Ns2 Simulator Research Papers - Academia.edu (original) (raw)

— L'intérêt pour les réseaux de capteurs sans fil s'est considérablement accru. Ils ont fait l'objet de plusieurs travaux de recherche ces dernières années. Néanmoins, ces réseaux sont confrontés à de multiples problèmes. Parmi ces... more

— L'intérêt pour les réseaux de capteurs sans fil s'est considérablement accru. Ils ont fait l'objet de plusieurs travaux de recherche ces dernières années. Néanmoins, ces réseaux sont confrontés à de multiples problèmes. Parmi ces problèmes nous trouvons celui de la localisation. Ce dernier, a reçu une attention importante car plusieurs applications ont besoin de l'information de localisation des capteurs. Ainsi, de nombreux systèmes et algorithmes de localisation ont été proposés pour ce type de réseaux. Dans ce papier nous avons effectué une étude comparative entre les deux protocoles de localisation AT-Free et HT-Refine. Nous avons évalué les performances et discuter les résultats obtenus par simulation.

The Mobile Ad-Hoc Networks (MANET) technology is a self-organized wireless interconnection of communication devices without the use of any fixed network infrastructure/backbone. The performance of Ad-hoc ondemand Distance Vector (AODV)... more

The Mobile Ad-Hoc Networks (MANET) technology is a self-organized wireless interconnection of communication devices without the use of any fixed network infrastructure/backbone. The performance of Ad-hoc ondemand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol is two MANET protocol. Selecting an appropriate routing protocol for steering data packet is a very important issue to evaluate the performance of wireless mobile ad-hoc networks (MANET). In order to guarantee an optimum use of these protocols, we need to test different routing protocols performances. This paper presents the performance analysis comparison of ad-hoc on-demand routing protocol (AODV) and Dynamic Source Routing (DSR) under different performance metrics like throughput, packet drop rate and end-to-end delay. Efficiency achieved by the AODV protocol is higher than DSR protocol in mobile ad-hoc networks. The simulation is done in Network Simulator (NS) 2.

Underwater Wireless Sensor Networks (UWSNs) is an emerging technology for the monitoring of aquatic assets and frequently applied in several domains like underwater information gathering, ocean sampling network, anonymous vehicles,... more

Underwater Wireless Sensor Networks (UWSNs) is an emerging technology for the monitoring of aquatic assets and frequently applied in several domains like underwater information gathering, ocean sampling network, anonymous vehicles, disaster prevention and submarine detection. Recently, UWSNs have been getting significant attention of researchers from both academia and industry. As a result, several studies have been carried out to perform certain improvements in UWSNs techniques, tools, protocols and architectures. In this regard, there is a dire need to investigate and summarize the modern UWSNs trends altogether within a single study. To achieve this, a Systematic Literature Review (SLR) is performed in this article to comprehensively analyze the latest developments in UWSNs. Particularly, 34 research studies published during 2012-2020 have been selected and examined in the area of UWSNs. This leads to the identification of 21 modern routing protocols and 11 tools. Furthermore, 5 different architecture types and 3 communication media technologies are presented in the context of UWSNs. Finally, a comparative analysis of routing protocols is done on the basis of important evaluation metrics. It has been concluded that there exist adequate approaches, protocols and tools for the monitoring of UWSNs. However, the design verification capabilities of existing approaches are insufficient to meet the growing demands of UWSNs. In this context, the findings of this article provide solid platform to enhance the current UWSNs tools and techniques for large and complex networks.

Wireless Mesh Networks (WMNs) are a radio-based network technology that has gained considerable importance in network research community. It is a multi-hop wireless access network where nodes can act both as a host as well as a router.... more

Wireless Mesh Networks (WMNs) are a radio-based network technology that has gained considerable importance in network research community. It is a multi-hop wireless access network where nodes can act both as a host as well as a router. One of the factors that influence the performance of WMNs is the underlying routing protocol used. Thus, numbers of different routing protocols are proposed in recent years. There is a need to understand the versatile behavioral aspects of these routing protocols in a wireless mesh network with varying traffic loads, the number of sources and speed. In this paper, we compare and evaluate the performance of Ad-hoc On demand Distance Vector (AODV) protocol which is unicast protocol with Ad-hoc On-demand Multipath Distance Vector (AOMDV) protocol, which is multipath routing protocol. The performance differentials are analyzed using metrics such as end to end delay, packet delivery ratio and normalized routing overhead.

Recently, Long-Term Evolution (LTE) is the result of ongoing work by the Third Generation Partnership Project (3GPP) toward Fourth Generation (4G) systems. LTE will be used for mobile, fixed and portable wireless broadband access, and... more

Recently, Long-Term Evolution (LTE) is the result of ongoing work by the Third Generation Partnership Project (3GPP) toward Fourth Generation (4G) systems. LTE will be used for mobile, fixed and portable wireless broadband access, and will offer several benefits to operators, aimed at increasing capacity, reducing network complexity and thus lowering deployment and operational costs. It will enable operators to meet the growing demand for mobile data solutions, making it possible for richer services to be delivered to consumers more cost effectively. The targets for LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink. However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network simulator and observation of TCP Reno performance investigated. The Evaluation of the network performance with TCP Reno is mainly based on congestion window behavior, throughput, average delay and lost packet.

Many previous studies have shown that traditional TCP slow-start algorithm suffers performance degradation in high-speed and long-delay networks. This paper presents a sender-side enhancement, which makes use of TCP Vegas... more

Many previous studies have shown that traditional TCP slow-start algorithm suffers performance degradation in high-speed and long-delay networks. This paper presents a sender-side enhancement, which makes use of TCP Vegas congestion-detecting scheme to monitor the router queue, and
accordingly refines slow-start window evolution by introducing
a two-phase approach to probe bandwidth more efficiently.
Moreover, it achieves good fairness of bandwidth utilization in
coexistence of multiple connections. Simulation results show that, compared with traditional slow-start and many other enhancements, it is able to significantly improve the startup performance without adversely affecting coexisting TCP connections.

NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects 2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects MANET (Mobile Ad-hoc Networks) A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in... more

NS2 IEEE Project Titles 2017 | 2018 Network Simulator IEEE Projects
2017 - 2018 NETWORK SIMULATOR - NS2 IEEE FINAL YEAR Projects
MANET (Mobile Ad-hoc Networks)
A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs
A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks
Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
Delay Analytical Models for Opportunistic Routing in Wireless Ad Hoc Networks
Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function
Fine-Grained Analysis of Packet Loss in MANETs
SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
WSN – Wireless Sensor Networks (Routing)
A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-cycled WSNs
A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks
A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks
E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic
Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks
Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks
Low-Cost Collaborative Mobile Charging for Large-Scale Wireless Sensor Networks
Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink
Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks
Optimization of Watchdog Selection in Wireless Sensor Networks
QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks
Routing Protocol for Wireless sensor networks Using Swarm intelligence-ACO with ECPSOA
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks
Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR)
WSN – Wireless Sensor Networks (Security)
A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks
Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks
Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
TruFiX: A Configurable Trust-based Cross-Layer Protocol for Wireless Sensor Networks
VANET – Vehicular Ad-hoc Networks (Routing)
Adaptive Quality of Service based Routing for Vehicular Ad hoc Networks with Ant Colony Optimization
CBS: Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance
EcoTrec—A Novel VANET-Based Approach to Reducing Vehicle Emissions
Enhancing Quality of Service Conditions Using a Cross-Layer Paradigm for Ad-hoc Vehicular Communication
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks
VANET – Vehicular Ad-hoc Networks (Security)
Distributed Aggregate Privacy-Preserving Authentication in VANETs
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET
GDVAN: A New Greedy Behavior Attack Detection Algorithm For VANETs
REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET
WIRELESS COMMUNICATIONS & OTHERS
Congestion Control Scheme Performance Analysis Based on Nonlinear RED
Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks
End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting
Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control
Spectrum-Availability based Routing for Cognitive Sensor Networks
Towards Effective Trust-based Packet Filtering in Collaborative Network Environments
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks

Scripting languages has become commonly used much more. It's interpreted languages, which will execute at run-time and for a specific environment. Scripting languages can run on client-side or on server-side with different... more

Scripting languages has become commonly used much more. It's interpreted languages, which will execute at run-time and for a specific environment. Scripting languages can run on client-side or on server-side with different characteristics. Both of these categories are prone to attacks which both have its vulnerabilities which the hackers can exploit. Cross-site scripting XSS is one of the widest attacks technique that could infect the client browser and gather or even to force the user for any unplanned behavior. Users, developers and professionals security can decrease and prevent XSS from occur. SQL injection is an attack technique also which inject the scripts using JavaScript\HTML code that will attach to different scripting languages such as PHP language which is run on many web servers around the world. The login forms are the simplest example that the attackers trying to inject with SQL injection to capture sensitive data from the database or change it. Validity, confidentiality, and integrity are useful steps can make SQL injection never occur adding to the prepared statement. Each developer can check his own pages and detect the vulnerabilities before running using some of security software tools that we use one of them named (ZAD) stand to Zed Attack Proxy that is use as penetration testing tool. At the conclusion, the scripting languages will be more used where the social pages and activity interactive interface widely spread, so the attacks techniques also will develop and the challenges will be more and complex.

In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed.... more

In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. Effective transmission power control is a critical issue in the design and performance of wireless ad hoc networks. Transmission Power affects the Survivability of the Network. Today, the design of packet radios and protocols for wireless ad hoc networks are primarily based on common-range transmission control. Mobility speed of the nodes and extension of ad hoc network affects the performance as well. In this paper, one of the widely used routing protocol AODV with varying transmission range, mobility speed and number of nodes is analyzed. Data transmitted by a node is received by all the nodes within its communication range. This paper focuses on the analysis of varying the range of the transmission in terms of distance, mobility speed and number of nodes in the network. The proposed work has been simulated using NS-2.34.The performance metrics comprises of Network Survivability has been analyzed in this paper.

This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless... more

This paper evaluates the security of wireless communication network based on the fuzzy logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm. We highlight the valuable assets in designing of wireless network communication system based on network simulator (NS2), which is crucial to protect security of the systems. Block cipher algorithms are evaluated by using fuzzy logics and a hybrid algorithm is proposed. Both algorithms are evaluated in term of the security level. Logic (AND) is used in the rules of modelling and Mamdani Style is used for the evaluations

This article presents a geocast secure and energy-efficient protocol approach for a wireless sensor network (WSN) deployed in space, based on virtual architecture with guarantee of delivery of data of the base station (BS) in all nodes... more

This article presents a geocast secure and energy-efficient protocol approach for a wireless sensor network (WSN) deployed in space, based on virtual architecture with guarantee of delivery of data of the base station (BS) in all nodes situated in one or several regions géocast. Our protocol consists of two major parts which are complementary and and allow a global economy of energy. First of all the concept of virtual 3D architecture allows us to build a solid foundation, fast and secure for the routing of the information. Then, the geocast diffusion itself is simply reduced to the research phase in the network which is a step of sending data. Our protocol has better performances in terms of energy saving and network overload than that[1].

Wireless Manet networks are relatively new compared to existing communications networks, their birth and evolution because of the rapid development of communications devices. Network nodes are connected without any type of connection or... more

Wireless Manet networks are relatively new compared to existing communications networks, their birth and evolution because of the rapid development of communications devices. Network nodes are connected without any type of connection or preconfiguration. This type of network is used in multiple areas and positions such as a network between vehicles within the city or a network between students in a room or meeting room. It is used in search and rescue operations and natural disasters because the infrastructure is destroyed. It is difficult to create a network of infrastructure in such cases. Each node in this type of network has a radio field in which to create a path to send and receive packets with other nodes that fall within the same domain. This path is formed by the routing protocol, which is the cornerstone of these networks, "Assessment of the performance of the AODV routing protocol in mobile wireless networks (MANET)", performance values of routing protocol in mobile wireless networks. We selected the most popular AODV routing protocol, simulated using the NS-2 emulator under many simulation scenarios, and guidelines for simulated scenarios, which provide good performance in environments with average number of nodes and data flows with them. We hope to be a valuable reference for colleagues who want to study this type of network.

2016 - 2017 IEEE NS2 PROJECT TITLES for M.E., M.Tech., B.E., B.Tech., MCA, M.Phil, Ph.D. Students in Mobile Ad-hoc Networks, MANET, Manet Routing, Manet Security, Wirless Sensor Networks, WSN Routing, WsN security, Wirless sensor network... more

2016 - 2017 IEEE NS2 PROJECT TITLES for M.E., M.Tech., B.E., B.Tech., MCA, M.Phil, Ph.D. Students in Mobile Ad-hoc Networks, MANET, Manet Routing, Manet Security, Wirless Sensor Networks, WSN Routing, WsN security, Wirless sensor network security, VANET, Vechicular Ad-hoc Netweork, Wireless Communication Titles for ECE, CSE, IT STudents in NS2. Ns2 projects in Online, Ns2 projects in Chennai, Ns2 projects in Pondicherry

Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited... more

Wireless Sensor Network has become a catchphrase recently starting from agriculture, military scenario, emergency situation, weather monitoring etc. Deployment of sensor network involves addressing a lot of practical issues like limited energy resource of sensor nodes, self-forming and self-healing of automated sensor networks, data fusion and communication capabilities. One of commonly used simulator –i.e. NS2, is a friendly tool that offers a virtual environment, which allows learning about the number of rules governing a sensor network's topologies to carry out various settings and communications' formats or patterns. In NS2 application services, it has been defined on how the sensors nodes perform when they identify a strange phenomenon. A sensor node may be sending a massage to a main station if it continues to identify that phenomenon. This paper proposes an enhancement method for this network simulator as a framework applicable to such called self-configured network, and with an aim to allow related paper works testing possible by the simulator. Furthermore, the new framework is utilized for temperature and carbon monoxide sensing and dissemination into the network.

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application... more

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10, 30 and 50 nodes, respectively using well known Network Simulator (NS-2.35). Moreover, Constant Bit Rate (CBR) considered as a traffic source and On-demand Distance Vector (AODV) as the routing protocol. For evaluation performance, QoS metrics such as end-to-end delay, packet delivery ratio, throughput and jitter are measured. The results show that delay and jitter of TFRC are slightly less than UDP and TCP whereas UDP has the significantly better performance wise throughput.

Due to the very large and quick growth of the wireless network and increasing demand for multimedia information on the web, video transmission over the wireless network has received tremendous attention from academe and industry.... more

Due to the very large and quick growth of the wireless network and increasing demand for multimedia information on the web, video transmission over the wireless network has received tremendous attention from academe and industry. Transmission of real-time video typically has bandwidth, delay, and loss requirements. Video transmission over wireless network poses many challenges. To address these challenges, extensive research has been conducted in the various areas of wireless video application. This paper is aimed at dissemination of the contributions a simulation environment for video transmission over the wireless network in Fedora environment because the Cygwin in window-xp environment has lots of limitation.

Mobile Ad Hoc Wireless network (MANET) consists of a set of mobile nodes that are connected by wireless links. The network topologies in such a network keep changing randomly and established infrastructure for centralized administration... more

Mobile Ad Hoc Wireless network (MANET) consists of a set of mobile nodes that are connected by wireless links. The network topologies in such a network keep changing randomly and established infrastructure for centralized administration is absent in such network due to this highly dynamic topology.
Each mobile node operates not only as an end system, but also as a router to exchange packets. The nodes are free to move about and organize themselves into a network. These nodes change their position very frequently and thus the route of data from source or originating node to sink or destination node do not sustain a fixed route in order to maintain the Real Time data Communication as well Quality of Service (QoS). The routing protocols may be classified as Proactive, Reactive, and Hybrid.
A Reactive (on-demand) routing strategy is a popular routing category for wireless ad-hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested.
In this work, an attempt has been made to compare the performance of on demand reactive routing protocols for MANET, namely, Ad hoc On Demand Distance Vector (AODV) protocol and Dynamic Source Routing (DSR) protocol. DSR and AODV are reactive gateway discovery algorithms where a mobile device of MANET connects another mobile device by gateway, only when it is needed. As per our findings the differences in the protocol mechanics lead to significant performance differentials for both of these protocols. We have also cultivated the essentiality of one Proactive routing algorithm, namely, destination sequence distance vector routing (DSDV).
The performance differentials are analyzed by varying simulation time and the number of nodes. These simulations are carried out using the ns-2 network simulator. The results presented in this work illustrate the importance in evaluating and implementing routing protocols in an ad hoc environment.

2015 - 2016 IEEE NS2 PROJECT TITLES

This paper proposes a quality of service (QoS) management framework for high throughput satellite (HTS) systems using extremely high frequency (EHF) frequency bands, which can achieve high capacity provided that feeder link outage events... more

This paper proposes a quality of service (QoS) management framework for high throughput satellite (HTS) systems using extremely high frequency (EHF) frequency bands, which can achieve high capacity provided that feeder link outage events caused by severe weather conditions can be properly counteracted. To this regard, smart gateway diversity architectures implementing advanced gateway handover procedures are certainly attractive, although they can only partly mitigate the negative effects of adverse weather conditions in terms of packet losses, delays, and jitters, which significantly degrade the performance of delay-sensitive and delay-insensitive traffic flows. To cope with these technical challenges, we propose an incremental rerouting scheme to control congestion events because of capacity reduction during the transient phase, consisting of offloading high-priority QoS traffic flows from the affected gateway towards gateways operating in more favorable conditions. Moreover, we apply inter-flow network coding at the gateways to protect delay-insensitive flows from packet losses occurring during feeder link outage. Finally, extra capacity is reserved at the gateways to handle the additional traffic resulting from gateway handover. The theoretical analysis (validated by simulation campaigns) allowed characterizing network coding performance and confirming the potentialities of our QoS management framework for HTS systems. Index Terms— QoS management, inter-flow network coding, terabit satellite systems, smart gateway diversity.

Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several... more

Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the
network and guarantee reliable communication. In this paper we intend to propose a new protocol called Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in
order to find the optimal path and achieve a dynamic and adaptive routing.

Abstract-It is important to explore how VANET Routing protocols behave in unplanned areas which lacks fixed infrastructure such as Road Side Unit to support vehicular communication. Furthermore, such areas do not possess vehicular traffic... more

Abstract-It is important to explore how VANET
Routing protocols behave in unplanned areas which
lacks fixed infrastructure such as Road Side Unit to
support vehicular communication. Furthermore, such
areas do not possess vehicular traffic regulatory
structures such as traffic signals, proper road lanes and
traffic planning. These areas show largely
unpredictable traffic pattern in means of vehicle speeds
and density. This paper presents the simulation results
of such scenarios in order to better understand or select
the optimal performing Routing protocol among
DSDV, DSR and AODV against metrics selected:
Packet delivery Ratio, Packet Loss Percentage and
Average End to End delay. The results show that AODV
outperforms DSDV and DSR in unplanned areas. To
the best of our knowledge no such routing protocol
performance evaluations have been performed for
unplanned areas.

Time synchronization in wireless sensor networks is a critical requirement for distributed and collaborative processing among the nodes. This paper presents a coarse grained hierarchical time synchronization scheme ‘LevelSync’ which... more

Time synchronization in wireless sensor networks is a critical requirement for distributed and collaborative processing among the nodes. This paper presents a coarse grained hierarchical time synchronization scheme ‘LevelSync’ which synchronizes nodes in a sensor network with regards to their distance from the sink or master node. A hierarchical tree is dynamically constructed during the synchronization with master node acting as the root. The master node initiates and controls the synchronization phase and is responsible for normalizing the virtual time with the corresponding UTC. Each node is assigned a level and maintains a virtual clock which runs at a frequency different than that of its physical clock. Virtual clocks run at a fixed frequency calculated by the root or reference nodes hence are free from the drifts. LevelSync decreases the number of messages required for the synchronization and the resynchronization periods. We evaluate the performance and energy efficiency of the LevelSync through simulation and compare with existing time synchronization protocols. LevelSync is computationally light, energy efficient and achieves long lasting synchronizations.

MANET (Mobile ADHOC Network) is a self organizing and self configuring network without the need of any centralized base station. In MANETs, the nodes are mobile and battery operated. As the nodes have limited battery resources and multi... more

MANET (Mobile ADHOC Network) is a self organizing
and self configuring network without the need of any centralized base
station. In MANETs, the nodes are mobile and battery operated. As
the nodes have limited battery resources and multi hop routes are
used over a changing network environment due to node mobility, it
requires energy efficient routing protocols to limit the power
consumption, prolong the battery life and to improve the robustness of
the system. This paper addresses issues pertaining to three different
routing protocols Destination Sequenced Distance vector (DSDV),
ADHOC Om Demand Multipath Distance Vector Routing (AOMDV)
and Dynamic Source Routing (DSR) protocols, which are used for
efficient routing under different scenarios in Mobile Ad-hoc Network
(MANET), which plays a critical role in places where wired network
are neither available nor economical to deploy. My objective was to
implement the two routing protocols using Network Simulators and
run it for different number of nodes. Then I compared the two routing
protocols for different network parameters and studied the efficient
protocol under a particular scenario on the basis of two metrics.
Packet delivery ratio and Routing load DSDV is a Proactive gateway
discovery algorithm where the gateway periodically broadcasts a
gateway advertisement message which is transmitted after expiration
of the gateways timer. DSR is a Reactive gateway discovery algorithm
where a mobile device of MANET connects by gateway only when it is
needed. Simulation results show that AOMDV performs better than
DSDV, respectively in packet delivery ratio and AOMDV, DSR both
perform better than DSDV in terms of average End-To-End Delay.

In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While... more

In this paper we deal with the protector control that which we used to secure AODV routing protocol in Ad Hoc networks. The considered system can be vulnerable to several attacks because of mobility and absence of infrastructure. While the disturbance is assumed to be of the black hole type, we purpose a control named "PC-AODV-BH" in order to neutralize the effects of malicious nodes. Such a protocol is obtained by coupling hash functions, digital signatures and fidelity concept. An implementation under NS2 simulator will be given to compare our proposed approach with SAODV protocol, basing on three performance metrics and taking into account the number of black hole malicious nodes.

In the last decade, underwater wireless sensor networks (UWSNs) have attracted a lot of attention from the research community thanks to their wide range of applications that include seabed mining , military and environmental monitoring.... more

In the last decade, underwater wireless sensor networks (UWSNs) have attracted a lot of attention from the research community thanks to their wide range of applications that include seabed mining , military and environmental monitoring. With respect to terrestrial networks, UWSNs pose new research challenges such as the three-dimensional node deployment and the use of acoustic signals. Despite the large number of routing protocols that have been developed for UWSNs, there are very few analytical results that study their optimal configurations given the system's parameters (density of the nodes, frequency of transmission, etc.). In this paper, we make one of the first steps to cover this gap. We study an abstraction of an opportunistic routing protocol and derive its optimal working conditions based on the network characteristics. Specifically, we prove that using a depth threshold, i.e., the minimum length of one transmission hop to the surface, is crucial for the opti-mality of opportunistic protocols and we give a numerical method to compute it. Moreover, we show that there is a critical depth threshold above which no packet can be transmitted successfully to the surface sinks in large networks, which further highlights the importance of properly configuring the routing protocol. We discuss the implications of our results and validate them by means of stochastic simulations on NS3.

Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to find single the best path to a destination from various paths available using Ad-Hoc On Demand Distance Vector (AODV) routing protocol.... more

Mobile Ad-Hoc NETworks (MANET) designed specifically for WMNs. MANET plays an important role to find single the best path to a destination from various paths available using Ad-Hoc On Demand Distance Vector (AODV) routing protocol. However, when multiple nodes choose the same path, it will cause the path to be overload and deteriorating the overall performance of the network. Multipath Parallel Routing Protocol (MPRP) comes out to overcome this problem. The scope of this project is to study and discuss how MPRP and Coordinated Distributed Scheme (CDS) enhance the performance of WMNs. MPRP and CDS is combined to allow the selection of shortest path. The algorithm named Shortest Path Multipath Parallel Routing Protocol (S-MPRP). S-MPRP enhanced the performance of MPRP by allowing the selecting second best path when the best path is congested. Due to cost limitation, the simulation carried out using Network Simulation 2 (NS2) to compare the performance of WMNs between S-MPRP and AODV. Simple configurations have been done to configure the S-MPRP on the nodes. The simulation results shows S-MPRP helps WMNs produce a better result in terms of throughput, delay and normalized control overhead.

Mobilead-hocnetworks(MANETs)arecomposedofmobilenodescommunicatingthroughwireless medium,withoutanyfixedcentralizedinfrastructure.Providingqualityofservice(QoS)support... more

Mobilead-hocnetworks(MANETs)arecomposedofmobilenodescommunicatingthroughwireless medium,withoutanyfixedcentralizedinfrastructure.Providingqualityofservice(QoS)support tomultimediastreamingapplicationsoverMANETsisvital.ThispaperfocusesonQoSsupport, providedbythestreamcontroltransmissionprotocol(SCTP)andtheTCP-friendlyratecontrol(TFRC) protocoltomultimediastreamingapplicationsoverMANETs.Inthisstudy,threeQoSparameters wereconsideredjointly:(1)packetdeliveryratio(PDR),(2)end-to-enddelay,(3)andthroughput.

Data Aggregation (DA) is one of the most frequently used techniques in Wireless Sensor Networks (WSNs) to improve the network lifetime. It involves gathering, consolidating, and routing the sensory data collected by sensor nodes. However,... more

Data Aggregation (DA) is one of the most frequently used techniques in Wireless Sensor Networks (WSNs) to improve the network lifetime. It involves gathering, consolidating, and routing the sensory data collected by sensor nodes. However, research studies have demonstrated that the dependability of the DA process affects severely when malicious nodes are present in the network. Many security solutions using cryptography and Intrusion Detection System (IDS) have been proposed in the literature for smooth conduction of the aggregation process. However, these solutions require more energy and processing capacity, which are the main constraints for sensor nodes. To this end, the current study presents Trust-Aware Data Aggregation and Intrusion Detection System (TDAGIDS) for clustered WSNs. This TDAGIDS has two modules viz., trust management and intrusion detection. Each node runs a Trust Management System (TMS) that computes the trust value of neighbor nodes by observing their activities. On the other hand, the Base Station (BS) is equipped with IDS that collects the trust values of network nodes and runs a statistical test to identify malicious nodes. In this way, TMS at the node level and IDS at BS level work in collaboration to detect and isolate the malicious nodes from the DA process. The simulation results show the effectiveness of the TDAGIDS over baseline T-LEACH (Trusted Low Energy Adaptive Clustering Hierarchy) protocol and recently proposed TDAGIOT (Trust based Data Aggregation for Internet of Things) method.

Wireless technology is rapidly gaining in popularity for educational institutes, home and business networking. As the wireless technology continues to improve the cost of wireless products continues to decrease. Wireless networks utilize... more

Wireless technology is rapidly gaining in popularity for educational institutes, home and business networking. As the wireless technology continues to improve the cost of wireless products continues to decrease. Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. There various popular routing protocols available for wireless networks are DSDV, AODV and DSR. This paper is aimed at dissemination of the measuring performance i.e., throughput, packet drop rate and average packet end-to end delay of wireless network UPD-based application for various routing protocol using simulation framework for video transmission over the wireless network in Fedora environment.

SUMMARY Sensor networks that carry heterogeneous traffics and are responsible for reporting very time-critical important events necessitate an efficient and robust data dissemination framework. Designing such a framework , that can... more

SUMMARY Sensor networks that carry heterogeneous traffics and are responsible for reporting very time-critical important events necessitate an efficient and robust data dissemination framework. Designing such a framework , that can achieve both the reliability and delay guarantee while preserving the energy efficiency, namely multi-constrained QoS (MCQoS), is a challenging problem. Although there have been many research works on QoS routing for sensor networks, to the best of our knowledge, no one addresses the above three service parameters all together. In this paper, we propose a new aggregate routing model and a distributed aggregate routing algorithm (DARA) that implements the model for achieving MCQoS. DARA is designed for multi-sink, multipath and location aware network architecture. We develop probabilistic models for multipath reliability constraint , sojourn time of a packet at an intermediary node and node energy consumption. Delay-differentiated multi-speed packet forwarding and in-node packet scheduling mechanisms are also incorporated with DARA. The results of the simulations demonstrate that DARA effectively improves the reliability, delay guarantee and energy efficiency.

In wireless sensor networks, sensor nodes fail either when s ome critical event occurs at the node or when the battery of the nodes is completely drained. If the remaini ng nodes in the sensor network are not aware of the node failure,... more

In wireless sensor networks, sensor nodes fail either when s
ome critical event occurs at the node or when
the battery of the nodes is completely drained. If the remaini
ng nodes in the sensor network are not aware
of the node failure, the network might under undergo significant
broadcast delay and path loss. An alarm
packet has to be broadcast throughout the network when any critical
event occurs and the transmission
path must be recovered to achieve better quality of service
in the sensor network. This paper utilizes least
disruptive topology repair (LeDir) algorithm to minimize the p
ower consumption and to handle such
critical events. LeDir algorithm is used to recover the tr
ansmission path and to ensure that the quality of
service issues in the network is met. The variations in
the throughput, roundtrip time, broadcast delays and
packet delivery ratio of the network are observed by pe
rforming multiple NS-2 simulations. It is observed
that the throughput of the network could be quickly regained when
the transmission path is recovered by
node replacement.

Position error between motions of the master and slave end-effectors is inevitable as it originates from hard-to-avoid imperfections in controller design and model uncertainty. Moreover, when a slave manipulator is controlled through a... more

Position error between motions of the master and slave end-effectors is inevitable as it originates from hard-to-avoid imperfections in controller design and model uncertainty. Moreover, when a slave manipulator is controlled through a delayed and lossy communication channel, the error between the desired motion originating from the master device and the actual movement of the slave manipulator end-effector is further exacerbated. This paper introduces a force feedback scheme to alleviate this problem by simply guiding the operator to slow down the haptic device motion and, in turn, allows the slave manipulator to follow the desired trajectory closely. Using this scheme, the master haptic device generates a force, which is proportional to the position error at the slave end-effector, and opposite to the operator’s intended motion at the master site. Indeed, this force is a signal or cue to the operator for reducing the hand speed when position error, due to delayed and lossy network, appears at the slave site. Effectiveness of the proposed scheme is validated by performing experiments on a hydraulic telemanipulator setup developed for performing live-line maintenance. Experiments are conducted when the system operates under both dedicated and wireless networks. Results show that the scheme performs well in reducing the position error between the haptic device and the slave end-effector. Specifically, by utilizing the proposed force, the mean position error, for the case presented here, reduces by at least 92% as compared to the condition without the proposed force augmentation scheme. The scheme is easy to implement, as the only required on-line measurement is the angular displacement of the slave manipulator joints.

TriBA(Triplet Based Architecture) is a Network on Chip processor(NoC) architecture which merges the core philosophy of Object Oriented Design with the hardware design of multicore processors[1].We present TriBASim in this paper, a NoC... more

TriBA(Triplet Based Architecture) is a Network on Chip processor(NoC) architecture which merges the
core philosophy of Object Oriented Design with the hardware design of multicore processors[1].We
present TriBASim in this paper, a NoC simulator specifically designed for TriBA.In TriBA ,nodes are
connected in recursive triplets .TriBA network topology performance analysis have been carried out from
different perspectives [2] and routing algorithms have been developed [3][4] but the architecture still lacks
a simulator that the researcher can use to run simple and fast behavioural analysis on the architecture
based on common parameters in the Network On Chip arena. TriBASim is introduced in this paper ,a
simulator for TriBA ,based on systemc[6] .TriBASim will lessen the burden on researchers on TriBA ,by
giving them something to just plug in desired parameters and have nodes and topology set up ready for
analysis.

Wireless Sensor Networks have been changing and enhancing the way people perceive environment and technology. Sensors are influencing many aspects of our lives, right from cell phones to state-of-the art defence systems. In order to give... more

Wireless Sensor Networks have been changing and enhancing the way people perceive environment and technology. Sensors are influencing many aspects of our lives, right from cell phones to state-of-the art defence systems. In order to give fast and on-time response for different applications, it is essential that wireless sensor nodes must work in cooperation with each other. The most important requirement to maintain the coordination among different nodes is time synchronization. This paper describes a virtual time based approach for synchronizing time in sensor network among spatially close nodes. We propose the Virtual Clock Rate Algorithm for synchronizing two (or more) electronic devices employing a quartz based clock. We apply our algorithm for synchronizing single-hop sensor network. The proposed approach exploits the broadcast nature of the wireless medium and MAC layer timestamping to reduce the critical path and improve accuracy. Our approach requires two broadcasts and n transmissions for synchronizing n nodes. The key idea is to leave the system clock of the nodes untethered and use a virtual clock at each node with an exact skew rate to keep a common notion of time thus removing drift. We evaluate the performance and energy efficiency of our approach through simulation. Our approach is computationally light, energy efficient, robust to node failures and achieve long lasting synchronization.