Modelling and Simulation of communication networks Research Papers (original) (raw)
2025, EURASIP Journal on Wireless Communications and Networking
More and more devices are becoming wirelessly connected. Many of these devices are operating in crowded unlicensed bands, where different wireless technologies compete for the same spectrum. A typical example is the unlicensed ISM band at... more
More and more devices are becoming wirelessly connected. Many of these devices are operating in crowded unlicensed bands, where different wireless technologies compete for the same spectrum. A typical example is the unlicensed ISM band at 2.4 GHz, which is used by IEEE 802.11bgn, IEEE 802.15.4, and IEEE 802.15.1, among others. Each of these technologies implements appropriate Media Access Control (MAC) mechanisms to avoid packet collisions and optimize Quality of Service. Although different technologies use similar MAC mechanisms, they are not always compatible. For example, all CSMA/CA-based technologies use Clear Channel Assessment (CCA) to detect when the channel is free; however, in each case it is specifically designed to improve detection reliability of the specific technology. Unfortunately, this approach decreases the detection probability of other technologies, increasing the amount of cross-technology collisions. In this article, we introduce the concept of coexistence aware CCA (CACCA), which enables a node operating in one technology to backoff for other coexisting technologies as well. As a proof of concept, we analyze the Packet Error Rate(PER) incurred by an IEEE 802.15.4 network in the presence of IEEE 802.11bg interference, and assess the PER reduction that is achieved by using CACCA.
2025, HAL (Le Centre pour la Communication Scientifique Directe)
sensing channel and new sensor device models. The proposed architecture is generic so it can be reused for any simulation platform. The performance evaluation is based on one of the typical WSN applications: local area protection, where... more
sensing channel and new sensor device models. The proposed architecture is generic so it can be reused for any simulation platform. The performance evaluation is based on one of the typical WSN applications: local area protection, where sensor nodes are densely scattered in an access regulated area in order to detect, identify and report non authorized accesses to a base station for analysis. Two networks topologies using different protocol stacks are investigated. Their performance evaluation is presented in terms of reliability and latency.
2025
Makalah ini membincangkan dan menganalisis skim kawalan kesesakan yang berbeza untuk rangkaian-rangkaian aktif dan mencadangkan rangkaian baru. Skim yang dicadangkan mengenai satu keseimbangan antara bilangan kesilapan yang... more
Makalah ini membincangkan dan menganalisis skim kawalan kesesakan yang berbeza untuk rangkaian-rangkaian aktif dan mencadangkan rangkaian baru. Skim yang dicadangkan mengenai satu keseimbangan antara bilangan kesilapan yang dipertimbangkan dan masa menunggu sebelum mengambil tindakan. Skim yang dilaksanakan bertindak ke atas konsep "Choke packet", iaitu sumber tersebut diarahkan untuk mengurangkan kadar transmisi. Pengurangan kadar transmisi yang munasabah dikekalkan pada sumber tersebut sambi! nod perantaraan dalam pelantar jaringan aktif bertindak sebagai ganti biasanya nod matlamat bertindak. Skim yang dicadangkan disimulasi menggunakan OPNET dan keputusan simulasi dilaporkan. Keputusan menunjukkan bahawa teknik pelindapan sumber dilaksanakan dalam nod perantaraan jaringan aktif mengurangkan kesesakan secara drastik dan memperbaiki keseluruhan prestasi jaringan.
2025
It is widely known that energy efficiency is very important in wireless sensor networks (WSN). As a result, a common protocol design guideline has been to trade off some performance metrics such as throughput and delay for energy, which... more
It is widely known that energy efficiency is very important in wireless sensor networks (WSN). As a result, a common protocol design guideline has been to trade off some performance metrics such as throughput and delay for energy, which also goes well in line with many WSN applications. However, there are other applications with real-time constraints, such as those involved in surveillance or control loops, for which WSN still need to be energy efficient but also need to provide better performance, particularly latency and jitter. This article presents LEMR, a cross-layer design-based communication stack that not only preserves the energy efficiency of current alternatives but also coordinates the transfer of packets from source to destination in such a way that latency and jitter are improved considerably. Coordination is based on hop-distance to the sink, a new MAC layer, and physical layer information. Our approach adopts the Clear Channel Assessment (CCA) and Low Power Listening...
2025
This paper studies the main performance characteristics of the SCP protocol, a medium access control protocol for sensor networks (WSN). SCP-MAC was designed taking into account the characteristics of energy shortage and processing... more
This paper studies the main performance characteristics of the SCP protocol, a medium access control protocol for sensor networks (WSN). SCP-MAC was designed taking into account the characteristics of energy shortage and processing capacity of the sensor nodes and seeks to reduce the consumption of energy at the expense of other performance parameters such as delay, flow and bandwidth. Our contributions through this work are the following: first, a physical layer model corresponding to the radio transmitter/receiver CC2420 was implemented in Qualnet®, including a model of energy consumption and a model of the SCP protocol based on the specifications of the authors; second, a detailed performance analysis of the protocol was made based on different metrics.
2025
The performance characteristics of Wi-Fi networks have traditionally been studied and analysed using analytical models and simulations. Due to the complexity of wireless communication the existing analytical Wi-Fi network models rely on... more
The performance characteristics of Wi-Fi networks have traditionally been studied and analysed using analytical models and simulations. Due to the complexity of wireless communication the existing analytical Wi-Fi network models rely on certain network constraints and simplifications in order to be mathematically tractable. We set out to evaluate the practicality of using Wi-Fi performance models to estimate network performance by collecting the model necessary parameters directly from an access point. In order to evaulate, we must also collect network metrics, such as packet payload size and number of nodes, for comparison with the model parameters. We explore different venues to collect these parameters and metrics to find out if it is practical to apply the models in Wi-Fi networks. After performing three attempts, we conclude that this is difficult due to several aspects in the Linux kernel, such as batching optimization patterns, proprietary kernel modules and firmware blobs. W...
2025
This paper presents a review on energy efficient WiseMAC Protocol for wireless sensor networks. Among various MAC layer protocol WiseMAC is a known as one of the most energy efficient protocol. Non-persistent carrier sense multiple access... more
This paper presents a review on energy efficient WiseMAC Protocol for wireless sensor networks. Among various MAC layer protocol WiseMAC is a known as one of the most energy efficient protocol. Non-persistent carrier sense multiple access (np-CSMA) and the preamble sampling technique are the main techniques used in basic WiseMAC protocol, they are used to reduce the consumption of power when energy is wasted in listening to idle medium. Here we investigate the WiseMAC protocol with the different important schemes that used in implementation of WiseMAC in sensor networks, these schemes are basically emphasizing on energy saving methods in WiseMAC, various modifications are done in original WiseMAC to make them more energy efficient; with the same motive of more energy efficiency, we propose adaptive WiseMAC protocol with dynamic duty cycle and the adaptive Contention Window.
2025
This paper presents a development of an Emulation Network Analyzer for heterogeneous services in campus environment. We propose a framework and implementation named ENA that models the network behavior of heterogeneous environment. The... more
This paper presents a development of an Emulation Network Analyzer for heterogeneous services in campus environment. We propose a framework and implementation named ENA that models the network behavior of heterogeneous environment. The purpose of this paper is to inform potential tool of analyzing the network in campus environment by providing an overview of the capabilities of ENA tool. For
2025
The development of PDPs is a hard task because currently there is not a widely accepted set of protocols to implement the communication between PDPs and other elements of the PBNM solutions. This paper presents a framework to support the... more
The development of PDPs is a hard task because currently there is not a widely accepted set of protocols to implement the communication between PDPs and other elements of the PBNM solutions. This paper presents a framework to support the development of PDPs in order to easy the time spent in coding new ones. The framework is based on the IETF approach for policies, which helps in the dissemination of the IETF view of policies.
2024, International Conference on Software, Telecommunications and Computer Networks
In order to be strongly connected in the network, a node may increase its power indiscriminately causing interference. Since interference is one of the major problems in wireless network, the proposed algorithm will co-operatively reduce... more
In order to be strongly connected in the network, a node may increase its power indiscriminately causing interference. Since interference is one of the major problems in wireless network, the proposed algorithm will co-operatively reduce inter-node interference in the network. Further, unidirectional links are a major source of interference as most of the routing protocol only utilizes bi-directional links. The algorithm will attempt to prevent such links or if required convert them into bi-directional links. The proposed algorithm is generic network layer power management algorithm and does not use special functionality of any routing protocol. Therefore, it can be applied to any routing protocol. Different routing protocols such as Dynamic Source Routing (DSR) in reference [3], Any Path Routing without Loops (APRL), Ad hoc On-Demand Distance Vector (AODV), On-demand Multicast Routing Protocol (ODMRP) and System-and Traffic-dependent Adaptive Routing Algorithm (STARA) in reference have been used by the authors to prove their concept. To demonstrate the performance and the capability of the proposed algorithm, we have applied it to Optimized Link-State Routing (OLSR) protocol as an example of a typical routing protocol. We will show that the proposed algorithm provides strongly connected and more reliable network over dynamic physical channel modeled by log-distance path loss model, log-normal shadowing model and rayleigh fading model. It stabilizes node connectivity over the dynamic network and environment and even, to a certain extent, prevent node from being completely disconnected from the network. For the selected simulation environment, we will show that the proposed algorithm provides a shorter packet delay, improves the network throughput by as much as 37%, decreases the routing overhead and reduces interference. In this paper, we will show that the proposed distributed power management algorithm adapts well in dynamic network topology and physical environment and provides a more reliable and strongly connected network. The related works in power control are listed in Section II. Section III describes the proposed distributed power management algorithm. Propagation models are surveyed and the reasons for selecting log-distance path loss, log-normally distributed shadowing and rayleigh fading models are stated in Section IV. A brief description of OLSR protocol is presented in Section V. Section VI and VII presents the simulation parameters and results. Section VIII concludes the paper.
2024
Jatinder Pal Singh, Love Kumar Department of ECE, DAVIET, Jalandhar, Punjab, INDIA ________________________________________________________________________________________ Abstract: The sensors are used to sense and convert the one... more
Jatinder Pal Singh, Love Kumar Department of ECE, DAVIET, Jalandhar, Punjab, INDIA ________________________________________________________________________________________ Abstract: The sensors are used to sense and convert the one physical quantity to another quantity and when these sensors are attached with processing devices and connecting through a network, it becomes as a wireless sensor network technology. The sensor network is the combination of sensor nodes and all the sensor nodes are battery operated. The battery replacement or recharging is difficult, so power consumption is the major issue for wireless sensor networks with modulation techniques such as MSK and OQPSK16 and routing techniques such as Converge cast Routing Technique (CRT) and Dummy Routing Technique (DRT) [7]. In this paper power analysis has been reported for both modulation techniques in static and mobile wireless sensor networks. Experiment is performed for 802.15.4 physical layer energy consumption with...
2024
Packet collisions and their resolution create a performance bottleneck in random access LA\' s. A hardware solution to this problem is to u.~e collision avoidance switches [1, 2]. Collision avoidance switches allow the implementation of... more
Packet collisions and their resolution create a performance bottleneck in random access LA\' s. A hardware solution to this problem is to u.~e collision avoidance switches [1, 2]. Collision avoidance switches allow the implementation of fandom access protocols without the penalty of collisions among packets. In this paper, we describe a design and implementation of a local area network ;:i rchi tecture based on collision avoidance, called the Collision Avoidance Multiple Broadcast (CA:\IB) tree netv.;ork. Our implementation includes CA.MB tree switches, station/network interface boards, and support of transport protocols. Our implementation of the CAME tree network follows the protocol layering architecture of the IEEE 802 local area networks.
2024
To solve a performance bottle neck in random access LANs due to packet collisions and their resolution, collision avoidance switches are introduced. These switches allow random access protocols to achieve high performance by resolving... more
To solve a performance bottle neck in random access LANs due to packet collisions and their resolution, collision avoidance switches are introduced. These switches allow random access protocols to achieve high performance by resolving collisions among packets. A conventional hardware implementation of these switches is the use of TTL chips. In this implementation; a handful of TTL chips are required to forma single switch (e.g., 18 TTL chips are needed for an implementation of the CAMB switch [7]). Thus, implementation of a complete network, which requires severa! of these switches, could very well result in a large and complex hardware system. Today's modern chip technology allows us to pack large quantity of logic in a single chip. By transferring the conventional implementation of the collision avoidance switches into a VLSI chip, the complexity of the resultant hardware is greatly reduced, not to mention the improvement in hardware performance and ease of packaging. This report provides an overall study of the collision avoidance protocols for the tree LANs with emphasis on the implementation of collision avoidance switches. Hardware implementations of sorne of these switches are discussed. And a VLSI implementation of the CAMB switch protocol is introduced.
2024
I would like to thank my supervisor Prof. Viktoria Fodor for her valuable comments and supports. I would like to thank my family in Addis Ababa for their continuous support in my whole two year study in Sweden. Finally I would like to... more
I would like to thank my supervisor Prof. Viktoria Fodor for her valuable comments and supports. I would like to thank my family in Addis Ababa for their continuous support in my whole two year study in Sweden. Finally I would like to thank my friends Asmeret, and Nur who lived with me in the same corridor for the last two years and provided me all the support that I needed.
2024
Analysing performance of transmitting data from a source to a certain destination is an interesting task. One of the most reliable networking protocol suites is the Transport Control Protocol and the Internet Protocol (TCP/IP), which will... more
Analysing performance of transmitting data from a source to a certain destination is an interesting task. One of the most reliable networking protocol suites is the Transport Control Protocol and the Internet Protocol (TCP/IP), which will be studied against a new management paradigm called Software Defined Networking (SDN). SDN is an emerging programmable network architecture, where network control plane is decoupled from forwarding plane. SDN forwarding methods are based on flows, which operate in contrast to conventional routing methods, such as TCP/IP routing table and MAC learning table. Moreover, OpenFlow protocol has efficient forwarding methods to push L2-L4 functions which are simplified into a Flow-Table(s) abstraction. This paper discusses the relationship between the processes of forwarding packets in conventional IP routing table vs. OpenFlow-table and evaluates the performance between both implementations using INET framework in OMNeT++. While TCP performs slightly better than OpenFlow with respect to mean round trip time (RTT). The results also proved the correctness of OpenFlow implemented simulation model. Finally, we propose a Distributed Active Information Model (DAIM) within OpenFlow to support an autonomic network management.
2024
Analysing performance of transmitting data from a source to a certain destination is an interesting task. One of the most reliable networking protocol suites is the Transport Control Protocol and the Internet Protocol (TCP/IP), which will... more
Analysing performance of transmitting data from a source to a certain destination is an interesting task. One of the most reliable networking protocol suites is the Transport Control Protocol and the Internet Protocol (TCP/IP), which will be studied against a new management paradigm called Software Defined Networking (SDN). SDN is an emerging programmable network architecture, where network control plane is decoupled from forwarding plane. SDN forwarding methods are based on flows, which operate in contrast to conventional routing methods, such as TCP/IP routing table and MAC learning table. Moreover, OpenFlow protocol has efficient forwarding methods to push L2-L4 functions which are simplified into a Flow-Table(s) abstraction. This paper discusses the relationship between the processes of forwarding packets in conventional IP routing table vs. OpenFlow-table and evaluates the performance between both implementations using INET framework in OMNeT++. While TCP performs slightly better than OpenFlow with respect to mean round trip time (RTT). The results also proved the correctness of OpenFlow implemented simulation model. Finally, we propose a Distributed Active Information Model (DAIM) within OpenFlow to support an autonomic network management.
2024, IEEE International Mediterranean Conference on Communications and Networking – MeditCom 2024
Given the proliferation of connected devices and the prioritization of real-time data acquisition across various scenarios, enhancing the energy efficiency within Wireless Sensor Networks (WSNs) is of paramount importance. This work has... more
Given the proliferation of connected devices and the prioritization of real-time data acquisition across various scenarios, enhancing the energy efficiency within Wireless Sensor Networks (WSNs) is of paramount importance. This work has focused on the IEEE 802.15.4 standard and addresses existing medium access control protocols such as CSMA or Slotted ALOHA and proposes refinements in the Slotted ALOHA protocol through incorporating techniques like Binary Exponential Backoff (BEB) and Q-learning. These enhancements have demonstrated to be promising in terms of average delay reduction, energy efficiency and bolstered network throughput. As it facilitates more efficient energy management it constitutes a robust alternative to conventional CSMA in WSN MAC sub-layer protocols.
2024
Content transfer without any prior knowledge of the routes, always causes a challenge in opportunistic networks. Content forwarding in these networks have repercussions in the form of communication cost. Enhancement in content forwarding... more
Content transfer without any prior knowledge of the routes, always causes a challenge in opportunistic networks. Content forwarding in these networks have repercussions in the form of communication cost. Enhancement in content forwarding in opportunistic networks can be realized by targeting key nodes that show high degree of influence, popularity or knowledge inside the network. Based on these observations, this paper presents an improved version of Lobby Influence algorithm called Enhanced Lobby Influence. The forwarding decision of Enhanced Lobby Influence not only depends on the intermediate node selection criteria as defined in Lobby Influence but also based on the knowledge of previously direct content delivery of intended recipient. The experimental results have shown that the new algorithm performed extremely well against its predecessor Lobby Influence and illustrates that not only it reduces the communication cost but at the same time makes content delivery efficient for intended recipients.
2024, ACM SIGMOBILE Mobile Computing and Communications Review
Opportunistic routing schemes that exploit the broadcast nature of wireless transmissions for selecting the best next-hop at that instant among a set of candidates are being actively explored [1-3]. These schemes which we refer to as... more
Opportunistic routing schemes that exploit the broadcast nature of wireless transmissions for selecting the best next-hop at that instant among a set of candidates are being actively explored [1-3]. These schemes which we refer to as opportunistic any-path forwarding (OAPF), reduce the number of transmissions needed for reliable packet delivery.
2024, Lecture Notes in Computer Science
Due to the significant increase of peer-to-peer (P2P) traffic in the past few years, more attentions are put on designing effective methodologies of monitoring and identifying P2P traffic. In this paper, we propose a novel approach to... more
Due to the significant increase of peer-to-peer (P2P) traffic in the past few years, more attentions are put on designing effective methodologies of monitoring and identifying P2P traffic. In this paper, we propose a novel approach to measure and discover the special characteristics of P2P applications, the periodic behaviors, from the packet traces. We call this the "periodic behavioral spectrum" (PBS) of P2P applications. This new finding, learning the characteristics of P2P traffic from a new angle, could enhance our understanding on P2P applications. To show the effectiveness of our approach, we not only provide justifications as to why P2P applications should have some inherent periodic behaviors, but also conduct hundreds of experiments of applying the approach on several popular P2P applications.
2024, Al-Khwarizmi Engineering Journal
Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing,... more
Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kernel-based fuzzy C-means clustering algorithm (KFCM) is adopted to cluster sensor nodes, while a cluster head (CH) is selected for each cluster based on a fuzzy logic system. Results depicts that the new work performs better than the existing algorithm...
2024, CSIT (March 2015) 3(1):45–58
Advanced metering infrastructure (AMI) is an important and integral component of Smart Grid. AMI requires a two way communication network to connect metering and load control endpoints spread over the residential area with the head end... more
Advanced metering infrastructure (AMI) is an important and integral component of Smart Grid. AMI requires a two way communication network to connect metering and load control endpoints spread over the residential area with the head end system. The most challenging part of AMI is to design this last leg of communication network which reliably and securely fulfills the requirement of the coverage, latency, scalability and compliance to country specific standards and regulations at the right cost. RF mesh technology is a proven way to implement the AMI network and this has been proven in the USA where the RF mesh networks have been functioning satisfactorily for more than a decade in the sub 1 GHz Industrial, Scientific and Medical (ISM) band with an available bandwidth of 26 MHz. In comparison, India has a narrow ISM bandwidth of only 2 MHz, which raises a doubt on achievement of AMI functionality within this constrained bandwidth. To carry out a high level feasibility for India, the relevant AMI data load and throughput requirements were estimated on the basis of data collected from published work and also through a survey involving Indian experts from utilities, regulatory bodies and metering companies. Based on the Pareto analysis of the estimated AMI data, the use case of 'interval data push' by the residential meters was considered for network simulation in a real world scenario of RF mesh AMI network. Utilizing only 20 % of the network capacity, for the estimated AMI data throughput of about 20 MB/day, the simulation exercise resulted in an estimate of size of network accommodating about 4800 endpoints per collector based on the acceptable latency of 5 s per hop.
2024
The modern era of photovoltaics (PV) really started with the "Bell Telephone Discovery" that was announced in 1954. This marked reaching levels of PV conversion efficiencies in the 6 % range that was considered a turning-point for... more
The modern era of photovoltaics (PV) really started with the "Bell Telephone Discovery" that was announced in 1954. This marked reaching levels of PV conversion efficiencies in the 6 % range that was considered a turning-point for application purposes. Most of the pioneers of that era have passed away. In late 2022, our PV community lost one of its more ardent backers and a scientist who not only helped usher in the important Bell Discovery as part of that team, but also led the first PV commercial efforts at Hoffman Electronics that resulted in the PVpowering of the first solar satellite, Vanguard I. This space-event marked the first major market for this technology-and provided some of the first proof-of-concepts that led to the current amazing PV electricity reality here on earth. This is to remember that true PV pioneer-Dr. Morton B. Prince. Dr. Prince's career and PV interests spanned more than 7 decades-during which he had leadership roles in research, technology development, commercialization, and government decision making. He certainly interacted with, enhanced, and influenced the careers and work of many of the PV "movers and shakers" that have brought this technology to its beyond-TW levels today worldwide. Even recently, Mort kept interest in PV progress. In the past couple years (in his mid-90s!), he even marveled at the progress of the perovskite technologies-noting that PV has always demonstrated its ability to provide new tipping points toward the next generations of devices through its incredible PV research foundations and talents. These foundations based some of its origins in his own works at Bell Telephone Laboratories and Hoffman Electronics. Mort always noted that he was surrounded by many talented scientists and engineers (Eugene Ralph, Martin Wolf, Peter Iles, Bernd Ross, Hans Rauchenbach-and certainly that Bell Trio of Pearson, Chapin, and Fuller) that helped launch his own distinguished career. Mort Prince has been underrecognized for his contributions to our solar technologies. He was a humble person, despite his recognized status on the international research and development levels. He was an eminent scientist, technical leader, and an ardent ambassador for PV's future. It is a future that he helped to found and nurture. Mort Prince was a professional, a member of the IEEE (Fellow), APS, ASES, and ISES. While at Bell Labs, Mort presented one of the first technical conference papers on the operation and performance of the Bell cell at the pioneering World Conference on Solar Energy in Phoenix, Arizona, in October-November 1955. The International Solar Energy Society and the American Solar Energy Society trace their origins to this first world solar technical meeting and exhibit. Some recollections Mort Prince's early career are included with the photo anthology at the end of this paper. It is noted that most of these images were provided to the author by Mort. A synopsis of Mort's pioneering PV publications and patents is also provided.
2024, Procedia Computer Science
Major modern day computing and communication rely upon the underlying network used for data transportation. A strong and robust network is a prerequisite for communication oriented applications. One kind of communication networks... more
Major modern day computing and communication rely upon the underlying network used for data transportation. A strong and robust network is a prerequisite for communication oriented applications. One kind of communication networks transportation known as Mobile ad hoc Networks (MANET) have been discussed in this paper and work has been done on their capability enhancement. Mobile ad hoc networks have evolved when fixed communication infrastructure is not available single wireless communication channel which limits their capacity a limitation can be resolved using multiple physical communication invented to incorporate multi-channel communication capabilities in wireless cons. In this paper a novel multi-channel wireless communication framework has been presented together with associated techniques and mechanisms. The proposed framework and protocols have been rigorously teste existing benchmarked multi-channel ad hoc network protocols
2024, International Journal of Modeling and Optimization
The scientific paper presenting theoretical and practical research results from Mechatronics and Cyber-Mix Mechatronics Engineering applied in industrial, economical and societal environments as well as the future trends of Claytronics.... more
The scientific paper presenting theoretical and practical research results from Mechatronics and Cyber-Mix Mechatronics Engineering applied in industrial, economical and societal environments as well as the future trends of Claytronics. Thus, the motivation of the scientific work is mainly the motivation of mechatronic and cyber-mechatronic engineering expressed by the concepts, architectures, new achievements of mechatronic and cyber-mechatronic intelligent systems for the automotive industry (already implemented at SC Automobile Renault-Dacia SA Pitesti, SC Auto Components SA Topoloveni, etc.), for measuring and controlling auto parts, moulded parts (carter, cylinder, etc.) and type of machined parts (taps, etc.). In addition, on the basis of a study of advanced world research, the mechatronics and cyber-micromechatronics evolution towards a new science and high-tech engineering integrated in Claytronics is presented, being able to generationally revolutionize design and future engineering for the future.
2024, Eastern-European Journal of Enterprise Technologies
A b d u l m a l i k A d i l A b d u l z a h r a Master of Information Technology* N a g h a m M u m t a z K u d h a i r
2024, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733)
In order to achieve high capacity packet transmissions in wireless ad hoc networks, the system throughput for a connectionless, distributed channel accessing scheme exploiting joint detection receivers is proposed and analyzed. Joint... more
In order to achieve high capacity packet transmissions in wireless ad hoc networks, the system throughput for a connectionless, distributed channel accessing scheme exploiting joint detection receivers is proposed and analyzed. Joint detection allows many concurrent, asynchronous packet transmissions to occur, thereby enhancing the capacity of a system. A novel packet format with physical layer header's containing an additional code identifier (CID) field as proposed in [2] is employed and CSMA is used for the physical layer header (PLH) of the packet. The data portion of each packet is spread by a unique random binary signature sequence identified by the code identifier field (CID) which allows joint detection of the asynchronous, overlapping packets. A comparison of using CSMA and Aloha multiple access for the PLH is made for a bimodal packet length distribution typical in TCP traffic. Further, an upper bound on the throughput capacity considering the proposed channel accessing schemes is given indicating a significant improvement of system and network throughput is possible with respect to conventional methods.
2024, INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Attendance is one of the important factors that determine the students activity in any educational organizations. Taking attendance manually is considered as a huge task, even if, it was done using traditional methods such as barcode or... more
Attendance is one of the important factors that determine the students activity in any educational organizations. Taking attendance manually is considered as a huge task, even if, it was done using traditional methods such as barcode or smart card technologies leading to congestion and waste of time. The motivation of this papper is to simulate the wireless sensors network of a smart university (UOT) campus using OMNeT++ inorder to enhance the total power consumption of wireless nodes using several nodes scheduiling algorthim . The proposed system has been tested, and the results show that, the processing load of central server is decreased and the total transmission load over the wireless network also enhanced with value of 83%. Different experiments applied over distributed ZigBee wireless nodes in order to enhance network parameters .finally, the network parameters such as total power capacity and number of received packets had been improved using a linear queue node scheduling...
2024
Worm origin identification and propagation path reconstruction are among the essential problems in digital forensics. Until now, several methods have been proposed for this purpose. However, evaluating these methods is a big challenge... more
Worm origin identification and propagation path reconstruction are among the essential problems in digital forensics. Until now, several methods have been proposed for this purpose. However, evaluating these methods is a big challenge because there are no suitable datasets containing both normal background traffic and worm traffic to evaluate these methods. In this paper, we investigate different methods of generating such datasets and suggest a technique for this purpose. ReaSE is a tool for the creation of realistic simulation environments. However, it needs some modifications to be suitable for generating the datasets. So we make required modifications to it. Then, we generate several datasets for Slammer, Code Red I, Code Red II and modified versions of these worms in different scenarios using our technique and make them publicly available.
2024, Springer eBooks
We study solutions to a source discovery problem defined in the framework of providing time-critical context-aware services over a Peer-to-Peer communication paradigm. The proposed mechanisms, which take place in ubiquitous computing... more
We study solutions to a source discovery problem defined in the framework of providing time-critical context-aware services over a Peer-to-Peer communication paradigm. The proposed mechanisms, which take place in ubiquitous computing environments, exploit the locality of reference properties exhibited by context usage patterns, with efficient means provided by Active Networks. Simulation results show that the new methods reduce network traffic while they maintain the good search time of flood broadcasting methods.
2024, Lecture Notes in Computer Science
We study solutions to a source discovery problem defined in the framework of providing time-critical context-aware services over a Peer-to-Peer communication paradigm. The proposed mechanisms, which take place in ubiquitous computing... more
We study solutions to a source discovery problem defined in the framework of providing time-critical context-aware services over a Peer-to-Peer communication paradigm. The proposed mechanisms, which take place in ubiquitous computing environments, exploit the locality of reference properties exhibited by context usage patterns, with efficient means provided by Active Networks. Simulation results show that the new methods reduce network traffic while they maintain the good search time of flood broadcasting methods.
2024, Sensors
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
2024, Computer Communications
Several efficient reliable broadcast protocols were developed and implemented on broadcast LANs. To enhance the amount of bandwidth available per node on a shared media LAN, such as 10 Mb/s Ethernet, there is a rapidly growing use of LAN... more
Several efficient reliable broadcast protocols were developed and implemented on broadcast LANs. To enhance the amount of bandwidth available per node on a shared media LAN, such as 10 Mb/s Ethernet, there is a rapidly growing use of LAN switches to interconnect independent LAN segments to form an extended LAN (E-LAN). The existing reliable broadcast protocols may be inefficient in E-LANs because the LAN switch in an E-LAN transmits both broadcast and multi-cast traffic on all the segments. However, in many group applications group members may be present only on few segments. In this article, we propose some reliable broadcast protocols (RBPs) that are designed to work efficiently in multi-switch E-LANs based on the class of programmable switches. This is achieved by judiciously adding functionality to the switches. Using simple deterministic models, we study the performance characteristics of our switched RBPs. We show that they are more efficient than the existing RBPs over a wide range of conditions.
2024, KSII Transactions on Internet and Information Systems
The low-rate (LR) UWB is a promising technology for the ubiquitous sensor network (USN) due to its extremely low power consumption and simple transceiver implementation. However the limited communication range is a bottleneck for its... more
The low-rate (LR) UWB is a promising technology for the ubiquitous sensor network (USN) due to its extremely low power consumption and simple transceiver implementation. However the limited communication range is a bottleneck for its widespread use. This paper deals with a new frame structure of class 4 active RFID multi-hop relay system based on ISO/IEC 18000-7 standard integrating with IEEE 802.15.4a LR-UWB PHY layer specification, which sets up a connection to USN. As a result of the vital importance of the coverage and throughput in the application of USN, further we analyze the performance of the proposed system considered both impulse radio UWB (IR-UWB) and chirp spread spectrum (CSS). Our simulation results show that the coverage and throughput are remarkably increased.
2024
In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 networks. The main goal is to improve the global throughput which is basically insufficient to satisfy high bandwidth requirements for applications... more
In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 networks. The main goal is to improve the global throughput which is basically insufficient to satisfy high bandwidth requirements for applications like monitoring or traffic control. The solution is based on the availability of multiple channels on current low-cost, low-energy radio transceivers, which can be easily tuned dynamically to different frequencies. This possibility can be exploited to increase the number of simultaneous transmissions on adjacent links. The allocation of the different channels is centralized and distributed by the coordinator thanks to a function designed to compute the channel offset between two successive children routers. In the nodes, the switching process between the transmission and the reception channels is triggered starting from the PHY primitive available on the transceiver. We have implemented the multichannel capability foe 802.15.4 MAC with multichannel interface to aodv protocol. The channel allocation conditions are observed by considering different scenarios. The performance is compared with single channel 802.15.4. The simulation results shows that the proposed protocol improves the global throughput by a factor between 2 and 5, depending on the scenario, compared to the single-channel solution or a random channel allocation.
2024, Nano Communication Networks
We present nanoNS3, a network simulator for modeling Bacterial Molecular Communication (BMC) networks. nanoNS3 is built atop the Network Simulator 3 (ns-3). nanoNS3 is designed to achieve the following goals: 1) accurately and... more
We present nanoNS3, a network simulator for modeling Bacterial Molecular Communication (BMC) networks. nanoNS3 is built atop the Network Simulator 3 (ns-3). nanoNS3 is designed to achieve the following goals: 1) accurately and realistically model the real world BMC, 2) maintain high computational efficiency, 3) allow newly designed protocols to be implemented easily. nanoNS3 incorporates the channel, physical (PHY) and medium access control (MAC) layers of the network stack. The simulator has models that accurately represent receiver response, microfluidic channel loss, transfer rate and error analysis, modulation, and amplitude addressing designed specifically for BMC networks. We outline the design and architecture of nanoNS3, and then validate the aforementioned features through simulation and experimental results.
2024, Computer Networks
The growth of mobile and ubiquitous computing has increased the demand for wireless communications, which in turn raises interference levels and spectrum pollution, causing problems of network coexistence. The coexistence assurance... more
The growth of mobile and ubiquitous computing has increased the demand for wireless communications, which in turn raises interference levels and spectrum pollution, causing problems of network coexistence. The coexistence assurance between these devices and wireless sensor networks is a big challenge. This paper proposes a new medium access protocol, DynMAC (Dynamic MAC), which uses mechanisms of dynamic channel reconfiguration, recovery from lost links and reconfiguration of transmission parameters based on the properties of the cognitive radios, to deal with this problem. Simulations and experiments using a real WSN testbed, were performed to validate our protocol. Results show that the proposed mechanisms solve the WSN configuration problems, in noisy and interference environments, and enable the coexistence with different networks and devices operating in the same frequency spectrum, while maintaining application requirements in critical deployment scenarios.
2024, 2018 International Symposium on Networks, Computers and Communications (ISNCC)
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to... more
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In this paper, we propose a new MAC protocol (RIVC-MB) to enhance communication reliability in the multipath multichannel routing protocol. The reliability of transmitting/re-routing the data packet in multipath multichannel routing protocol is improved by providing early route invalidity detection and early switchover. Waiting time to access the medium is also improved, when a node is attempting to access a busy medium, by re-routing the data packet via the alternative route. The RIVC-MB protocol uses the cross-layer interaction between MAC and routing protocols to achieve these goals. The proposed protocol is implemented and extensi...
2024, Symmetry, MDPI
Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the... more
Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the network to render it unresponsive. Adversaries launch counterfeit report injection attacks and false vote injection attacks through compromised sensor nodes. Several filtering solutions have been suggested for detecting and filtering false reports during the multi-hop forwarding process. However, almost all such schemes presuppose a conventional underlying protocol for data routing that do not consider the attack status or energy dissipation on the route. Each design provides approximately the equivalent resilience in terms of protection against compromised node. However, the energy consumption characteristics of each design differ. We propose a fuzzy adaptive path selection to save energy and avoid the emergence of favored paths. Fresh authentication keys are generated periodically, and these are shared with the filtering nodes to restrict compromised intermediate filtering nodes from the verification process. The scheme helps delay the emergence of hotspot problems near the base station and exhibits improved energy conserving behavior in wireless sensor networks. The proposed scheme provides an extended network lifetime and better false data filtering capacity.
2024, Lecture Notes in Computer Science
Due to their energy and performance limitations and unpredictable deployment strategies, sensor networks pose difficult engineering challenges for link configuration and topology coordination. This paper presents a novel, topology... more
Due to their energy and performance limitations and unpredictable deployment strategies, sensor networks pose difficult engineering challenges for link configuration and topology coordination. This paper presents a novel, topology transparent technique for automatic time slotted link management in sensor networks. Our approach relies on the use of mutually orthogonal latin squares to determine transmission schedules between sensor nodes. We present three different protocols which, when compared to other approaches, significantly reduce or completely eliminate control message overhead. Our approach is probabilistic in the sense that it does not entirely guarantee either complete transmission collision freedom or sensor area coverage. However, we show through analysis and extensive simulation that by proper choice of system parameters we obtain excellent performance and coverage results.
2024, International Journal of Electrical and Computer Engineering (IJECE)
Due to the dramatic growth in the use of Wireless Sensor Network (WSN) applications ranging from environment and habitat monitoring to tracking and surveillance, network research in WSN protocols has been very active in the last decade.... more
Due to the dramatic growth in the use of Wireless Sensor Network (WSN) applications ranging from environment and habitat monitoring to tracking and surveillance, network research in WSN protocols has been very active in the last decade. With battery-powered sensors operating in unattended environments, energy conservation becomes the key technique for improving WSN lifetimes. WSN Medium Access Control (MAC) protocols address energy awareness and reduced duty cycles. The focus of this study is to investigate, through simulation, the effect of variations in various factors that influence the performance results of WSNs. Using MiXiM framework with OMNeT++ simulator, this simulation study proposes modifications in Crankshaft MAC protocol in order to improve its performance. The impact of duration and number of slots, degree of connectivity among the nodes, mobility speed and mobility update interval and also, the impact of sending data packets without preambles are investigated. Based o...
2024, IEEE Transactions on Signal and Information Processing over Networks
Signal and information processing tasks over Wireless Sensor Networks can be successfully accomplished by means of a distributed implementation among the nodes. Existing distributed schemes are commonly based on iterative strategies that... more
Signal and information processing tasks over Wireless Sensor Networks can be successfully accomplished by means of a distributed implementation among the nodes. Existing distributed schemes are commonly based on iterative strategies that imply a huge demand of one-hop transmissions, which must be efficiently processed by the lower layers of the nodes. At the link layer, general purpose medium access (MAC) policies for wireless communications usually focus on avoiding collisions. These existing approaches result in a reduction of the number of simultaneous transmissions, and an underutilization of the channel as a consequence. This leads to a decrease in the performance of the distributed tasks, since an efficient channel occupation is not generally accomplished. In this work, we propose a new MAC protocol that, besides focusing on the reliability of the communications, provides an efficient channel occupation. While the former has a direct impact on the energy consumption of usually battery powered devices, the latter affects the performance of the distributed task executed. We include both aspects in a global utility function that the nodes, relying just on local available information, aim to increase at every communication step. Furthermore, our proposal combines in a unique framework both unicast and broadcast scenarios. Through several simulation results, we show that our adaptive protocol outperforms the related literature.
2024, International Journal of Online Engineering (iJOE)
In order to reduce the energy consumption and data congestion caused by flooding at the initial stage of the network, the cluster head and the boundary node are used as the key nodes to reduce the data flow in the network, so that the... more
In order to reduce the energy consumption and data congestion caused by flooding at the initial stage of the network, the cluster head and the boundary node are used as the key nodes to reduce the data flow in the network, so that the network has better delay performance. Various clustering algorithms in wireless sensor networks and the improved method of clustering protocols are introduced. On the basis of directed diffusion algorithm, a directed diffusion protocol based on CONID clustering is studied. Through the OMNeT++ basic platform, the wireless sensor network simulation platform is built on the basis of the MiXiM module. The platform uses a hierarchical structure, and its network layer implements a directed diffusion protocol based on CONID clustering. The application layer implements the two step WLS localization algorithm. The MAC layer uses the FIexiTP protocol. The physical layer uses the simplest flat path fading model. Because the sensor has both perception and data transmission characteristics, the dual channel communication model is adopted. The platform is suitable for wireless sensor network detection, localization and tracking algorithm simulation. Through the hierarchical function of the platform, it can analyze the practicability and effectiveness of the algorithm in more detail, and has certain value. It can also be used in the simulation of cross layer protocols, and can combine several parameters to perform joint analysis of system performance. Simulation results show that the CONID based directional diffusion protocol has better delay performance than the conventional directed diffusion protocol. Finally, the performance of the two step WLS location protocol is analyzed from several perspectives, which provides an example for the platform.
2024, International Journal of Wireless and Microwave Technologies
Convergecast communication is used in many sensor applications .The flow of data in convergecast routing is from many to one i.e. many sensory nodes sense the data and send through parent child relation to the root node or sink node.... more
Convergecast communication is used in many sensor applications .The flow of data in convergecast routing is from many to one i.e. many sensory nodes sense the data and send through parent child relation to the root node or sink node. Convergecast routing is always followed by broadcasting. In broadcast communication is from one to many and in convergecast it is from many to one. As sensor nodes have limited battery capacity main focus is to save energy. As compare to wired network wireless network is prone to attacks and it is less reliable than the wired network. This paper investigates the affect of header length of network layer on the BER, SNIR, backoff duration, SNR and latency of convergecast routing with the help of omnet++ simulator.
2024, International Journal of Computing and Network Technology
Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah standard which... more
Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah standard which is also a substandard of IEEE 802.11 is no exemption. As a matter of fact, IEEE802.11ah suffers from hidden node problem more than networks (IEEE 802.11a/b/n/ac) due to their wider coverage which is up to 1km, high number of devices they can support (over 8000 nodes to one AP) and frequent simultaneous sleeping and sending of the nodes (power saving mode). A few researchers have worked on this hidden node problem in IEEE802.11ah but could not get a lasting solution to it. Therefore, this paper proposes an algorithm which detects hidden nodes and also proposes a theoretical solution based on previous works which was also experimentally verified through the BIHD-CM.
2024, Journal of emerging technologies and innovative research
Traditional networks are very complex and arduous to manage. It uses fixed and dedicated infrastructure devices such as routers and switches to control network traffic and are also vertically integrated i.e. there is a strong coupling... more
Traditional networks are very complex and arduous to manage. It uses fixed and dedicated infrastructure devices such as routers and switches to control network traffic and are also vertically integrated i.e. there is a strong coupling between control and data planes. The functionality of the traditional network mostly implemented on dedicated infrastructure devices so deploying new services and protocols is a challenging tasks because all the switches need to be updated or replaced manually. The main idea behind Software Defined Networks (SDN) is to separate the control plane from the data plane and move it to a centralized server known as controller. In this paper, an introduction to Software Defined Networking is presented. In SDN (Software Defined Networking), the whole intelligence lies in the controller that programmatically control the underlying hardware devices. This paper also covers the introduction of SDN, SDN Architecture, SDN Controller, Characteristics of various SDN controller and SDN controller service.
2023, VAWKUM Transactions on Computer Sciences
The technology of Ultra Wide band now a days is quite demanding due to the characteristics like its simple architecture , low power consumption and cost reliability but still it faces some deficiencies in term of its design to achieve low... more
The technology of Ultra Wide band now a days is quite demanding due to the characteristics like its simple architecture , low power consumption and cost reliability but still it faces some deficiencies in term of its design to achieve low complexity and low cost. UWB systems experience problems while using digital signal processing technology and require high sampling frequencies. In this paper, the performance of UWB system in the cooperative communication environment is evaluated in terms of its Bit Error Rate for different number of relays and different average distances from source to destination node. The simulations are performed for both line of sight (LOS) and non-line of sight (NLOS) environment. Results from simulation shows that the performance of the system decreases by increasing average source to destination distance. The simulation results also shows that the system performs better in LOS channel environment as compared to NLOS channel environment. In the end results, it shows that the performance of the system increases by increasing the number of relay nodes to adequately large number.
2023, Proceedings of the 7th International Conference on Sensor Networks
This paper describes an experimental study which investigates relevant properties of multi-channel wireless communications in an outdoor industrial environment. A testbed of IEEE 802.15.4 radios was developed in order to evaluate the... more
This paper describes an experimental study which investigates relevant properties of multi-channel wireless communications in an outdoor industrial environment. A testbed of IEEE 802.15.4 radios was developed in order to evaluate the performance of the 16 channels defined by the standard, at all the nodes, simultaneously. From the collected data, some relevant facts are discussed, such as the spatial variations in channel quality, the differences in the characteristics of different channels, the link asymmetry, and the non-stationary characteristics of the channel. The possible problems that can arise in the deployment of industrial wireless sensor networks, based on the characteristics of the standards developed for this type of network, are described, as well as some possible solutions.
2023
This paper introduces an approach of media access control for reducing collisions in a heterogeneous wireless sensor network, which contains different types of sensor nodes so a sensor fusion technique can be barely applied. Data packets... more
This paper introduces an approach of media access control for reducing collisions in a heterogeneous wireless sensor network, which contains different types of sensor nodes so a sensor fusion technique can be barely applied. Data packets sent to a designated node can cause serious collision due to a funneling effect of network traffic. At lightly loaded networks, our approach uses traditional random media access, but it dynamically divides collision domains at heavy traffic to allow contending nodes fair opportunity to acquire the media. We have conducted extensive simulation to demonstrate the effectiveness of the approach. Index Terms-Media access control, sensor network, wireless communication, funnel effect, division of collision domain.