Modelling and Simulation of communication networks Research Papers (original) (raw)

NetSim v11 - Experiments Manual.
For Under Graduate & Post graduate lab experimentation

Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to... more

Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown to most people. However compared to WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi.

— Lifetime enhancement has always been a crucial issue as most of the wireless sensor networks (WSNs) operate in unattended environment where human access and monitoring are practically infeasible. Clustering is one of the most powerful... more

— Lifetime enhancement has always been a crucial issue as most of the wireless sensor networks (WSNs) operate in unattended environment where human access and monitoring are practically infeasible. Clustering is one of the most powerful techniques that can arrange the system operation in associated manner to attend the network scalability, minimize energy consumption , and achieve prolonged network lifetime. To conquer this issue, current researchers have triggered the proposition of many numerous clustering algorithms. However, most of the proposed algorithms overburden the cluster head (CH) during cluster formation. To overcome this problem, many researchers have come up with the idea of fuzzy logic (FL), which is applied in WSN for decision making. These algorithms focus on the efficiency of CH, which could be adoptive, flexible, and intelligent enough to distribute the load among the sensor nodes that can enhance the network lifetime. But unfortunately, most of the algorithms use type-1 FL (T1FL) model. In this paper, we propose a clustering algorithm on the basis of interval type-2 FL model, expecting to handle uncertain level decision better than T1FL model. Index Terms— WSN, type 2 fuzzy logic, mamdani's method.

Wikipedia describes network simulation as " a technique where a program models the behavior of a network by calculating the interaction between the different network entities (hosts/routers, data links, packets, etc.) using mathematical... more

Wikipedia describes network simulation as " a technique where a program models the behavior of a network by calculating the interaction between the different network entities (hosts/routers, data links, packets, etc.) using mathematical formulas. " But beyond the basic description, how can you use network simulation to predict and check your network systems? Network simulation is designed for characterizing, creating and validating the communication solutions, computer networks and distributed or parallel systems. It enables predicting network behavior and network performance. One can create, run and analyze any desired communication scenario. Generally, a simulation is the only method that allows continuous testing and debugging of network comprised of hundreds and thousands of communication elements (devices, hosts, routers, switches, servers, so on), since a standard lab won't do, and field tests are expensive, difficult to operate and non-deterministic. Simulation Platforms There is a variety of simulation platforms available, some of them open source and some of them commercial: OPNET, QualNet, OMNET++, NS-3 …

OMNeT++ (od Objective Modular Network Testbed in C++), je objektno – orijentirani modularni program za simulaciju diskretnih događaja, primarno namijenjen mrežnoj simulaciji. U sebi sadržava generičku arhitekturu, iz čijeg razloga može... more

OMNeT++ (od Objective Modular Network Testbed in C++), je objektno – orijentirani modularni program za simulaciju diskretnih događaja, primarno namijenjen mrežnoj simulaciji. U sebi sadržava generičku arhitekturu, iz čijeg razloga može biti upotrijebljen u razne svrhe unutar svoje domene. Neki od njih jesu modeliranje žičnih i bežičnih komunikacijskih mreža, modeliranje protokola, modeliranje mreža u čekanju (queueing networks), modeliranje višeprocesorskih i ostalih distribuiranih hardverskih sustava, validacija hardverske arhitekture, i generalno modeliranje i simulacija bilo kakvog sistema gdje je pristup diskretnog događaja prikladan te se može jednostavno mapirati u entitete komunikacijom kroz poruke.

Software-Defined Networking (SDN) is a network paradigm that facilitates network management by combining control functions on a centralized controller and enables network innovation with network programmability. Network testing... more

Software-Defined Networking (SDN) is a network paradigm that facilitates network management by combining control functions on a centralized controller and enables network innovation with network programmability. Network testing environments are needed for developing novel solutions that are developed by utilizing the opportunities provided by SDN which contributes significantly to the future internet. There are many simulation and emulation software tools available in the literature that provide the necessary testing environment. In this study, a feature-based comparison of these tools is done features in terms of testbed mode, emulation approach, scalability, real controller support, etc.

Every day a large number of problems are studied and analyzed where modeling in the form of networks is a way of being more efficient in the search for efficient results for companies, organizations, associations and even in problems of... more

Every day a large number of problems are studied and analyzed where modeling in the form of networks is a way of being more efficient in the search for efficient results for companies, organizations, associations and even in problems of particular interest, at each moment gradually the number of Study requirements of this type of case are becoming more frequent, this research document tries to show an alternative way of finding a solution to problems that can be very complicated, since they can exponentially increase the modeling as a whole of equations and feasible spaces hence the importance of remembering interesting linear programming algorithms as a source of inspiration for the state of the art that allows it to be viewed by researchers as a useful tool in large-scale network problems, sometimes small prototypes can provide solutions of powerful in a simple way and without a high cost of implementation where creativity is the way to find search solutions.

NetSim - network simulator Experiment Manual for teaching & network lab experimentation

The emergence of nano-electromagnetic communications ba- sed on graphene nano-antennas has opened new perspec- tives for communications between small things, referred as to the internet of micro-things or even as the... more

The emergence of nano-electromagnetic communications ba-
sed on graphene nano-antennas has opened new perspec-
tives for communications between small things, referred as
to the internet of micro-things or even as the internet of
nano-things. However, these antennas make use of the Ter-
ahertz band which raises many problems like the absorption
of entire range of the available bandwidth by any molecule.
Meanwhile, recent advances have been made in the design
and fabrication of micro-robots enabling formation of micro-
robots networks. Nano-antennas are an interesting way of
communicating between micro-robots. We envision two types
of bene ts using integrated nano-antennas in micro-robots.
First, nano-wireless communications could enhance exist-
ing applications enabling a greater communication distance
in an ensemble and broadcasting facilities. Second, nano-
wireless communications can create new usage and new ap-
plications. This article presents a simulation framework for
micro-robots using nano-wireless communications and an
application being developed within our simulator.

A Mobile agent is " a program that is self-governing enough to act separately, even when the user or application that launched it is not available to provide guidance and handle errors ". In general terms, it is a program that acts in... more

A Mobile agent is " a program that is self-governing enough to act separately, even when the user or application that launched it is not available to provide guidance and handle errors ". In general terms, it is a program that acts in behalf of its owner. A mobile agent is an object that migrates through many nodes of a assorted network of computers, under its own control, in order to perform tasks using resources of these nodes. The mobility trait of a mobile agent implies operation thereof in untrustworthy environments, which introduces malicious host threats. Available literature have been studied, analyzed and discussed. The salient characteristics as well as the drawbacks of current solutions were isolated. Through this knowledge a dynamic mobile agent security framework was defined. The framework is based on the definition of multiple security levels, depending on type of deployment environment and type of application. A prototype was constructed and tested and it was found to be lightweight and efficient, giving developers. Insight into possible security threats as well as tools for maximum protection against malicious hosts. The framework outperformed other frameworks / models as it provides dynamic solutions without burdening a system with unnecessary security gadgets and hence paying for it in system cost and performance.

Heterogeneous Spacecraft Networks (HSNs) are network environments in which spacecraft from different missions and institutions can communicate with each other at low cost and with low impact on overall system resources. The Mission Design... more

Heterogeneous Spacecraft Networks (HSNs) are network environments in which spacecraft from different missions and institutions can communicate with each other at low cost and with low impact on overall system resources. The Mission Design Center (MDC) at NASA Ames Research Center has been studying solutions for low cost multi-spacecraft systems for a number of years. One may now build on the idea to interconnect clusters of spacecraft with each other to have them act as mobile nodes belonging to the same collaborative mission. Recent progress in small satellite technology is significant, and one of the advantages of small satellites lies precisely in the large quantity of spacecraft that can be produced at accessible costs. It follows naturally that small satellites are an interesting candidate platform for development and demonstration of the HSN concept. This paper is the second in a series of three companion papers. The general concept of operations for HSNs in LEO and a number of future applications are proposed in the first paper [6], while enabling technology such as devices and lower layer protocols are discussed in paper three [7]. In this paper, we pick up the scenario of a low-cost and multi-institutional network of Earth Observation (EO) missions in LEO and conduct network performance analysis using the AGI System Tool Kit (STK) and the open-source Network Simulator (NS-3). A multi-spacecraft network consolidates the individual capabilities of each spacecraft from different institutions by combining benefits of both frequent revisit and concentrated observation. Complementary and correlated data could be collected simultaneously from a large set of distributed spacecraft utilizing HSN capability. In this specific configuration, communication distance between spacecraft, related delays and error rate are the major factors in network performance. Also, average duration of communication opportunities between spacecraft is usually very limited. Thus, it is i- portant to simulate orbital dynamics, link margins, and protocols simultaneously to analyze network performances. In this paper, we compare some existing protocols to obtain a measure for the practical performance of the candidate network. We focus on best-effort data delivery, an approach necessitated by the severe constraints on communications resulting from low-cost and low system resource small spacecraft. In the application layer, we show that packet size and data rate of a source node also affect overall performance of the network. We present the resulting figures of merit from our simulations. The paper concludes with a summary of the simulation results.

Developing smart phone technologies and their applications cause increasing demand on high data rates. Users interest with social network platforms and they would like to share photos and videos. According to researches and telecom... more

Developing smart phone technologies and their applications cause increasing demand on high data rates. Users interest with social network platforms and they would like to share photos and videos. According to researches and telecom company reports about usage area of mobile data transfers, voice and data traffic are generated at indoor like home, office, restaurant etc. Mobile operators work out for supplying high data rates and increase their capacity and coverage area for indoor users who encountered with weak signal power. The one of the main works about that is decreasing the distance of mobile station and base station. Due to the decreasing of this distance, users have high data rate and in spite of the increasing number of base stations, operators have better coverage area and increase their capacity. Femtocell technology, which is also called home base stations, provides high data transfer rates and better coverage area for limited number of subscribers at indoor. Resulting of spectrum scarcity, operators have to share their spectrum with femtocells and they have to manage interference of existent systems and femtocells. The most important interference management approach is power control. In power control technique, transmit power consumption from mobile stations are arranged for mitigation of interference. In this thesis, game theoretic utility-based adaptive power control algorithm for uplink of femtocell networks is performed for mitigation of interference in two different ways. The first one is allocation of femtocell interference threshold in randomly activated femtocell base stations in a known macrocell coverage area and the second one is adaptation of the power of the femtocell users for mitigating total interference from femtocell users at the macrocell base station. Accordingly, we consider two different pricing schemes which are centralized pricing and de-centralized pricing for updating the power level at mobile station. In addition, we examined two different technologies which are frequency division multiple access (FDMA) and code DMA (CDMA). The results show that each active user at network could reach the given signal to interference plus noise ratio (SINR) threshold value with iterative power control algorithm and macrocell base station encountered with given interference threshold value with power control and user removal algorithms.

Networks are required for interconnection between one or more systems. A network can be composed of an infrastructure based system, this infrastructure system consists of a centralized base station. Cables are used as a medium for... more

Networks are required for interconnection between one or more systems. A network can be composed of an infrastructure based system, this infrastructure system consists of a centralized base station. Cables are used as a medium for connectivity between non-mobile nodes. Air is used as the medium for mobile nodes air is used. For delivery of data in mobile node source needs to know location of the destination and hence here comes the concept of routing protocol. WRP, DSR, AODV protocol are analysed for the performance based on matrices like average power consumed(APC), packet delivery rate(PDR) and Execution time. Keywords— Wireless Routing Protocol (WRP), Dynamic Source Routing (DSR), Ad-hoc on demand distance vector (AODV), Global Mobile Information System Simulator (Glomosim), Constant Bit Rate(CBR).

In telecommunications, 4G is the fourth generation of cell phone mobile communications standards. There are many features associated with 4G, which make it promising. On the other hand,new applications required to be supported by new... more

In telecommunications, 4G is the fourth generation of cell phone mobile communications standards. There are many features associated with 4G, which make it
promising.
On the other hand,new applications required to be supported by new mobile
systems include a variety; VoIP, video conference, multimedia messaging, multi-
player games, virtual private networks (VPN), etc.
All these applications require higher throughput, wider BW, smaller delay and
innovative transmission methods that will give higher spectral efficiency and good
quality.
Two leading emerging technologies are: LTE (Long Term Evolution standardized by third generation partnership project (3GPP) and WiMAX (the IEEE802.16e,
the worldwide interoperability for microwave access) are considered able to fulfil
the 4G requirements announced by ITU-R which is known as International Mobile
Telecommunications Advanced (IMT-Advanced)
In this project we will attempt to perform the system-level simulation of these
technologies (and also simulate at the link level wherever necessary) and compare
them on certain performance parameters by developing comparable 7-cell scenarios
for both LTE and WiMAX.
Actually, two types of simulations are possible-one on link-level and the other
on system level. Merging both increases computing complexity. Therefore we go
for certain abstractions and instead focus on system level simulation.
Future scope of both these technologies is enormous. Also, both the technologies have their own advantages and disadvantages. In future, a network may be
possible which combines the advantages of both these technologies.

Sometimes retracted or thoroughly refuted scientific information is used and propagated long after it is understood to be misleading. Likewise, sometimes retracted news items spread and persist, even after it has been publicly... more

Sometimes retracted or thoroughly refuted scientific information is used and propagated long after it is understood to be misleading. Likewise, sometimes retracted news items spread and persist, even after it has been publicly established that they are false. In this paper, we use agent-based models of epistemic networks to explore the dynamics of retraction. In particular, we focus on why false beliefs might persist, even in the face of retraction. We find that in many cases those who have received false information simply fail to receive retractions due to social dynamics. Surprisingly, we find that in some cases delaying retraction may increase its impact. We also find that retractions are most successful when issued by the original source of misinformation, rather than a separate source.

Nanowireless electro-magnetic communication networks in the Terahertz band have raised interest in the networking community these very last years. However, if detailed studies have been published on analytical modelling of... more

Nanowireless electro-magnetic communication networks in
the Terahertz band have raised interest in the networking community these very last years. However, if detailed studies have been published on
analytical modelling of these networks, no simulation have been run to
study in detail the characteristics of the transmission medium. We have
designed Vouivre, a standalone nanowireless simulator, which is interfaced
with two micro-robots simulator DPRSim and VisibleSim. This paper
describes briefly Vouivre and presents first metrics of the communication
channel using a communication paradigm called TS-OOK (Time Spread On-Off Keying).

This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of... more

This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of network protocols without disturbing protocol behavior. This is especially true for transport layer protocols where timing plays an important role. For deep analysis of protocol mechanisms, network simulation plays an essential role. This paper demonstrates a network simulator tool channel SimCast. This simulator focuses on the congestion control methods of the transport layer. Using this special purpose simulator, the effects of network topology and loss models can be investigated in detail. This paper presents a comparison of simulation results from SimCast to the output of other network simulators and real network measurements.

Computer networks support many of the services that our society relies on. Therefore, ensuring their resilience to faults and challenges, such as attacks, is critical. To do this can require the execution of resilience strategies that... more

Computer networks support many of the services that our society relies on. Therefore, ensuring their resilience to faults and challenges, such as attacks, is critical. To do this can require the execution of resilience strategies that perform dynamic reconfiguration of networks, including resilience-specific functionality. It is important that resilience strategies are evaluated prior to their execution, for example, to ensure they will not exacerbate an on-going problem. To facilitate this activity, we have developed a toolset that supports the evaluation of resilience strategies that are specified as event-driven policies. The toolset couples the Ponder2 policy-based management framework and the OMNeT++ simulation environment. In this paper, we discuss the network resilience problem and motivate simulation as a suitable way to evaluate resilience strategies. We describe the toolset we have developed, including its architecture and the implementation of a number of resilience mechanisms, and its application to evaluating strategies that detect and mitigate Internet worm behaviour.

This article describes sadharanikaran model of communication (SMC) and outlines its fundamentals. The article initially discusses the concept of ‘sadharanikaran' as conceived in Hindu poetics acknowledging its relevance for the modern... more

This article describes sadharanikaran model of communication (SMC) and outlines its fundamentals. The article initially discusses the concept of ‘sadharanikaran' as conceived in Hindu poetics acknowledging its relevance for the modern discipline of communication. And, it also presents an account of the background upon which the model was developed and proposed. The descriptive part of the article is primarily indebted to Natyashastra and Vakyapadiya

This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of... more

This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of network protocols without disturbing protocol behavior. This is especially true for transport layer protocols where timing plays an important role. For deep analysis of protocol mechanisms, network simulation plays an essential role. This paper demonstrates a network simulator tool channel SimCast. This simulator focuses on the congestion control methods of the transport layer. Using this special purpose simulator, the effects of network topology and loss models can be investigated in detail. This paper presents a comparison of simulation results from SimCast to the output of other network simulators and real network measurements.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.

Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can... more

Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.

Rising consumption of on-demand video streaming content has triggered significant research efforts to provide good quality content delivery with low wait-times for users while playback. Since, most internet-based streaming services use... more

Rising consumption of on-demand video streaming content
has triggered significant research efforts to provide good
quality content delivery with low wait-times for users while
playback. Since, most internet-based streaming services use
HTTP that runs on the Transmit Control Protocol (TCP), our
focus is on providing low end-to-end delay while streaming
video with TCP as the transport layer. To that end, a random
linear coding-based set of enhancements to TCP’s flow control
called ”Variable Bucket Size Network Coding (VBNC)”
are proposed and the impact of those modifications across
different routing protocols are studied for mobile ad-hoc networks
(MANETs). The VBNC enhancements to TCP address
the issue of TCP’s agnostic flow control with respect to the
arriving traffic at the source and also handle the conservative
approach towards flow control. The proposed algorithm
has been implemented in ns-3 and the system performance is
compared from the perspective of congestion window evolution,
video end-to-end delay and video goodput. Our evaluation
shows that without significant changes in the network
stack, our algorithm is compatible with the currently widely
used OLSR and AODV routing protocols and offers almost a
100% improvement in video goodput over TCP New Reno.

Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires... more

Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different access technologies with IP-based QoS. Policy-Based Network Management (PBNM) is one approach that could be employed to address this challenge. Hence, a policy-based framework for end-to-end QoS management in converged networks, CNQF (Converged Networks QoS Management Framework) has been proposed within our project. In this paper, the CNQF architecture, a Java implementation of its prototype and experimental validation of key elements are discussed. We then present a fuzzy-based CNQF resource management approach and study the performance of our implementation with real traffic flows on an experimental testbed. The results demonstrate the efficacy of our resource-adaptive approach for practical PBNM systems.

Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can... more

Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.

Simulation and analysis of video transmission in NS-2 is a challenging task because of limited resources available and as a result of this the video quality will be degraded. In this paper we are trying to simulate video transmission in... more

Simulation and analysis of video transmission in NS-2 is a challenging task because of limited resources available and as a result of this the video quality will be degraded. In this paper we are trying to simulate video transmission in an IEEE 802.11 multihop network using the chain network. Multiple video streaming is compared and analysed with various factors and efficiency is recorded. Analysis is done for various protocols such as AODV, DSR, AOMDV and DSDV and in each case the results are recorded. From the evaluation results it is clearly understood that the performance varies with the protocol and AODV had better results as compared to other protocols.

Recent advances in Intelligent Transportation Systems and rapid development of applications in this field have attracted many researchers. In this paper we initially describe different source coding techniques for reliable packet delivery... more

Recent advances in Intelligent Transportation Systems and rapid development of applications in this field have attracted many researchers. In this paper we initially describe different source coding techniques for reliable packet delivery reasoning with incompatibility of TCP over wireless links. We use the concept of source encoding, optimistic routing techniques, along with STAR vehicles concept introduced in [25] which are very realistic, study the effect of these STAR vehicles over decrease in overhead, probability of successful packet transmission over different densities of distribution of vehicles. We finally compare proposed scheme with Code Torrent scheme in [24].

In this thesis, we discuss and evaluate M2MShare, a DTN solution for mobile phones that leverages on nodes’ mobility and opportunistic contacts to enable proximity based file sharing. To this aim, we have integrated M2MShare in the... more

In this thesis, we discuss and evaluate M2MShare, a DTN solution for mobile phones that leverages on nodes’ mobility and opportunistic contacts to enable proximity based file sharing. To this aim, we have integrated M2MShare in the Opportunistic Network Environment (ONE) simulator and tested its performance with realistic movement models in a map-based environment.
This complex city-scale testbed includes a multitude of nodes
representing real users engaged in their daily activities and movements, and allowed us to demonstrate the efficacy of M2MShare.