4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks Research Papers (original) (raw)
An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just... more
An assignment on development of Cellular mobile communication Generations, Namely, From 0 G to 5 G. Including a briefing on GSM, EDGE, AMPS, GPRS, And all others categories related to this field. This is totally a briefing that was just created in 15 min. ;)
Global Optimization ) ازدحام کنترل ( congestion control شده توزیع الگوریتم یک عنوان به را ( primal -dual شود می انجام لینکها و منابع توسط که ازدحام کنترل مکانیزم نماییم. می بررسی TCP vegas... more
Global Optimization ) ازدحام کنترل ( congestion control شده توزیع الگوریتم یک عنوان به را ( primal -dual شود می انجام لینکها و منابع توسط که ازدحام کنترل مکانیزم نماییم. می بررسی TCP vegas با را multi link -multi source دهیم. می شرح و عدالت ، تاخیر مهم ویژگیهای شده مطرح مدل loss در TCP Vegas داده نشان کند. می بیان را که شود می vegas اختصاص با باشد، داشته وجود شبکه در کافی میزان به بافرینگ که زمانی است ممکن که کنیم می بررسی ادامه در کند. می پیدا ثبات ، شبکه ظرفیت وزندار عادلنه با که دهد می پیشنهاد و کرده بررسی را آن نتایج و دهد رخ شبکه در ازدحام ایجاد مکانیزم ) صف فعال مدیریت از استفاده REM سازی شبیه نتایج نهایت در کرد. جلوگیری آن از توان می ( ایم. آورده پایان در را
Most of the business web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of requirements. In software engineering the needs for software designers has become evident to... more
Most of the business web applications are complex, difficult to implement, risky to maintain and customization requires deep understanding of requirements. In software engineering the needs for software designers has become evident to design an efficient and cost effective software framework. Research shows that reusability can improve software quality, productivity, save countless hours in development time and save millions of dollars. Unfortunately, implementing systematic reuse has proven to be a difficult process. As web engineers continue to struggle with cost and time, reuse has emerged as a sound engineering principle and practice in many fields. However, technology for completely integrated user interfaces, reuse design, customize and implement it is still relatively immature. Object-oriented framework mechanism provides reusability and enables web engineers to customize various aspects in web development. This study will contribute to the fields of object-oriented web engineering, component-based software engineering, web application customization and object visualization. In particulars, this study will provide a novel mechanism for designing, customizing, reusing and visualizing web elements for developing quality web application within shortest development time and cost. This study will also present an underlying code generation technique for integrating Model-View-Controller pattern, improve development productivity and reduce errors. At the end, this study conducted a complete assessment on the proposed customization mechanism.
بسياري از استانداردهاي شبكههاي بيسيم شامل ويژگيهاي كيفيت سرويس (QoS) در لايه MAC هستند. اين ويژگيها، به گرههايي كه ترافيك real-time مانند صدا و ويدئو را انتقال ميدهند، امكان ميدهد كه مقدم بر گرههايي كه ترافيك best-effort حمل ميكنند،... more
بسياري از استانداردهاي شبكههاي بيسيم شامل ويژگيهاي كيفيت سرويس (QoS) در لايه MAC هستند. اين ويژگيها، به گرههايي كه ترافيك real-time مانند صدا و ويدئو را انتقال ميدهند، امكان ميدهد كه مقدم بر گرههايي كه ترافيك best-effort حمل ميكنند، به كانال دسترسي داشته باشند. موفقيت اين مكانيسمهاي QoS نيازمند اين است كه گرهها درستكار باشند و صادقانه گروه QoS برنامه كاربردي خود را گزارش دهند. اگرچه كه گرههاي منطقي اين كار را انجام ميدهند، اما اگر بتوانند، براي حداكثر كردن بهرهوري خود، از يك مشخصات استاندارد تعدي ميكنند. واسطهاي شبكه روز به روز بيشتر قابلبرنامهريزي ميشوند و اين به گرهها امكان ميدهد كه براي افزايش گذردهي خود، بهطور غلط ترافيك best-effort خود را بهجاي ترافيك real-time جا بزنند. در اين مقاله، يك ساختار MAC شبيه slotted Aloha كه در بسياري از موارد، از لايه MAC IEEE 802.11e استفاده ميكند، با استفاده از تئوري بازي تحليل ميشود. مدل MAC ما به ترافيك اجازه ميدهد كه به دو صورت با اولويت بالا (HP) يا با اولويت پايين (LP) دستهبندي شود و به دو صورت دسترسي تصادفي (رقابتي ) و دسترسي بهروش سركشي (غيررقابتي) ميتواند كانال را در اختيار بگيرد. دليل استفاده از روش بدون درگيري به عنوان يك مكانيسم كارا اين است كه كاربران كم اولويت را تشويق ميكند كه درستكارانه عمل كنند. در اين مقاله در باره تابعهاي مطلوبيت براي ترافيكهاي LP و HP بحث ميكند و بازدهي سيستم را با استفاده از مفهوم راهحل دادي و ستد نش (NBS ) در تئوري بازيهاي مشاركتي تحليل ميكنيم. از مفهوم NBS براي يافتن يك نقطه عملياتي منصفانه و بهينه پارتو براي سيستم استفاده خواهيم كرد. از آنجا كه كاربران بهطور استراتژيك عمل ميكنند، از چهارچوب تئوري بازيهاي غيرمشاركتي براي يافتن مجموعهاي از تعادل نش استفاده ميشود. در ادامه، از اين مساله كه نقطه عملياتي NBS يك تعادل نش است، درخواهيم يافت كه استراتژي ما در اين مساله كارا و strategy-proof است.
The performance of wireless local area networks (WLANs) is based on the performance of the corresponding access points (APs). Nowadays, network engineers tend to manually assign data channels (frequencies) for each AP. They only use... more
The performance of wireless local area networks (WLANs) is based on the performance of the corresponding access points (APs). Nowadays, network engineers tend to manually assign data channels (frequencies) for each AP. They only use channels 1, 6, and 11 because no interference exists between these channels. But it will be far more efficient if all 11 channels are used. Therefore, the channel allocation problem becomes a major challenge when deploying WLANs. In this paper, we assume that the location of each AP is known. Our objective is to optimally assign a frequency for each AP such that the throughput is maximized and the interference between the various APs is minimized. We also consider a realistic scenario where the APs are not in line of sight of each other, but on the other hand there are different barriers that separate them. We formulate the problem using integer linear programming (ILP) in order to obtain the optimal frequency assignment (OFA). Then, we propose two efficient heuristic algorithms to achieve the same results. Finally, we evaluate the performance of all techniques and make a comparison between them.
NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects 2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects MANET (Mobile Ad-hoc Networks) A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in... more
NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects
2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects
MANET (Mobile Ad-hoc Networks)
A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Delay Analytical Models for Opportunistic Routing in Wireless Ad Hoc Networks
Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function
Fine-Grained Analysis of Packet Loss in MANETs
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
WSN – Wireless Sensor Networks (Routing)
A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-cycled WSNs
A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks
A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks
E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks
Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks
Low-Cost Collaborative Mobile Charging for Large-Scale Wireless Sensor Networks
Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
Optimization of Watchdog Selection in Wireless Sensor Networks
QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks
Routing Protocol for Wireless sensor networks Using Swarm intelligence-ACO with ECPSOA
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks
Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR)
WSN – Wireless Sensor Networks (Security)
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
TruFiX: A Configurable Trust-based Cross-Layer Protocol for Wireless Sensor Networks
VANET – Vehicular Ad-hoc Networks (Routing)
Adaptive Quality of Service based Routing for Vehicular Ad hoc Networks with Ant Colony Optimization
CBS: Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
EcoTrec—A Novel VANET-Based Approach to Reducing Vehicle Emissions
Enhancing Quality of Service Conditions Using a Cross-Layer Paradigm for Ad-hoc Vehicular Communication
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks
VANET – Vehicular Ad-hoc Networks (Security)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET
GDVAN: A New Greedy Behavior Attack Detection Algorithm For VANETs
REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET
WIRELESS COMMUNICATIONS & OTHERS
Congestion Control Scheme Performance Analysis Based on Nonlinear RED
Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks
End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting
Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control
Spectrum-Availability based Routing for Cognitive Sensor Networks
Towards Effective Trust-based Packet Filtering in Collaborative Network Environments
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
L’histoire des réseaux mobiles est jalonnée par trois étapes principales, auxquelles on donne couramment le nom de génération. On parle des première, deuxième et troisième générations de réseaux mobiles, généralement abrégées... more
L’histoire des réseaux mobiles est jalonnée par trois étapes principales, auxquelles on donne couramment le nom de génération. On parle des première, deuxième et troisième générations de réseaux mobiles, généralement abrégées respectivement en 1G, 2G et 3G. Ces trois
générations diffèrent principalement par les techniques mises en œuvre pour accéder à la ressource radio. L’évolution de ces techniques est guidée par la volonté d’accroître la capacité ainsi que les débits offerts par le système dans une bande de fréquences restreinte. En effet,
les fréquences sont des ressources très rares car convoitées par de multiples applications (télévision, radio, faisceaux hertziens, liaisons satellites, réseaux privés, communications militaires, etc.).
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing... more
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic source routing (DSR) protocol.
In every developing and developed nation the utilization of automobiles is a maximising day by day and apparently the accidents relating to automobiles have increased drastically too. In our projectawe identify the problem of leakages of... more
In every developing and developed nation the utilization of automobiles is a maximising day by day and apparently the accidents relating to automobiles have increased drastically too. In our projectawe identify the problem of leakages of toxic gases taking place in a closed volume of an maximising and also develop an application through which the person inside the closed cabin or any of it's family member/friend can be notified of the situation. To overcome this situation we have introduced the automatic toxic gas indicator which enables us to detect any such hazardous leakage taking place at almost all environment conditions very effectively with the help of smart sensors. Anhydrous Ammonia is favoured in many large cooling systems because it has better heat transfer characteristics and is cheaper than the refrigerant gases used in home cooling systems and refrigerators. The problem is that the material is very reactive and toxic. Fortunately, the gas is extremely irritating at well below the toxic level so that when a minor leak happens, unprotected people evacuate the area quickly with little urging. A catastrophic leak, however can overcome people before they have a chance to get clear. This is partially because man people are temporarily blinded by less than lethal concentrations. The smart sensors will be enabled to detect any such leakages taking place inside the cabin and will also send signals to the motors of the power window to roll down automatically and when any situation of gas leakage is detected and alert sms/call is sent to the user and he is notified of the situation.
- by IRJCS: : International Research Journal of Computer Science and +2
- •
- The Internet of Things, Internet of Things, Wireless sensor network- lifetime and coverage, 4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks
Al margen un sello con el Escudo Nacional, que dice: Estados Unidos Mexicanos. Presidencia de la República.
Mobility management with provision of seamless handover is crucial for an efficient support of global roaming of mobile nodes (MNs) in next-generation wireless networks (NGWN). Mobile IPv6 (MIPv6) and its extensions were proposed by IETF... more
Mobility management with provision of seamless handover is crucial for an efficient support of global roaming of mobile nodes (MNs) in next-generation wireless networks (NGWN). Mobile IPv6 (MIPv6) and its extensions were proposed by IETF for IP layer mobility management. Mobile IPv6 developed in 1997 is considered to be one of the key technologies for realizing mobile Internet which enables seamless communication between fixed line and wireless access networks. Now, users are able to establish and maintain a session between their computer and information network as they roam from one place to another. Once connected, a continuous session with no interruptions is provided. But the delay constraint, measured in terms of handover latency, is the crucial factor, which should be reduced.
since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled... more
since the wireless node operates on battery power, the energy consumption plays a vital role in wireless sensor network (WSN). Normally the communication consumes much energy when comparing to sensing and data processing. So a controlled communication with the help of the proper routing can save maximum energy. As per the data transmission as well as reception analysis most of the power wasted due to unnecessary route request flow. To minimize the route request, a new shortest path routing protocol introduced. In this paper, it has been analysed the various parameters such as network throughput, Mean Delay, mean jitter, packet delivery ratio based on the comparison of different routing protocols.
In recent years, studies have been lead about a new generation, with distintive characteristics, such as a desire to live intensely the moment, easeness to interact with new technologies, enhancement of informality, and an aversion to... more
In recent years, studies have been lead about a new generation, with distintive characteristics, such as a desire to live intensely the moment, easeness to interact with new technologies, enhancement of informality, and an aversion to traditional institutions, excessive creativity, longing to connect with the world etc. This is called Generation Y. This article discusses the
emergence of the concept of Generation Y, analyzes the factors that distinguish it from previous generations. It also shows how church has been affected by the new generation, while reflecting on guiding principles for the evangelization of Generation Y, briefly evaluating the model emerging church as a paradigm to attract individuals Y and warning of the risk of losing our identity.
Abstrak Manajemen QoS (Quality of Service) pada MANET (Mobile Ad Hoc Network) tidak semudah jika dibandingkan dengan penanganan QoS pada jaringan berkabel. Hal ini disebabkan karakteristik MANET yaitu kualitas bandwidth yang tidak bisa... more
Abstrak Manajemen QoS (Quality of Service) pada MANET (Mobile Ad Hoc Network) tidak semudah jika dibandingkan dengan penanganan QoS pada jaringan berkabel. Hal ini disebabkan karakteristik MANET yaitu kualitas bandwidth yang tidak bisa dijaga dikarenakan kualitas bandwidth pada MANET sangat ditentukan oleh kualitas sinyal wireless. Ditambah lagi setiap node pada MANET dapat berpindahpindah kapan dan kemana saja. Akibatnya, sering terjadi proses routing untuk membangun struktur jaringan antar node-node tersebut. Pada MANET, setiap node-nodenya memiliki peran sebagai end-user sekaligus sebagai router yang menghitung sendiri arah rute selanjutnnya. Dengan demikian permasalah routing ini akan bertambah sulit karena kemungkinan terjadinya looping akan sangat besar. Belum lagi masalah lain yaitu packet loss, packet error, dropped packet, latency dan lain sebagainya. Penelitian ini menganalisa beberapa jenis protokol Ad-Hoc Routing diimplementasikan pada MANET dengan cara simulasi menggunakan OPNET Modeler sehingga dapat diketahui protokol mana saja yang memenuhi kriteria QoS untuk MANET. Kata Kunci : MANET, mobile ad hoc network, QoS, routing, wireless 1 Pendahuluan 1.1 Latar Belakang Teknologi wireless saat ini telah didukung oleh berbagai perangkat mobile. Sehingga memungkinkan suatu perangkat mobile mengirimkan data ke perangkat lainnya. Perangkat mobile disini mencakup netbook, tablet, smartphone dan berbagai perangkat yang terhubung menggunakan teknologi.
Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast... more
Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in
Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate
duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of data to be transmitted to the sink and thus saving energy. For better power management we used a hierarchical routing protocol in WAPMS and caused the motes to sleep during idle time.
Today’s Telecom operators are enforced by the market to provide various services; also they need a strong management framework to manage those in a right way. Considering the importance of QoS inherent there,... more
Today’s Telecom operators are enforced by the market
to provide various services; also they need a strong
management framework to manage those in a right
way. Considering the importance of QoS inherent
there, we first aim to introduce couple of useful
processes of COBIT5 (Control Objectives for
Information and Related Technology) in this paper as
named DSS01 (Manage Operations) and DSS02
(Manage Service Requests and Incidents) to be mapped
with eTOM (Enhanced Telecom Operations Map)
framework with, in order to promote QoS as our
second target of this research.
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative communication utilizing space-time block codes. In cooperative communication, users besides communicating their own information,... more
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative communication utilizing space-time block codes. In cooperative communication, users besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time coding and network coding. Two cooperating users utilize Alamouti space time code for inter user cooperation and in addition utilize a third relay which performs network coding. The third relay does not have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based network coding, instead of conventional XOR based network code and utilize iterative joint networkchannel decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to investigate the convergence property of the proposed decoder.
The fourth generation of mobile technology -known as 4G and also referred to as Long Term Evolution (LTE) -is the next step in the evolution of mobile network technology. The Business Benefits of 4G LTE.4G LTE is the fourth major... more
The fourth generation of mobile technology -known as 4G and also referred to as Long Term Evolution (LTE) -is the next step in the evolution of mobile network technology. The Business Benefits of 4G LTE.4G LTE is the fourth major generation of mobile network technology. Its bandwidth, latency and capacity offer the promise that network connectivity will no longer be a barrier to the benefits of high-performance mobile applications. As Information and Communications Technology (ICT) continues to develop, the business world is applying it ever more broadlyand across increasingly diverse applications. Critical to this is the development of mobile communications technology. The latest such technology, 4G LTE ('Fourth Generation -Long Term Evolution'), provides substantial performance improvements over previous mobile technologies, and offers the promise that connectivity will no longer be a barrier to realizing the benefits of enterprise mobility. Safaricom launched its LTE Advanced 4G LTE network making it the first mobile operator in the Sub-Saharan region to launch the 4G Technology.
Many theorists would agree that, had it not been for reinforcement learning, the development of Boolean logic might never have occurred. It might seem unexpected but entirely conflicts with the need to provide the lookaside buffer to... more
Many theorists would agree that, had it not been for reinforcement learning, the development of Boolean logic might never have occurred. It might seem unexpected but entirely conflicts with the need to provide the lookaside buffer to leading analysts. After years of compelling research into multi-processors, we confirm the exploration of IPv7. In order to overcome this obstacle, we use ubiquitous epistemologies to verify that the seminal distributed algorithm for the visualization of SCSI disks by Maruyama [1] runs in Θ(n) time.
Increases in population and limited health workforce have increased demand for health care services. Unfortunately there has not been a corresponding increase in healthcare facilities and personnel. Modern technology, using smart... more
Increases in population and limited health workforce have increased demand for health care services. Unfortunately there has not been a corresponding increase in healthcare facilities and personnel. Modern technology, using smart electronic technology provide means of solving these problems. Telemedicine requires high speed data networks in order to provide effective healthcare in ways similar to traditional healthcare methods. IEEE 802.16e or Mobile WIMAX provides last mile high speed broadband wireless access. WIMAX also provides QoS as part of its implementation. In this project we have reviewed WIMAX QoS Service Classes and mapped them to some healthcare applications to analyse the performance. A WIMAX network is simulated based on our mappings and the throughput and delay performance are analysed based on the QoS requirements of healthcare services. The throughputs and delays we got from our simulations were better than the requirements for medical applications except for heart rate transmission. Changing the audio encoding scheme for heart rate improves the throughput but none of the encoding schemes achieves the health requirements.
Mobile ad hoc networks (MANET) are becoming increasingly popular wireless networking model in various areas of technology usage from every-day to specific military purposes. Security in ad hoc networks is a key concern in order to provide... more
Mobile ad hoc networks (MANET) are becoming increasingly popular wireless networking model in various areas of technology usage from every-day to specific military purposes. Security in ad hoc networks is a key concern in order to provide protected communication between mobile nodes in an unknown and heterogeneous environment. The main challenge of MANETs is their vulnerability to security attacks and how to operate securely and efficiently while preserving its own resources. This paper discusses the most common type of attack on MANET and their security challenges. There are a lot of existing solutions in this field which propose increasing of MANETs security by new protocol design, evaluate existing protocols and their abilities, propose new routing protocols, find solutions and prevention measures for existing attacks or improving specific characteristics of MANET such as the packet drop rate, the overhead, end-to-end packet delays, network throughput etc.This paper attempts to provide an overview of MANET security challenges.The paper finishing by presenting current and possible solutions as a problems requiring for further research in the future.
A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its... more
A Service Level Agreement (SLA) between a service provider and its customers is an assurance to customers in fulfills the best services. Customers can get the service they pay for which obligates the service provider to achieve its service promises. Failing to meet SLAs could result in serious financial consequences for a provider and lost customers trust. This paper presents an analysis on performance of Quality of Service (QoS) SLA on a User Provider Edge –Metro Ethernet (UPE-ME) network. A QoS SLA tested method called RFC 2544 is performed on four customers in one industrial area. Actual data on four of QoS parameters which are throughput, jitter, latency and frame loss are tested by using test gear VeEX Vepal MX-120. The customers are focus to the User Provider Edge (UPE) customer. A few measurement and techniques are presented on the tested method. Analysis result on the tested throughput, jitter, latency and frame loss performance are presented based on growth of bytes. Network performance tested is identified that it is qualify as a perform network link. Performance presented results on growth of throughput with growth of frame length and latency increased with growth of frame length. Analyzed on frames loss presented that there are no errors thus this proved good quality network. Some jitters presented that they are in a low value which means that less jitter presents system with a better operation. Identifications on parameter value are presented based on an analyzed QoS using Minitab 16. The produce result shows the implemented of SLA QOS UPE-ME follow the QoS and this result is a better proved for customer satisfaction and good services from the service provider.
Actual network size depends on the application and the protocols developed for the routing for this kind of networks should be scalable and efficient. Each routing protocol should support small as well as large scale networks very... more
Actual network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable and efficient. Each routing protocol should support small as well as large
scale networks very efficiently. As the number of node increase, it increases the management functionality
of the network. Graph theoretic approach traditionally was applied to networks where nodes are static or
fixed. In this paper, we have applied the graph theoretic routing to MANET where nodes are mobile. Here,
we designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Each cluster supports a few nodes with a cluster head. The intracluster
connectivity amongst the nodes within the cluster is supported by multi-hop connectivity to ensure
handling mobility in such a way that no service disruption can occur. The inter-cluster connectivity is also
achieved by multi-hop connectivity. However, for inter-cluster communications, only cluster heads are
connected. This paper demonstrates graph theoretic approach produces an optimum multi-hop connectivity
path based on cumulative minimum degree that minimizes the contention and scheduling delay end-toend.
It is applied to both intra-cluster communications as well as inter-cluster communications. The
performance shows that having a multi-hop connectivity for intra-cluster communications is more power
efficient compared to broadcast of information with maximum power coverage. We also showed the total
number of required intermediate nodes in the transmission from source to destination. However, dynamic
behavior of the nodes requires greater understanding of the node degree and mobility at each instance of
time in order to maintain end-to-end QoS for multi-service provisioning. Our simulation results show that
the proposed graph theoretic routing approach will reduce the overall delay and improves the physical
layer data frame transmission.
The functionality of the wireless application protocol (WAP) dependent nomadic devices can be enhanced using techniques for the reconfiguration of such devices in the mobile environment, either individually or en mass. For example, a... more
The functionality of the wireless application protocol (WAP) dependent nomadic devices can be enhanced using techniques for the reconfiguration of such devices in the mobile environment, either individually or en mass. For example, a system that enables the hand-held devices of selected personnel at a disaster site to be automatically adapted for specifically directed emergency WAP communications is highly beneficial. In this paper we present a method for the provision of configuration settings over the wireless application protocol using the GSM short messages system (SMS). Discussion of implementation of wireless datagram protocol, wireless session protocol and wireless application environment layers is included. Data for push operation via an SMS gateway is presented that demonstrates increasing popularity amongst users.
This paper proposes an extensible solution that gives support to recent growth in wireless communication and allows developers outside of the automotive industry to develop applications leveraging vehicle to vehicle communication. The... more
This paper proposes an extensible solution that gives support to recent growth in wireless communication and allows developers outside of the automotive industry to develop applications leveraging vehicle to vehicle communication. The suggested software architecture, which would integrate with the automotive open source architecture (AUTOSAR) standard, has primary focus on supporting applications for safer vehicles and also provides the foundation for developing personal and entertainment applications that can be operated within vehicles. The proposed architecture finds its applications in collision avoidance, autonomous navigation, and direct vehicle to vehicle communication for negotiating pass-through at intersections. The communication network manager is a critical part of the framework, and it includes a new Vehicle Ad-hoc Network (VANET) topology for communication with other vehicles. The proposed topology, that can have at most one intermediate hop to communicate any two vehicles, assumes conformance with IEEE 802.11p and the dedicated short range communication (DSRC) standard.
We propose a 6LoWPAN-SNMP that enables transmission of SNMP messages over ). The 6LoWPAN-SNMP is an extended modification of the Simple Network Management Protocol (SNMP). Compared to traditional IP-networks, 6LoWPAN is a severely... more
We propose a 6LoWPAN-SNMP that enables transmission of SNMP messages over ). The 6LoWPAN-SNMP is an extended modification of the Simple Network Management Protocol (SNMP). Compared to traditional IP-networks, 6LoWPAN is a severely resource-constrained network; hence, existing SNMP protocols need to be modified to meet the goals in RFC 4919, "6LoWPAN Problems and Goals". The proposed 6LoWPAN-SNMP provides for native communication of SNMP messages on LoWPAN networks. The proposed mechanism is resource-efficient and fully compatible with the standard SNMP. It utilizes SNMP header compression and provides extended protocol operations to reduce the number of SNMP messages generated among the SNMP entities. Compatibility with the standard SNMP is achieved by a proxy forwarder on the 6LoWPAN gateway. The proposed mechanism is implemented on actual hardware platforms using the opensource Net-SNMP library and the Berkeley 6LoWPAN on the TinyOS 2.1. The feasibility and effectiveness of 6LoWPAN-SNMP is evaluated. The experimental results show that 6LoWPAN can be effectively supported with network management functionality based on SNMP.
Messages routing over a network is one of the most fundamental concept in communication which requires simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it refers to the addition of a... more
Messages routing over a network is one of the most fundamental concept in communication which requires simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it refers to the addition of a timing constraint in which messages should be received within a specified time delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of routing real-time messages on networks. We study whether it is possible to have an optimal on-line algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message routing's algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual examples. Next, we explore the Unidirectional Ring topology in finding the transmission's " makespan " .Lastly, we propose the same network modelling through the technique of Kinesthetic Learning Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the effectiveness of the KLA approach compared to the traditional teaching method.
Mobile ad hoc networks (MANET) are self configuring, infrastructure less networks where the participating nodes are working as host as well as routers. Because of the absence of central infrastructure and mobility of nodes selection of a... more
Mobile ad hoc networks (MANET) are self configuring, infrastructure less networks where the participating nodes are working as host as well as routers. Because of the absence of central infrastructure and mobility of nodes selection of a routing protocol has become a great issue. IETF MANET group has given certain qualitative parameters in order to select a protocol. These parameters define the inhibited characteristics of a protocol. They have classified these protocols as proactive, reactive and hybrid routing protocols depending upon their characteristics. This paper is presented as a part of an ongoing research work. Through this paper we are explaining different protocols and comparing them on the given qualitative parameters.
The IPv4 used until now and still in use, has addresses of 32 bits fixed size. That would allow using up to 232 addresses or approximately around 4 billion addresses. Many assumptions are created regarding the year when the number of IPv4... more
The IPv4 used until now and still in use, has addresses of 32 bits fixed size. That would allow using up to 232 addresses or approximately around 4 billion addresses. Many assumptions are created regarding the year when the number of IPv4 addresses will drain, taking into the consideration the growth of the internet. Some studies estimate 2041 and other 2020 and some even 2009. The IPv6 would in other hand allow more addresses, since it is based on 128 bits addresses. As a result, preparations are ongoing to implement the IPv6.
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now. Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet Protocol version 6 (IPv6) due to the... more
The issue of deploying IPv6 Technology has been a topic of debate for more than a decade now. Professionals have been discussing on the transition from Internet Protocol version 4 (IPVv4) to Internet Protocol version 6 (IPv6) due to the fact that the IPv4 address space would soon be exhausted.
In this paper, we analyse the IPv4 and IPv6 technologies and look at the benefits of migrating to IPv6, its social implications, risks & challenges and the opportunities the IPv6 migration offers.
It is well known that the performance of a network degrades when it reaches a certain size.
This paper deals with identification of multivariable fractional order systems. The state space model is used, based on the Guidorzi canonical form. An output error identification approach is used, and the parametric sensitivity functions... more
This paper deals with identification of multivariable fractional order systems. The state space model is used, based on the Guidorzi canonical form. An output error identification approach is used, and the parametric sensitivity functions model is developed as a multivariable fractional model. Its simulation is carried out using the fractional bounded integration operator. Different simulations test the method efficiency, and its statistical performance is analyzed, using Monte Carlo simulation at various signal-to-noise ratios.
The development and deployment of several wireless and cellular networks mean that users will demand to be always connected as they move around. Mobile nodes will therefore have several interfaces and connections will be seamlessly... more
The development and deployment of several wireless
and cellular networks mean that users will demand to be always
connected as they move around. Mobile nodes will therefore have
several interfaces and connections will be seamlessly switched
among available networks using vertical handover techniques.
Proactive handover mechanisms can be combined with the
deployment of a number of location-based systems that provide
location information to a very high degree of accuracy in different
contexts. Furthermore, this new environment will also allow
contextual information such as user profiles as well as the
availability of local services to be combined to provide optimal
communications for mobile users. The goal of this paper is
therefore to explore the development of a comprehensive framework
for achieving optimal communication in heterogeneous
wireless environments using location and contextual information
to provide efficient handover mechanisms. Using location-based
techniques, it is possible to demonstrate that the Time Before
Handover as well as the Network Dwell Time can be accurately
estimated. These techniques are dependent on accurately estimating
the handover radius. This paper investigates how location and
context awareness can be used to estimate the best handover
radius. The paper also explores how such techniques may be
integrated into the Y-Comm architecture which is being used to
explore the development of future mobile networks. Finally, the
paper highlights the use of ontological techniques as a mechanism
for specifying and prototyping such systems.
This paper presents the design theory of conventional single-ended LNA and differential LNA based on CMOS technology. The design concepts give an useful indication to the design trade-offs associated with NF, gain and impedance matching.... more
This paper presents the design theory of conventional single-ended LNA and differential LNA based on CMOS technology. The design concepts give an useful indication to the design trade-offs associated with NF, gain and impedance matching. Four LNA's have been designed using technological design rules of TSMC 0.18-µm CMOS technology and this work mainly proposed for IEEE 802.11a applications. With 1.8V supply voltage, the proposed LNA's achieve a gain higher than 19dB, a noise figure less than 4dB and impedance matching less than-10dB at 5GHz frequency. The goal of this paper is to highlight the efficient LNA architecture for achieving simultaneous gain, noise and input matching at low supply voltage. The performance of all LNA's are analysed and compared using Agilent's Advanced Design System Electronic Design Automation tools.
Authentication, Authorization, and Accounting (AAA) Server application provides users AAA services for network devices and mobile software applications. In authentication process if a user is requesting services with IP security highly... more
Authentication, Authorization, and Accounting (AAA) Server application provides users AAA services for network devices and mobile software applications. In authentication process if a user is requesting services with IP security highly customized hardware platform server with IP security protocol is required to handle validity of user for the network services. Development and testing of IPSec platform is a great challenge and this platform provides various IP security services for traffic at IP layer in both IPv4 and IPv6.It also provides encryption and decryptions of the payload of IP packets between communicating servers. Authentication process is accomplished via the presentation of an identity and credentials. This paper describes the methodology to develop and evaluate the embedded IP security platform for AAA server for IP sec network users. IPSec network users need to authenticate themselves to the AAA server application when they want to communicate with it. AAA Server application uses RADIUS/DIAMETER protocol and Extensible Authentication Protocol (EAP) to provide user AAA services. Finally results shows embedded IP security platform for AAA server is developed and tested successfully for IPSec network users.
- by International journal of Mobile Network Communications & Telematics ( IJMNCT)
- •
- Embedded Systems, 4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks, Embedded Linux, IPsec Protocol
Hierarchical routing techniques have long been known to increase network scalability by constructing a virtual backbone. Even though MANETs have no physical backbone, a virtual backbone can be constructed by finding a connected dominating... more
Hierarchical routing techniques have long been known to increase network scalability by constructing a virtual backbone. Even though MANETs have no physical backbone, a virtual backbone can be constructed by finding a connected dominating set (CDS) in the network graph. Many centralized as well as distributed algorithms have been designed to find a CDS in a graph (network). Theoretically, any centralized algorithm can be implemented in a distributed fashion, with the tradeoff of higher protocol overhead. Because centralized approaches do not scale well and because distributed approaches are more practical especially in MANETs, we propose a fast distributed connected dominating set (FDDS) construction in MANETs. FDDS has message and time complexity of O(n) and O(D 2 ), where n is the number of nodes in the network and D is the maximum node degree. According to our knowledge, FDDS achieves the best message and time complexity combinations among the previously suggested approaches. Moreover, FDDS constructs a reliable virtual backbone that takes into account (1) node's limited energy, (2) node's mobility, and (3) node's traffic pattern. Our simulation study shows that FDDS achieves a very low network stretch. Also, when the network size is large, FDDS constructs a backbone with size smaller than other well known schemes found in the literature.
An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available... more
An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities-of-Service so a Quality-of-Service Framework is needed to help applications and services deal with this new environment. In addition, since these networks must work together, future mobile systems will have an open, instead of the currently closed, architecture. Therefore new mechanisms will be needed to protect users, servers and network infrastructure. This means that future mobile networks will have to integrate communications, mobility, quality-of service and security. This paper provides an overview of potential architectures for communication in future networks. Our study shows that only a number of these architectures support this integration.
In wireless sensor networks (WSNs), there are many factors, such as the reciprocal interference of wireless links, battlefield applications and nodes are exposed to poor physical protection medium. All of these result in the sensor nodes... more
In wireless sensor networks (WSNs), there are many factors, such as the reciprocal interference of wireless links, battlefield applications and nodes are exposed to poor physical protection medium. All of these result in the sensor nodes being more exposed to be attacked and compromised. Since sensors are normally energy limited in WSNs, it is constantly basic to conserve the node energy and expand the lifetime of the network. Besides, hierarchical clustering is deemed as one of the numerous ways to deal with the reduction of energy consumption of nodes and increasing the network lifetime in WSNs. This paper conspicuously introduces an efficient and secure malicious node detection model based on a hybrid clustering network for WSNs (ESMCH) which is based on a trusted mobile node. WSNs are still suffering from some attacks like Man-in-the-Middle Attack and Black hole Attack, so by using the ESMCH model, we can avoid these attacks. Finally, simulation results also indicate that the proposed model can increase the network lifetime, and achieve an efficient and secure clustering network.
- by International Journal of Computer Networks & Communications (IJCNC)
- •
- Wireless Sensor Networks, Wireless Sensor Networks (WSN), 4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks, Wireless Sensor and Mobile Adhoc Networks
Quality of service (QoS) is the mechanism of the network to provide different service level to a different traffic type as business need. The main objective of this work is to improve QoS in network by reducing link load and bandwidth... more
Quality of service (QoS) is the mechanism of the network to provide different service level to a different traffic type as business need. The main objective of this work is to improve QoS in network by reducing link load and bandwidth consumption. It uses a routing scheme that satisfies expected demand and minimized link utilization of system. It works on reliability by limited usage of bandwidth. Results are presented to demonstrate the effectiveness of system. The efficient QoS model provides better control and administration of network traffic. Solution of routing problem with help of proposed model allows providing the distribution of traffic between source-and destination-node so that delays along every path are equal.
A mobile ad-hoc network is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. To maintain and allocate network resources effectively and fairly among a collection of users is a... more
A mobile ad-hoc network is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. To maintain and allocate network resources effectively and fairly among a collection of users is a major issue. The resources shared mostly are the bandwidth of the links and the queues on the routers or switches. Packets are queued in these queues awaiting transmission. When too many packets are contending for the same link, the queue overflows and packets have to be dropped. When such drops become common events, the network is said to be congested. In this paper we consider the problem of congestion control in MANETs.TCP does not work properly with specific effects occurring in MANETs.TCP has originally designed for Internet, a network with different properties. As a consequence appropriate congestion control is widely considered to be key problem in MANETs. We compare performance evolution of TCP RENO, TCP VEGAS by using NS2 simulator.