Eric Gamess - Academia.edu (original) (raw)
Papers by Eric Gamess
Vehicular Adhoc Networks (VANETs) are becoming very important since they bring many new features ... more Vehicular Adhoc Networks (VANETs) are becoming very important since they bring many new features to road transportation (e.g., safety, entertainment, location-based services) and can significantly assist passengers and drivers in their journey. To implement the future intelligent transportation systems, routing protocol's performance must be evaluated. Even though the performance of routing protocols in the field of VANETs has been addressed in the literature previously through simulations, it has almost always been limited to a small number of vehicles with random mobility, which does not reflect reality due to the increasing number of vehicles worldwide. In this paper we evaluate three well-known routing protocols in a real city scenario. We study the impact of changing the bitrate over those protocols.
MSV, 2010
Today, simulation has become a fundamental tool for researchers and network administrators to des... more Today, simulation has become a fundamental tool for researchers and network administrators to design, debug, improve and fine-tune networks. One of the main problems faced by these specialists when selecting a simulation tool is the variety of options. This converts the selection in a complex and long process. In most cases, the selection of the tool is done without following a suitable process which should include identifying needs, scopes, and constraints of the project. In this paper we studied a group of network simulation tools to guide users during the selection process. We focused on the level of support that these simulation tools can offer to new telecommunications technologies trends, and the amount of effort needed for installation and familiarization. One of the goals of this paper is to help researchers and network administrators to quickly identify which simulator is most suitable for their needs.
Lecture notes in electrical engineering, 2011
The complex and abstract theory of routing protocols can be clarified by doing some laboratories ... more The complex and abstract theory of routing protocols can be clarified by doing some laboratories in testbeds. However, it is not always possible to setup an entire testbed containing multiple computers, switches and routers to strengthen student skills for time and cost reasons. Using GUI-based applications is an alternative way to improve the understanding of the complex algorithms involved in
Este artículo presenta el diseño y la implementación de una aplicación web orientada a apoyar la ... more Este artículo presenta el diseño y la implementación de una aplicación web orientada a apoyar la administración de conferencias académicas en Venezuela, como lo son el Simposio Científico y Tecnológico en Computación (SCTC) y la Conferencia Nacional de Computación, Informática y Sistemas (CoNCISa). La aplicación automatiza varios procesos tediosos y repetitivos como la reservación de asistencia, la gestión de pagos, y la generación de documentos digitales (distintivos de identificación, certificados de asistencia y recibos de pago). El sistema fue realizado con software libre, usando herramientas modernas de desarrollo y de fácil acceso. Es de aclarar que tanto el SCTC como CoNCISa tienen requerimientos muy específicos y ningún software existente de administración de conferencias se pudo configurar para cubrir las necesidades de estas conferencias nacionales. Por ende, los organizadores de estos eventos científicos se vieron en la obligación de llevar a cabo los procesos de administración en forma manual, por años, resultando en un número significativo de horas trabajadas. Con este nuevo sistema, la administración del SCTC y de CoNCISa se ve mejorada significativamente, resultando en un significante ahorro de tiempo, en una reducción de costos al utilizar software de dominio público y al eliminar el uso de papel, y adicionalmente en una minimización de errores.
International journal of computer theory and engineering, 2018
Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance,... more Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance, the interception of conversations, the theft of important and confidential information, and the generation of large expenses in any organization, if they do not have the correct security mechanisms. VoIP is based on existing layers and protocols and therefore inherits their security issues. In relation to signalization, different protocols have been proposed for VoIP. However, the Session Initiation Protocol (SIP) tends to be the favorite one because it is standardized by the IETF and has many features. Similarly to any other Internet protocol, SIP is susceptible to security threads, and can be involved in different kinds of attacks. In this paper, we propose three basic scenarios, representing common fundamental network architectures for VoIP, from which more complex systems can be built. We also establish a set of policies and guidelines focused on the aforementioned architectures, in order to mitigate security threads and provide more effective solutions for existing vulnerabilities in VoIP.
Integrating emerging technologies into current systems is critical to enhance the human quality o... more Integrating emerging technologies into current systems is critical to enhance the human quality of life. In the field of transportation, the automobile is the predominant locomotion method used by people. Even though new vehicular safety systems have been integrated into vehicles, road accidents are still one of the major reasons for death worldwide. In general, Vulnerable Road Users (VRUs) that share roads with vehicles have second priority in safety systems for the Intelligent Transportation System, since they are mostly focused on avoiding collision between vehicles. However, VRUs do represent a very significant percent of the victims of road accidents. In this paper, we propose a solution where the integration of current and future technologies to the vehicular safety system is a key factor, so that roads will be a better place for all the actors (people, animals, and vehicles) that transit on them. In order to protect VRUs and animals on or nearby the roads, a collision-avoidance system with two levels is proposed. The idea is to have a flexible solution that will integrate any current technology and new technologies as they appear. Warning information will be delivered in real-time about people, other living beings, vehicles, and obstacles when a possible collision is detected. On the lower level, on-board computers can address imminent threats thanks to the access to lightweight quality information consisting of data samples shared by vehicles, persons, and animals that join the common platform. In the upper level, additional support based on pre-processed information coming as a service from the Cloud will also assist any decision. With all this information, a vehicle will be in the capacity of taking instant safety decisions, in real-time, and without overloading its local computational resources.
In this paper we present SNMP JManager, a free open source application developed under the GNU Ge... more In this paper we present SNMP JManager, a free open source application developed under the GNU General Public License in Java. Its main goal is to be used as a didactic application in network advanced courses at Universidad Central de Venezuela to support the teaching and learning of SNMP v1/2c/3. SNMP JManager is platform independent, easy to use, and has a user-friendly interface. Additionally, SNMP JManager can be a powerful application for network administrators and allows them to collect and modify the configuration of network devices through the use of SNMP v1/2c/3, import MIBs, manage traps, etc. It was developed to support both IPv4 and IPv6, which makes it one of the strongest free open source SNMP managers.
International Journal of Advanced Computer Science and Applications, 2018
For shopping centers, mobile devices and their associated technologies represent great business o... more For shopping centers, mobile devices and their associated technologies represent great business opportunities and a way to improve the user experience within their facilities. These types of constructions are usually quite large, multi-story, and with a significant number of shops, services, where the visitors may find themselves having difficulties to have a complete and up-to-date list of the stores, determine which stores and services are those that meet the characteristics or specifications they seek, know the location of the shops or how to reach them. This research studies and contemplates different technologies, tools, and approaches for the development of a technological solution for shopping centers that offers in its functionality a geolocation system in the interior spaces of the buildings. Our technological solution includes a mobile application for the Android operating system implemented by using the native development approach, and a web application for managing data, where the contents and settings of the mobile application will be obtained following the client/server model through a private API. It is worth to mention that the already mentioned system of geolocation in interiors is implemented using WiFi technology and the different Access Points installed in the shopping center, through which users can obtain their position, locate the stores or services of their interest, and receive indications on how to reach them.
Clei Electronic Journal, Dec 1, 1998
A complete traversal of a container C (such as a set) is informally described by the iteration sc... more A complete traversal of a container C (such as a set) is informally described by the iteration scheme for all x 2 C F(x; C) where F is a function that might possibly modify C by inserting new elements into it. We assume that the order in which the elements are treated is not relevant, as long as the iteration continues until F has been applied to all elements currently in C , including those F has inserted. Standard iteration mechanisms, such as the iterators provided in the C++ Standard Template Library (STL), do not directly support complete traversals. In this paper we present two approaches to complete traversals, both extending the STL framework, one by means of generic algorithms and the other by means of a container adaptor.
International Journal of Information Technology and Computer Science, Nov 8, 2018
The growth of data traffic on the web, the virtualization of services, and the changes in the pat... more The growth of data traffic on the web, the virtualization of services, and the changes in the pattern of traffic between users and data centers have led to a reassessment of the current methods of doing network administration. Software Defined Networks (SDNs) propose a paradigm that delegate the control of packets and flows to applications, developed according to specific requirements, where the OpenFlow protocol can be used for communications. The development of this type of applications, as in any other development area, requires tests and measurement tools to facilitate a performance evaluation. However, the current open-source performance measurement applications for SDN networks cover only very basic characteristics, while there is a wide range of SDN controllers with support to many versions of OpenFlow, making the selection of the controller a difficult point to address. In this paper, we propose a distributed performance evaluation tool for SDN controllers, that can assess the throughput, latency, percentage of memory consumption, percentage of CPU utilization, and consumption in kB for input/output interfaces, using OpenFlow version 1.3. Our tool is based on Cbench, and adds new functionalities such as the graphical representation of results to analyze the outcomes. To validate our tool, we make a performance evaluation of well-known SDN controllers such as Ryu, OpenDaylight, OpenMUL, and Floodlight, in environments under great stress of requests.
Information Processing Letters, Oct 1, 2000
Java is gaining acceptance as a language for high performance computing, as it is platform indepe... more Java is gaining acceptance as a language for high performance computing, as it is platform independent and safe. A parallel linear algebra package is fundamental for developing parallel numerical applications. In this paper, we present plapackJava, a Java interface to PLAPACK, a parallel linear algebra library. This interface is simple to use and object-oriented, with good support for initialization of distributed objects. The experiments we have performed indicate that plapackJava does not introduce a significant overhead with respect to PLAPACK.
International Journal of Computer Network and Information Security, Oct 8, 2018
The current communication requirements are moving quickly to mobile ad-hoc networks, mainly becau... more The current communication requirements are moving quickly to mobile ad-hoc networks, mainly because of the decreasing cost of wireless networking technology and the increasing capacity to integrate into embedded devices technologies such as WiFi, ZigBee, Bluetooth, and WAVE. It is important to understand the limitation or the strength of each protocol and standard in order to make a better selection decision at the moment of implementing a specific scenario. This paper evaluates how routing protocols perform in mobile scenarios when the speed of nodes is relatively high. Our research shows that reactive routing protocols have a better packet delivery ratio (PDR) than proactive routing protocols. However, proactive routing protocols have a smaller endto-end delay and hops count.
International Journal of Intelligent Transportation Systems Research, May 2, 2019
Vehicular Ad hoc Networks (VANETs) have gained considerable attention in the past few years due t... more Vehicular Ad hoc Networks (VANETs) have gained considerable attention in the past few years due to their promising applicability in relation to the Intelligent Transportation Systems (ITSs). This emerging new technology will provide timely information to develop adaptive traffic light control systems that will allow a significant optimization of the vehicular traffic flow. In this paper, we introduce a novel algorithm for counting vehicles stopped at a traffic light using VANET technology. The algorithm is based on the idea of the propagation of a count request message from the RSU (originating unit) toward the vehicles that are at the end of the waiting line, and the propagation of a response message (with the number of vehicles counted) in the opposite direction, that is, from the vehicles at the end of the line toward the RSU. For this, our algorithm uses BEACON messages periodically to exchange the necessary information between any two 1-hop neighbors. Using the data received from BEACON messages, each vehicle can maintain its own neighbors list. To validate and evaluate the performance of our proposal, we use Veins (Vehicle in Network Simulation) and TraCI (Traffic Control Interface). The former is a framework that ties together a network simulator (OMNeT++) with a road traffic simulator (SUMO), and the latter is an API for the communications between both simulators by providing TCP connections between each other. The results of the simulations performed in different scenarios are encouraging since they indicate that the proposed algorithm efficiently computes a number of vehicles very close to the real one, using a few control messages.
Lecture notes in electrical engineering, 2010
Nowadays, there are a wide variety of network benchmark tools, giving researchers and network adm... more Nowadays, there are a wide variety of network benchmark tools, giving researchers and network administrators many options to work with. However, this variety tends to hinder the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find one that calculates a desired gauge, so they have to learn how to manipulate different tools and how to interpret the obtained results. This research offers a compilation of network benchmark tools currently used, with the purpose of guiding the selection of one tool over the others, by outlining their main features, strengths and weaknesses.
Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network a... more Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates a given gauge, so they have to learn how to manipulate different tools and how to interpret obtained results. This paper offers a compilation of currently used network benchmarking tools, with the intention of guiding the selection of one tool over others, by outlining their main features, strengths and weaknesses.
International Journal of Advanced Computer Science and Applications, 2022
Now-a-days, Single Board Computers (SBCs), especially Raspberry Pi (RPi) devices, are extensively... more Now-a-days, Single Board Computers (SBCs), especially Raspberry Pi (RPi) devices, are extensively used due to their low cost, efficient use of energy, and successful implementation in a wide range of applications; therefore, evaluating their performance is critical to better understand the applicability of RPis to solve problems in different areas of knowledge. This paper describes a comparative and experimental study regarding the performance of five different models of the RPi family (RPi Zero W, RPi Zero 2 W, RPi 3B, RPi 3B+, and RPi 4B) in several scenarios and with different configurations. To conduct our multiple experiments on RPis, we used a selfdeveloped and other existing open-source benchmarking tools allowing us to perform tests that mimic real-world needs, assessing important factors including CPU frequency and temperature during stressful activities, processor performance when executing CPU-intensive processes such as audio and file compressions as well as cryptographic operations, memory and microSD storage performance when executing read and write operations, TCP throughput in different WiFi bands, and TCP latency to send a specific payload from a source to a destination. Our experimental results showed that the RPi 4B significantly outperformed the other SBCs tested. In addition, our research indicated that the RPi Zero 2 W overclocked, RPi 3B, and RPi 3B+ had similar performance. Finally, the RPi Zero 2 W showed a much higher capacity than its predecessor, the RPi Zero W, and seems to be a perfect replacement when upgrading, since they have the same form factor and are physically interchangeable. With this study, we aim to guide researchers and hobbyists in selecting adequate RPis for their projects.
International Journal of Advanced Computer Science and Applications, 2016
IPv6 is the response to the shortage of IPv4 addresses. It was defined almost twenty years ago by... more IPv6 is the response to the shortage of IPv4 addresses. It was defined almost twenty years ago by the IETF as a replacement of IPv4, and little by little, it is becoming more preponderant as the Internet protocol. The growth of Internet has led to the development of high performance networks. On one hand, Ethernet has evolved significantly and today it is common to find 10 Gigabit Ethernet networks in LANs. On the other hand, another approach for high performance networking is based on RDMA (Remote Direct Memory Access) which offers innovative features such as kernel bypass, zero copy, offload of splitting and assembly of messages in packets to the CAs (Channel Adapters), etc. InfiniBand is currently the most popular technology that implements RDMA. It uses verbs instead of sockets and a big effort of the community is required to port TCP/IP software to InfiniBand, to take advantage of its benefits. Meanwhile, IPoIB (IP over InfiniBand) is a protocol that has been proposed and permits the execution of socket-based applications on top of InfiniBand, without any change, at the expense of performance. In this paper, we make a performance evaluation of IPv6 and IPv4 over 10 Gigabit Ethernet and IPoIB. Our results show that 10 Gigabit Ethernet has a better throughput than IPoIB, especially for small and medium payload sizes. However, as the payload size increases, the advantage of 10 Gigabit Ethernet is reduced in comparison to IPoIB/FDR. With respect to latency, IPoIB did much better than 10 Gigabit Ethernet. Finally, our research also indicates that in a controlled environment, IPv4 has a better performance than IPv6.
Vehicular Adhoc Networks (VANETs) are becoming very important since they bring many new features ... more Vehicular Adhoc Networks (VANETs) are becoming very important since they bring many new features to road transportation (e.g., safety, entertainment, location-based services) and can significantly assist passengers and drivers in their journey. To implement the future intelligent transportation systems, routing protocol's performance must be evaluated. Even though the performance of routing protocols in the field of VANETs has been addressed in the literature previously through simulations, it has almost always been limited to a small number of vehicles with random mobility, which does not reflect reality due to the increasing number of vehicles worldwide. In this paper we evaluate three well-known routing protocols in a real city scenario. We study the impact of changing the bitrate over those protocols.
MSV, 2010
Today, simulation has become a fundamental tool for researchers and network administrators to des... more Today, simulation has become a fundamental tool for researchers and network administrators to design, debug, improve and fine-tune networks. One of the main problems faced by these specialists when selecting a simulation tool is the variety of options. This converts the selection in a complex and long process. In most cases, the selection of the tool is done without following a suitable process which should include identifying needs, scopes, and constraints of the project. In this paper we studied a group of network simulation tools to guide users during the selection process. We focused on the level of support that these simulation tools can offer to new telecommunications technologies trends, and the amount of effort needed for installation and familiarization. One of the goals of this paper is to help researchers and network administrators to quickly identify which simulator is most suitable for their needs.
Lecture notes in electrical engineering, 2011
The complex and abstract theory of routing protocols can be clarified by doing some laboratories ... more The complex and abstract theory of routing protocols can be clarified by doing some laboratories in testbeds. However, it is not always possible to setup an entire testbed containing multiple computers, switches and routers to strengthen student skills for time and cost reasons. Using GUI-based applications is an alternative way to improve the understanding of the complex algorithms involved in
Este artículo presenta el diseño y la implementación de una aplicación web orientada a apoyar la ... more Este artículo presenta el diseño y la implementación de una aplicación web orientada a apoyar la administración de conferencias académicas en Venezuela, como lo son el Simposio Científico y Tecnológico en Computación (SCTC) y la Conferencia Nacional de Computación, Informática y Sistemas (CoNCISa). La aplicación automatiza varios procesos tediosos y repetitivos como la reservación de asistencia, la gestión de pagos, y la generación de documentos digitales (distintivos de identificación, certificados de asistencia y recibos de pago). El sistema fue realizado con software libre, usando herramientas modernas de desarrollo y de fácil acceso. Es de aclarar que tanto el SCTC como CoNCISa tienen requerimientos muy específicos y ningún software existente de administración de conferencias se pudo configurar para cubrir las necesidades de estas conferencias nacionales. Por ende, los organizadores de estos eventos científicos se vieron en la obligación de llevar a cabo los procesos de administración en forma manual, por años, resultando en un número significativo de horas trabajadas. Con este nuevo sistema, la administración del SCTC y de CoNCISa se ve mejorada significativamente, resultando en un significante ahorro de tiempo, en una reducción de costos al utilizar software de dominio público y al eliminar el uso de papel, y adicionalmente en una minimización de errores.
International journal of computer theory and engineering, 2018
Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance,... more Attacks on networks which implement VoIP could lead to the degradation of the IP PBX performance, the interception of conversations, the theft of important and confidential information, and the generation of large expenses in any organization, if they do not have the correct security mechanisms. VoIP is based on existing layers and protocols and therefore inherits their security issues. In relation to signalization, different protocols have been proposed for VoIP. However, the Session Initiation Protocol (SIP) tends to be the favorite one because it is standardized by the IETF and has many features. Similarly to any other Internet protocol, SIP is susceptible to security threads, and can be involved in different kinds of attacks. In this paper, we propose three basic scenarios, representing common fundamental network architectures for VoIP, from which more complex systems can be built. We also establish a set of policies and guidelines focused on the aforementioned architectures, in order to mitigate security threads and provide more effective solutions for existing vulnerabilities in VoIP.
Integrating emerging technologies into current systems is critical to enhance the human quality o... more Integrating emerging technologies into current systems is critical to enhance the human quality of life. In the field of transportation, the automobile is the predominant locomotion method used by people. Even though new vehicular safety systems have been integrated into vehicles, road accidents are still one of the major reasons for death worldwide. In general, Vulnerable Road Users (VRUs) that share roads with vehicles have second priority in safety systems for the Intelligent Transportation System, since they are mostly focused on avoiding collision between vehicles. However, VRUs do represent a very significant percent of the victims of road accidents. In this paper, we propose a solution where the integration of current and future technologies to the vehicular safety system is a key factor, so that roads will be a better place for all the actors (people, animals, and vehicles) that transit on them. In order to protect VRUs and animals on or nearby the roads, a collision-avoidance system with two levels is proposed. The idea is to have a flexible solution that will integrate any current technology and new technologies as they appear. Warning information will be delivered in real-time about people, other living beings, vehicles, and obstacles when a possible collision is detected. On the lower level, on-board computers can address imminent threats thanks to the access to lightweight quality information consisting of data samples shared by vehicles, persons, and animals that join the common platform. In the upper level, additional support based on pre-processed information coming as a service from the Cloud will also assist any decision. With all this information, a vehicle will be in the capacity of taking instant safety decisions, in real-time, and without overloading its local computational resources.
In this paper we present SNMP JManager, a free open source application developed under the GNU Ge... more In this paper we present SNMP JManager, a free open source application developed under the GNU General Public License in Java. Its main goal is to be used as a didactic application in network advanced courses at Universidad Central de Venezuela to support the teaching and learning of SNMP v1/2c/3. SNMP JManager is platform independent, easy to use, and has a user-friendly interface. Additionally, SNMP JManager can be a powerful application for network administrators and allows them to collect and modify the configuration of network devices through the use of SNMP v1/2c/3, import MIBs, manage traps, etc. It was developed to support both IPv4 and IPv6, which makes it one of the strongest free open source SNMP managers.
International Journal of Advanced Computer Science and Applications, 2018
For shopping centers, mobile devices and their associated technologies represent great business o... more For shopping centers, mobile devices and their associated technologies represent great business opportunities and a way to improve the user experience within their facilities. These types of constructions are usually quite large, multi-story, and with a significant number of shops, services, where the visitors may find themselves having difficulties to have a complete and up-to-date list of the stores, determine which stores and services are those that meet the characteristics or specifications they seek, know the location of the shops or how to reach them. This research studies and contemplates different technologies, tools, and approaches for the development of a technological solution for shopping centers that offers in its functionality a geolocation system in the interior spaces of the buildings. Our technological solution includes a mobile application for the Android operating system implemented by using the native development approach, and a web application for managing data, where the contents and settings of the mobile application will be obtained following the client/server model through a private API. It is worth to mention that the already mentioned system of geolocation in interiors is implemented using WiFi technology and the different Access Points installed in the shopping center, through which users can obtain their position, locate the stores or services of their interest, and receive indications on how to reach them.
Clei Electronic Journal, Dec 1, 1998
A complete traversal of a container C (such as a set) is informally described by the iteration sc... more A complete traversal of a container C (such as a set) is informally described by the iteration scheme for all x 2 C F(x; C) where F is a function that might possibly modify C by inserting new elements into it. We assume that the order in which the elements are treated is not relevant, as long as the iteration continues until F has been applied to all elements currently in C , including those F has inserted. Standard iteration mechanisms, such as the iterators provided in the C++ Standard Template Library (STL), do not directly support complete traversals. In this paper we present two approaches to complete traversals, both extending the STL framework, one by means of generic algorithms and the other by means of a container adaptor.
International Journal of Information Technology and Computer Science, Nov 8, 2018
The growth of data traffic on the web, the virtualization of services, and the changes in the pat... more The growth of data traffic on the web, the virtualization of services, and the changes in the pattern of traffic between users and data centers have led to a reassessment of the current methods of doing network administration. Software Defined Networks (SDNs) propose a paradigm that delegate the control of packets and flows to applications, developed according to specific requirements, where the OpenFlow protocol can be used for communications. The development of this type of applications, as in any other development area, requires tests and measurement tools to facilitate a performance evaluation. However, the current open-source performance measurement applications for SDN networks cover only very basic characteristics, while there is a wide range of SDN controllers with support to many versions of OpenFlow, making the selection of the controller a difficult point to address. In this paper, we propose a distributed performance evaluation tool for SDN controllers, that can assess the throughput, latency, percentage of memory consumption, percentage of CPU utilization, and consumption in kB for input/output interfaces, using OpenFlow version 1.3. Our tool is based on Cbench, and adds new functionalities such as the graphical representation of results to analyze the outcomes. To validate our tool, we make a performance evaluation of well-known SDN controllers such as Ryu, OpenDaylight, OpenMUL, and Floodlight, in environments under great stress of requests.
Information Processing Letters, Oct 1, 2000
Java is gaining acceptance as a language for high performance computing, as it is platform indepe... more Java is gaining acceptance as a language for high performance computing, as it is platform independent and safe. A parallel linear algebra package is fundamental for developing parallel numerical applications. In this paper, we present plapackJava, a Java interface to PLAPACK, a parallel linear algebra library. This interface is simple to use and object-oriented, with good support for initialization of distributed objects. The experiments we have performed indicate that plapackJava does not introduce a significant overhead with respect to PLAPACK.
International Journal of Computer Network and Information Security, Oct 8, 2018
The current communication requirements are moving quickly to mobile ad-hoc networks, mainly becau... more The current communication requirements are moving quickly to mobile ad-hoc networks, mainly because of the decreasing cost of wireless networking technology and the increasing capacity to integrate into embedded devices technologies such as WiFi, ZigBee, Bluetooth, and WAVE. It is important to understand the limitation or the strength of each protocol and standard in order to make a better selection decision at the moment of implementing a specific scenario. This paper evaluates how routing protocols perform in mobile scenarios when the speed of nodes is relatively high. Our research shows that reactive routing protocols have a better packet delivery ratio (PDR) than proactive routing protocols. However, proactive routing protocols have a smaller endto-end delay and hops count.
International Journal of Intelligent Transportation Systems Research, May 2, 2019
Vehicular Ad hoc Networks (VANETs) have gained considerable attention in the past few years due t... more Vehicular Ad hoc Networks (VANETs) have gained considerable attention in the past few years due to their promising applicability in relation to the Intelligent Transportation Systems (ITSs). This emerging new technology will provide timely information to develop adaptive traffic light control systems that will allow a significant optimization of the vehicular traffic flow. In this paper, we introduce a novel algorithm for counting vehicles stopped at a traffic light using VANET technology. The algorithm is based on the idea of the propagation of a count request message from the RSU (originating unit) toward the vehicles that are at the end of the waiting line, and the propagation of a response message (with the number of vehicles counted) in the opposite direction, that is, from the vehicles at the end of the line toward the RSU. For this, our algorithm uses BEACON messages periodically to exchange the necessary information between any two 1-hop neighbors. Using the data received from BEACON messages, each vehicle can maintain its own neighbors list. To validate and evaluate the performance of our proposal, we use Veins (Vehicle in Network Simulation) and TraCI (Traffic Control Interface). The former is a framework that ties together a network simulator (OMNeT++) with a road traffic simulator (SUMO), and the latter is an API for the communications between both simulators by providing TCP connections between each other. The results of the simulations performed in different scenarios are encouraging since they indicate that the proposed algorithm efficiently computes a number of vehicles very close to the real one, using a few control messages.
Lecture notes in electrical engineering, 2010
Nowadays, there are a wide variety of network benchmark tools, giving researchers and network adm... more Nowadays, there are a wide variety of network benchmark tools, giving researchers and network administrators many options to work with. However, this variety tends to hinder the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find one that calculates a desired gauge, so they have to learn how to manipulate different tools and how to interpret the obtained results. This research offers a compilation of network benchmark tools currently used, with the purpose of guiding the selection of one tool over the others, by outlining their main features, strengths and weaknesses.
Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network a... more Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates a given gauge, so they have to learn how to manipulate different tools and how to interpret obtained results. This paper offers a compilation of currently used network benchmarking tools, with the intention of guiding the selection of one tool over others, by outlining their main features, strengths and weaknesses.
International Journal of Advanced Computer Science and Applications, 2022
Now-a-days, Single Board Computers (SBCs), especially Raspberry Pi (RPi) devices, are extensively... more Now-a-days, Single Board Computers (SBCs), especially Raspberry Pi (RPi) devices, are extensively used due to their low cost, efficient use of energy, and successful implementation in a wide range of applications; therefore, evaluating their performance is critical to better understand the applicability of RPis to solve problems in different areas of knowledge. This paper describes a comparative and experimental study regarding the performance of five different models of the RPi family (RPi Zero W, RPi Zero 2 W, RPi 3B, RPi 3B+, and RPi 4B) in several scenarios and with different configurations. To conduct our multiple experiments on RPis, we used a selfdeveloped and other existing open-source benchmarking tools allowing us to perform tests that mimic real-world needs, assessing important factors including CPU frequency and temperature during stressful activities, processor performance when executing CPU-intensive processes such as audio and file compressions as well as cryptographic operations, memory and microSD storage performance when executing read and write operations, TCP throughput in different WiFi bands, and TCP latency to send a specific payload from a source to a destination. Our experimental results showed that the RPi 4B significantly outperformed the other SBCs tested. In addition, our research indicated that the RPi Zero 2 W overclocked, RPi 3B, and RPi 3B+ had similar performance. Finally, the RPi Zero 2 W showed a much higher capacity than its predecessor, the RPi Zero W, and seems to be a perfect replacement when upgrading, since they have the same form factor and are physically interchangeable. With this study, we aim to guide researchers and hobbyists in selecting adequate RPis for their projects.
International Journal of Advanced Computer Science and Applications, 2016
IPv6 is the response to the shortage of IPv4 addresses. It was defined almost twenty years ago by... more IPv6 is the response to the shortage of IPv4 addresses. It was defined almost twenty years ago by the IETF as a replacement of IPv4, and little by little, it is becoming more preponderant as the Internet protocol. The growth of Internet has led to the development of high performance networks. On one hand, Ethernet has evolved significantly and today it is common to find 10 Gigabit Ethernet networks in LANs. On the other hand, another approach for high performance networking is based on RDMA (Remote Direct Memory Access) which offers innovative features such as kernel bypass, zero copy, offload of splitting and assembly of messages in packets to the CAs (Channel Adapters), etc. InfiniBand is currently the most popular technology that implements RDMA. It uses verbs instead of sockets and a big effort of the community is required to port TCP/IP software to InfiniBand, to take advantage of its benefits. Meanwhile, IPoIB (IP over InfiniBand) is a protocol that has been proposed and permits the execution of socket-based applications on top of InfiniBand, without any change, at the expense of performance. In this paper, we make a performance evaluation of IPv6 and IPv4 over 10 Gigabit Ethernet and IPoIB. Our results show that 10 Gigabit Ethernet has a better throughput than IPoIB, especially for small and medium payload sizes. However, as the payload size increases, the advantage of 10 Gigabit Ethernet is reduced in comparison to IPoIB/FDR. With respect to latency, IPoIB did much better than 10 Gigabit Ethernet. Finally, our research also indicates that in a controlled environment, IPv4 has a better performance than IPv6.