UAD Template_Zalik Nuryana


 

       10.12198/spektrum.v20i1.13            spektrum.industri@ie.uad.ac.id   
 

SPEKTRUM INDUSTRI 
Journal homepage: 

http://journal3.uad.ac.id/index.php/spektrum 

  ISSN 2442-2630 (online) | 1693-6590 (print) 

 

101 

Network Performance Optimization Using Odd and Even 
Dual Interleaving Routing Algorithm For Oil and Gas 
Pipeline Network 

M. Y. Lee1, A. S. Azman2, S.K. Subramaniam3,*, F. S. Feroz4 

1,2Fakulti Kejuruteraan Elektonik dan Kejuruteraan Komputer, Universiti Teknikal Malaysia Melaka (UTeM), Durian 

Tunggal, Melaka, 76100, Malaysia. 

3Advance Sensors & Embedded Controls System (ASECS), Centre for Telecommunication Research & Innovation 

(CeTRI), Fakulti Kejuruteraan Elektonik dan Kejuruteraan Komputer, Universiti Teknikal Malaysia Melaka (UTeM), 

Durian Tunggal, Melaka, Malaysia. 

4Centre of Advanced Computing Technology (C-ACT), Fakulti Kejuruteraan Elektronik dan Kejuruteraan Komputer, 

Universiti Teknikal Malaysia Melaka (UTeM), Malaysia. 

*Corresponding author: siva@utem.edu.my  
 

INTRODUCTION 

 The oil and gas sector is divided into three main parts, namely upstream, midstream, and 

downstream, which are required to obtain commercial products as shown in Figure. 1. The process often 

begins with industry discovery and field development in the upstream sector, where all crude oil 

exploration and extraction are carried out. Using trucks, tanker vessels, or pipelines, raw materials are 

transported to the next station through the midstream, which plays an active role in the storage of crude 

A R T I C L E  I N F O  
 

A B S T R A C T   

Article history 

Received: August 2020 
Revised  : September 2021 
Accepted:  September 2021 

 The oil and gas industry is one of the world’s largest conglomerates, 
involving the production of complicated and critical methods for 
refining. This indicates the high necessity for a secure and reliable 
system, such as the Wireless Sensor Network (WSN), which provides 
auspicious and flexible solutions for the industry. It is one of the most 
excellent and trendy solutions to the crisis existing within the oil and 
gas industry, especially in the midstream pipeline. In this application, 
the nodes were arranged in a linear architecture, to cover a long 
distance of the pipe. The factors causing the degradation of the overall 
network performance with increasing density were also identified, due 
to the increment of the load causing clogging and inhabiting the packet 
queue. This subsequently led to packet loss, throughput unfairness, 
higher power consumption, and passive nodes’ presence in the 
network. The proposed routing protocol (AODVEO) was also reactive 
based on the AODV reducing the instabilities by splitting the traffic into 
even and odd paths. Additionally, the performances of AODV and 
DSDV were used to benchmark the efficacy of the proposed routing 
protocol. 
 

This is an open-access article under the CC–BY-SA license. 

Copyright © 2022 the Authors 

 
Keywords 
Wireless sensor network  

Linear 

Oil and gas  
Pipeline 
 
 

 

mailto:10.12198/spektrum.v20i1.13
mailto:spektrum.industri@ie.uad.ac.id
http://journal3.uad.ac.id/index.php/spektrum
mailto:siva@utem.edu.my
http://creativecommons.org/licenses/by-sa/4.0/
http://creativecommons.org/licenses/by-sa/4.0/


 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

102 

oil before transmission to the downstream. In this sector, the transported materials are then refined and 

commercialized. Various methods are also observed for the transportation of raw materials, such as 

truck or ship utilization. However, pipeline transportation is found to be a cost-effective and more 

pragmatic mode of transportation (Abbas et al., 2018; Muller, 2017). Despite being a popular 

transportation choice, issues such as leakage, corrosion, and sabotage still occurred, leading to the 

unexpected disasters responsible for the destruction of the economy, workers, and nature. 

On January 10, 2018, The Star reported that Petronas, the only administrator of Malaysia’s oil 

reserves and third-largest exporter of global liquefied natural gas after Qatar and Australia, confirmed a 

leakage at the Long Luping section of the Sabah-Sarawak pipeline in Lawas. This showed that the 600 

km oil and gas facility connecting Kimanis (Sabah) to Bintulu (Northern Sarawak) had a leakage at 1.45 

am, which led to a devastating explosion (“Gas leak at Petronas Sabah-Sarawak Pipeline in Lawas The 

Star Online,” 2018). Another explosion was also reported on January 13, 2020, serving as the fourth 

occurrence to be recorded since June 11, 2014, along the same pipeline (“Another explosion along 

Sarawak-Sabah interstate gas pipeline _ The Star,” 2020). 

Figure 1.  Overview of Upstream, Midstream, and Downstream. 

On April 12, 2019, The Straits Time reported an explosion at Petronas oil and gas complex, where 

two local workers and more than ten houses in Kampung Lepau were badly injured and damaged, 

respectively (“Explosion at Petronas oil and gas complex in Johor injures two, damages houses, SE Asia 

News & Top Stories - The Straits Times,” 2019). These reports proved that the remote pipeline integrity 

monitoring system was essential to avoid any unforeseen disaster. 

Introduction to Wireless Sensor Network 

Wireless Sensor Network(WSN) has recently prevailed in the mobile tracking of pipeline health, due 

to its usability and cost-effectiveness (Ali, S., Qaisar, S., Saeed, H., Khan, M., Naeem, M., & Anpalagan, 

2015; Raza et al., 2018). This is a collection of sensors with the ability to sense, process, and 

communicate, subsequently forming a network for monitoring the physical world (W. Z. Khan, Aalsalem, 

Gharibi, & Arshad, 2017). It has also been implemented in both sensor-integrated ground and 

underwater pipelines, to detect any form of unwanted irregularities (Abbas, Bakar, Ayaz, Mohamed, & 

Tariq, 2017; Aldosari, Elfouly, Ammar, & Alsulami, 2020; Felemban, Shaikh, Qureshi, Sheikh, & Qaisar, 

2015; Watt, Phillips, Campbell, Wells, & Hole, 2019). Furthermore, the network topology is one of the 

techniques used to differentiate several types of sensors, due to being a node placement architecture. 

This is divided into two main structures, namely linear and spread-out topologies. Based on covering 

hundreds/thousands of kilometres, the nodes of the midstream pipeline are often positioned in the linear 

topology (“Malaysia Oil and Gas Midstream Market | Growth, Trends, and Forecasts (2020 - 2025),” 

2016). Subsequently, the classification of the networks is separated into a one-tier flat and multi-tier 

hierarchical topology, as shown in Figs. 2 and 3, respectively. 



SPEKTRUM INDUSTRI Vol. 20. No 1, April 2022 pp. 101-112 

Network performance optimization… (Lee, et.al.) 
 103 

 

Figure 2.  Flat one-tier topology. 

Hierarchical topology often involves the communication of a cluster head and the nodes, with the 

generated information being forwarded to a higher level, as shown in Figure 3. 

Figure 3.  Hierarchical topology. 

Wireless standards also significantly affect network efficiency or result, depending on the utilized 

application. In a real linear topology scale, the two criteria with implementational capabilities are as follows, (1) the 

IEEE 802.11, which contains the individual modules used to communicate with the wireless transmission 

serving a stationary or mobile terminal collection (S. M. Khan, Nilavalan, & Sallama, 2015), and (2) the 

IEEE 802.15.04, which is known as a low-rate private area wireless network. Based on this condition, 

the IEEE 802.11 was selected due to the tremendous data rate, compared to the IEEE 802.15.04. A 

brief comparison is subsequently displayed in Table 1. 

Challenges and Limitations of Conventional Routing Protocols 

Based on the preliminary stage of the study, several analyses were carried out on the existing 

conventional protocols, to identify their challenges and limitations. In this condition, multi-hop was used 

as the data transmission technique, where the sender node transferred the information to the receiver 

(Yao, Cao, Vasilakos, & Member, 2014). However, some problems were observed as the number of 

nodes increased, such as (1) energy consumption, (2) communication reliability, (3) network scalability, 

(4) robustness, and (5) security. According to A. Khan et al. (2019), the lifetime of a network was a 

crucial factor affecting restricted power supply in linear WSN topology, where a massive amount of 

energy was needed for data transmission in a large-scale system. Although the idea of preparing backup 

power was applicable, it was still unsuitable in underground or underwater nodes. In the oil and gas field, 

a secure contact network is highly needed, as the nodes are expected to obtain and transmit the data 

or signal to the destination when an anomaly is observed. This needs to be carried out within a specified 

amount of time, as failure often leads to a catastrophic accident. Subsequently, these data were crucial 

for monitoring the pipeline’s health, to avoid extra costs. 

 

 

 



 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

104 

Table 1.  Comparison of IEEE 802.11 and IEEE802.15 

Parameter Wifi ZigBee WirelessHart Z-Wave 

IEEE standard 802.11a/b/g/n/ac 802.15.04 802.15.04 802.15.04 
Operational 
frequency 

5GHz(A,ac)/2.4GHz(b,g)/2.4GHz-
5GHz(n) 

2.4GHz 2.4GHz 2.4GHz 

Nodes per 
master 

2007 >65000 500 232 

Range 100meters(a,b,g)/250meters(n) 1600 meters 250 meters 100 meters 
Date rate 11Mbps(b)/54Mbps(a,g)/450Mbps(a

,c)600Mbps(n) 
250Kbps 250Kbps 250Kbps 

Battery 
Life/Cost 

Days-weeks/High Months-
years/Low 

Months-
years/Low 

Months-
years/Low 

 

The scalability of a network often leads to the achievement of a stable performance without being 

affected by the nodes. This explains that when the network expands, the number of nodes being deployed 

is increased. In this condition, more data and traffic are then generated and created, respectively. 

However, the network and its performance become overcrowded and degraded. This confirms that the 

scalability of the system is affected by the following, (1) network capacity, (2) queue threshold, and (3) 

range of source node to the destination. Based on robustness and security, the flexibility level of the 

network is determined by the management of massive data, intrusion, or malicious attack volumes, 

respectively. Since the nodes are implemented to decrease human interference, unauthorized 

personnel are likely to attack the system towards the obstruction of data collection, by triggering a false 

alarm or manipulating the packets (W. Z. Khan, Hossain, Aalsalem, Saad, & Atiquzzaman, 2016). 

Additionally, a routing protocol is deemed decent based on the adaptability and delivery of optimum 

performance within the network. 

Related Work 

At the beginning of the studies, several performance issues were mostly observed due to the 

increasing number of nodes. In this condition, the deprivation of delivery ratio, throughput, and the high 

energy consumption are reflected in the network layer (routing layer) performances. This revealed that 

many experts were attracted to routing, to improve the overall network performance. It. is also known 

as a high-level decision-making mechanism, where information is transferred from the source to 

destination nodes through an inter-network containing one or more transitional structures 

(Radhakrishnan et al., 2016). Moreover, the efficiency of routing protocols is typically calculated from 

the link reliability perspective among the nodes, disconnection, and restoration of connections, which is 

an essential operation where approximately all data packets are likely to be missed. In this case, the three 

most popular protocols are reactive, proactive, and hybrid systems. The reactive routing protocols use 

an on-demand approach for discovering paths (Kaur & Singh Kahlon, 2014), indicating that the routes 

are dynamically changing based on the present network conditions (Mohammed, 2019). When the 

network’s status is not continuously monitored or updated, the flooded messages and route tables are 

minimized (Goswami S, Joardar S, Das C B, Kar S, 2017). However, the path discovery process is found 

to continuously occur, causing more time to establish the connection, which leads to increased end-to-

end delay. The Ad-hoc On-Demand Distance Vector (AODV) is also an example of a reactive routing 

protocol, which uses RREQ (route request), RREP (route reply), and RRER (route error) for route 

management (Govindasamy & Punniakody, 2018; Xin & Yang, 2015). In this condition, RREQ and 

RREP are used as broadcast and acknowledgement packets, respectively. Meanwhile, RERR is 

transferred to the source node during the link interruption. The verifies the systematic restart of the route 

detection process when some data are still observed for transmission (Govindasamy & Punniakody, 

2018). 

According to proactive routing protocols (table-driven protocols), the update of the table was 

regularly carried out, with information such as the hop, sequence numbers, hop figure, and destination, 

being made permanent by occasionally transmitting control messages between all network nodes 

(Hamid & El Mokhtar, 2016; Pandey, Raina, & Rao, 2015). These have a more rapid route establishment, 



SPEKTRUM INDUSTRI Vol. 20. No 1, April 2022 pp. 101-112 

Network performance optimization… (Lee, et.al.) 
 105 

subsequently verifying consistent path availability. Since the routes are continuously updated, the will delay is 

outrightly minimized, with network traffic being more constant (Mohammed, 2019). On the downside, 

the network is flooded with routing information (control packets and routing overhead), as congestion is 

observed due to the frequent table updates consuming all the systematic resources. Moreover, the 

DSDV (Destination Sequence Distance Vector) is an example of a proactive routing protocol, where 

each node is needed to transfer a sequence number that is periodically increased and transmitted to all 

neighbouring structures with other updates (Chavan, Kurule, & Dere, 2016; Singh & Verma, 2015). The 

hybrid routing protocol is a combination of proactive and reactive systems, due to their utilization 

advantages. This obtains correct path information to determine the optimum direction of the target node, 

by updating routing information when needed. It is also generally known as the combination of DSDV and 

Link State Routing (LSR), optimized for rapid integration with lower power and memory consumption. 

Therefore, network traffic should be denser regarding the number of nodes, irrespective of the routing 

protocol selected for implementation. This relationship occurred due to the increment of both control and 

data packets congesting the traffic of the system. All the nodes were also considered as sources in real-

life deployment, with data being simultaneously transmitted. From each node, the sum of transmitted data 

is shown in Equation. (1). 

NP=(CPi+DPi )+ ∑ (CPj+DPj)≤ IfQlen      (1) 
j=i+1 

Where, 

x = n −                   (2) 

Where NP = the total packets of the network constricted by the IfQ length limit, n = the number of 

nodes, CPi and DPi = the sum of control and data packets for node i, respectively, with the condition 1 ≤ i 

≤ x, as well as CPj and DPj = the control and data packets for the adjacent nodes j, respectively. Based 

on Eq. (1), the generated total packets increased with higher overall node quantities, leading to several 

network performance issues. This led to the proposition of the Ad hoc On-Demand Distance Vector 

Even and Odd (AODVEO) routing protocol. 

Ad Hoc On-Demand Distance Vector Even And Odd (AODVEO) 

The AODVEO routing algorithm was mostly developed based on the AODV system. This was not in 

line with the conventional AODV algorithm, which determines its path by selecting the shortest and 

freshest route (van Glabbeek, Höfner, Portmann, & Tan, 2016). The AODVEO system also establishes 

its path based on Even and Odd paths, as shown in Fig. 4. Furthermore, it is designed to deliver improved 

results regarding the overall network performance for linear topology, compared to the conventional 

routing algorithm. Different from the standard practice, AODVEO also separates the route into Even and 

Odd traffic (Figure. 4), for the reduction of congestion. When an odd/even node transfers the RREQ to its 

surroundings, only the compatible systems are eligible for acceptance and continuous transmission. 

This process is then prolonged until the RREQ is dropped when arriving at its destination node. Once 

dropped, the destination node transmits RREP in a reverse direction, where collection at the source 

structure leads to the transmission of the data packet through the established route.  



 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

106 

Figure 4.  AODVEO routing algorithm 

Figure 5 shows the forward transmission of the RREQ packet to the neighbouring nodes, E2 and 

O2, through the odd-numbered source (On). Since E2 is an even-numbered node, the transmitted 

packet was rejected and dropped. Meanwhile, the packet was acknowledged in O2 and transmitted to 

the subsequent hop, due to the oddness of the node. This process was continuously conducted until 

RREQ reached ND, with the packet interchange procedure subsequently carried out by discarding 

RREQ and forwarding RREP in the opposite direction to the source. 

Figure 5.   AODVEO Even and Odd path. 

A queue limit is a simple mechanism for controlling the bidirectional packet movement within every 

network node. This is observed in the AODVEO system, although the dual-path (Even and Odd) 

approach lessens the routing overhead by half, subsequently ensuring better network traffic. In the 

system, the total packets accumulated for Even and Odd nodes are shown in Eqs. (3) and (4), 

respectively. 
x 

NPE=(CPEi+DPEi)+ ∑ (CPEj+DPEj)≤ IfQlen        (3) 
j=i+1 

NPE = the even packet queues for the x nodes in the network, CPEi and DPEi = the sum of overall 

control and data packets for node i, where 1 ≤ i ≤ x, as well as CPEj and DPEj = the control and data 

packets for the neighbouring nodes j, where i ≤ j ≤ N. 

 

 



SPEKTRUM INDUSTRI Vol. 20. No 1, April 2022 pp. 101-112 

Network performance optimization… (Lee, et.al.) 
 107 

x 

NPO=(CPOi+DPOi)+ ∑ (CPOj+DPOj)≤ IfQlen     (4) 
j=i+1 

NPO = the odd packet queues for x nodes in the network, CPOi and DPOi = the sum of overall 

control and data packets for node i, with the restriction of 1≤ i ≤ x, as well as CPOj and DPOj = the control 

and data packets for the neighbouring nodes j, where i ≤ j ≤ x. Furthermore, the accepted data at the 

destination node is shown in Eq. (5), where the packages (data and control packets) arriving with a 

queue length more than IfQlen were oddly and evenly dropped from the network. 

TNP = NPE + NPO                     (5) 

TNP = the packets accumulated in the network, as well as NPE and NPO = the total numbers of 

packets available in the even and odd traffics (Eqs. 3 and 4). In this condition, the limitation of IfQlen 

was found to bound the equations, with simulations carried out using the proposed AODVEO, AODV, 

and DSDV routing protocols. This was conducted in a specified environment and condition, to validate 

the results of splitting the traffic into two paths.  

RESEARCH METHOD 

The simulation was conducted using AODV, DSDV, and AODVEO, through the Network Simulator 

2.35. In this condition, only the best five of the seven runs (seven seeds) were selected and averaged, 

with the spacing (d) and time (t) being 50 m and 500 s, respectively. Moreover, the transport agent and 

traffic type applied were the Transmission Control Protocol (TCP) and Constant Bit Rate (CBR), 

respectively. The size of the executed packet was also 512 bytes, with the transfer rate being two 

packets/secs, as shown in Table 2. 

Table 2.  Simulation parameters. 

Parameters Value 

MAC IEEE 802.111 
Routing protocols AODV, DSDV, AODVEO 

Topology Linear 
Number of nodes 20,40,60,80,100,120,140,160,180,200 

Packet size 512 bytes 
Seed 1-20 

Interface queue type Drop tail 
Packet queue length 50 packet 
Propagation mode Two ray ground 

Simulation time 500 seconds 

 

RESULTS AND DISCUSSION 

Delivery Ratio 

This is the correlation between the successfully obtained and total transferred packets, due to being 

an important performance measure for the reliability of a specific network. Since most implementations 

were data-critical in the oil and gas sector, all the lost information values were found to be highly 

enormous to the industry. In this condition, the lower delivery ratio indicated more network packet loss. 

Based on Fig. 6, the packet distribution ratio decreases with an increase in the network size, clarifying 

that the delivery ratios of AODV and AODVEO were almost identical at a smaller scale of 20-40 nodes, 

with DSDV being slightly higher. In the deployment of 80 nodes, the AODVEO routing protocol 

significantly surpassed AODV and DSDV by 15 and 11%, respectively. This revealed that the proposed 

protocol (AODVEO) was more efficient in preserving the packet transferred to the target node, compared 

to AODV and DSDV. Additionally, the packet queue was minimized by separating the traffic into two 

distinct routes, leading to the elimination and accomplishment of congestion and more data flow, 

respectively. 



 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

108 

 

Figure 6.  Delivery ratio (%) vs the number of nodes. 

Throughput 

This is defined by the rate of the received data (from the packet) transferred from the source to the 

destination nodes (kbps) within the network. Based on a consumer’s perspective, throughput is more 

important when highly compared to the delivery ratio within the available resources, indicating a more 

significant system capacity. However, the delivery ratio is more critical from the designer’s perspective, 

due to determining the problems causing low network throughput. In this report, AODVEO outperformed 

both AODV and DSDV from a small to large-scale network size of 20-200 nodes, regarding the analysis 

of throughput (Fig. 7). This showed that AODVEO highly delivered 8.82 and 12.17 kpbs at 20 and 200 

nodes, respectively, compared to DSDV. In Fig. 6, the throughput trend was also a reflection of the 

packet delivery ratio (Fig. 5), where the source node attempted to re-transmit the data based on the loss 

of information. This led to a lower distribution of delivery ratio and successfully received data, with the 

throughput subsequently affected severely. 

 

Figure 7.  Throughput vs the number of nodes. 

Ehnergy Consumption 

Energy consumption is measured in Joule (J) and described as the overall network power utilized 

over the total received packet. This is because energy management is an essential wireless parameter in 

linear topology, with a communication connection discontinuity being created by a single node failure. 

Since more packets were being delivered, the power consumption closer to destination nodes was often 

higher, causing the congestion of the traffic line. However, the congestion is likely to drop when a 

package is produced by or crosses through the nodal area. In this condition, issues such as energy 

waste were generated due to packet regeneration and hopping. Based on Fig. 8, the energy expenditure 

is also increased with the elevating value of the nodes. This proved that the DSDV and AODVEO 

networks consumed the highest and lowest amount of available energy, respectively. Despite having 

higher throughput values, the AODVEO routing protocol still outperformed AODV and DSDV by 0.00398 

and 0.00536 J, respectively, at a small network size of 20 nodes. Meanwhile, it used less energy of 

0.0377 and 0.0953 J for AODV and DSDV at a larger network size of 200 nodes, respectively. 



SPEKTRUM INDUSTRI Vol. 20. No 1, April 2022 pp. 101-112 

Network performance optimization… (Lee, et.al.) 
 109 

 

Figure 8.  Energy consumption vs the number of nodes. 

 

Passive Nodes 

These nodes are unable to transmit data to the target network area, due to the unnecessary or 

unevenly allocated bandwidths within the system. They also occur mostly in high traffic networks with a 

constrained energy source. Moreover, the passive nodes cause a breakdown of communication, which 

affects the network’s lifetime. Based on Fig. 9, the occurrence of these elements in AODVEO and DSDV is 

found at the deployment of 80 nodes, with subsequent observation confirmed at 60 for AODV. In a large-scale 

network of 200 nodes, the total number of these elements in AODVEO, AODV, and DSDV was 59.8, 72.6, 

and 68.9%, respectively. Although AODVEO had a higher value of throughput, its passive nodes were 

still lower than AODV and DSDV. 

 

Figure 9.  Passive nodes vs the number of nodes. 

Fairness Index 

This is the network-wide measure of resource equality allocation, where the closeness to 1 leads to 

a better outcome over the network. In linear WSN, network imbalances are an important factor with any 

protocol, as AODVEO outperformed AODV and DSDV by 0.06 and 0.05 at the deployment of 20 nodes, 

respectively (Fig. 10). Despite this, the fairness index for AODVEO was still below 0.5 at a 40 node 

deployment. This subsequently became worse with the continuous elevation of the nodes being 

deployed. Based on Fig. 10, the graphical numbers indicated that the issues surrounding network 

fairness were yet to be completely resolved since the resources allocated were far from being equally 

distributed. 



 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

110 

Figure 10.  Fairness index vs the number of nodesCONCLUSION 

The rice planting and harvesting process is at risk of falling into the level 4 category in terms of 

ergonomics. According to the RULA (Rapid Upper Limb Assessment) method analysis, the high 

category with recommendations for an investigation and change immediately. Gender, BMI, length of 

employment, and tenure have no bearing on MSD levels. The waist and the neck have a percentage of 

MSDs of 98 % and 95%, respectively. These were the body parts subjected to a high level of ergonomic 

risk. Traditional agriculture workers were advised to improve work procedures and tools before the 

situation worsened to reduce long-term risks.Several factors, including job demands, socio-cultural 

factors, workplace characteristics, and environmental factors, cause or exacerbate work-related 

disorders, according to WHO (1985). Otherwise, musculoskeletal problems such as awkward posture, 

prolonged standing, kneeling, slouching, and repetitive muscle activity occur in most cases of 

agricultural work due to the physical demands on the body. Fatigue, illness, and accidents will inevitably 

result from this posture. Workers' lack of knowledge of agricultural health and safety puts them in the 

most dangerous situations. This study included agricultural activities in the occupational group with the 

highest risk of musculoskeletal disorders (MSDs). When combined with tool design and related 

educational interventions, these ergonomic considerations effectively prevent MSD problems. The 

study's conclusion emphasizes the importance of ergonomic hand tool design as a form of intervention. 

CONCLUSIONS 

Many interrelated factors were found to affect the overall network performance in a pipeline network, 

as reactive and provocative routing protocols (AODV and DSDV) were simulated in the early analytical 

stages, with the system efficiency subsequently reviewed. This proved that numerous network 

performance issues were identified with a continuous increase in system size. Based on the results, the 

proposed reactive routing protocol, AODVEO, was found to be very reliable and efficient. This improved 

the overall network performance of a wireless sensor network with linear topology. In the most extensive 

configuration (200 nodes), AODVEO routed the network to produce more throughput and delivery ratio, 

as well as less energy and passive nodes at 8.19kbps, 7.546%, 0.03772J, and 12.8%, respectively. 

However, a negligible development of the fairness index was observed, where the IP (index point) was 

found to be below par (0.5). In Figure. 10, the reflected values also indicated that the resource was not 

yet distributed equally through the network. Therefore, more studies need to be conducted in refining 

the issues of fairness, especially for the large-scale network. 

ACKNOWLEDGMENTS 

This study is part of the project analysis and development of a static multi-hop linear routing algorithm 

for the oil and gas pipeline, using an 802.11 wireless sensor network. The authors are grateful to the 

Ministry of Higher Education, Malaysia and the University Teknikal Malaysia Melaka, for their support, 

laboratory facilities, and sincere encouragement. 



SPEKTRUM INDUSTRI Vol. 20. No 1, April 2022 pp. 101-112 

Network performance optimization… (Lee, et.al.) 
 111 

REFERENCES 

Abbas, M. Z., Abu Baker, K., Ayaz, M., Mohamed, H., Tariq, M., Ahmed, A., & Faheem, M. (2018). Key 

factors involved in pipeline monitoring techniques using robots and WSNs: Comprehensive 

survey. Journal of Pipeline Systems Engineering and Practice, 9(2), 1–15. 

https://doi.org/10.1061/(ASCE)PS.1949-1204.0000305 

Abbas, M. Z., Bakar, K. A., Ayaz, M., Mohamed, M. H., & Tariq, M. (2017). Hop-by-Hop dynamic 

addressing based routing protocol for monitoring of long range underwater pipeline. KSII 

Transactions on Internet and Information Systems, 11(2), 731–763. 

https://doi.org/10.3837/tiis.2017.02.007 

Aldosari, H., Elfouly, R., Ammar, R., & Alsulami, M. (2020). New Monitoring Architectures for underwater 

oil/Gas Pipeline using Hyper sensors (Vol. 69, pp. 307–296). https://doi.org/10.29007/c84d 

Ali, S., Qaisar, S., Saeed, H., Khan, M., Naeem, M., & Anpalagan, A. (2015). Network Challenges for 

Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline 

Condition Monitoring. https://doi.org/10.3390/s150407172 

Another explosion occurs along Sarawak-Sabah interstate gas pipeline _ The Star. (2020, January). 

Retrieved from https://www.thestar.com.my/news/nation/2020/01/13/another- explosion-occurs-

along-sarawak-sabah-interstate-gas-pipeline 

Chavan, A. A., Kurule, D. S., & Dere, P. U. (2016). Performance Analysis of AODV and DSDV Routing 

Protocol in MANET and Modifications in AODV against Black Hole Attack. Procedia Computer 

Science, 79, 835–844. https://doi.org/10.1016/j.procs.2016.03.108 

Explosion at Petronas oil and gas complex in Johor injures two, damages houses, SE Asia News & Top 

Stories - The Straits Times. (2019, April 12). Retrieved from 

https://www.straitstimes.com/asia/se-asia/explosion-at-petronas-oil-and-gas-facility-in- 

pengerang 

Felemban, E., Shaikh, F. K., Qureshi, U. M., Sheikh, A. A., & Qaisar, S. Bin. (2015). Underwater Sensor 

Network Applications: A Comprehensive Survey. International Journal of Distributed Sensor 

Networks, 2015. https://doi.org/10.1155/2015/896832 

Gas leak at Petronas Sabah-Sarawak Pipeline in Lawas The Star Online. (2018, January). 

Retrieved from https://www.thestar.com.my/news/nation/2018/01/10/gas-leak-at-petronas-sabah-

sarawak-pipeline-in-lawas 

Goswami S, Joardar S, Das C B, Kar S, P. K. D. (2017). Performance Analysis of Three Routing 

Protocols in MANET Using NS-2 and ANOVA test with Varying Speed of Nodes. Intech, 

i(tourism), 13. https://doi.org/10.5772/66521 

Govindasamy, J., & Punniakody, S. (2018). A comparative study of reactive, proactive and hybrid 

routing protocol in wireless sensor network under wormhole attack. Journal of Electrical Systems 

and Information Technology, 5(3), 735–744. https://doi.org/10.1016/j.jesit.2017.02.002 

Hamid, B., & El Mokhtar, E. N. (2016). Performance analysis of the Vehicular Ad hoc Networks (VANET) 

routing protocols AODV, DSDV and OLSR. 2015 5th International Conference on Information 

and Communication Technology and Accessibility, ICTA 2015. 

https://doi.org/10.1109/ICTA.2015.7426885 

Kaur, N., & Singh Kahlon, M. (2014). A Review on Reactive and Proactive Wireless Sensor Networks 

Protocols. International Journal of Computer Applications, 95(11), 22–29. 

https://doi.org/10.5120/16639-6603 

Khan, A., Imran, M., Noreen, M., Tariq, M., Shoaib, M., & Subhan, F. (2019). Impact of Node 

Deployment and Routing for Protection of Critical Infrastructures. IEEE Access, 7, 1–1. 

https://doi.org/10.1109/access.2019.2891667 

Khan, S. M., Nilavalan, R., & Sallama, A. F. (2015). A Novel Approach for Reliable Route Discovery in 

Mobile Ad-Hoc Network. Wireless Personal Communications, 83(2), 1519– 1529. 

https://doi.org/10.1007/s11277-015-2461-8 

Khan, W. Z., Aalsalem, M. Y., Gharibi, W., & Arshad, Q. (2017). Oil and Gas monitoring using Wireless 

Sensor Networks: Requirements, issues and challenges. Proceeding - 2016 International 

https://doi.org/10.3837/tiis.2017.02.007
http://www.thestar.com.my/news/nation/2020/01/13/another-
http://www.straitstimes.com/asia/se-asia/explosion-at-petronas-oil-and-gas-facility-in-
http://www.thestar.com.my/news/nation/2018/01/10/gas-leak-at-petronas-


 SPEKTRUM INDUSTRI Vol. 20 No. 1 April 2022 pp. 101-112       

Network performance optimization… (Lee, et.al.) 
 

112 

Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET 

2016, 31–35. https://doi.org/10.1109/ICRAMET.2016.7849577 

Khan, W. Z., Hossain, M. S., Aalsalem, M. Y., Saad, N. M., & Atiquzzaman, M. (2016). A cost analysis 

framework for claimer reporter witness based clone detection schemes in WSNs. Journal of 

Network and Computer Applications, 63, 68–85. https://doi.org/10.1016/j.jnca.2016.01.014  

Malaysia Oil and Gas Midstream Market| Growth, Trends, and Forecasts (2020 - 2025). (2016). 

Retrieved May 25, 2020, from https://www.mordorintelligence.com/industry-reports/malaysia-oil-

and-gas-midstream-market 

Mohammed, I. Y. (2019). Comparative analysis of proactive & reactive protocols for cluster based 

routing algorithms in WSNs, 124(March), 131–142. 

Muller, N. (2017). Petroleum Products By Pipelines and Rail  :Evidence From Shipment of Crude Oil 

From North Dakota. 

Pandey, K., Raina, S. K., & Rao, R. S. (2015). Performance analysis of routing protocols for vehicular 

adhoc networks using NS2/SUMO. Souvenir of the 2015 IEEE International Advance Computing 

Conference, IACC 2015, 844–848. https://doi.org/10.1109/IADCC.2015.7154825 

Radhakrishnan, R., Edmonson, W. W., Afghah, F., Rodriguez-Osorio, R. M., Pinto, F., & Burleigh, S. 

C. (2016). Survey of Inter-Satellite Communication for Small Satellite Systems: Physical Layer 

to Network Layer View. IEEE Communications Surveys and Tutorials, 18(4), 2442–2473. 

https://doi.org/10.1109/COMST.2016.2564990 

Raza, M., Aslam, N., Le-Minh, H., Hussain, S., Cao, Y., & Khan, N. M. (2018). A Critical Analysis of 

Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks. 

IEEE Communications Surveys and Tutorials, 20(1), 39–95. 

https://doi.org/10.1109/COMST.2017.2759725 

Singh, K., & Verma, A. K. (2015). Experimental analysis of AODV, DSDV and OLSR routing protocol 

for flying adhoc networks (FANETs). Proceedings of 2015 IEEE International Conference on 

Electrical, Computer and Communication Technologies, ICECCT 2015, 1– 4. 

https://doi.org/10.1109/ICECCT.2015.7226085 

van Glabbeek, R., Höfner, P., Portmann, M., & Tan, W. L. (2016). Modelling and verifying the AODV 

routing protocol. Distributed Computing, 29(4), 279–315. https://doi.org/10.1007/s00446-015-

0262-7 

Watt, A. J., Phillips, M. R., Campbell, C. E. A., Wells, I., & Hole, S. (2019). Wireless Sensor Networks 

for monitoring underwater sediment transport. Science of the Total Environment, 667, 160–165. 

https://doi.org/10.1016/j.scitotenv.2019.02.369 

Xin, H. M., & Yang, K. (2015). Routing protocols analysis for internet of things. Proceedings - 2015 2nd 

International Conference on Information Science and Control Engineering, ICISCE 2015, (i), 

447–450. https://doi.org/10.1109/ICISCE.2015.104 

Yao, Y., Cao, Q., Vasilakos, A. V, & Member, S. (2014). Lifetime-Balancing Data Collection Protocol for 

Heterogeneous Wireless Sensor Networks. IEEE Transaction on Networking, 23(3), 1–14. 

https://doi.org/10.1109/TNET.2014.2306592 

 

https://doi.org/10.1016/j.jnca.2016.01.014
http://www.mordorintelligence.com/industry-