4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks Research Papers (original) (raw)

An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just... more

An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just created in 15 min. ;)

بسياري از استانداردهاي شبكههاي بيسيم شامل ويژگيهاي كيفيت سرويس (QoS) در لايه MAC هستند. اين ويژگيها، به گره‌هايي كه ترافيك real-time مانند صدا و ويدئو را انتقال ميدهند، امكان ميدهد كه مقدم بر گرههايي كه ترافيك best-effort حمل ميكنند،... more

بسياري از استانداردهاي شبكههاي بيسيم شامل ويژگيهاي كيفيت سرويس (QoS) در لايه MAC هستند. اين ويژگيها، به گره‌هايي كه ترافيك real-time مانند صدا و ويدئو را انتقال ميدهند، امكان ميدهد كه مقدم بر گرههايي كه ترافيك best-effort حمل ميكنند، به كانال دسترسي داشته باشند. موفقيت اين مكانيسمهاي QoS نيازمند اين است كه گرهها درستكار باشند و صادقانه گروه QoS برنامه كاربردي خود را گزارش دهند. اگرچه كه گرههاي منطقي اين كار را انجام ميدهند، اما اگر بتوانند، براي حداكثر كردن بهرهوري خود، از يك مشخصات استاندارد تعدي ميكنند. واسطهاي شبكه روز به روز بيشتر قابلبرنامهريزي ميشوند و اين به گرهها امكان ميدهد كه براي افزايش گذردهي خود، بهطور غلط ترافيك best-effort خود را بهجاي ترافيك real-time جا بزنند. در اين مقاله، يك ساختار MAC شبيه slotted Aloha كه در بسياري از موارد، از لايه MAC IEEE 802.11e استفاده ميكند، با استفاده از تئوري بازي تحليل ميشود. مدل MAC ما به ترافيك اجازه ميدهد كه به دو صورت با اولويت بالا (HP) يا با اولويت پايين (LP) دستهبندي شود و به دو صورت دسترسي تصادفي (رقابتي ) و دسترسي بهروش سركشي (غيررقابتي) ميتواند كانال را در اختيار بگيرد. دليل استفاده از روش بدون درگيري به عنوان يك مكانيسم كارا اين است كه كاربران كم اولويت را تشويق ميكند كه درستكارانه عمل كنند. در اين مقاله در باره تابع‌هاي مطلوبيت براي ترافيكهاي LP و HP بحث ميكند و بازدهي سيستم را با استفاده از مفهوم راهحل دادي و ستد نش (NBS ) در تئوري بازيهاي مشاركتي تحليل ميكنيم. از مفهوم NBS براي يافتن يك نقطه عملياتي منصفانه و بهينه پارتو براي سيستم استفاده خواهيم كرد. از آنجا كه كاربران بهطور استراتژيك عمل ميكنند، از چهارچوب تئوري بازيهاي غيرمشاركتي براي يافتن مجموعهاي از تعادل نش استفاده ميشود. در ادامه، از اين مساله كه نقطه عملياتي NBS يك تعادل نش است، درخواهيم يافت كه استراتژي ما در اين مساله كارا و strategy-proof است.

NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects 2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects MANET (Mobile Ad-hoc Networks) A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in... more

NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects
2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects
MANET (Mobile Ad-hoc Networks)
A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Delay Analytical Models for Opportunistic Routing in Wireless Ad Hoc Networks
Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function
Fine-Grained Analysis of Packet Loss in MANETs
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
WSN – Wireless Sensor Networks (Routing)
A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-cycled WSNs
A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks
A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks
E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks
Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks
Low-Cost Collaborative Mobile Charging for Large-Scale Wireless Sensor Networks
Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
Optimization of Watchdog Selection in Wireless Sensor Networks
QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks
Routing Protocol for Wireless sensor networks Using Swarm intelligence-ACO with ECPSOA
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks
Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR)
WSN – Wireless Sensor Networks (Security)
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
TruFiX: A Configurable Trust-based Cross-Layer Protocol for Wireless Sensor Networks
VANET – Vehicular Ad-hoc Networks (Routing)
Adaptive Quality of Service based Routing for Vehicular Ad hoc Networks with Ant Colony Optimization
CBS: Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
EcoTrec—A Novel VANET-Based Approach to Reducing Vehicle Emissions
Enhancing Quality of Service Conditions Using a Cross-Layer Paradigm for Ad-hoc Vehicular Communication
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks
VANET – Vehicular Ad-hoc Networks (Security)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET
GDVAN: A New Greedy Behavior Attack Detection Algorithm For VANETs
REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET
WIRELESS COMMUNICATIONS & OTHERS
Congestion Control Scheme Performance Analysis Based on Nonlinear RED
Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks
End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting
Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control
Spectrum-Availability based Routing for Cognitive Sensor Networks
Towards Effective Trust-based Packet Filtering in Collaborative Network Environments
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks

L’histoire des réseaux mobiles est jalonnée par trois étapes principales, auxquelles on donne couramment le nom de génération. On parle des première, deuxième et troisième générations de réseaux mobiles, généralement abrégées... more

L’histoire des réseaux mobiles est jalonnée par trois étapes principales, auxquelles on donne couramment le nom de génération. On parle des première, deuxième et troisième générations de réseaux mobiles, généralement abrégées respectivement en 1G, 2G et 3G. Ces trois
générations diffèrent principalement par les techniques mises en œuvre pour accéder à la ressource radio. L’évolution de ces techniques est guidée par la volonté d’accroître la capacité ainsi que les débits offerts par le système dans une bande de fréquences restreinte. En effet,
les fréquences sont des ressources très rares car convoitées par de multiples applications (télévision, radio, faisceaux hertziens, liaisons satellites, réseaux privés, communications militaires, etc.).

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing... more

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic source routing (DSR) protocol.

In every developing and developed nation the utilization of automobiles is a maximising day by day and apparently the accidents relating to automobiles have increased drastically too. In our projectawe identify the problem of leakages of... more

In every developing and developed nation the utilization of automobiles is a maximising day by day and apparently the accidents relating to automobiles have increased drastically too. In our projectawe identify the problem of leakages of toxic gases taking place in a closed volume of an maximising and also develop an application through which the person inside the closed cabin or any of it's family member/friend can be notified of the situation. To overcome this situation we have introduced the automatic toxic gas indicator which enables us to detect any such hazardous leakage taking place at almost all environment conditions very effectively with the help of smart sensors. Anhydrous Ammonia is favoured in many large cooling systems because it has better heat transfer characteristics and is cheaper than the refrigerant gases used in home cooling systems and refrigerators. The problem is that the material is very reactive and toxic. Fortunately, the gas is extremely irritating at well below the toxic level so that when a minor leak happens, unprotected people evacuate the area quickly with little urging. A catastrophic leak, however can overcome people before they have a chance to get clear. This is partially because man people are temporarily blinded by less than lethal concentrations. The smart sensors will be enabled to detect any such leakages taking place inside the cabin and will also send signals to the motors of the power window to roll down automatically and when any situation of gas leakage is detected and alert sms/call is sent to the user and he is notified of the situation.

since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled... more

since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled communication with the help of the proper routing can save maximum energy. As per the data transmission as well as reception analysis most of the power wasted due to unnecessary route request flow. To minimize the route request, a new shortest path routing protocol introduced. In this paper, it has been analysed the various parameters such as network throughput, Mean Delay, mean jitter, packet delivery ratio based on the comparison of different routing protocols.

In recent years, studies have been lead about a new generation, with distintive characteristics, such as a desire to live intensely the moment, easeness to interact with new technologies, enhancement of informality, and an aversion to... more

In recent years, studies have been lead about a new generation, with distintive characteristics, such as a desire to live intensely the moment, easeness to interact with new technologies, enhancement of informality, and an aversion to traditional institutions, excessive creativity, longing to connect with the world etc. This is called Generation Y. This article discusses the
emergence of the concept of Generation Y, analyzes the factors that distinguish it from previous generations. It also shows how church has been affected by the new generation, while reflecting on guiding principles for the evangelization of Generation Y, briefly evaluating the model emerging church as a paradigm to attract individuals Y and warning of the risk of losing our identity.

Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast... more

Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in
Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate
duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of data to be transmitted to the sink and thus saving energy. For better power management we used a hierarchical routing protocol in WAPMS and caused the motes to sleep during idle time.

Today’s Telecom operators are enforced by the market to provide various services; also they need a strong management framework to manage those in a right way. Considering the importance of QoS inherent there,... more

Today’s Telecom operators are enforced by the market
to provide various services; also they need a strong
management framework to manage those in a right
way. Considering the importance of QoS inherent
there, we first aim to introduce couple of useful
processes of COBIT5 (Control Objectives for
Information and Related Technology) in this paper as
named DSS01 (Manage Operations) and DSS02
(Manage Service Requests and Incidents) to be mapped
with eTOM (Enhanced Telecom Operations Map)
framework with, in order to promote QoS as our
second target of this research.

One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative communication utilizing space-time block codes. In cooperative communication, users besides communicating their own information,... more

One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative communication utilizing space-time block codes. In cooperative communication, users besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time coding and network coding. Two cooperating users utilize Alamouti space time code for inter user cooperation and in addition utilize a third relay which performs network coding. The third relay does not have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based network coding, instead of conventional XOR based network code and utilize iterative joint networkchannel decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to investigate the convergence property of the proposed decoder.

Many theorists would agree that, had it not been for reinforcement learning, the development of Boolean logic might never have occurred. It might seem unexpected but entirely conflicts with the need to provide the lookaside buffer to... more

Many theorists would agree that, had it not been for reinforcement learning, the development of Boolean logic might never have occurred. It might seem unexpected but entirely conflicts with the need to provide the lookaside buffer to leading analysts. After years of compelling research into multi-processors, we confirm the exploration of IPv7. In order to overcome this obstacle, we use ubiquitous epistemologies to verify that the seminal distributed algorithm for the visualization of SCSI disks by Maruyama [1] runs in Θ(n) time.

Increases in population and limited health workforce have increased demand for health care services. Unfortunately there has not been a corresponding increase in healthcare facilities and personnel. Modern technology, using smart... more

Increases in population and limited health workforce have increased demand for health care services. Unfortunately there has not been a corresponding increase in healthcare facilities and personnel. Modern technology, using smart electronic technology provide means of solving these problems. Telemedicine requires high speed data networks in order to provide effective healthcare in ways similar to traditional healthcare methods. IEEE 802.16e or Mobile WIMAX provides last mile high speed broadband wireless access. WIMAX also provides QoS as part of its implementation. In this project we have reviewed WIMAX QoS Service Classes and mapped them to some healthcare applications to analyse the performance. A WIMAX network is simulated based on our mappings and the throughput and delay performance are analysed based on the QoS requirements of healthcare services. The throughputs and delays we got from our simulations were better than the requirements for medical applications except for heart rate transmission. Changing the audio encoding scheme for heart rate improves the throughput but none of the encoding schemes achieves the health requirements.

Mobile ad hoc networks (MANET) are becoming increasingly popular wireless networking model in various areas of technology usage from every-day to specific military purposes. Security in ad hoc networks is a key concern in order to provide... more

Mobile ad hoc networks (MANET) are becoming increasingly popular wireless networking model in various areas of technology usage from every-day to specific military purposes. Security in ad hoc networks is a key concern in order to provide protected communication between mobile nodes in an unknown and heterogeneous environment. The main challenge of MANETs is their vulnerability to security attacks and how to operate securely and efficiently while preserving its own resources. This paper discusses the most common type of attack on MANET and their security challenges. There are a lot of existing solutions in this field which propose increasing of MANETs security by new protocol design, evaluate existing protocols and their abilities, propose new routing protocols, find solutions and prevention measures for existing attacks or improving specific characteristics of MANET such as the packet drop rate, the overhead, end-to-end packet delays, network throughput etc.This paper attempts to provide an overview of MANET security challenges.The paper finishing by presenting current and possible solutions as a problems requiring for further research in the future.

A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its... more

A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its service promises. Failing to meet SLAs could result in serious financial consequences for a provider and lost customers trust. This paper presents an analysis on performance of Quality of Service (QoS) SLA on a User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS SLA tested method called RFC 2544 is performed on four customers in one industrial area. Actual data on four of QoS parameters which are throughput, jitter, latency and frame loss are tested by using test gear VeEX Vepal MX-120. The customers are focus to the User Provider Edge (UPE) customer. A few measurement and techniques are presented on the tested method. Analysis result on the tested throughput, jitter, latency and frame loss performance are presented based on growth of bytes. Network performance tested is identified that it is qualify as a perform network link. Performance presented results on growth of throughput with growth of frame length and latency increased with growth of frame length. Analyzed on frames loss presented that there are no errors thus this proved good quality network. Some jitters presented that they are in a low value which means that less jitter presents system with a better operation. Identifications on parameter value are presented based on an analyzed QoS using Minitab 16. The produce result shows the implemented of SLA QOS UPE-ME follow the QoS and this result is a better proved for customer satisfaction and good services from the service provider.

Actual network size depends on the application and the protocols developed for the routing for this kind of networks should be scalable and efficient. Each routing protocol should support small as well as large scale networks very... more

Actual network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable and efficient. Each routing protocol should support small as well as large
scale networks very efficiently. As the number of node increase, it increases the management functionality
of the network. Graph theoretic approach traditionally was applied to networks where nodes are static or
fixed. In this paper, we have applied the graph theoretic routing to MANET where nodes are mobile. Here,
we designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Each cluster supports a few nodes with a cluster head. The intracluster
connectivity amongst the nodes within the cluster is supported by multi-hop connectivity to ensure
handling mobility in such a way that no service disruption can occur. The inter-cluster connectivity is also
achieved by multi-hop connectivity. However, for inter-cluster communications, only cluster heads are
connected. This paper demonstrates graph theoretic approach produces an optimum multi-hop connectivity
path based on cumulative minimum degree that minimizes the contention and scheduling delay end-toend.
It is applied to both intra-cluster communications as well as inter-cluster communications. The
performance shows that having a multi-hop connectivity for intra-cluster communications is more power
efficient compared to broadcast of information with maximum power coverage. We also showed the total
number of required intermediate nodes in the transmission from source to destination. However, dynamic
behavior of the nodes requires greater understanding of the node degree and mobility at each instance of
time in order to maintain end-to-end QoS for multi-service provisioning. Our simulation results show that
the proposed graph theoretic routing approach will reduce the overall delay and improves the physical
layer data frame transmission.

Messages routing over a network is one of the most fundamental concept in communication which requires simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it refers to the addition of a... more

Messages routing over a network is one of the most fundamental concept in communication which requires simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it refers to the addition of a timing constraint in which messages should be received within a specified time delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of routing real-time messages on networks. We study whether it is possible to have an optimal on-line algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message routing's algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual examples. Next, we explore the Unidirectional Ring topology in finding the transmission's " makespan " .Lastly, we propose the same network modelling through the technique of Kinesthetic Learning Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the effectiveness of the KLA approach compared to the traditional teaching method.

The IPv4 used until now and still in use, has addresses of 32 bits fixed size. That would allow using up to 232 addresses or approximately around 4 billion addresses. Many assumptions are created regarding the year when the number of IPv4... more

The IPv4 used until now and still in use, has addresses of 32 bits fixed size. That would allow using up to 232 addresses or approximately around 4 billion addresses. Many assumptions are created regarding the year when the number of IPv4 addresses will drain, taking into the consideration the growth of the internet. Some studies estimate 2041 and other 2020 and some even 2009. The IPv6 would in other hand allow more addresses, since it is based on 128 bits addresses. As a result, preparations are ongoing to implement the IPv6.

The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now. Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet Protocol version 6 (IPv6) due to the... more

The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now. Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6, its social implications, risks & challenges and the opportunities the IPv6 migration offers.

The development and deployment of several wireless and cellular networks mean that users will demand to be always connected as they move around. Mobile nodes will therefore have several interfaces and connections will be seamlessly... more

The development and deployment of several wireless
and cellular networks mean that users will demand to be always
connected as they move around. Mobile nodes will therefore have
several interfaces and connections will be seamlessly switched
among available networks using vertical handover techniques.
Proactive handover mechanisms can be combined with the
deployment of a number of location-based systems that provide
location information to a very high degree of accuracy in different
contexts. Furthermore, this new environment will also allow
contextual information such as user profiles as well as the
availability of local services to be combined to provide optimal
communications for mobile users. The goal of this paper is
therefore to explore the development of a comprehensive framework
for achieving optimal communication in heterogeneous
wireless environments using location and contextual information
to provide efficient handover mechanisms. Using location-based
techniques, it is possible to demonstrate that the Time Before
Handover as well as the Network Dwell Time can be accurately
estimated. These techniques are dependent on accurately estimating
the handover radius. This paper investigates how location and
context awareness can be used to estimate the best handover
radius. The paper also explores how such techniques may be
integrated into the Y-Comm architecture which is being used to
explore the development of future mobile networks. Finally, the
paper highlights the use of ontological techniques as a mechanism
for specifying and prototyping such systems.

This paper presents the design theory of conventional single-ended LNA and differential LNA based on CMOS technology. The design concepts give an useful indication to the design trade-offs associated with NF, gain and impedance matching.... more

This paper presents the design theory of conventional single-ended LNA and differential LNA based on CMOS technology. The design concepts give an useful indication to the design trade-offs associated with NF, gain and impedance matching. Four LNA's have been designed using technological design rules of TSMC 0.18-µm CMOS technology and this work mainly proposed for IEEE 802.11a applications. With 1.8V supply voltage, the proposed LNA's achieve a gain higher than 19dB, a noise figure less than 4dB and impedance matching less than-10dB at 5GHz frequency. The goal of this paper is to highlight the efficient LNA architecture for achieving simultaneous gain, noise and input matching at low supply voltage. The performance of all LNA's are analysed and compared using Agilent's Advanced Design System Electronic Design Automation tools.

Authentication, Authorization, and Accounting (AAA) Server application provides users AAA services for network devices and mobile software applications. In authentication process if a user is requesting services with IP security highly... more

Authentication, Authorization, and Accounting (AAA) Server application provides users AAA services for network devices and mobile software applications. In authentication process if a user is requesting services with IP security highly customized hardware platform server with IP security protocol is required to handle validity of user for the network services. Development and testing of IPSec platform is a great challenge and this platform provides various IP security services for traffic at IP layer in both IPv4 and IPv6.It also provides encryption and decryptions of the payload of IP packets between communicating servers. Authentication process is accomplished via the presentation of an identity and credentials. This paper describes the methodology to develop and evaluate the embedded IP security platform for AAA server for IP sec network users. IPSec network users need to authenticate themselves to the AAA server application when they want to communicate with it. AAA Server application uses RADIUS/DIAMETER protocol and Extensible Authentication Protocol (EAP) to provide user AAA services. Finally results shows embedded IP security platform for AAA server is developed and tested successfully for IPSec network users.

An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available... more

An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities-of-Service so a Quality-of-Service Framework is needed to help applications and services deal with this new environment. In addition, since these networks must work together, future mobile systems will have an open, instead of the currently closed, architecture. Therefore new mechanisms will be needed to protect users, servers and network infrastructure. This means that future mobile networks will have to integrate communications, mobility, quality-of service and security. This paper provides an overview of potential architectures for communication in future networks. Our study shows that only a number of these architectures support this integration.

In wireless sensor networks (WSNs), there are many factors, such as the reciprocal interference of wireless links, battlefield applications and nodes are exposed to poor physical protection medium. All of these result in the sensor nodes... more

In wireless sensor networks (WSNs), there are many factors, such as the reciprocal interference of wireless links, battlefield applications and nodes are exposed to poor physical protection medium. All of these result in the sensor nodes being more exposed to be attacked and compromised. Since sensors are normally energy limited in WSNs, it is constantly basic to conserve the node energy and expand the lifetime of the network. Besides, hierarchical clustering is deemed as one of the numerous ways to deal with the reduction of energy consumption of nodes and increasing the network lifetime in WSNs. This paper conspicuously introduces an efficient and secure malicious node detection model based on a hybrid clustering network for WSNs (ESMCH) which is based on a trusted mobile node. WSNs are still suffering from some attacks like Man-in-the-Middle Attack and Black hole Attack, so by using the ESMCH model, we can avoid these attacks. Finally, simulation results also indicate that the proposed model can increase the network lifetime, and achieve an efficient and secure clustering network.

Quality of service (QoS) is the mechanism of the network to provide different service level to a different traffic type as business need. The main objective of this work is to improve QoS in network by reducing link load and bandwidth... more

Quality of service (QoS) is the mechanism of the network to provide different service level to a different traffic type as business need. The main objective of this work is to improve QoS in network by reducing link load and bandwidth consumption. It uses a routing scheme that satisfies expected demand and minimized link utilization of system. It works on reliability by limited usage of bandwidth. Results are presented to demonstrate the effectiveness of system. The efficient QoS model provides better control and administration of network traffic. Solution of routing problem with help of proposed model allows providing the distribution of traffic between source-and destination-node so that delays along every path are equal.