Abstract

Mobile Ad-hoc Network has emerged as a key technology for next-generation networks. Though its rapid growth inspires numerous applications, it is difficult to assure Quality of Service because of its immense scaling caused due to node’s mobility, fading radio signals, and unreliable nature of the wireless channel. To efficiently utilize network resources and accomplish guaranteed Quality of Service, a novel Software-Defined Multilayered Admission Control model that embeds an intelligent Neurofuzzy Inference-based Admission Control service engine is proposed in this paper. Each node makes use of the Neurofuzzy Inference-based Admission Control service to learn, manage, prioritize, and admit data traffic according to user requirement. The service engine exploits fuzzy inference-based admission control process to assess node’s current status using Quality of Service parameters, namely, bandwidth, queue load, and Received Signal Strength Indicator to evaluate the prediction index. The prediction index not only helps in determining the strongly connected neighbors during reliable path selection process but also solely decides whether the admission control session can be admitted or rejected. Moreover, the Neuro-Multilayered Learning process of the service engine helps to self-organize and make the complete network intelligent for instantaneous decision making. The proposed mechanism not only improves the session admission between nodes but also reduces the packet drops assuring successful session completion. Performance analysis using the simulation model proves that the proposed system shows promising gains with assured throughput and low end-to-end delay and has the potential to be applied in real-world scenarios.

1. Introduction

Mobile Ad-hoc Networks (MANET) forms a self-organized, infrastructure-less, and rapidly deployable wireless network [1]. It is constructed by a set of mobile nodes that offers unique advantage of being created and used “anywhere, anytime” but not relying on the complex infrastructure. Though MANET undergoes rapid progress inspiring numerous applications, enabling multimedia communication in mobile ad-hoc networks still remains a challenging task. Predominantly, most real-time video and audio applications makes use of stringent bandwidth typically requiring the network to support such challenging and varying traffic rates with high throughput and low end-to-end delay to guarantee Quality of Service (QoS) [25].

Despite the efforts made to alleviate many issues [6], there still exist a number of barriers to the deployment of real-time applications in MANET. The most prominent ones include maintaining connection state, rapid allocation of resources, avoid scarcity of resources, and effectively manage dynamic topological changes caused due to mobility and appropriate resource reservation between the source and destination. These challenges [79] has initiated the need to design and develop new QoS techniques [1013] to support real-time data services in MANET. Furthermore, the new approach should be capable of differentiating various service requirements taking into consideration all other essential elements carefully with an ultimate goal to guarantee best end-to-end service delivery.

The Admission Control (AC) [1417] is considered as the most crucial mechanism for providing QoS in MANET. Its core functionality is to estimate the node’s state based on resource availability and decide which application’s data flow can be admitted along which node such that the QoS as per user requirement is met without violating previously made guarantees.

To combat the aforementioned challenges and develop an enhanced technique to effectively manage network resources for assuring QoS in MANET, in this paper, novel neurofuzzy logic-based Software-Defined Multilayered Admission Control (SD_MAC) model is proposed. Aim of the proposed model is to assure guaranteed QoS support for real-time traffic. It exploits the fuzzy logic to ensure traffic adaptation characterized by dynamic changes (making it adequate to the uncertainty and the information incompleteness) in MANET environment. The model also incorporates the benefits of Neural Networks (NN) to support the multimedia service in ad-hoc networks. The self-adaptive data driven mechanism of the neural network allows fast learning of different operations performed by the core functional blocks of the system thereby permitting a best traffic class selection and delivery according to flow requirements. After learning the data presented to them it offers the capability to generalize, i.e., it often predicts an event occurrence even if the input data is noisy and their underlying relationships are unknown or difficult to describe. The most important feature of the NN is that it can approximate multivariate functions with superior prediction accuracy and low computational complexity. It can primarily be used when limited data sets are available and the relationships between them are vague. Overall NN exploits the capability to learn and adapt to the system behaviour more quickly by integrating the operations of various components (both in MAC and network layer) to make the network self-organized and artificially intelligent.

The proposed SD_MAC system makes use of the Neurofuzzy Inference-based Admission Control (NFAC) service engine whose core functionality is to(i)Evaluate the resource availability by using QoS parameters such as bandwidth, queue load, and RSSI in each node to generate the node status. The Fuzzy Inference-based Admission Control (FIAC) module in the NFAC engine is triggered automatically in each node to generate the node status.(ii)Derive the prediction index which solely decides whether the admission control session can be admitted or rejected via the node for the requested QoS.(iii)Self-learn the behavioural functionalities, and train and test the network to make it self-organized and artificially intelligent for effective decision making using Neuro-Multilayered Learning (NML) process.

Our proposed methodology was modelled using prototype developed using MATLAB. The performance of the proposed model is evaluated by comparing it with other existing approaches such as SWAN, StAC, DACME, and FuzzyQoS. The results showed that the service exhibited by NFAC engine tends to automate the working procedure of admission control to achieve good throughput by selecting strongly connected neighbors and reliable path for longer live transmission.

The rest of the document is organized as follows: Section 2 presents related work, Section 3 illustrates our proposed SD_MAC system, Section 4 depicts the simulation results and analysis, and finally Section 5 concludes the paper along with a discussion on future directions.

This section describes briefly some of the main admission control model proposed for wireless MANET.

A stateless service differentiation AC model (SWAN) [18] performs real-time traffic control using sender-based admission control by distinguishing real-time and best-effort traffic. The source probes the path to the destination when it wants to send a real-time traffic to destination. During the probe, it identifies the available bandwidth and relies on feedback received from the MAC layer by using the rate and source-based admission control approach. Each node uses the rate control algorithm to control the best-effort traffic. The bandwidth used for best-effort traffic is restricted so that real-time applications can exploit the required bandwidth; the bandwidth not used by real-time applications can be exploited by the best-effort traffic. The probe request in SWAN causes a lot of overhead and packet loss.

In Staggered Admission Control protocol (StAC) [19], the source sends the session request packet. The session is rejected if the network layer does not support the flow, else it broadcasts the request. Intermediate nodes add information to request after verifying their local resources. The destination receives the request and sends the response. Source caches all the route information and then sends an admission request packet to two hop neighbors which sends an admission denied back if it cannot support new information flow. Based on the observation, the source transmits data at a very low rate, and gradually increases the flow rate up to the required level within the specified time. During the gradual increasing time if it is affecting the earlier admitted sessions then a session may be rejected. Presence of interference causes link failures resulting in frequent route discoveries. This deteriorates the performance in StAC by incurring high routing overheads and end-to-end delay.

A distributed admission control for MANET environments (DACME) [20] approach periodically assesses end-to-end conditions on the path. Source node performs path probing to obtain various QoS measurements to assure transmission of data traffic under good conditions. The destination responds to probes giving the source feedback about path conditions. Though this method tends to perform well in small to medium network taking advantage of the IEEE 802.11e standard [21], it suffers from fairness issue under high network load.

The FuzzyQoS [22] approach aims to improve the traffic regulation rate and congestion control of multimedia applications. It monitors the variation rate in queue to provide a measure of the queue state and uses fuzzy thresholds to adapt the traffic transmission rate under dynamic conditions. It makes the source node more responsive to any sudden changes in network traffic volume by using explicit rate congestion notification. Though this approach achieves stable end-to-end delay under different network conditions, it does not deal well with route failures. It reduces the data rate of affected session while searching for new routes implying its support for real-time applications only with elastic throughput requirements.

To increase the user’s perceived QoS, we apply an NFAC service mechanism in the SD_MAC model. Detailed illustration of the proposed approach is elaborated in Section 3.

3. System Description

3.1. Overview of the SD_MAC Model

The proposed Software-Defined Multilayered Admission Control (SD_MAC) model exploits a new cross-layer QoS solution for mobile ad-hoc networks. The overall architecture of the proposed SD_MAC model comprises of various functional blocks such as routing service, admission controller, classifier, scheduler, and traffic regulator.

Figure 1 illustrates the schematic representation of the SD_MAC model with its core functional blocks.

The Admission Controller module is considered as the most important functional block of the SD_MAC model. Its core functionality is to send a dedicated probe request from the source node towards the destination node to detect most reliable route by estimating intermediate node’s resources availability. Based on the information, the admission control module at the source decides whether to admit or reject the data service request. In the proposed model, each node initiates “admission control” process to evaluate its current resource availability, which is indicated using the “service offered prediction index, SOfdprediction_index” value. Every node stores the SOfdprediction_index value in its Local Aware Table (LAT). Next, using the “Routing Service” module, each node broadcasts a beacon message (consisting of the signal qualities, type of service offered (SOfdprediction_index), etc.) over the network. The neighbor nodes receive the beacon message and store the sender’s id, service offered (SOfdprediction_index) by the sender, etc., in its LAT. Now, let us assume that a source node has data to be transmitted to a destination node in the network. Let us consider that a reliable route from the source to the destination does not exist, and then during such occasions, the proposed SD_MAC model performs the following steps:(i)The source initiates admission control mechanism within itself to generate service-requested prediction index (SReqprediction_index) value(ii)The source then performs the “path selection” process to reach the destination. As part of the “path selection” process, the source and the neighbor nodes looks-up its LAT to find strongly connected neighbors, SCN (nodes that have SOfdprediction_index > SReqprediction_index) that has the capability to process the data traffic as per user’s QoS requirement(iii)The source then sends a dedicated probe request (DPReq) message only to the selected SCNs, which in turn repeats the process until destination is reached

Unlike other admission control techniques, the source node in the proposed model does not execute admission control process every time to select the strong neighbors, rather, it simply looks up its LAT to identify the SCNs (each node maintains the list of neighbor nodes with its “prediction index” value in its LAT). This mechanism of validating node’s resource availability using “prediction index” prevents the node from executing the “admission control” process every time a resource verification request arrives from other nodes. In addition, as every node maintains the list of neighbor nodes prediction index in its LAT, the neighbour, which has the capability to process the request, is identified instantaneously during path discovery. Moreover, to optimize traffic regulation and control congestion over the network for both real-time (audio/video) and nonreal-time services, the proposed model embeds a Neurofuzzy Inference-based Admission Control (NFAC) service engine to exploit fuzzy inference approach integrated with neural artificial intelligence. The aim is to guarantee best end-to-end service delivery for end users. Though, NFAC’s core objective is to learn, manage, prioritize, and admit data traffic according to user’s QoS requirement, it also keeps the network trained and tested on various behavioural changes making it self-organized and artificially intelligent for effective decision making over a period of time. Significantly, this not only improves the service flow acceptance between nodes but also reduces the dropping of service among them. The other functional blocks of the SD_MAC model such as the classifier, traffic regulator, and the scheduler are specifically used to distinguish, regulate, and schedule data traffic appropriately. Whenever a data service request is admitted, the classifier provides service differentiation by classifying and marking the packets into 4 different classes. It marks the packets either as High Profiled (HP) or Medium Profiled (MP) or Low Profiled (LP). The marked packets are then queued in their respective HP or MP or LP queues and wait for the transmission. The main objective of the classifier is to distinguish the traffic and determine the ones that should pass or bypass the Traffic Regulator. The Traffic Regulator module regulates MP and LP traffic by delaying MP and LP packet processing and allows more bandwidth for HP packet processing. When a new real-time flow is allowed by admission control block, the packets marked as HP by passes the traffic regulator and are queued in HP queues for processing. The Scheduler module employs a new scheduling discipline referred to as the Strict and Probabilistic Priority Queuing (SPPQ) which determines the probability with which the queue is served by assigning a parameter to each priority queue. It offers variety of service differentiation by providing service segregation among various groups of traffic classes.

The functional blocks or components that belong to the SD_MAC system are as follows: Routing Service: it discovers legitimate path between the source and the destination. It performs(i)Path Selection(ii)Resource ReservationAdmission controller: the Admission controller in the SD_MAC system incorporates a Neurofuzzy Inference-based Admission Control (NFAC) service engine to(i)Evaluate and maintain the node status information for each node(ii)Derive the certainity factor or prediction index using the node status information to solely decide whether the admission control session can be admitted or rejectedPrimary functionality of NFAC is to perform the following activities:(i)Fuzzy Inference-based Admission Control Process(ii)Neuro-Multilayered Learning ProcessClassifier: it classifies and stamps packets based on their priority (as platinum, gold, silver, and bronze) when a new request is admitted by the admission controllerScheduler: it uses the scheduling algorithm in order to push the marked packets in their respective high- , medium- , and low-profiled queues for transmissionTraffic Regulator: it regulates data traffic in MP and LP queues if there is delay encountered in processing HP packets and vice versa

The summary of notations used in the SD_MAC system is referred in Table 1.

3.2. Detailed Specification of Software-Defined Multilayered Admission Control System

Our work primarily focuses on Routing Service and Admission Control component.

3.2.1. Routing Service

To realize service access anytime and anywhere, the path between the source and destination should be strongly connected. SD_MAC follows the Ad-hoc on Demand Distance Vector Routing (AODV) protocol for path establishment. It uses Signal Strength (SS) metric to make sure that the data traffic service is performed only on reliable links [23] rather than on weak, diminishing links (ie., selecting “reliable” links ensures that the path between the source and the destination is strongly connected). The “routing service” component performs key operation such as path selection and resource reservation.

3.2.2. Path Selection

The path selection is performed before the source Sn transmits data to the destination Dn. The process involves the following steps:Step 1: at regular intervals, each node broadcasts the “P_beacon” UDP packet to its immediate neighbors announcing the link qualities and services provided. The “P_beacon” packet contains the following information:where Nid indicates the node id, NRSSI indicates the node’s Received Signal Strength Indicator (RSSI), NSNR indicates the node’s Signal-to-Noise Ratio (SNR), NTS indicates the node’s time stamp, and SOfdprediction_index indicates the node’s service-offered prediction index value.Step 2: the neighbor nodes receive the P_beacon packet, extracts the sender node’s information, and adds the entry in its Local Aware Table (LAT). Each node maintains a LAT which contains the list of its one-hop neighbor information. Entry in LAT has the following fields: Each node generates and maintains a service-offered (SOfdprediction_index) prediction index which indicates the type of service offered by neighbor nodes. The SOfdprediction_index derived using NFAC process is elaborated in detail in Section 3.3.Step 3: in a similar way, all the nodes in the network share among each other their signal qualities and services offered using the “P_beacon” packet which in turn is added and maintained in their respective LAT. Now, using the information in LAT, each node has the capability to select its reliable neighbor nodes. This ensures each node to selectively send service queries only to strongly connected neighbors (SCNs), which may in turn forward service queries to their SCNs.Step 4: when a source node has data service (DS) to be transmitted to a destination and if it does not know a “reliable route” to reach the destination, it first looks up into its LAT to verify if there are SCNs, which offers the required service. Typically, the data service consists of the following information: (i) the type of data traffic, TRType and (ii) measure of data traffic, MData.Using the information of DS such as TRType and MData and the node status (Nstatus), the node derives a SReqprediction_index value, where Nstatus indicates current node’s status which is evaluated using FIAC’s process of NFAC and SReqprediction_index indicates the type of data service to be processed by the source which is evaluated using NML’s process of NFAC. Details regarding Nstatus and SReqprediction_index are elaborated in detail in Section 3.3.Step 5: the source looks up its LAT to verify if there are neighbors, which satisfies the criteria: SOfdprediction_index ≥ SReqprediction_index. If there are nodes that satisfy the criteria, then those nodes are considered as strongly connected neighbors (SCN). The source then selectively sends a dedicated probing request packet DPReq (Saddr,Daddr, Seqid, Servicepath, and SReqprediction_index) only to those SCNs. The fields Saddr, Daddr, and Seqid indicate the source address, destination address, and sequence identifier. The Servicepath refers to the service path with first address filled with its own address and the address of SCNs along with its signal strength. During the LAT look-up process, the following is performed:(i)If only one SCN satisfies the criteria, then the DPReq packet is sent only to the SCN found.(ii)If multiple SCNs satisfy the criteria, then the DPReq packet is send to “k” SCNs whose SOfdprediction_index value is high compared to others. Let “k” indicate the optimal number of paths selected for data transmission. Our scenario considers “k = 3,” i.e., maximum of three reliable paths are selected during the “path selection” mechanism, such that when a path discovered fails during data transmission, the next path can be considered for transmission. In cases, where all three routes selected fails during data transmission, the process of “path selection” is initiated once again. An optimal limit of three paths has been chosen in our work as too many paths can increase the complexity during maintenance.(iii)If no SCN satisfies the criteria, then the node waits for a time period and then performs the LAT look up once again. The time slot is not a fixed value and keeps varying as it depends on the node’s LAT update, i.e., the LAT in each node is updated whenever a “P_beacon” packet from the neighbor is received. Due to dynamic change in topology, there is possibility that each node receives “P_beacon” packets from new or old neighbors and records the new or updated information in its LAT. As soon as the LAT records a new entry or updates the existing entries, the node embedded with SD-MAC functionality automatically reinitiates a LAT look-up process. Moreover, the influence that this behaviour across the network is low, as in most cases, the occurrence of this behaviour in MANET is found to be minimal or negligible.Step 6: Upon receiving DPReq packet, the SCN checks the query_handler (QH) table. The QH table maintains the details related to query handled by each node. If Seqid in DPReq packet exists in QH table, then the request is considered duplicate and discarded otherwise it is forwarded to its SCNs. It also sends a Dedicated Replay Acknowledgement packet (DRAck) to the source indicating the status on path selection and for decision making by the source. The process continues until DPReq packet reaches the destination node. Algorithm 1 summarizes the steps involved in the path selection process in the SD_MAC model.

// Node i broadcasts P_beacon packet to immediate neighbors
Ni P_beacon (NId, NRSSI, NSNR, NTS, SOfdprediction_index);
// Neighbor Node j receives P_beacon packet of Ni node i
NjP_beacon (NId, NRSSI, NSNR, NTS, SOfdprediction_index);
//extract the beacon of Node i and store in LAT of Node j
LATj extract_data();
Nj send P_beacon (NId, NRSSI, NSNR, NTS, SOfdprediction_index);
NiP_beacon (NId, NRSSI, NSNR, NTS, SOfdprediction_index);
LATi extract_data();
/∗ entry in LAT contains the following field. 𢅺/
LATfields = [NHid, NHAvRSSI, NHAvSNR, NHTS, SOfdprediction_index]
// if source node has data and does not know path to destination
if (Sn (data) = = “T” && path_to_destination( ) = = “F”) then
SCNi = Sn_lookup (LATsn);
end if;
if (is exist(SCNi)) then // strongly connected neighbor node exists
 // send DPReq packet to SCN found
Sn send DPReq (Saddr, Daddr, Seqid, Servicepath, SReqprediction_index)
 // SCN receivesDPReq packet
 SCNi DPReq (Saddr, Daddr, Seqid, Servicepath, SReqprediction_index)
 Check_QHtable(); //SCN checks QH table
 if (Seqid = = exists()) then
   Discard DPReq();
 else
  if (SOfdprediction_index ≥ SReqprediction_index) then
   append (Servicepath);
   extract_signal_data();
   store_into_LAT();
   forward DPReq() packet to SCN;
   send DRAck() to source //send Ack to source
  end if;
 end if;
end if;
3.2.3. Resource Reservation

On receiving the first DPReq packet, the destination initiates the resource reservation process. It generates a Dedicated Probe Replay (DPRep) message and sends it along the reverse path. The intermediate SCNs which receives the DPRep packet revalidates its resource availability by checking its current SOfdprediction_index (SOfdprediction_index ≥ SReqprediction_index), and if satisfied, it updates its node state (Ns) as reserved. Note, each node maintains a “Node State-Ns” which helps in detecting and recovering QoS violations. At any particular instant of time, the Ns exists in any one of the following states:(i)checked: if path is selected during path discovery(ii)reserved: if node reserves resource during the resource reservation process(iii)allocated: if node receives data packets and processes(iv)liberated: if resources are released by the node

Resources reserved by the node can be liberated if data packets are not received by the node within a short allocated period (the time slot is set specific to the application within which if the neighbor node does not receive the data packets from the source or from its neighbor, it will release the reserved resource for other purposes. This ensures that the resource reserved for data transmission in the neighbor nodes is utilized optimally rather than being locked for performing a particular task). After sending DPReq along multiple SCNs, the source may receive multiple DPRep response from different service paths. It is now the responsibility of the source to select the best service path to deliver the data traffic. Our SD_MAC model selects the path with least service path discovery time by always choosing the first DPRep response path because this is the path that has experienced the least delay and is probably less congested and shorter than the later arriving DPRep response path. By using a dedicated control session, the source selects a reliable path (a path that is established for an acceptable period for transmission) with intermediate SCNs that have the capability to serve source node’s QoS requirement. Now, the source admits data traffic along the selected path to destination.

Figure 2 represents the sequence diagram depicting the steps performed in a routing service component.

3.3. Neurofuzzy Inference-Based Admission Control (NFAC) Mechanism

The SD_MAC model makes use of the fuzzy neural approach based admission control to exhibit better efficiency which leads to higher user’s satisfaction. The Neurofuzzy Inference-based Admission Control (NFAC) engine combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks to develop an intelligent system to handle incoming traffic keeping the resource utilization at an optimal level.

The Neurofuzzy Inference-based Admission Control (NFAC) engine acts as a key component of the SD_MAC model. The proposed model embeds the NFAC service engine, an automated process triggered in each node to(i)find the scheduling mechanism and the type of services being used to estimate the current data traffic serviced and the actual bandwidth available for accommodating other data services(ii)Find its current availability by observing and predicting the network conditions(iii)Identify the amount of resources utilized for high- , medium- , and low-priority packets. Its core objective is to generate the “node status, Nstatus” and thereby derive the “prediction index” which determines whether the node has the capability to accommodate the type of services requested by other nodes in the network.

In SD_MAC, the Admission Control module maintains the prediction index value which helps each node to dynamically regulate real-time data transmission and accurately allocate resources in the face of network dynamics such as mobility and traffic overloads. Unlike other AC approaches, which executes the AC process to estimate the node’s current status, in SD_MAC the decision regarding the node’s current resource availability is made instantaneously by merely verifying the “prediction index.” NFAC’s functionality is categorized as follows:(i)Fuzzy Inference-based Admission Control Process(ii)Neuro-Multilayered Learning Process

3.4. Fuzzy Inference-Based Admission Control (FIAC) Process

The NFAC service engine is empowered with the Fuzzy Inference-based Admission Control (FIAC) process which comprises of fuzzy logic (FIL) [15] that offers better adaptability under varying network conditions by tuning rules without intervention of operators. Aim of FIAC is to formulate a control decision by considering multiple QoS parameters. The Structure of FIAC used in NFAC is shown in Figure 3.

Our scenario considers QoS parameters such as(i)Type of user service, packet type (PType)(ii)Varying queue load (QLoad)(iii)Bandwidth availability (BWavail),(iv)Signal intensity (RSSI),

as the input. These inputs act as a vital sign to accurately predict the node’s current status in the network. Next, the input variables are fuzzified through fuzzification process to form different Fuzzy Linguistic variables. To fuzzify the variables, fuzzy sets have to be determined. The crisp inputs are classified with its corresponding membership functions to form the fuzzy sets.

In SD_MAC, we have considered 9 fuzzy sets such as(i)For the HP packet type, the fuzzy sets considered are NSHlow, NSHmoderate, and NSHhigh(ii)For the MP packet type, the fuzzy sets considered are NSMlow, NSMmoderate, and NSMhigh(iii)For the LP packet type, the fuzzy sets considered are NSLlow, NSLmoderate, and NSLhigh

where NSHhigh or NSMhigh or NSLhigh indicates the “excellent” state of the node with minimal traffic, less congested HP or MP or LP queues, and low mobility. Similarly, NSHmoderate or NSMmoderate or NSLmoderate indicates “good” state of the node with allowable traffic, moderate congested HP or MP or LP queue and average mobility. Finally, NSHlow or NSMlow or NSLlow indicates “poor” state of the node with high traffic, high mobility and highly congested HP or MP or LP queues, respectively. Threshold values ranges between TLlow, TLmed, and TLhigh for LP users, TMlow, TMmed, and TMhigh for MP users, and THlow, THmed, and THhigh for HP users set as per the application scenario. Table 2, describes the classification of inputs and its fuzzy sets.

Fuzzification is followed by the fuzzy rule base creation process which uses logical combination of input variables with the AND (&&) operator. Quality of results in a fuzzy system depends on the fuzzy rules. The sample fuzzy rule base is referred below:If (PType = HP) && (QLHP = H) && (QLMP = M) && (QLLP = L) && (RSSI = L) && (BWavail = L) thenNStatus = NSHlowIf (PType = MP) && (QLHP = L) && (QLMP = H) && (QLLP = L) && (RSSI = H) && (BWavail = H) thenNStatus = NSMhighIf (PType = LP) && (QLHP = L) && (QLMP = M) && (QLLP = M) && (RSSI = M) && (BWavail = M) thenNStatus = NSLmoderate

3.4.1. Node Status and Prediction Index Generation

Inference engine uses the rule base to generate the defuzzified value node status, Nstatus, which typically reflects the dynamic behaviour of the traffic in node’s buffers and the available capacity of the current node. Table 3 displays the Nstatus derived using the QoS parameters.

For example, let us consider the packet type (PType) be HP, the percentage of queue load for HP be 42% (M), for MP be 35% (L), for LP be 63% (H), the RSSI be 67% (H), and bandwidth available (BWavail) be 28% (L). The triangular membership function representing the range of membership degree is represented for each input, as shown in the following figures.

If HP Queue Load = 42%, then the degree of membership ranges between 0.47 and 0.53, as shown in Figure 4.

For MP Queue Load = 35%, then the degree of membership ranges between 0.42 and 0.58, as shown in Figure 5.

For LP Queue Load = 63%, then the degree of membership ranges between 0.46 and 0.56, as shown in Figure 6.

For RSSI = 67%, then the degree of membership ranges between 0.31 and 0.79, as shown in Figure 7.

For bandwidth available = 28%, then the degree of membership ranges between 0.3 and 0.8, as shown in Figure 8.

The fuzzification process combines the input to generate the defuzzified value node status, Nstatus = 79 (NSHmod), as represented in Table 4. The NSHmod status indicates the node is in good state and can admit allowable data traffic as its queues are moderately congested.

The SD_MAC model considers the Nstatus as one of the primary factor [24] in making decision during admission control. Followed by Nstatus, each node generates a measure of prediction index, an estimated value that reflects the node’s current resource availability. It is used to validate the current resource utilization of the node based on traffic, mobility, and congestion. The Admission Control module maintains two types of prediction indexes such as(i)Service-offered prediction index (SOfdprediction_index)(ii)Service-required prediction index (SReqprediction_index)

3.4.2. Service-Offered Prediction Index (SOfdprediction_index)

It refers to the service currently offered by the node, i.e., the node’s current resource availability is specified using this value. The Nstatus combines with the current load status of HP, MP, and LP queues to generate the SOfdprediction_index. The threshold limits for the HP queue (such as ThQhigh, ThQmed, and ThQlow), MP queue (such as TmQhigh, TmQmed, and TmQlow), and LP queue (such as TlQhigh, TlQmed, and TlQlow) load status are set as per application requirement. Then, SOfdprediction_index is evaluated by validating the Nstatus along with the queue load status. For example,if (Nstatus = = NSHhigh)&&(HPQload > ThQhigh)&&(MPQload > TmQmed)&&(LPQload ≤ TlQlow) thenSOfdprediction_index=V; //where, 0 ≤ V ≤ 1end;

where V ranges from 0 ≤ V ≤ 1, provided “1” indicates that the node is completely occupied and is unavailable to offer any service currently, while “0” indicates that the node’s resources are free and is fully available to offer varied services.

3.4.3. Service-required prediction index (SReqprediction_index)

It refers to the service requested by the node, i.e., the node acts as a source and has a data service to be transmitted to a destination. The service to be supported by other nodes is specified using this value. The type (TRType) and measure (MData) of data service along with the bandwidth required (Breq) are validated to generate the SReqprediction_index.

For example,if (TRType = = “voice”)&&(MData > Dhigh)&&(BWreq ≤ BWmax) thenSReqprediction_index=V; //where, 0 ≤ V ≤ 1end;

where V ranges from 0 ≤ V ≤ 1, provided “1” indicates high-profiled data service with high resource requirement is requested by the source, while “0” indicates low-profiled data service with very low resource availability is requested by the source.

Dynamic change in node behaviour (caused due to traffic characteristics, mobility, number of neighbors, etc.) tends to regenerate the dedicated probe request (prediction index), which is fed as part of the input to Neuro-Multilayered Learning (NML) to accurately identify strongly connected neighbors. Detailed analysis on the NML process is discussed in the following section.

3.5. Neuro-Multilayered Learning (NML) Process

The proposed work uses the Artificial Neural Network (ANN) to train the model using various input parameters such as the dedicated probe request (prediction index) to accurately predict the strongly connected neighbor nodes. The aim of the proposed model is to recognize the weights of each input parameter using machine learning, specifically, the Artificial Neural Network. The ANN is a supervised mathematical learning tool inspired by biological neural networks. The network is connected with a vast number of nodes called neurons. The connections between the nodes imitate the synaptic connections found in biological entities.

ANNs are incredibly useful for analysis of mapped information as it can be trained to recognize patterns in data.

The aim of implementing the ANN is to predict the weight factors for different nodes such that the best possible node with a weight factor can be selected. The proposed Neuro-Multilayered Learning (NML) mechanism implements a multilayer perception (MLP) to learn, analyze, train, and adapt to the operational behaviour of various components and optimize decision according to the node’s current resource availability. The NML maps various features to derive a set of output with good accuracy and high learning capability. It is composed of a vast number of connected units arranged in layers. Among which the first layer is the input layer and the last layer is the output layer. The inner layers are referred to as the hidden layers which are responsible for the bulk of the processing. The process involves important activities such as(i)Train the network(ii)Estimate and accurately admit data service

3.5.1. Train the Network

NML initiates a training process to assure adaptive behaviour of the network. Training the network involves estimating the connecting weights by minimizing the overall error measures, i.e., tasks where the weights of each unit (neurons) should be adjusted in such a way that the error between the desired output and the actual output is reduced. The error derivative computed during this process helps to accurately classify each instance. The process involves the following steps:Step 1: the NML receives input parameters (also referred as instances) including the probe request constituting the SOfdprediction_index generated from FIAC process. Multiple instances (dynamic change in node’s behaviour triggers NFAC engine which derives the SOfdprediction_index prediction index value) at varied time slot are received by the NML process. Let “i1” be the instance received at time slot t1. Change in node’s behaviour causes regeneration of an instance “i2” at time slot t2.Step 2: the instances are fed into the NML process to estimate the error derivative using the steps elaborated in “Mathematical Analysis of NML.” It then classifies the instances appropriately for accurate decision making. Over a period of time, the training processes craft each node to self-organize and adapt to dynamic changes making the whole network intelligent.Mathematical Analysis of NML: aim of the NML is to select the best strongly connected neighbor node based on the Credibility Score (CS). The credibility score was calculated aswhere α, β, and γ are the weight factors and NN, DP, and PF are the number of neighbors, dedicated probe request, and packet forward rate factors, respectively.

The proposed model considers 5 parameters as input, such as, number of nodes, average number of neighbors, mobility, dedicated probe request, and packet forward rate. A diagrammatic representation of the artificial neural network of the SD_MAC model is shown in Figure 9.

The input parameters such as number of nodes and mobility determine the kind of network we are dealing with [25], the packet forward rate determines the traffic characteristics, number of neighbors, and dedicated probe request determines the strongly connected neighbor which is why these parameters has been included. The output layer has 8 nodes resulting in 69 possible cases with a combination of α, β, and γ values. The sample values generated for the cases are shown in Table 5.

The cases with 0 values are excluded (the weight factor with 0 relevance would mean that the factor would become irrelevant for the network) to generate 36 possible cases, as depicted in Figure 10, i.e.,

The NML was implemented to have 5 inputs, 36 outputs, and 3 hidden layers with 10 neurons each. Each node acts as a decentralized processing unit, which, based on its own data activates nodes of the next layer. A node is activated by a weighted sum of all its parent nodes and takes on probabilistic values. For example, let nodes be denoted by the notation aij, where i refers to the layer corresponding to the node while j refers to the node number. Thus, the first node in the input layer will be named a00, while the last node in the same layer will be named a04. The first node in the next layer will similarly be named a10. The value a10 will be a weighted sum of all the values of its parents, viz, a00, a01, …, a0n, where n is the number of nodes in the layer. Since the sum will be greater than one, in this work we use a normalizing function ReLU [26] (as ReLU achieves better result than sigmoid [27]) so that the value appears between 0 and 1. The weights are the values assigned to the arrows linking each nodes. We use the notation , where the arrow connects node j of the layer i to node k of the layer i + 1. It is by adjusting these weights, that we determine the strength of the connections and how firing of one neuron will activate the next one. To calculate the weights of the zeroth node (a10) on the first layer, and its value is computed by normalizing the sum of all the values in the previous layer multiplied with their weights. Mathematically, in case of node a10,

For each node, may be written as . Thus, the equation is rewritten as

In general, it is expressed aswhere aij is the jth node on ith layer and is the weight of the jth node in the i − 1 layer. In this manner, all the nodes in the ith layer are assigned values. This continues for all successive layers and the neurons keep firing till finally the output layer is activated. Initially, the model starts with generic weights and in each successive case the weights are refined to better suit the predetermined result. A cost function determines how close the result was to the actual value. This process occurs multiple times till the results converge and weights in each layer obtain the best possible value to suit the output. In our case each of the 36 output nodes was assigned a probability value. The data was divided such that 75% was used for training and 25% for testing. To train our model, we use a simple mean squared error (MSE) as cost function. The MSE is attractive because it is simple to use, parameter-free, and inexpensive to compute. Thus, the MSE is computed aswhere L refers to the last layer, n is number of outputs, and “a” is the expected output value. The sum gives us the total error for the network. For example, if we consider only the first four of the 36 possible cases and assume value 0.3 is the correct answer, we may obtain the values, as shown in Table 6, in the first iteration. The error in this scenario would be the sum of all the squares of differences between the observed value and expected value.

Similarly, the MSE is calculated for all possible cases and the average is computed. For each new dataset, consisting of all the weights and biases, the cost function is minimized by reducing the error, and thereby allowing the machine to learn. This model consisting of various parameters becomes capable of predicting the best weight factors (SCN) for the network.

3.5.2. Estimate and Accurately Admit Data Service

Apart from training the network, NML also helps in estimating and accurately admitting data service using the following steps:Step 1: at a particular instance of time, each node receives multiple DPReq (Saddr, Daddr, Seqid, Servicepath, SReqprediction_index) packets from its neighbor nodes. At the same time, the node’s AC module maintains its current SOfdprediction_index value.Step 2: the node gathers the SReqprediction_index (instances) from multiple DPReq packets and forwards it to the NML process. First, it categorizes instances based on the traffic type (HP or MP or LP) and groups them together to form a similar set S = (xi, yi, zi), 1 ≤ i ≤ n, consisting of “n” instances, where (xi ∈ HP, Yi ∈ MP, and Zi ∈ LP). Next, it classifies and labels instances either as “Accept candidate-AC” or “Reject candidate-RC” or “Unknown candidate-UC.”(i)Accept candidate, AC: an instance is said to be labeled as AC, provided the instance satisfies the predefined rule (SOfdpredictionindex > SReqpredictionindex).(ii)Reject candidate, RC: an instance is said to be labeled RC, provided the instance satisfies the predefined rule (SOfdpredictionindex < SReqpredictionindex).(iii)Unknown candidate, UC: all other instances are labeled as UC.The unknown candidate list is fed into NML for further optimization. The multilayered process estimates the error derivative using the steps elaborated in “Mathematical Analysis of NML.” It then classifies instances with allowable errors as AC and otherwise as RC, respectively.Step 3: the instances (SReqprediction_index) labeled as AC are prioritized and considered as allowable data service (i.e., the node acts as SCN for its neighbors). The node reserves resources as per the request and triggers the NFAC to regenerate the SOfdpredictionindex. Repeat the process from step 2.

The labeled candidates are stored into the local Managed Information Database (MID) maintained by each node. The MID has storage capacity for storing varied patterns of labeled candidates. These patterns are then used for data mining and classification during NML’s training activity. The idea behind the NML model is to reduce the computational complexity at each level and make the data mining efficient. The unique candidate list from the MID are collected and sent to its neighbors across the network. The neighbor node receives the candidate list and updates its MID with unique candidate list. Algorithm 2 summarizes steps to estimate and accurately admit data service

Input: The instances , , received from Neighbor nodes
 = generate_set ; // denotes the multi-instance sets
Initialize ; j = 1;
 = getCount(); // get the number of instances
for j = 1 to
repeat // repeat and validate multi-instance set
 if then
  if (SOfdpredictionindex > SReqpredictionindex) then
   AC_list = Ii
    end;
 else if then
  if (SOfdpredictionindex < SReqpredictionindex) then
   RC_list = Ii; //Instance labeled as reject candidate
  end;
 else
  UC_list = Ii; //instance labeled unknown candidate
 err = derive_Error(); // find error derivative
 calssify_candidates(err); //classify instance AC or RC or UC
 end
j = j+1;
until ; // continue for all instances
 end /∗ end of for loop
 = getMasterCandidate(AC_list, RC_list, UC_list);
add_to_MID(Mlabel) //add master list to DB.
send_to_neighbor()
Output: Classify instances and generate error derivative

The error between real and expected output is computed. If is within the allowable range (AR), it indicates that instance is covered by an existing attracting basin. Then, and are adjusted. If is beyond the AR, it means that instance is not covered by any existing attracting basins and need to find “h” with minimum error “u”. If is in the AR, it means that the internal output classification represented by unit “u” is applicable to the instance. Also, the input to “j” should be adjusted. Thus, the unit whose AV is the maximum among those connecting with unit “u” is selected. If is beyond the AR, it means that both input classification and output classification is inadequate for the instance. Thus, “j” and “h” are appended to the hidden layers. The new second layer “s” is connected with all the input units. The new third-layer unit is connected with all the output units to generate a fine tuned expected output. The error derivative analysis using the internal layers of the NML process is represented in Algorithm 3.

 = DeriveError (Routput, Eoutput); // error
if ( <= Alwrange) then // Alwrange is allowable range
 Alwvalue = AdjustSlayer (, ); // and are adjusted.
Ii = classifyCandidate (, CInstance,Avalue);
ACandidate_list = Ii // instance is set as acceptable candidate
 updateMID (ACandidate_list);
else if ( > Alwrange) then
Tlayer = findMerrorTLUnit(); //find 3rd-layer min error
 = ComputeCharacteristicerror (sendtoTlayer(CInstance));
 if ( <= Alwrange) then
Ii = classifyCandidate (, CInstance);
ACandidate_list = Ii
 updateMID (ACandidate_list); //Assigned as accept candidate
 else if (  > Alwrange) then
 RC = IOCinadequate(Ilist);
 if (RC < Thvalue) then
  Ii = classifyCandidate (, CInstance);
  ACandidate_list = Ii;
  updateMID (ACandidate_list);
 else
  Ii = classifyCandidate (, CInstance);
  RCandidate_list = Ii; //Assigned as reject candidate
  updateMID (RCandidate_list);
 end;
end;
else
Ilist = addinformation (CInstance, , );
end;

The NML process considers the error value which is the difference between the real and expected output, to classify the instances as follows:(i)If error is within allowable range, then they are classified as “Accept candidate, AC”(ii)If error is beyond allowable range, then they are classified as “Reject candidate, RC”

After several execution of the training stage, NML starts testing operation to test the correctness of the results. The success of network learning is to satisfy the user data flow requirement without performing any operations at the node level. This makes the entire network to offer data service accurately and select the most suitable SCN nodes.

3.6. Classifier, Traffic Regulator, and Scheduler

Any given network supports various types of data flows and categorizes it into two types:(i)nonreal-time traffic or best-effort flows such as messages which requires the data to be reliably delivered to the destination(ii)real-time traffic or QoS flows such as voice and video which apart from reliability requires additional constraints such as available bandwidth and delay to be satisfied.

The real-time traffic is normally expected to get better service than the others. Hence, priority for acquiring resources in a network is generally given to the real-time traffic. In addition to real-time flows, nonreal-time flows such as messages play a very crucial role because of their application in military battle field and emergency rescue operations. These applications require fast and assured transmission of emergency messages. Hence, in such a scenario, priority for acquiring resources in a network has to be given to the emergency nonreal-time traffic based on the user profile. QoS in MANET becomes a necessity due to its applications in critical scenarios. The SD_MAC model makes use of the classifier, traffic regulator, and the scheduler modules to distinguish, regulate, and schedule data traffic appropriately. Figure 11 shows how these modules work together to provide the service. The classifier, scheduler, and traffic regulator modules operate between the IP layer and the MAC layer.

In SD_MAC model, after the source selects the best service path (a path that is established for an acceptable period for transmission with intermediate SCNs that have the capability to serve source node’s QoS requirement) to deliver the data traffic, it then admits data traffic along the selected path to the destination. At each node, the admission control module maintains a SOfdpredictionindex to reflect the node’s current resource availability (in MANET the node’s current resource utilization keeps changing due to change in traffic, mobility, and congestion) using which it revalidates if the SOfdpredictionindex > SReqpredictionindex (indicates the data service to be supported by intermediate nodes). If the SOfdpredictionindex is high, then the admission controller admits the session for processing otherwise rejects it. When a new session is admitted, the classifier, the traffic regulator, and the scheduler performs the following process to support the desired QoS. Based on the traffic type, the classifier classifies the packets QoS profile as platinum, gold, silver, and bronze. It then marks the priority of those packets HP (High Profiled, code is 0), MP (Medium Profiled, code is 1), and LP (Low Profiled, code is 2). Thus, the classifier differentiates real-time and nonreal-time sessions forcing the traffic regulator to process MP and LP packets but not the HP packets. For example, if the traffic type is “network control,” then the QoS profile is set to “Platinum,” and the user priority is marked as HP. Then, based on marking, the packets remain unregulated and bypass the traffic regulator module if it is HP and are forced to pass through the traffic regulator if they are MP or LP. The goal of the traffic regulator is to regulate the data traffic of MP and LP packets (i.e., it tends to delay MP and LP packet processing) and utilize the resource for processing HP packets (real-time sessions). The stamped (marked) packets are then queued by the scheduler in their respective HP, MP, and LP queues and wait for transmission. The scheduler implements a combination of Strict and Probabilistic Priority Queuing to impose service differentiation as per the user’s priority and serve packet in their respective HP, MP, and LP queues. It permits users to utilize resources opportunistically by regulating high traffic imposed by other nodes.

Detailed specification on classifier, traffic regulator, and scheduler modules are referred in the following section:

3.6.1. Classifier

To meet the user’s service requirements and provide better service to selected network traffic, the classifier module in SD_MAC differentiates packets into four classes: platinum, gold, silver, and bronze, as referred in Table 7.

Based on the type of traffic, the packets are stamped as(i)High-Profiled user (HP) supports high bandwidth to ensure high quality of service(ii)Medium-Profiled user (MP) supports nominal bandwidth for moderate QoS(iii)Low-Profiled user (LP) supports lowest bandwidth for bulk data service

The first class “platinum” and “gold” has the highest priority and corresponds to applications with real-time (RT) traffic such as voice and network control packets. This class supports high bandwidth to ensure high QoS. The class is referred to as “expedited forwarding” and in IntServ is referred as guaranteed service. The second class “silver” has less priority than the first class. It is suitable for applications requiring high throughput such as video applications. This class supports nominal bandwidth for moderate QoS. The class is referred to as “assured forwarding” in DiffServ and “controlled load” in IntServ. The third class “bronze” is the least priority class and has no specific constraint. This class supports lowest bandwidth for bulk data service. This class is referred to as best effort in both DiffServ and IntServ architectures.

Based on Traffic type and QoS profile, each user is assigned a static priority as per the classification HP, MP, and LP. To meet service requirements, a proportional weight (which favours fairness among the competing nodes) is assigned to each user. This is implemented by adding a priority field to the header of every packet. The codes (0, 1, and 2) representing the priorities are stored in the priority field. The intermediate node does enqueuing based on the priority value.

3.6.2. Traffic Regulator

The Traffic Regulator module regulates MP and LP (best effort) traffic by delaying best-effort packet processing and allows more bandwidth for HP (real-time) packet processing. When a new real-time flow is allowed by the admission control block, the packets marked as HP by passes the traffic regulator and are queued in HP queues for processing.

3.6.3. Scheduler

The Scheduler module employs a new scheduling discipline referred to as the Strict and Probabilistic Priority Queuing (SPPQ) which determines the probability with which the queue is served by assigning a parameter to each priority queue. It offers variety of service differentiation among various groups of traffic classes. To provide high QoS, different priorities are assigned to packets entering the nodes in the network. The packet scheduling algorithm is employed to select each packet and transmit it to the data link layer. Though a number of packet scheduling algorithm have been proposed, the prominent ones among them include Strict Priority (SP) (i.e., servicing lower priority packets only when higher-priority ones are not waiting to be serviced) [28], Weighted Fair Queuing (WFQ) (i.e., having N data flows currently active, with weights , ,…, , data flow i will achieve an average data rate of R ∗ /, where R is the data link rate) [29], and Weighted Round Robin (WRR) (i.e., assigning a portion of the available bandwidth to each priority queue) [30] are perhaps the most widely adopted disciplines. Among the three disciplines, the SP is easy to implement and provides large differentiation among classes. However, the SP is unfair to all classes other than the highest priority class. This mechanism of SP may introduce large periods of starvation to lower priority classes and usually cannot handle this starvation problem by itself. To deal with starvation problem and make the SP discipline controllable, we propose to assign a parameter to each priority queue, which determines the probability with which the queue is served. Hence, a new scheduling discipline, referred to as the Strict and Probabilistic Priority Queuing (SPPQ) is formed. Similar to WFQ and WRR, variety of service differentiation can be achieved in SPPQ by setting the assigned parameters properly. The novel property of the SPPQ discipline is that it provides service segregation among groups of traffic classes and has the following characteristics:(a)It is easy to implement and verify(b)It exploits well the available network bandwidth(c)It consumes very small memory and processing power requirements(d)Network administrators find them easy to understand and configure(e)It does not require time-stamping as in WFQ

The performance of SPPQ algorithm has been evaluated in this work by considering different priority classes and traffic patterns. The evaluation shows that with high network load i.e., the packet arrival probability λ > 0.6, the QoS offered to low-priority packets rapidly deteriorates with its throughput significantly dropping and delay sharply increasing.

In this paper, we consider the network to operate under the following assumptions:(i)The arrival process of each input of the network is a simple Bernoulli process, that is, the probability that a packet arrives within a clock cycle is constant and the arrivals are independent of each other. We will denote this probability as λ. This probability can be further broken down to λh, λm, and λl, which represent the arrival probability for high- , medium- , and low-priority packets, respectively. It holds that λ = λh + λm + λl.(ii)Under this mechanism, when applications transmit a packet to the network, they specify its priority, designating it either as high, medium, or low. The criteria for priority selection may stem from the nature of packet data.(iii)Each packet priority queue is statically assigned a weight, which specifies the bandwidth ratio that will be dedicated to the particular queue with their sum must be equal to 1.(iv)Upon reception, packets are first classified according to their priority and are then assigned to the queue specifically dedicated to the particular priority, as depicted in Figure 12.

During the network cycle, the SPPQ algorithm evaluates the queues by observing the bandwidth ratio that has been assigned to each queue to select the packet to be forwarded through the output link. The packet is always transmitted when there is traffic waiting, as opposed to nonwork conserving algorithms which do not transmit a packet if the queue is found to be empty. The bandwidth is divided among the queues that do have packets to transmit, proportionally to their weights in case if the queue does not use its bandwidth ratio within a time window.

Every node maintains a separate queue such as HP, MP, and LP for the four classes of users.

According to the priority, the packets are enqueued and dequeued from the queues proportionally based on the weights and the percentage of packets waiting in their respective queues. Let a, b, and c represent the percentage of HP, MP, and LP packets waiting in their respective queues and it is calculated as follows:where QLHP, QLMP, and QLLP represent the number of packets occupied in HP, MP, and LP queues and is dynamic. From each queue, the number of packets to be dequeued is decided based on their access ratio and is calculated as follows:where “” represent the weight which is a constant. The , , and are the user defined weights assigned for HP, MP, and LP queues such that  >  >  >  > 0. The represents the maximum weight. Thus, at any point of time, for any random data flow, the priority of HP packets over MP and LP and the priority of MP packets over LP is ensured.

4. Simulation Results and Discussion

We compare in this section the performance of our proposed SD_MAC scheme with other well-known admission control protocols such as SWAN, StAC, DACME, and FuzzyQoS. For evaluation purpose, the simulator was developed using MATLAB. The simulation prototype provides a user-friendly Graphical User Interface (GUI) enabling the user to edit the network topology and set the parameter values of the protocol module in just a few mouse clicks.

The GUI of SD_MAC is shown in Figure 13.

The simulation environment was tested with 50 nodes moving in an area of 1000 × 1000 sq m. Each node implements random waypoint mobility model. The transmission rate of nodes is 2 Mbps, while their transmission range is 250 m. Initially, when the simulation is initiated the nodes are deployed at random location in the geographical area, as shown in Figure 14.

The mobile nodes move randomly and freely with a speed varying between 0 m/s to 35 m/s. The network traffic model is the Poisson distribution model with buffer space in each node configured as 100 packets. The application with mixture of traffics such as FTP, Web microflows, VoIP, and real-time traffics. The voice and video flows represent real-time traffic with voice modelled as 32 kbps constant rate traffic with a packet size of 80 bytes, video modelled as 200 kbps constant rate traffic with a packet size of 512 bytes, and TCP flows are greedy FTP traffic type with packet size of 512 bytes are used during evaluation.

The parameters used as part of simulation are listed in Table 8.

During simulation, the nodes are randomly chosen to act as the source (node that generates message and transmits the message to destination), with 20 sessions/source. The source and destination nodes are distributed among the mobile nodes in the MANET. Figure 15 displays the network model of the SD_MAC system.

To better investigate the scope and performance [3135] of the protocols, the metrics are selected carefully for fair result analysis. With constant node density scenario, by varying the speed of nodes (as it affects the performance of the protocols due to frequent topology changes) the simulation was run for 500 iteration to derive the average results and the observation on various metrics is analyzed.Scenario 1: in this scenario, the number of nodes is varied from 50 to 300 while the nodes were set to move with low mobility of 5 m/s.Scenario 2: in this scenario, the number of nodes is varied from 50 to 300 while the nodes were set to move with high mobility of 30 m/s.

4.1. Packet Delivery Ratio (PDR)

PDR defines the ratio of the number of packets delivered to the destination successfully against the total number of packets generated by the source.

For better insight and comparative analysis among various approaches, simulation results for scenario 1 and scenario 2 are captured and presented in Tables 9 and 10.

4.1.1. Scenario 1 Analysis

In scenario 1, all the nodes exhibit low mobility across the network. The PDR data captured for various approaches are represented in Figure 16(a). From Figure 16(a), we observe that though the FuzzyQoS scheme performs better in delivering packets successfully to destination when compared to DACME, StAC, and SWAN, the proposed SD_MAC scheme demonstrates better PDR than FuzzyQoS. The fact that in the SD_MAC model, the packets are admitted by the admission controller through the SCN nodes delivered successfully to the destination. The path detected remains intact due to low mobility. Significantly it is observed that when the node density increases, the percentage of PDR also increases because the number of SCNs identified during path selection is more enabling SD_MAC to select the best among them resulting in high PDR. With 100 nodes, SD_MAC surpassed DACME’s, StAC’s, and SWAN’s performance by ∼10%, ∼15%, and ∼18% and FuzzyQoS by ∼5%–∼8%. Nevertheless, even when the number of nodes is increased to 300, the proposed scheme was able to sustain the PDR% > 95% and remain stable in delivering packets successfully to destination when compared to other schemes.

4.1.2. Scenario 2 Analysis

In scenario 2, all the nodes exhibit high mobility across the network. In Figure 16(b), we can observe the PDR of the proposed SD_MAC scheme outperforms other schemes and maintains the PDR above 80% even when the node density increases and exhibits high mobility. The Neurofuzzy Inference-based Admission Control engine in the SD_MAC model exploits the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks to handle incoming traffic and utilize the resources at an optimal level. It is intelligent and fast detection of SCNs helps in achieving high PDR even when mobility increases. Additionally, the neuro-multilayered learning technique ensures the network to adapt to dynamic behaviour and make accurate decisions spontaneously. Though DACME has better PDR compared to StAC and SWAN, and its PDR starts degrading when the number of nodes increases. From the result it is observed that when the node density is 125, the SD_MAC surpassed SWAN’s and StAC’s performance by ∼12%–∼15% and DACME by ∼10%. The PDR for SD_MAC is found to be ∼3%–∼5% more compared to FuzzyQoS. Moreover, the PDR is sustained above 90% when the number of node increases above 125. It has been noticed that even with dynamic change in topology (considering scenario 1 and scenario 2), the nodes were able to successfully deliver the packets from source to destination and sustain high percentage of PDR compared to other existing counterparts. The fact that the LAT look-up process performed by each node during path selection resulted in identifying one or more SCNs preventing the node from waiting for the time slot in order to perform a LAT look up once again. It is from the PDR observation that the path selected was successfully utilized for data transmission in the proposed model, making it most suitable scheme for critical applications.

4.2. Session Admission Ratio (SAR)

It refers to the ratio of data sessions admitted into the network to the total number requesting admission. Figure 17 shows the SAR of the protocols at different node speed.

SAR for StAC is high compared to others as increase in node speed impacts earlier admitted sessions making source to admit more sessions. Even with high-node speed, SD_MAC surpassed FuzzyQoS performance on an average by ∼18%–∼22%, DACME and SWAN by ∼31% and ∼35%, respectively. Though FuzzyQoS uses explicit notification to make the source aware of any sudden change in topology, it does not handle well the route failures, making it to generate more routing overheads to recover the data route.

While, DACME does periodic thorough assessment of resources to identify path conditions during session admission, change in conditions requires reassessment to assure fairness in this approach degrading its SAR. Even in high node speed occasions, SD_MAC is able to sustain SAR and successfully serve the admitted data sessions against other approaches. The fact being each node in SD_MAC has the capability to select its SCNs by LAT look up and share among each other the type of services offered. During probe request, it selects SCNs instantaneously reducing the overall time taken during the probing session making it fast and successful.

4.3. Session Completion Ratio (SCR)

It refers to the ratio of the number of data sessions completed to the application’s satisfaction. Figure 18 represents the Session Completion Ratio (SCR) of the protocols. The excessive retransmission results in switching the data session to another route or initiate new route discovery.

The session drops if its requirements are not fulfilled. It is clear from figure that the SCR of SD_MAC varies from 94.3% to 76.8% by increasing speed from 2 m/s to 32 m/s while for StAC it varies from 41.2% to 31.4%, respectively. In case of StAC, admitted sessions are dropped due to link failures affecting earlier admitted session resulting in frequent route discoveries. SCR of DACME is higher than FuzzyQos even at higher node speed because it takes advantage of periodic assessment of end-to-end conditions during path probing and admitting traffic only when the conditions are appropriate assuring high SCR for sessions admitted. SCR of FuzzyQos is low compared to DACME and SD_MAC, as it does not deal well with route failures while higher speed cause frequent route failure making SCR to degrade. The SD_MAC performs better at different node speed among all the protocols. It is fast, intelligent, and controlled admission of data session helps in achieving high SCR. Obviously, the neuro-multilayered learning process makes the whole network learn and adapt to dynamic node behaviour, making the system to make accurate decisions spontaneously. Local route repair carried out through LAT look up helps to maintain the agreed throughput to the data session.

4.4. Packet Loss Ratio (PLR)

It refers to the ratio of the number of lost packets to the total number of sent packets.

In Figure 19, it is observed that compared to other approaches, the packet loss ratio for SWAN mechanism is higher and increase from 1.5% to 10.7% when node speed changes from 2 m/s to 32 m/s. Higher node speed makes the preprobed routes stale in SWAN resulting in high packet loss. PLR for FuzzyQoS is low compared to SWAN, StAC, and DACME, as it incorporates methodology to adapt to traffic transmission rate under dynamic conditions which reduces data rate for affected session and admits it in new routes.

Observation shows that SD_MAC has the lowest PLR and ranges from 0.15% to 0.61% when node speed changes from 2 m/s to 32 m/s. The multilayered neurofuzzy-incorporated AC in SD_MAC switches data session from one route to another when current route fails. The capability to spontaneously identify SCNs and predict the node’s current resource availability makes the system to admit sessions faster and on more appropriate routes. It not only increases SCR in SD_MAC but also reduces the overall PLR, respectively.

4.5. Average End-to-End Delay

It refers to the time slot elapsed between the time at which the packet is generated at its source and the time it is delivered to its destination. Figure 20 shows the average end-to-end delay caused with increase in node speed for various approaches.

Increase in node speed deteriorates the performance of link causing interference resulting in packet loss, route failures, or delayed transmission. Route failures in StAC make the source to reject the affected session and readmit the session via the backup routes. Frequent route failures not only initiates route discovery frequently but also introduces more overheads and delay which is the case indentified in StAC. The observation indicates the proposed SD_MAC system’s efficiency in sustaining low delay making it more suitable for real-time applications. Prior to data traffic admission, the NFAC engine enables accuracy in decision making, i.e., selecting SCNs, allocating, and utilization of available resources not only assures successful guaranteed session admission but also reduces the overall end-to-end delay.

4.6. Average Throughput

It refers to the total amount of data successfully delivered to the destination per unit time.

In most approaches, frequent route-failures caused due to high mobility makes nodes fail to deliver packets successfully to destination. In Figure 21, the throughput is high when node speed (NS) is low (). Optimal amount of throughput is achieved for all approaches when NS is between 2 m/s to 10 m/s. The throughput for all approaches drops when the node speed varies from ∼10 m/s–∼15 m/s and then upholds.

Observation in Figure 21 shows that SD_MAC has maintained its highest average throughput due to its highest SCR as it is able to assure and uphold the throughput of each session which has been guaranteed at the time of session admission. Although the average throughput of SD_MAC decreases with the increase in node speed, it still maintains the guaranteed throughput at higher ratio for all the admitted session in the network. Nevertheless, NFAC utilizes the opportunities proactively by trasmitting more violently to achieve better throughput. The effectiveness of SD_MAC approach provide opportunities for more nodes complete admitted sessions both in normal as well as in high mobility and traffic constrained environment. The combination of neural intelligence and fuzzy logic makes each node to self-organize and adapt to the dynamic changes making the network effective in decision making enhancing QoS in MANET.

5. Conclusions

Despite the rapid progress and the large volume of research activities made in the MANET, almost all research areas still impose many open issues. In this paper, we have proposed a novel “Software-Defined Multilayered Admission Control (SD_MAC) model” predominantly suitable for real-time mission critical applications. Primarily, the proposed scheme makes use of Neurofuzzy Inference-based Admission Control service engine which dynamically regulates real-time data transmission and accurately allocates resources in the face of network dynamics such as mobility and traffic overloads. Our protocol enhancement proves to make network more intelligent. Simulation results proves the proposed approach outperforms the existing approaches such as SWAN, StAC, DACME, and FuzzyQoS in terms of session admission ratio, session completion ratio, and low dropping probability, assuring QoS for end users. Our future work relies on challenges imposed in limitation on terrain models with interference posed due to environmental conditions.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.