTE
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEPerformance Analysis of Different Modulation Schemes using Wi-Max And LTE
Performance Analysis of Different Modulation Schemes using Wi-Max And LTE
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networks
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 

Similar to Best strategy to control data on internet-of-robotic-things in heterogeneous networks

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
 
Priority based flow control protocol for internet of things built on light f...
Priority based flow control protocol for internet of things built  on light f...Priority based flow control protocol for internet of things built  on light f...
Priority based flow control protocol for internet of things built on light f...IJECEIAES
 
Performance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyPerformance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyIRJET Journal
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...IJECEIAES
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
 
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...IJECEIAES
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 

Similar to Best strategy to control data on internet-of-robotic-things in heterogeneous networks (20)

An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...
 
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WANIRJET- Viability of Smart City Applications with Lora WAN
IRJET- Viability of Smart City Applications with Lora WAN
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
Priority based flow control protocol for internet of things built on light f...
Priority based flow control protocol for internet of things built  on light f...Priority based flow control protocol for internet of things built  on light f...
Priority based flow control protocol for internet of things built on light f...
 
Performance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular TechnologyPerformance Evolution of LTE Cellular Technology
Performance Evolution of LTE Cellular Technology
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
 
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...
 
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...
 
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
Exponential MLWDF (EXP-MLWDF) Downlink Scheduling Algorithm Evaluated in LTE ...
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelIJECEIAES
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...IJECEIAES
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...IJECEIAES
 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodIJECEIAES
 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkIJECEIAES
 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...IJECEIAES
 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...IJECEIAES
 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...IJECEIAES
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksIJECEIAES
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...IJECEIAES
 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...IJECEIAES
 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersIJECEIAES
 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...IJECEIAES
 
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...IJECEIAES
 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...IJECEIAES
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...IJECEIAES
 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelIJECEIAES
 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
 
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
 

Recently uploaded

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

Best strategy to control data on internet-of-robotic-things in heterogeneous networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 2, April 2021, pp. 1830~1838 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i2.pp1830-1838  1830 Journal homepage: http://ijece.iaescore.com Best strategy to control data on internet-of-robotic-things in heterogeneous networks Wisam Mahmood Lafta1 , Ahmed A. Alkadhmawee2 , Mohammed A. Altaha3 1 Department of Computer Science, University of Technology, Iraq 2 College of Education for Human Sciences, University of Basrah, Iraq 3 College of Veterinary, University of Basrah, Iraq Article Info ABSTRACT Article history: Received Apr 4, 2020 Revised Aug 7, 2020 Accepted Nov 6, 2020 The control and transmission of huge data constitute an immense challenge in various types of networks (wired and wireless). Congestion caused by the high traffic and low throughput of huge data continues to be major problems in a heterogeneous platforms such as internet of things (IoT) technology and internet-of-robotic-things (IoRT). The heterogeneous network requires new models and mechanisms to deal with the increased challenges posed by IoT and IoRT. Accordingly, eliminating the issues that emerge has compelled finding improved solutions as a new strategy. This study proposed a new strategy called routing information and distance vector (RIDV) to create the best improvement of a heterogeneous network. The RIDV strategy activates the routing information protocol (RIPv2) on a router in wire network parallel with the ad-hoc on-demand distance vector (AODV) protocol on the wireless network. The RIDV strategy is used to solve the problems of the diversity of heterogeneous networks as the basis of the infrastructure IoRT technology. Hence, this strategy can reduce or avoid congestion through the use of enhanced and effective best routing protocols. Simulation results using OPNET show that the proposed method improved the quality of service (QoS) compared with other related strategies and AODV and RIPv1 protocols in terms of data drop, traffic drop, queue delay, and throughput. Keywords: Internet of robotic things Internet of things On-demand distance vector OPNET Routing information protocol This is an open access article under the CC BY-SA license. Corresponding Author: Wisam Mahmood Lafta Department of Computer Science University of Technology Baghdad, Iraq Email: 10861@uotechnology.edu.iq 1. INTRODUCTION The increasing number of smart devices and robot machines is become necessary to control the influence of developments in various application fields. Robotic devices, drones and autonomous vehicles augmented are the technologies which will provide the next phase of development of IoT applications [1]. Internet of things (IoT) and Internet-of-Robotic-Things (IoRT) applications are expected to steadily grow upon networks because a substantial part of human life has become connected to the internet based on the urgent need related to the technological revolution [2, 3].The Internet is defined as a collection of wired and wireless networks described as a heterogeneous network [4-6]. The majority of the studies on heterogeneous networks have been conducted based on one type of network (i.e., either wire or wireless) [7, 8]. The traditional methods use transmission control protocol (TCP) standard with wire networks and user datagram protocol (UDP) designed to utilized with wireless networks [9-11]. The TCP and UDP protocols are mostly used for the important applications of IoT and IoRTin heterogeneous networks. The concepts of IoRT and
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1831 IoT are compatible with the same requirements of heterogeneous networks and technical protocols in IEEE 802.11 MAC and 802.16 MAC (WiMAX), as shown in Figure 1 [12]. Figure 1. Internet of robotic things The scalability router creates a smart environment based on hyperconnectivity to build an excellent IoT network and IoRT applications. The methods or strategies are necessary by selecting the only solutions to understand the high performance and meet the requirements of the good network. These aspects may be a crucial element in building a dynamic global network infrastructure. IoRT applications scenarios must be approached for real-life full-scale testbeds, models and practical systems [13]. IoRT is considered important and complex application because they contain a large amount of data. IoRT applications often suffer from not applying a dynamic style to deal with slow data transmission and congestion.The main parameters such as delay, traffic load and network throughput represent critical issues for the IoRT application [14]. Therefore, designing an effective strategy that achieves real-time data transmission control smoothly is a major challenge for IoRT applications. The best elements of IoRT applications are the ad-hoc on-demand distance vector (AODV) and the routing information protocol (RIP) protocols [15]. The RIP and AODV protocols are mostly used separately and present best results if they are applied in wireless networks. The proposed approach aims to update and establish new dealing methods to improve IoRT applications. The proposed method uses TCP and UDP as standard protocols compatible with the properties of the data transmitted, thereby making the network organized and harmonious with the packaging type (e.g., sound,.video, .ftp). Some of the best elements of heterogeneous networks are the AODV and RIP protocols, which are used in heterogeneous network applications, such as IoRT applications [16]. The proposed method creates a new working mechanism that retuns the dynamic properties in the AODV and RIPv2 protocols. This new mechanism aims to select the best performance by obtaining new routings strategies that enhance communication. The new routing mode makes a unified path table process that distinguishes the routing and distance vector (RIDV) algorithm. The remainder of this paper is organized as follows. Section 2 explains the features of the distance vector routing algorithm (DVRA), which demonstrates the dynamic properties of the best protocols, such as RIP and AODV. Section 3 focuses on the steps of the RIDV algorithm and its work mechanisms to choose the only performance that makes its work unrestricted. Section 4 discusses the results of the proposed strategy with important parameters. Section 5 concludes this study with an explanation of the scalable networks through the results obtained.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1832 2. SYSTEM MODEL 2.1. DVRA DVR is a metric use to determine the best route across a network by counts a number of hops. DVRA makes networks reliable according to what is recorded within the priority table by transferring the packet from the main node to the target. The subsequent hope (router device) should be determined in the table of priorities [17]. The RIP and AODV protocols are the most important interference and control in DVRA. These two protocols are supported in the majority of campus LAN networks [18]. The RIP protocol is a standard protocol used in routing protocol from small to medium TCP/IP networks to apply a distance- vector algorithm [19]. More than one route between two or more nodes make a router select a method to calculate the shortest path. The RIP protocol is implemented on the router to achieve the network function regularly. One of the significant features that enhance the effectiveness of routers is RIP.The RIP protocol can be classified as follows:  RIP version 1 (RIPv1) uses broadcast UDP data packets based on a statistic routing [20].  RIP version 2 (RIPv1) is a dynamic routing that uses multicast packets to exchange routing information with support authentication [21]. The current study discusses the RIP v2. This feature belongs to the dynamic routing protocol to reduce the network traffic that fits with the characteristics of AOVD. The software of RIP sends routing information updates every 30 seconds to create a routing table. Adevice running RIP can receive a default network via an update from another device that is also running RIP or the main device using the DVRP strategy. In both ways, the default network is advertised between at least two devices using the DVRP strategy. 2.2. Dynamic routing protocol The dynamic algorithm is based on the counting of all possible paths that link with the source to the target [22]. The table router's information for the entire network is updated by supported information from its immediate neighbors [23]. Thereafter, the router shares the information with all network mobile nodes and exchange information between neighbours' nodes at regular intervals [24]. The AODV protocol is one of the foremost prominent reactive routing protocols and good application on the dynamic routing algorithm. The AODV protocol uses “HELLO” messages to enhance the reliability of obtainable paths [25]. The "HELLO" messages is period local broadcasts from a source node to inform all nearby mobile nodes in a wireless network.This message may even be used to update the local network to avoid connectivity issues of the node [26]. The procedure of the "HELLO" message is organized by the knowledge table to select the path updated periodically to obviate congested or failed paths. The first request is route requests (RREQs). There after, wait to answer the second request, which is route replies (RREPs) as shown in Figure 2. If the link is interrupted or broken, then the answer will be route errors (RERRs) [27]. This dynamic protocol interacts with the wireless network environment (mobile nods). The confirmed information from the interactive commands and by investing during a positive aspect connect it with another dynamic environment represented by a wired network environment (routers) [28]. The confirmed information from the wireless network environment by interactive commands of the AODV protocol connect with another dynamic environment represented by a wire network environment using the RIPv2 protocol. Figure 2. Dynamic performance RREQs and RREPs
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1833 3. RIDV STRATEGY RIDV can also be a strategy generation from two algorithms to formulate a new algorithm and support the positive side and disregard or disable the negative aspects of the previous algorithms, there by forming an efficient algorithm called RIDV. Networks are treated equally (wired and wireless networks) within the primary hop count networks where a packet crosses, and route discovery with route maintenance, as shown in Figure 3. Figure 3. Flowcherat of RIDV strategy The RIDV algorithm can be explained through the following steps: Step 1: Source node sends broadcast request to RREQ. Step 2: If node is a router - Setting the router on RIPv2 Step 3: Else go to step 1 //the source node. Step 4: Receive a message including the route table with new information. Step 5: Update the routing table by refreshing to add one hop for each advertised. Step 6: Selecting the new next node using the AODVprotocol. Step 7: Search for the best routing path using DVRA.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1834 Step 8: If (destination node within the routing table), then go to step 10. Step 9: Else (go to step 6). Step 10: Maintenance routing table shown in Figure 4. Step 11: Return the result go to step 4 //sending the unified routing paths table to the router because of the implementation of the same path routing map algorithm (DVR with DRP). Figure 4. Route maintenance with time 4. SIMMULATION RESULTS AND ANALYSIS The following results are presented within the factors applied in a heterogeneous network that is work on IoRT environment as shown in Table 1. Figure 5 shows the dynamic mobility of the IoRT systems and data management represented by the source node m25. The mobile device sends different instructions to other nodes from m1 to m15. These nodes (e.g., robot or smart mobiles nodes) may be connected with an access point (i.e., node 3, node 2) through two routers in OPNET. The simulation is used to perform and analyze different routing protocols, such as RIPv2 and RIPv1 with AODV, to generate a new RIVD strategy by applying 15 mobile nodes and by having three different scenarios in an area of 2000×1500 m. In the results between the first scenarios, the RIPv2 protocol is activated only in routers. In the second scenario, protocols (RIPv1 default protocol in router) are not activated with the proposed new RIVD strategy to measure the different factors. Table 1. Elements of the network Environment Details type Mobile node 16 source & destination Router 2 Wire Access point 2 Wired& wireless Maximum packet in queue 50 packets size Network interface type IoRT application Topographical area 2000X 1500 sq.m Routing protocol RIPv2&AODV RIDV Number of scenarios 3 With the same conditions Simulation time 20 Mints Packet Size 260 MB Simulator OPNET 14.5
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1835 Figure 5. IoRT environment 4.1. Data drop in LAN Figure 6 shows that RIDV (blue line) is equal to zero compared with other scenarios that did not lose any packets through the process by time average. The new result from the new proposed strategy led to the disposal of the loss data. Figure 6. Data drop in LAN
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1836 4.2. Traffic drop IP Figure 7 evidently shows that the RIDV strategy curves the lowest. The focus on the blue curves with other curves means its best result as the packets’/sec less loss achieved in the RIDV strategy in the properties of IP traffic. By achieving this factor, network congestion is avoided. Figure 7. Traffic drop IP 4.3. Queue delay Queue is an important parameter in measuring the delay in any network and congestion pointer. Moreover, achieving the speed of the network depends on the lowest delay and network stability. Figure 8 shows that the blue line is the best one to determine the speed and slowness of communication by measuring the accumulated load on point to point in the queue. Figure 8. Queue delay 4.4. Throughput in the wireless LAN The second best pointer in the network is the throughput. Figure 9 shows that the blue line is the highest one compared with the others. That is, the processes work with excellent output. Increased network productivity indicates its strength and effectiveness, particularly with wireless networks because it is more vulnerable to noise.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Best strategy to control data on internet-of-robotic-things in ... (Wisam Mahmood Lafta) 1837 Figure 9. Throughput in the wireless LAN The above results imply the dynamic mobility of RIDV algorithm gives high flexibility to the IoRT enviroment.The RIP and AODV protocol tables were united into one table if these protocols were activated concurrently. Accordingly, they will end with diminishing time and reduced congestion, thereby resulting avoid a collision in the passage of information from the mobile source (user) to the mobile destination (robot) using the available dynamic property. 5. CONCLUSION The internet of robotic things (IoRT) requires research into the area of seamless heterogeneous platform integration, things identification (addressing and naming in IoT) and dynamic-things. The current research is focused on IoT heterogeneous parallel processing and dynamic systems based on parallelism and concurrency. The dynamic maintain is changing the re-configuration IoT systems in the heterogeneous network for integration with IoRT service and composition.The problem of control in terms of avoiding congestion and slow data transmission results from high traffic with the effect of queue delay on network productivity. Note that the configuration required by the proposed RIDV strategy is better than RIP and AODV that works separately. The reason is that the AODV protocol has considerable interaction with the RIPv2 protocol owing to similar properties. The dynamic compatibility features in the RIDV strategy provide sobriety and reliability to transmit data. In this context, RIDV strategy could be considered maintaining a path table needed to address scalability and reliability concerns with respect to IoT technologies and IoRT applications. The high efficiency of the new RIDV strategy makes the heterogeneous network interact with the surroundings by controlling and transmitting information toward its targets. The implementation of the same path map algorithm by maintaining a path table periodically gives the RIDV strategy a distinct method of control and preference, thereby shortening the time and unified path routing table. Future studies should activate a new RIDV strategy in different independent networks by selecting a rapid means to connect with mobile devices in wide areas. REFERENCES [1] L. A. Grieco, et al., “IoT-aided robotics applications: Technological implications, target domains and open issues,” Computer Communication, vol. 54, pp. 32-47, 2014. [2] P. Sethi and S. R. Sarangi, “Internet of Things: Architectures, Protocols, and Applications,” Journal of Electrical and Computer Engineering, vol. 2017, no. 1, pp. 1-25, 2017. [3] K. Xu, et al., “A tutorial on the internet of things: From a heterogeneous network integration perspective,” IEEE Network, vol. 30, no. 2, pp. 102-108, 2016. [4] W. M. Lafta, et al., “Performance evaluation of heterogeneous network based on RED and WRED,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 3, no. 3, pp. 540-545, 2016. [5] Q. Zhu, et al., “A mobile ad hoc networks algorithm improved AODV protocol,” Procedia Engineering, vol. 23, pp. 229-234, 2011.
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1830 - 1838 1838 [6] H. H. Qasim, et al., “Design and implementation home security system and monitoring by using wireless sensor networks WSN/internet of things IOT,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 3, pp. 2617-2624, 2020. [7] B. Sreedevi, et al., “Implementation of Zone Routing Protocol for Heterogeneous Hybrid Cluster Routing to Support QoS in Mobile Ad hoc Networks,” International Journal of Computer Applications, vol. 25, no. 10, pp. 1-6, 2011. [8] S. Patil and A. M. Bhavikatti, “Heterogeneous network optimization using robust power-and-resource based algorithm,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4226-4237, 2019. [9] K. Pandey and A. Swaroop, “A Comprehensive Performance Analysis of Proactive, Reactive and Hybrid MANETs Routing Protocols,” International Journal of Computer Science Issues, vol. 8, no. 6, pp. 432-441, 2011. [10] W. M. Lafta, et al., “Heterogeneous Network Performance Improvement Using Proposed OLRED and OLWRED Strategies,” International Journal of Future Computer and Communication, vol. 5, no. 5, pp. 199-204, 2016. [11] B. S. Kang, et al., “AODV-RIP: Improved security in mobile ad hoc networks through route investigation procedure,” Concurrency and Computation Practice and Experience, vol. 22, no. 7, pp. 816-830, 2010. [12] H. Harman, et al., “Robot assistance in dynamic smart environments—a hierarchical continual planning in the now framework,” Sensors (Switzerland), vol. 19, no. 22, pp. 1-33, 2019. [13] O. Vermesan and J. Bacquet, “Cognitive Hyperconnected Digital Transformation,” River Publishers, pp. 1-310, 2017. [14] J. Govindasamy and S. Punniakody, “A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack,” Journal of Electrical Systems and Information Technology, vol. 5, no. 3, pp. 735-744, 2018. [15] A. Dhaka, et al., “Gray and Black Hole Attack Identification Using Control Packets in MANETs,” Procedia Computer Science, vol. 54, pp. 83-91, 2015. [16] R. van Glabbeek, et al., “Modelling and verifying the AODV routing protocol,” Distributed Computing, vol. 29, no. 4, pp. 279-315, 2016. [17] Z. S. Mahmood, et al., “The Directional Hierarchical AODV (DH-AODV) routing protocol for wireless mesh networks,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2016, pp. 224-229. [18] A. Syarif, et al., “Adding gateway mode for R-AODV routing protocol in hybrid ad hoc network,” TENCON 2011 - 2011 IEEE Region 10 Conference, Bali, 2011, pp. 169-173. [19] S. G. Thorenoor, “Dynamic routing protocol implementation decision between EIGRP, OSPF and RIP based on technical background using OPNET modeler,” 2010 Second International Conference on Computer and Network Technology, Bangkok, 2010, pp. 191-195. [20] A. A. Susom, “Effectiveness of routing protocols for different networking scenarios,” Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 4, pp. 112-121, 2018. [21] S. G. Fernandez, et al., “Unmanned and autonomous ground vehicle,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4466-4472, 2019. [22] E. H. Houssein, “Ant-Hoc: A swarm intelligence-based routing protocol for Ad Hoc networks,” IRACST International Journal of Computer Networks and Wireless Communication, vol. 6, no. 1, pp. 14-23, 2016. [23] K. Chawla and K. Vats, “Different QoS Based Simulation Evaluation of TORA and GRP Routing Protocol Based on Frequency Hopping,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 11, pp. 523-531, 2014. [24] A. Aneiba and M. Melad, “Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET,” International Journal of Future Computer and Communication, vol. 5, no. 1, pp. 57-60, 2016. [25] S. M. Hassan, et al., “Application of Wireless Technology for Control: A WirelessHART Perspective,” Procedia Computer Science, vol. 105, pp. 240-247, 2017. [26] W. Mahmood, et al., “OLWRED: Best Selected Strategy for Data Transmission in Heterogeneous Networks,” International Journal of Computer Applications, vol. 152, no. 4, pp. 11-15, 2016. [27] J. Song, et al., “WirelessHART : Applying Wireless Technology in Real-Time Industrial Process Control,” 2008 IEEE Real-Time and Embedded Technology and Applications Symposium, St. Louis, 2008, pp. 377-386. [28] M. S. E. Alhassan and H. Hagras, “Towards Congestion Control Approach Based on Weighted Random Early Detection and Type-2 Fuzzy Logic System,” 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom, 2019, pp. 71-74.