Application of MSVPC- 5G Multicast SDN Network Eminence Video Transmission in Drone Thermal Imaging for Solar Farm Monitoring

The impact of multimedia in day-to-day life and its applications will be increased greatly with the proposed model (MSVPC)–5G Multicast SDN network eminence video transmission obtained using PSO and cross layer progress in wireless nodes. The drone inspection and analysis in a solar farm requires a very high number of transmissions of various videos, data, animations, along with all sets of audio, text and visuals. Thus, it is necessary to regulate the transmissions of various videos due to a huge amount of bandwidth requirement for videos. A software-defined network (SDN) enables forwarder selection through particle swarm optimization (PSO) mode for streaming video packets through multicast routing transmissions. Transmission delay and packet errors are the main factors in selecting a forwarder. The nodes that transfer the videos with the shortest delay and the lowest errors have been calculated and sent to the destination through the forwarder. This method involves streaming to be increased with the highest throughput and less delay. Here, the achieved throughput is shown as 0.0699412 bits per second for 160 s of simulation time. Also, the achieved packet delivery ratio is 81.9005 percentage for 150 nodes on the network. All these metrics can be changed according to the network design and can have new results. Thus, the application of MSVPC- 5G Multicast SDN Network Eminence Video Transmission in drone thermal imaging helps in monitoring solar farms more effectively, and may lead to the development of certain algorithms in prescriptive analytics which recommends the best practices for solar farm development.


Introduction
The quality assurance of a solar farm includes millions of solar panels, cables, DC combiner boxes and invertors [1,2]. To ensure the operational reliability and the efficiency of the photovoltaic system, field fault diagnosis or the real-time visual inspection is vital. Considering the performance assessment methods like I-V measurements or the other field techniques, real-time thermal imaging of the PV panels and the electrical components are more effective [2]. Through this process, the thermal profiles of each panel in a large module is visible and it paves the way for analyzing the properties and identifying the faults such as micro and macro cracks due to the thermal stress. In addition, the thermal parameters on In this proposed model, the speed of the node and the errors of conversion of the receiving packets have been calculated, the packets with the least changes and the video packets with the least delay have been found and sent through multicast routing mode. To regulate the transmission, the local best and global best nodes are selected in the particle swarm optimization mode and the packets sent. In this paper, Section 2 examines the literature survey, revealing the background ideas proposed for the MSVPC method, which states that video packets are transferred through a forwarder selected through PSO and data transmitted over SDN-enabled devices on the 5G network. Section 3 describes the design and methodology of MSVPC, Section 4 presents the results and discussions and, finally, Section 5 concludes with the influences and future challenges that need to be addressed.

Literature Review
SDN with network function virtualization, one can gain a global view of the entire network can be analysed using an open interface such as OpenFlow and with the centralized network controller. SDN can support new services and programs at any level of user requirement or need [4]. The current practice of focusing predominantly on rate-distortion performance with little consideration for these restrictions has led to the development of encoders that often perform poorly in non-ideal network conditions [1]. GPP has started discussions about technologies that could be standardized in future standards of 5G such as full dimension of multi-input multi-output, usage of unlicensed band, and multi-radio access technology coordination [5].
The availability of high-speed networks and the decreased cost of video capturing and displaying technology have opened the door for better monitoring systems in solar farms. Commonly used methods for the thermal imaging in the solar farms are by crane or lift, by walking and through drones. Considering the first two methods, the thermal imaging inspection is dependent on the module angle and the field topology. In addition, to obtain better results the thermal camera lens angle must be perpendicular to the panel surface. While both of these methods requires more time and resources, the third method, drone operation is much more effective and does not depend on the ground conditions, module angle, or field topology. Moreover, a centralized data set can be obtained from the drone inspection method and it is expected that video communication will be the dominating traffic over wireless and IP networks [6]. The data is aggregated and processed by servers to provide meaningful information or an actionable output. This output could be sent back through the network to trigger a set of actuator devices [7]. The related research fields such as embedded systems, computer networks, advanced hardware ranging from cameras, sensor nodes, boards and the like have been manufactured in industries has a bandwidth wider than 4G and higher scale of antenna array, higher the data rate and the computational burden due to digital signal processing far heavier [8]. The data flow from the streaming server could be controlled. The mobile network buffer queue serves the data in a rate that is modelled as a Poisson process. The client queue serves the data in its encoded bit rate [9]. UOWCs are vulnerable to numerous factors such as scattering, absorption and fading. In addition, UOWC performance is limited to short range and extensive research is required for long-range communications [10]. The variety of possible WLAN configurations and WIFI standards creates a need to determine their capabilities and to estimate the video stream transmission quality. The growing popularity of Wi-Fi networks creates a natural need to provide the same services in wireless environment [11]. A number of cross-layer techniques have been proposed to address the routing problem for realtime video transmission over multi-hop wireless networks in order to maximize the received video quality [12]. The MDC-FEC enables each video segment in a scalable mode of video coding standard to be packetized into multiple descriptions for the highest data protection against lossy transmission, and more fine-grained video streaming under varying bandwidth constraints and diverse playback capacities of mobile devices [13]. Engineering requirements for 5G and the design issues, M-MIMO, cloud-based networking, SDN, energy efficiency, spectrum regulation and standardization for 5Gwas proposed [14]. These devices are now playing an ever increasingly important role in lives. Recently, industry has made significant progress in resolving a lot of constraints due to the widespread adoption of wireless technologies [15]. It can be observed that the behaviour of radio signals is very different in the underground mines compared to that in outdoor and line of sight environments. In addition, the first step in increasing a wireless network performance is understanding the actual environment [16]. A systematic analysis is to investigate the effects of various underwater channel conditions, resulting from changing the water turbidity levels, on video quality and when different modulation techniques have been imposed [17]. The need for 5G technology in a smart grid and the areas where the new power grid can benefit the accessing of data was thoroughly discussed. The main aim of this work is to demonstrate 5G architecture in general compared to other wireless technologies and new networks in a smart grid, thus bringing the Internet of energy into the picture [18]. The introduction of RFID systems is attracting attention. IC cards are used widely as a secure form of door key. There is also a movement to incorporate VoIP technology into nurse call systems [19]. A video conferencing and internet television, delivered using multicast, can achieve high bandwidth efficiency. On the other hand, unicast delivery of such applications is inefficient in terms of bandwidth utilization, which is still an issue [20,21]. Chakravarthy. V, et al. [22] concluded on with an SDN-based load balancer which improves the efficiency of the network by distributing the traffic across multiple paths to optimize the efficiency of the network. Jeya. R, et al. [23] have addressed the video is considered as an input in the transmitter side and transformed into data frames and compressed with the help of ASCIIbased Huffman algorithm. Using Affine ECC, the compressed data are encrypted as well as modulated with the help of the MQPSK method.

MSVPC Network Design
The set of nodes as N devices and S sensors formed in a network and the channels that connect those nodes wirelessly have been represented as S = (s 1 . . . s 2 . . . s n ). Moreover, 5G mobile communication is created by establishing the hierarchical cellular connection among the cellular devices, access point A P , internet gateway I G , and internet server I S are shown in Figure 1. At the beginning of the network I S broadcasts its presence at regular intervals as t. Also, the set of video data packets are accessed by the nodes known as V. The aggregator node A N will continue to announce its presence on the network through its broadcast message. The network includes user devices and sensors. The sensors in the network sense the quality of the network and provide information about it. It realizes and shares information about the number of videos traveling on the network, bandwidth usage, transfer rate, information about the network port on which it travels and metadata about the video. If the sensor receives the A N message, it will update the aggregator ID immediately if the message has not been received before, or if it is already connected to an A N , it will estimate the distance D ist between the new A N and the previous A N and upgrade the shortest-distance aggregator so as to communicate. The sensor then sends the link message to the A N , which receives the message and stores the information of the sensors that sent reply message through the link. The D ist is calculated according to the Pythagorean theorem, where, the location of the sensor and user is termed as (X 1 ,Y 1 ), and aggregator location is (X 2 ,Y 2 ) and then, distance D ist between these two products are computed as per the following equation.
The network is interconnected with a data-based network architecture, which we use to set names for source-to-destination navigation and to determine the name by individual group to respond to device packets. After creating the names, the data-based network configuration will publish it, and then, the connected devices will have to subscribe to it, thus assigning an address to each device as Addressing → D NS . This address is known as the domain name of the network and the connection ID. It is used to decide which node the data should be transmitted to during the process of providing a D NS IP address to each node. As a result, each device and sensor on the network is assigned an IP address, which is then utilized to detect device connections inside the network.
The actuators will continue to broadcast their presence at regular intervals with the (X, Y) location. Packets can quickly reach the destination by setting the status of the packets that arrive on the network so that the path can finalize according to the status. If the message is received by an A N or user, they will update the actuator's information along with actuator → ID and location points → (X, Y). If the user device is connected to the actuator, the actuator will generate an ID for the user and notify the device, and update it to the actuator's user list. Thus, when the actuator generates an ID for the device, it checks if it already has a D NS address, and then generates the ID using a random number between (0-1). Once the device receives and updates the ID, it creates a secure connection with the actuator, thereby establishing security within the network.
To create such a secure connection, the device will change its password P WD and its ID using XOR mode, it then shares the security provisioning information with the actuator during the time of communication so that the actuator will retrieve the original password R P and ID attached to it then authorize the transaction if it is valid, besides it enables the final authorization to add the user to the network's link list as per the equation below.
When requesting a video description along with its location (X, Y) by a node, the details of the node ID, its authorized P WD , its subscription information, and the location of the node are all attached for identification. When this information is verified, the device is checked for access control according to the P WD and its valid subscription particulars, and the virtual infrastructure system is activated. This virtual infrastructure system manages the different situations in the network and manages its processing and storage properly. Access control for each node is attached to the virtual infrastructure activated after validating several steps, such as the following monitoring steps: the first step is whether it is properly connected to the network or not, and the second step is whether it has received a connection ID, and is the a suitable P WD for it, all of these need to be verified.
If the A N receives the virtual infrastructure activation information, it will update the sensor counts and calculate their distance D ist It then sends information about short-range sensors request to storage M SD . The intermediator will select and send the appropriate video traffic ID upon receipt of that information, and updates the information about those sensors.
If the video is not available, then the actuator requests the internet server for the video and sends it to the user. Similarly, the internet server also sends the information about the sensor to the user. According to the report of the sensor, the user device starts streaming the video or stopping the video. The 5G network enables a nested data group system between the movable nodes; it forces to manage those types of groups properly.
Sometimes the network has to handle large amounts of data. The load balancer running on the network balances the data and converts it to the virtual network. There, the videos will be distributed to individual users or individual groups for a limited time. Thus, the distributed videos are arranged in a separate layer with a scalable code number. In the first layer, data can be sent individually based on network status and streamed with smaller data bits. In the top layer, high-quality videos are streamlined and integrated. All of these methods work according to the function of the network.
Once these videos reach the video optimizer, it will update the nodes in the cache about the sent node information so that it can know the demands on the network along with the specific file ID F ID . If the destination node ID is not connected, the information will be sent to resource allocator R A to obtain the destination ID, otherwise it will be sent to the monitor node to obtain the current status of the network. Later, it will transferred to the storage, and the total packet bytes count of the video will be attached as shown in Figure 2. The monitoring node stores the sensor's information and uses it to regulate the channels through which data packets travel, thus storing more data on the storage device M SD . The cached C S video size V S which is less than the storage capacity and the streaming duration noted as t, have been used to compute the cached video. Also, we can compute the total server storage size as C VS . Part of the information is stored on the local network, and some high-quality videos are stored on the main server. It depends on the needs and functionality of the network. Similarly, the data layer in the network must be integrated with all parents. The cache information of the node is transferred to the virtual network optimizer. If it does not contain MPEG information it will be saved anew. If it is not already listed in the received data, it will be stored in the optimization layer as shown in Figure 3. The encryption process is activated after the frame ID and MEPEG data are added to the optimizer stack, which then sends it to the identification code. Furthermore, the load balancer is activated and the information is processed in a properly balanced manner, which ensures that there is no reflection of the data and it is integrated in the correct layer as shown in Figure 4. Otherwise, the optimizer will remove the content from the layer. Scanner nodes, which are registered on the network, store the data that the sensors record when their sensors change location. The cache node stores the information in the scanner node and the source registry. When data are collected from multiple locations at different levels, the data stored at the scanner terminal are used to detect connections between data using certain rules. This type of data verification allows you to immediately notify the network of changes in the network's infrastructure. It runs from the beginning of the network, which is powered by resource register software running on the network.
It monitors the performance of the hardware on the network and the services running on it. It monitors whether the data transfer is active or the connected storage is running.

Adaptive Video Streaming
Each particle P will bring some possible solutions with current and previous experiences. A network has a limited number of particle swarms P = (p 1 . . . .p 2 . . . p n ) within its boundaries. Its moving speed S at a time t and its ideal resting location R L = (r l1 . .r l2 . .r ln ) are calculated as per the below mentioned Equation (5) Here, S Va and S Vb have explained the continuous transmission speed variations and nodes moving variations inside the network, α is the tuning parameter of the speed, LR L is the last resting location during the mobility and L B is the local best resting location among the set of selected locations with coverage area C R . At this point, the R L is computed as per Equation (6), later updates the current R L as the last LR L and updates new one to obtain the movement points and also the movement speed S t+1 at the time obtained from the maximum and minimum speeds of the particle.
Here L B is the lowest boundary of the resting location. The travelling delay T D has been computed from the summation of packet buffering delay B D and transmission channel propagation delay P D , and due to the transmission and because of the wireless nature, the packet transmission error E T can occur, the error difference E D is also calculated. The last transmission packet is T PL and the current transmission packets is T P respectively.
E D should be minimum level than the error difference threshold of E DT , E D ≤ E DT. All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4.
Design considerations: Here is the lowest boundary of the resting location. The travelling delay has been computed from the summation of packet buffering delay and transmission channel propagation delay , and due to the transmission and because of the wireless nature, the packet transmission error can occur, the error difference is also calculated. The last transmission packet is and the current transmission packets is respectively.
should be minimum level than the error difference threshold of , ≤ .
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4. Design considerations:  Analyse packet expiry computations before and after;  Reduce the data packets loss;  To reduce the error rate of the transmission computed;  Links are congested, causing packet buffer overflow at the networking device;  Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in Table  1. The above Table 2 shows the quality of the transmission according to the packet loss percentage. Occasionally there will be several changes in the aims mentioned above. It can be calculated as follows. It is necessary to find the optimal position.
Analyse packet expiry computations before and after; Energies 2021, 14, x FOR PEER REVIEW 9 of 17 Here is the lowest boundary of the resting location. The travelling delay has been computed from the summation of packet buffering delay and transmission channel propagation delay , and due to the transmission and because of the wireless nature, the packet transmission error can occur, the error difference is also calculated. The last transmission packet is and the current transmission packets is respectively.
should be minimum level than the error difference threshold of , ≤ .
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4. Design considerations:  Analyse packet expiry computations before and after;  Reduce the data packets loss;  To reduce the error rate of the transmission computed;  Links are congested, causing packet buffer overflow at the networking device;  Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in Table  1. The above Table 2 shows the quality of the transmission according to the packet loss percentage. Occasionally there will be several changes in the aims mentioned above. It can be calculated as follows. It is necessary to find the optimal position.

Reduce the data packets loss;
Energies 2021, 14, x FOR PEER REVIEW 9 of 17 Here is the lowest boundary of the resting location. The travelling delay has been computed from the summation of packet buffering delay and transmission channel propagation delay , and due to the transmission and because of the wireless nature, the packet transmission error can occur, the error difference is also calculated. The last transmission packet is and the current transmission packets is respectively.
should be minimum level than the error difference threshold of , ≤ .
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4. Design considerations:  Analyse packet expiry computations before and after;  Reduce the data packets loss;  To reduce the error rate of the transmission computed;  Links are congested, causing packet buffer overflow at the networking device;  Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in Table  1. The above Table 2 shows the quality of the transmission according to the packet loss percentage. Occasionally there will be several changes in the aims mentioned above. It Here is the lowest boundary of the resting location. The travelling delay has been computed from the summation of packet buffering delay and transmission channel propagation delay , and due to the transmission and because of the wireless nature, the packet transmission error can occur, the error difference is also calculated. The last transmission packet is and the current transmission packets is respectively.
should be minimum level than the error difference threshold of , ≤ .
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4. Design considerations:  Analyse packet expiry computations before and after;  Reduce the data packets loss;  To reduce the error rate of the transmission computed;  Links are congested, causing packet buffer overflow at the networking device;  Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in Table  1. Here is the lowest boundary of the resting location. The travelling delay has been computed from the summation of packet buffering delay and transmission channel propagation delay , and due to the transmission and because of the wireless nature, the packet transmission error can occur, the error difference is also calculated. The last transmission packet is and the current transmission packets is respectively.
should be minimum level than the error difference threshold of , ≤ .
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in Figure 4. Design considerations:  Analyse packet expiry computations before and after;  Reduce the data packets loss;  To reduce the error rate of the transmission computed;  Links are congested, causing packet buffer overflow at the networking device;  Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in Table  1. The above Table 2 shows the quality of the transmission according to the packet loss percentage. Occasionally there will be several changes in the aims mentioned above. It can be calculated as follows. It is necessary to find the optimal position. When a lot of metrics of this type are available, they are all stored in a matrix format in which the optimal solution is calculated. When different videos are transferred, many limitations occur. Similarly, many different functions f i occur during transmission, so it is important to find transmissions with minimal variations. This will help us to find the optimal transmissions. Thus, we calculate the transmission rate of optimal video streaming.
When videos are transmitted through different channels C T , it is calculated as follows. Here S T is the video travelling speed and E TM is the maximum video error rate.
The delay for all channels and the error rate of the arrival packets D E are calculated as below. The delay variations and its performance given in Tables 3 and 4.  Tables 3 and 4 shows the delay performance according to the protocol based on speed variations. Thus, we can detect the video that is being streamed S V in a very short time. (15) According to this, we can find the perfect video streaming frequency S VF is as below: By achieving minimum packet transmission delay and reduced packet error difference the video transmission gains higher video streaming frequency (Algorithm 1). Then, we form the global fitness G B path to transfer the video packets.
Compute the Storage device size M SD and cached Video size C VS a.
Update swarm random locations L, Speed S of particles, at time t 6.
Compute resting location R L of swarm 7.
Repeat the process R L till end of the communication 9.
For i = i 1 . . . i n 10. Update R L variations of R L = R L(t) + S t+1 11. Compute data transmission error E T and traveling delay T D 12. T D = (B D + P D ) 13.
E D = T PL − T P 14. Combination of delay and arrival packet error difference computed using 15. D E = T∑ T R + E T ∑ S T 16. Computed perfect video streaming in network by 17.
S VF = P R (1 − minimum( D E + T D )) 18. Find local PSO best L B forwarder for multicast routing within coverage range C R 19. L B = BestR L (r l1 ..r l2 ..r ln ) → C R 20. Construct final global fitness path G B for transmission 21.
During transmission the network initiates the group formation on the primary server. If the internet server cannot be accessed directly, users will join the multicast group; information about the group ID will be given to all users in the group; later, according to the calculation, the node acts as a head in that local group, and is extended up to the destination by selecting the global best nodes throughout the path. The network paves its continuity path, and all users joining the group will be added to the multicast member list. This allows short interparticle distance nodes to act as forwarders and stream video as shown in Figure 5.
The physical 5G communication is configured in the physical medium using the 256 QAM Modulation and Beamforming. The software-defined network SDN is used to virtualize the network function by utilizing the virtual network. Multicast communication between the users and the server is generated by forming the multicast tree in the network layer as IP multicast, as shown in Figure 6. The multicast users can join and leave in the multicast group and the corresponding tree is updated dynamically. Once the IP multicast is created, the data center is used to encode the video to be streamed to all multicast users as in Figure 6.  Descriptions are distributed across the multicast tree, during the video transmission. IP multicast minimizes the unnecessary transmission of replicated packets in the network. Data centre-based video multicast servers are represented as description providers which exhibit the packet in multicast IP containing information about its description which is forwarded to the controller. The transmission is completed using the SDN which also monitors and optimizes the video transmission. The video optimizer service is deployed on the edge of the 5G network with video traffic filtering. The video traffic is forwarded from a load balancer to the optimizer virtual network which handles the management plane as an efficient assignment of IP addresses to active users of the infrastructure. Also, the cognitive framework continuously quantifies the congestion degree of the network at a fine-grain level using the congestion index. When the congestion index surpasses the threshold, then it is processed by the cognitive layer leading to the application of the filtering rule in the associated virtual network.

Simulation Analysis
The proposed method uses the following parameters to build the network. The network is configured with 100 to 200 data points as various scenarios, five access points, five internet gateways and one streaming server. Furthermore, network terminals are built with a beam-forming MM wave antenna for transmission and receiver pockets and a multi-inputmulti-output channel installed at each terminal for communication. The movement of the nodes is undertaken in random mobility mode. Each node moves at random speed from 0 to its maximum speed of 5 m in a random direction. As well as stopping for a short period after going a certain distance and then moving again known as pause time, and here pause time is mentioned as 10 milliseconds. In this mode the nodes travel across the network. Accordingly, video packets are converted to multicast routing mode. Table 5 shows the network parameters used.

Results and Discussion
Packet delivery ratio (PDR) is the percentage of packets arriving at the destination from the source. As the percentage of such packets increases, the protocol running on that network is said to work better. Figure 7 shows that the proposed protocol MSVPC has received a large number of packets in percentage format. This is due to the network design and the routing methods in it. In addition, in the comparable scalable virtual video optimizer network (SVNVO) and ALVN, it can be seen that the percentage of packets it has received is reduced due to the lack of optimization system routing designed in the proposed model. Here, the network shows 81.1448 percentage of packet delivery ratio in MSVPC. Because of the swarm optimization-based video transmission and multicast routing this performance enhancement is achieved.
Network delay is the amount of time it takes to transfer video packets from source to destination. This includes transmission propagation delay, queuing delay and network delay. In Figure 8 the network delay is less than the proposed MSVPC method. The reason is the choice of network design and associated parameters. When the path for video transmission is selected in PSO mode, the delay is calculated as an important parameter and thus the local best node and global best nodes are selected and the path is set. This significantly reduces network delay and, as a result, more packets are delivered to the destination as in Figure 9. Network delay considers the queue, channel and propagation delay timings, and including all these timings MSVPC achieved 0.0694974 as a minimum delay compared to other protocols.   It has been reduced in the proposed method, MSVPC, as shown in Figure 9, by the particle swarm method, which chooses the multicast forwarder selection. This reduces the number of packets lost during video transmission over a 5G network. As packet losses decrease, packet delivery increases, and this can be detected by the quality measures given in it. Here, the packet drops based on the dropped packet counts. If the path is stable, the network can gain minimum packet loss during transmission. Here the proposed MSVPC lost less number of packets than the other protocols.
Throughput is the bits count of packets obtained at the destination. If the destination starts to obtain more bits, then the network design and protocols can be considered to work better. MSVPC obtains more packet bits in the network. To calculate this, the large packets in the destination can be multiplied by eight and divided by the time the packets transmitted. We assume that the routing of the network works best, if the nodes in the network can stream a large number of video pocket bits. Figure 10 shows the MSVPC proposed method can be seen to get more throughputs as 64232.7 for 100 nodes. The quality of service output has increased in proposed method compared to SVNVO method available in the literature and may be benchmarked for transferring of data through the 5G network. In Table 6 the nodes, packet interval, packet sizes and simulation time are taken as inputs and the changes caused by its variations are calculated as results. The proposed protocol, MSVPC, has a higher packet delivery ratio than the other two protocols compared to it as well as less delay.

Conclusions
5G mobile communication is created by establishing the hierarchical cellular connection between cellular devices, and the physical 5G communication is configured in the physical medium using the 256QAM Modulation and Beamforming antenna. The softwaredefined network (SDN) is used to virtualize the network function. This research work aims to integrate and implement the 5G network for monitoring the thermal imaging of solar farms through drone's inspection. Multicast communication between the users and the server is generated by forming the multicast tree in the network layer as IP multicast using particle swarm optimization. Descriptions are distributed across the multicast tree during the video transmission process. IP multicast minimizes the unnecessary transmission of replicated packets in the network and the delay is minimized and packet error is lower to forward the packet. Here the video multicast servers are represented as internet servers that send a packet in multicast routing containing information about its description which is forwarded to the controller, and the transmission is completed using the SDN which also monitors and optimizes the video transmission. The video optimizer service is deployed at the edge of the 5G network with video traffic filtering. The video traffic is forwarded from a load balancer to the optimizer which handles the management plane as an efficient assignment of node addresses to active users of the infrastructure using the dynamic host control protocol service; also, the cognitive framework continuously quantifies the congestion degree of the network at a fine-grained level using a congestion index. When the congestion index surpasses the threshold, then it is processed by the cognitive layer leading to the application of the filtering rule in the associated optimizer.