The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (IJWMN)
1. Top Ten Read Articles in
Wireless&Mobile Networks
International Journal of Wireless &
MobileNetworks (IJWMN)
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
2. A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D
SCENARIOS
Hoda Nematy
Malek-Ashtar University of Technology, Shabanlou, Babaee Hwy, Lavizan,Tehran.
ABSTRACT
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular
network, D2D is considered as a novel channel of communication. This form of
communication has introduced for 4th cellular communication and enacts a significant role in
the 5th generation. Four D2D communication scenarios defined in the references, includes
direct D2D and relaying D2D communication both with and without cellular infrastructure.
One of the major challenges addressing D2D protocols contributes to the fact that they have
one single secure protocol that can adapt to the four scenarios. In the current study, we
propose a secure D2D protocol based on ARIADNE. To authenticate and key agreement
between Source and Destination, we employ LTE-A AKA protocol, further for broadcast
authentication between relaying nodes TESLA was applied. In Contrary to the recent
protocols, our proposed protocol has inconsiderable computation overhead and trivial
communication overhead than SODE and preserve many security properties such as
Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and Secure
Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure
Key Agreement of the proposed protocol with ProVerif verification tools.
KEYWORDS
5th generation, Four D2D scenarios, LTE-A AKA protocol, secure D2D protocol, ProVerif
Full Text : https://aircconline.com/ijwmn/V13N4/13421ijwmn01.pdf
Volume Link : https://airccse.org/journal/jwmn_current21.html
3. REFERENCES
[1] H. H. Hussein, H. A. Elsayed, and S. M. A. El-kader, “Intensive Benchmarking of D2D
communication over 5G cellular networks: prototype, integrated features, challenges, and
main applications,” Wirel. Networks, pp. 1–20, 2019.
[2] N. Kato, “On device-to-device (D2D) communication [Editor’s note],” IEEE Netw., vol.
30, no. 3, p. 2, 2016.
[3] Y.-D. Lin and Y.-C. Hsu, “Multihop cellular: A new architecture for wireless
communications,” in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE
Computer and Communications Societies. Proceedings. IEEE, 2000, vol. 3, pp. 1273–1282.
[4] D. Wu, L. Zhou, Y. Cai, R. Q. Hu, and Y. Qian, “The role of mobility for D2D
communications in LTE-Advanced networks: energy vs. bandwidth efficiency,” IEEE Wirel.
Commun., vol. 21, no. 2, pp. 66–71, 2014.
[5] N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5G: The next generation of mobile
communication,” Phys. Commun., vol. 18, pp. 64–84, 2016.
[6] S. K. Tetarave and S. Tripathy, “Secure Opportunistic Data Exchange Using Smart
Devices in 5G/LTEA Networks,” in International Conference on Security & Privacy, 2019,
pp. 3–16.
[7] T. Balan, A. Balan, and F. Sandu, “SDR Implementation of a D2D Security
Cryptographic Mechanism,” IEEE Access, vol. 7, pp. 38847–38855, 2019.
[8] L. Wang, Y. Tian, D. Zhang, and Y. Lu, “Constant-round authenticated and dynamic
group key agreement protocol for D2D group communications,” Inf. Sci. (Ny)., vol. 503, pp.
61–71, 2019.
[9] P. Gope, “LAAP: Lightweight Anonymous Authentication Protocol for D2D-Aided Fog
Computing Paradigm,” Comput. Secur., 2019.
[10] M. Cao et al., “Sec-D2D: A Secure and Lightweight D2D Communication System With
Multiple Sensors,” IEEE Access, vol. 7, pp. 33759–33770, 2019.
[11] P. P. Tayade and P. Vijayakumar, “Enhancement of Security and Confidentiality for
D2D Communication in LTE-Advanced Network Using Optimised Protocol,” in Wireless
Communication Networks and Internet of Things, Springer, 2019, pp. 131–139.
[12] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol
for ad hoc networks,” Wirel. networks, vol. 11, no. 1–2, pp. 21–38, 2005.
[13] H. Tan, Y. Song, S. Xuan, S. Pan, and I. Chung, “Secure D2D group authentication
employing smartphone sensor behavior analysis,” Symmetry (Basel)., vol. 11, no. 8, p. 969,
2019.
[14] M. Wang and Z. Yan, “Privacy-preserving authentication and key agreement protocols
for D2D group communications,” IEEE Trans. Ind. Informatics, vol. 14, no. 8, pp. 3637–
3647, 2017.
[15] R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “GRAAD: Group anonymous and
accountable D2D communication in mobile networks,” IEEE Trans. Inf. Forensics Secur.,
vol. 13, no. 2, pp. 449–464, 2017.
4. [16] A. Zhang, L. Wang, X. Ye, and X. Lin, “Light-weight and robust security-aware D2D-
assist data transmission protocol for mobile-health systems,” IEEE Trans. Inf. Forensics
Secur., vol. 12, no. 3, pp. 662–675, 2016.
[17] A. Zhang, J. Chen, R. Q. Hu, and Y. Qian, “SeDS: Secure data sharing strategy for D2D
communication in LTE-Advanced networks,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp.
2659–2672, 2015.
[18] B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, “ProVerif 2.00: Automatic
Cryptographic Protocol Verifier, User Manual and Tutorial,” Version from, pp. 5–16, 2018.
5. SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO
CELLULAR NETWORKS
1Shiqi Xing, 2Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan
Sandrasegaran
Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia.
ABSTRACT
LTE is an emerging wireless communication technology to provide high- speed data service
for the mobile phones and data terminals. To improve indoor coverage and capacity
Femtocells are included in 3GPP since Release 8. There is no common simulation platform is
available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented
open source simulator which incorporates a complete protocol stack can be used for
simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides
the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment
with interference from Microcells and Macrocell users along with the scripting.
KEYWORDS
Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB),
Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to
Interference Plus Noise Ratio(SINR), Physical Layer(PHY)
Full Text : https://airccse.org/journal/jwmn/6614ijwmn01.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
7. EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF
THINGS: A COMPARATIVE STUDY
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung
School of Computing, Engineering and Mathematics, Western Sydney University, Sydney,
Australia
ABSTRACT
The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area
wireless networks and technologies into the designs of IoT applications. This enables
numerous business opportunities in fields as diverse as e-health, smart cities, smart homes,
among many others. This research analyses some of the major evolving and enabling wireless
technologies in the IoT. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low
Energy, LoRa, and the different versions of Wi-Fi including the recent IEEE 802.11ah
protocol. The studies evaluate the capabilities and behaviours of these technologies regarding
various metrics including the data range and rate, network size, RF Channels and Bandwidth,
and power consumption. It is concluded that there is a need to develop a multifaceted
technology approach to enable interoperable and secure communications in the IoT.
KEYWORDS
Internet of Things, Wireless Technologies, Low-power, M2M Communications.
Full Text : https://aircconline.com/ijwmn/V8N5/8516ijwmn05.pdf
Volume Link : https://airccse.org/journal/jwmn_current16.html
8. REFERENCES
[1] B. Sanou, "The World in 2013: ICT facts and figures," International Telecommunications
Union, 2013.
[2] C. V. N. Index, "Global mobile data traffic forecast update, 2010-2015," White Paper,
February, 2011.
[3] C. V. N. Index, "The zettabyte era–trends and analysis," Cisco white paper, 2013.
[4] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, "The applications of WiFi-based wireless
sensor network in internet of things and smart grid," in 2011 6th IEEE Conference on
Industrial Electronics and Applications (ICIEA), 2011, pp. 789-793.
[5] R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," Computer, pp. 28-
35, 2015.
[6] D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, "Wireless Sensor Networks and
the Internet of Things: Selected Challenges," presented at the The 8th GI/ITG
KuVSFachgesprächDrahtloseSensornetze, 2009.
[7] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf
protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE
Wireless Communications, vol. 20, pp. 91-98, 2013.
[8] S. Lee, D. Yoon, and A. Ghosh, "Intelligent parking lot application using wireless sensor
networks," in International Symposium on Collaborative Technologies and Systems, 2008,
pp. 4857.
[9] W. Lemstra, V. Hayes, and J. Groenewegen, The innovation journey of Wi-Fi: The road
to global success: Cambridge University Press, 2010.
[10] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al.,
"Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal
Processing Magazine, vol. 30, pp. 40- 60, 2013.
[11] E. Perahia and R. Stacey, Next Generation Wireless LANs: 802.11 n and 802.11 ac:
Cambridge university press, 2013.
[12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor
Networks: A Survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[13] L. Verma, M. Fakharzadeh, and S. Choi, "WiFi on Steroids: 802.11 ac and 802.11 ad,"
IEEE Wireless Communications, vol. 20, pp. 30-35, 2013.
[14] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, "IEEE 802.11 AH: theWiFi
approach for M2M communications," IEEE Wireless Communications, vol. 21, pp. 144-152,
2014.
[15] IEEE. (2015, 30/05/2014). IEEE P802.11 Sub 1GHz Study Group. Available:
http://www.ieee802.org/11/Reports/tgah_update.htm
[16] E. Khorov, A. Lyakhov, A. Krotov, and A. Guschin, "A survey on IEEE 802.11 ah: An
enabling networking technology for smart cities," Computer Communications, pp. 53-69,
2014.
9. [17] T. Adame, A. Bel, B. Bellalta, J. Barcelo, J. Gonzalez, and M. Oliver, "Capacity analysis
of IEEE 802.11 ah WLANs for M2M communications," in Multiple Access Communcations,
ed: Springer, 2013, pp. 139- 155.
[18] Qualcomm. (2014, 12/10/2014). Improving whole home coverage and power efficiency.
Available: https://www.qualcomm.com/invention/research/projects/wi-fi-evolution/80211ah
[19] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, "Performance
evaluation of IEEE 802.11 ah and its restricted access window mechanism," in 2014 IEEE
International Conference on Communications Workshops (ICC), 2014, pp. 460-466.
[20] S. Aust, R. V. Prasad, and I. G. Niemegeers, "Outdoor long-range WLANs: a lesson for
IEEE 802.11 ah," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1761-1775, 2015.
[21] P. Valerio. (2014) Can Sub-1GHz WiFi Solve The IoT Connectivity Issues? The New
Global Enterprise. Available: http://www.frontwave.eu/2014_12_01_archive.html
[22] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "IEEE 802.11
af: a standard for TV white space spectrum sharing," IEEE Communications Magazine, vol.
51, pp. 92100, 2013.
[23] S. K. Mohapatra, R. R. Choudhury, and P. Das, "The Future Directions in Evolving WI-
FI: Technologies, Applications, and Services," International Journal of Next-Generation
Networks, vol. 6, pp. 13-22, 2014.
[24] Bluetooth SIG. (2001, 01/05/2014). Bluetooth specification version 1.1. Available:
http://www.bluetooth.com
[25] (2015, 11/12/2014). Bluetooth Smart Technology: Powering the Internet of Things.
Available: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx
[26] J. Decuir, "Bluetooth Smart Support for 6LoBTLE: Applications and connection
questions," IEEE Consumer Electronics Magazine, vol. 4, pp. 67-70, 2015.
[27] Bluetooth SIG. (2012, 11/04/2015). Bluetooth Core Version 4.0. Available:
https://www.bluetooth.org/Technical/Specifications/adopted.htm
[28] J. Hui and D. Culler. 6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture.
Available: http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf
[29] M. B. Baria, A. P. Gharge, and N. D. Sheth, "A Review of Zigbee Smart Energy," in
International Journal of Engineering Development and Research, 2014.
[30] N. Baker, "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications,"
Computing and Control Engineering, vol. 16, pp. 20-25, 2005.
[31] A. J. Jara, L. Ladid, and A. F. Gómez-Skarmeta, "The Internet of Everything through
IPv6: An Analysis of Challenges, Solutions and Opportunities," JoWUA, vol. 4, pp. 97-118,
2013.
[32] L. Alliance, "LoRa alliance–wide area networks for IoT," ed, 2015.
[33] F. Siddiqui, S. Zeadally, and K. Salah, "Gigabit Wireless Networking with IEEE 802.11
ac: Technical Overview and Challenges," Journal of Networks, vol. 10, pp. 164-171, 2015.
10. [34] F. Stroud. (2015, 15/01/2015). 802.11ac. Available:
http://www.webopedia.com/TERM/8/802_11ac.html
[35] P. Anitha and C. Chandrasekar, "Energy Aware Routing Protocol ForZigbee Networks,"
Journal of Computer Applications (JCA), vol. 4, pp. 92-94, 2011.
[36] P. McDermott-Wells, "What is bluetooth?," IEEE Potentials, vol. 23, pp. 33-35, 2004.
[37] IEEE 802.11 Working Group, "IEEE Standard for Information Technology–
Telecommunications and information exchange between systems–Local and metropolitan
area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in
Vehicular Environments," IEEE Std, vol. 802, p. 11, 2010.
[38] A. Dementyev, S. Hodges, S. Taylor, and J. Smith, "Power Consumption Analysis of
Bluetooth Low Energy, ZigBee and ANT Sensor Nodes in a Cyclic Sleep Scenario "
Microsoft Research, pp. 1-5, 2013.
[39] B. B. Olyaei, J. Pirskanen, O. Raeesi, A. Hazmi, and M. Valkama, "Performance
comparison between slotted IEEE 802.15. 4 and IEEE 802.1 lah in IoT based applications,"
in IEEE 9th International Conference on Wireless and Mobile Computing, Networking and
Communications (WiMob), Lyon, France, 2013, pp. 332-337.
11. ENERGY EFFICIENT ANIMAL SOUND RECOGNITION SCHEME IN WIRELESS
ACOUSTIC SENSORS NETWORKS
Saad Al-Ahmadi and Badour AlMulhem
Department of Computer Science, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
Wireless sensor network (WSN) has proliferated rapidly as a cost-effective solution for data
aggregation and measurements under challenging environments. Sensors in WSNs are cheap,
powerful, and consume limited energy. The energy consumption is considered to be the
dominant concern because it has a direct and significant influence on the application’s
lifetime. Recently, the availability of small and inexpensive components such as microphones
has promoted the development of wireless acoustic sensor networks (WASNs). Examples of
WASN applications are hearing aids, acoustic monitoring, and ambient intelligence.
Monitoring animals, especially those that are becoming endangered, can assist with biology
researchers’ preservation efforts. In this work, we first focus on exploring the existing
methods used to monitor the animal by recognizing their sounds. Then we propose a new
energy-efficient approach for identifying animal sounds based on the frequency features
extracted from acoustic sensed data. This approach represents a suitable solution that can be
implemented and used in various applications. However, the proposed system considers the
balance between application efficiency and the sensor’s energy capabilities. The energy
savings will be achieved through processing the recognition tasks in each sensor, and the
recognition results will be sent to the base station.
KEYWORDS
Wireless Acoustic Sensor Network, Animal sound recognition, frequency features extraction,
energyefficient recognition schema in WASN
Full Text : https://aircconline.com/ijwmn/V12N4/12420ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current20.html
12. REFERENCES
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput.
Networks, vol. 52, no. 12, pp. 2292–2330, 2008.
[2] A. Bertrand, “Applications and trends in wireless acoustic sensor networks: A signal
processing perspective,” 2011 18th IEEE Symp. Commun. Veh. Technol. Benelux, SCVT,
2011, 2011.
[3] B. Chen, “Audio Recognition with Distributed Wireless Sensor Networks,” pp. 1–48,
2010.
[4] J. Xie, “Acoustic classification of Australian frogs for ecosystem surveys,” 2017.
[5] D. Mitrovic, M. Zeppelzauer, and C. Breiteneder, “Discrimination and Retrieval of
Animal Sounds,” 2006 12th Int. Multi-Media Model. Conf., pp. 339–343, 2005.
[6] J. Colonna, T. Peet, C. A. Ferreira, A. M. Jorge, E. F. Gomes, and J. Gama, “Automatic
Classification of Anuran Sounds Using Convolutional Neural Networks,” Proc. Ninth Int. C*
Conf. Comput. Sci. Softw. Eng. - C3S2E ’16, pp. 73–78, 2016.
[7] A. D. Mane, R. A. Rashmi, and S. L. Tade, “Identification & Detection System for
Animals from their Vocalization,” no. 3, pp. 1–6, 2013.
[8] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Frog call classification: a survey,” Artif. Intell.
Rev., pp. 1–17, 2016.
[9] M. P. Malumbres and C. Science, “On the Design of a Bioacoustic Sensor for the Early
Detection of the Red Palm Weevil,” pp. 1706–1729, 2013.
[10] P. Xie, Jie, Towsey, Michael, Yasumiba, Kiyomi, Zhang, Jinglan, Roe, “Detection of
anuran calling activity in long field recordings for bio-acoustic monitoring,” IEEE Int. Conf.,
2015.
[11] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Acoustic classification of Australian frogs
based on enhanced features and machine learning algorithms,” Appl. Acoust., vol. 113, pp.
193–201, 2016.
[12] Q. F. Gary G. Yen, “Automatic frog call monitoring system: a machine learning
approach,” Appl. Sci. Comput. Intell. V.
[13] C. J. Huang et al., “Intelligent feature extraction and classification of anuran
vocalizations,” Appl. Soft Comput. J., vol. 19, pp. 1–7, 2014.
[14] J. G. Colonna, A. D. Ribas, E. M. Santos, and E. F. Nakamura, “Feature Subset
Selection for Automatically Classifying Anuran Calls Using Sensor Networks,” pp. 10–15,
2012.
[15] Z. Chen and R. C. Maher, “Semi-automatic classification of bird vocalizations using
spectral peak tracks,” J. Acoust. Soc. Am., vol. 120, no. 5, pp. 2974–2984, 2006.
[16] C. J. Huang, Y. J. Yang, D. X. Yang, Y. J. Chen, and H. Y. Wei, “Realization of an
intelligent frog call identification agent,” Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4953 LNAI, pp. 93–102, 2008.
13. [17] C. Bedoya, J. M. Daza, and J. D. Lopez, “Automatic Recognition of Anuran Species
Based on Syllable Identification,” Ecol. Inform., vol. 24, no. January 2016, 2014.
[18] J. G. Colonna, M. Cristo, M. Salvatierra, and E. F. Nakamura, “An incremental
technique for realtime bioacoustic signal segmentation,” Expert Syst. Appl., vol. 42, no. 21,
pp. 7367–7374, 2015.
[19] C. J. Huang, Y. J. Yang, D. X. Yang, and Y. J. Chen, “Frog classification using machine
learning techniques,” Expert Syst. Appl., vol. 36, no. 2, PART 2, pp. 3737–3743, 2009.
[20] S. Chu, S. Narayanan, and C.-C. J. Kuo, “Environmental Sound Recognition With Time-
Frequency Audio Features,” IEEE Trans. Audio. Speech. Lang. Processing, vol. 17, no. 6, pp.
1142–1158, 2009.
[21] N. C. Han, S. V. Muniandy, and J. Dayou, “Acoustic classification of Australian anurans
based on hybrid spectral-entropy approach,” Appl. Acoust., vol. 72, no. 9, pp. 639–645, 2011.
[22] J. Xie, Z. Jinglan, and P. Roe, “Acoustic features for multi-level classification of
Australian frogs : Family, Genus and Species,” IEEE, pp. 1–5, 2015.
[23] J. Xie, M. Towsey, A. Truskinger, P. Eichinski, J. Zhang, and P. Roe, “Acoustic
classification of Australian anurans using syllable features,” Information, Commun. Signal
Process. (ICICS), 10th
Int. Conf. on. IEEE, 2015.
[24] A. Camacho, A. Garcia Rodriguez, and F. Bolanos, “Automatic detection of
vocalizations of the frog Diasporus hylaeformis in audio recordings,” J. Acoust. Soc. Am.,
vol. 130, no. 4, p. 2500, 2011.
[25] S. Gunasekaran and K. Revathy, “Automatic Recognition and Retrieval of Wild Animal
Vocalizations,” IJCTE Int. J. Comput. Theory Eng., vol. 3, no. 1, p. 136�140, 2011.
[26] J. Xie, M. Towsey, P. Eichinski, J. Zhang, and P. Roe, “Acoustic feature extraction
using perceptual wavelet packet decomposition for frog call classification,” Proc. - 11th IEEE
Int. Conf. eScience, eScience 2015, pp. 237–242, 2015.
[27] B. Croker and N. Kottege, “Using feature vectors to detect frog calls in wireless sensor
networks,” J. Acoust. Soc. Am., vol. 131, no. 5, pp. EL400–EL405, 2012.
[28] Vaca-Castano, Gonzalo, and D. Rodriguez, “Using Syllabic Mel Cepstrumfeatures and
K-Nearest Neighbors to Identify Anurans and Birds Species,” Signal Process. Syst. (SIPS),
2010 IEEE Work. On. IEEE, pp. 466–471, 2010.
[29] X. Dong, M. Towsey, J. Zhang, and P. Roe, “Compact Features for Birdcall Retrieval
from Environmental Acoustic Recordings,” Proc. - 15th IEEE Int. Conf. Data Min. Work.
ICDMW, 2015, pp. 762–767, 2016.
[30] M. Vasile, C. Rusu, R. Ciprian, and J. Astola, “Audio based solutions for detecting
intruders in wild areas,” Signal Processing, vol. 92, no. 3, pp. 829–840, 2012.
[31] M. Nikolic and J. Goldstein, “Enabling Signal Processing over Data Streams,” 2017.
[32] F. Alías, J. C. Socoró, and X. Sevillano, “A review of physical and perceptual feature
extraction techniques for speech, music and environmental sounds,” Appl. Sci., vol. 6, no. 5,
2016.
14. [33] S. Fagerlund, “Bird species recognition using support vector machines,” EURASIP J.
Adv. Signal Process., vol. 2007, 2007.
[34] D. Bzdok, M. Krzywinski, and N. Altman, “Machine learning : Supervised methods ,
SVM and kNN,” pp. 1–6, 2018.
[35] W. D Randall and M. Tony R, “Reduction Techniques for Instance-Based Learning
Algorithms,” Mach. Learn., vol. 38, pp. 257–286, 2000.
[36] K. J. Piczak, “ESC: Dataset for Environmental Sound Classification,” Proc. 23rd ACM
Int. Conf. Multimedia, MM 2015, pp. 1015–1018, 2015.
[37] Y. Aytar, C. Vondrick, and A. Torralba, “SoundNet: Learning Sound Representations
from Unlabeled Video,” no. Nips, 2016.
[38] F. Yu, “A Survey of Wireless Sensor Network Simulation Tools,” Washingt. Univ. St.
Louis, Dep. …, pp. 1–10, 2011.
[39] K. Erciyes, O. Dagdeviren, O. Yılmaz, and H. Gumus, “Modeling and Simulation Tools
for Mobile Ad Hoc Networks,” no. November, pp. 37–70, 2011.
15. PERFORMANCE EVALUATION AND ENHANCEMENT OF VLAN
VIA WIRELESS NETWORKS USING OPNET MODELER
Tareq Al-Khraishi and Muhannad Quwaider
Department of Computer Engineering, Jordan University of Science and Technology, Irbid ,
Jordan
ABSTRACT
A VLAN is a logical connection that allows hosts to be grouped together in the same
broadcast domain, so that packets are delivered only to ports that are combined to the same
VLAN. We can improve wireless network performance and save bandwidth through the
characteristic VLAN network. In addition, the implementation of VLAN greatly improves
wireless network security by reducing the number of hosts receiving copies of frames
broadcast by switches, thus keeping hosts holding critical data on a separate VLAN. In this
paper we compare wireless network with VLAN via wireless network. The proposed network
is evaluated within terms of delay and average throughput using web browsing applications
and file transfer in heavy traffic. The simulation was carried out using OPNET 14.5 modeler
and the results show that the use of VLAN via wireless network improved performance by
reducing traffic resulting in a minimized delay time. Furthermore, VLAN implementation
reduces network throughput because the traffic received and transmitted has a positive
relationship with throughput. Eventually, we investigated the use of adhoc routing protocols
such as AODV, DSR, OLSR, TORA and GPR to improve the performance of wireless
VLAN networks.
KEYWORDS
WLAN, OPNET, Throughput, VLAN, Routing Protocols, Access Point
Full Text : https://aircconline.com/ijwmn/V12N3/12320ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current20.html
16. REFERENCES
[1] Tambe, S. S., (2015) “Wireless technology in networks”, International Journal of
Scientific and Research Publications, Vol. 5, No. 7, pp1-3.
[2] Mittal, I., & Anand, A., (2014) “WLan Architecture. International Journal of Computer
Trends and Technology”, Vol. 8, No. 3, pp. 148-151.
[3] Alimi, I. A., & Mufutau, A. O., (2015) “Enhancement of network performance of an
enterprises network with VLAN”, American Journal of Mobile Systems, Applications and
Services, Vol. 1, No. 2, pp 82-93.
[4] Elechi Onyekachi O., (2014) “Design and Simulation of Wireless Local Area Network for
Administrative Office using OPNET Network Simulator: A Practical Approach”, Information
and Knowledge Management, Vol.4, No.10, pp. 27-34.
[5] Krupanek, B., & Bogacz, R., (2016) “OPNET Modeler simulations of performance for
multi nodes wireless systems”, International Journal of Metrology and Quality Engineering,
Vol. 7, No. 1, pp 105.
[6] H.S.Mewara , Mukesh Kumar Saini, (2014) “ Performance Analysis of Access Point for
IEEE802.11g Wireless LAN Using Opnet Simulator” , International Journal of Advanced
Engineering Research and Science (IJAERS), Vol.1, Issue.1, pp. 14-18.
[7] Sarah Ali Abdullah, (2016) “Simulation of Virtual LANs (VLANs) Using OPNET”,
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol .11, Issue.
6, Ver. II, pp. 67-80.
[8] AL-Khaffaf, D. A. J., (2018) “Improving LAN Performance Based on IEEE802. 1Q
VLAN Switching Techniques”, Journal of University of Babylon, Vol. 26, No. 1, pp 286-
297.
[9] Chokshi, R., & Yu, C, (2007) “Study on VLAN in Wireless Networks”, Technical Report.
[10] Ali, A. H., Abbas, A. N., & Hassan, M. H., (2013) “Performance Evaluation of
IEEE802. 11g WLANs Using OPNET Modeler”, American Journal of Engineering Research
(AJER), Vol. 2, Issue. 12, pp. 9-15.
[11] Meenakshi, Parneek Kaur, (2014) “Performance Metrics of WLAN for Different
Applications using OPNET”, International Journal of P2P Network Trends and Technology
(IJPTT), Vol. 4 Issue. 5.
[12] Alisa, Z. T., (2013) “Evaluating the performance of wireless network using OPNET
modeler”, International Journal of Computer Applications, Vol. 62, No. 13.
[13] Jayakumar, G., & Ganapathy, G., (2007) “Performance comparison of mobile ad-hoc
network routing protocol”, International Journal of Computer Science and Network Security
(IJCSNS), Vol. 7, No. 11, pp 77-84.
[14] Manickam, P., Baskar, T. G., Girija, M., & Manimegalai, D. D., (2011) “Performance
comparisons of routing protocols in mobile ad hoc networks”, arXiv preprint
arXiv:1103.0658.
[15] Shrivastava, L., Bhadauria, S. S., & Tomar, G. S., (2011) “Performance Evaluation of
Routing Protocols in MANET with different traffic loads”, In 2011 International Conference
on Communication Systems and Network Technologies (pp. 13-16). IEEE.
17. [16] Maheswara, P. V., & Naik, K. B., (2013) “Routing protocol performance issues and
evaluation considerations in MANET”, International Journal of Engineering Research and
Applications (IJERA), Vol. 3, Issue. 4, pp.01-05.
[17] Elsadig, M. A., & Fadlalla, Y. A. (2018) “Mobile Ad Hoc Network Routing Protocols:
Performance Evaluation and Assessment”, International Journal of Computing and Digital
Systems, Vol. 7, No. 1, pp 59-66.
[18] Kadyamatimba, A., Mbougni, M., Helberg, Z. P. N. A., & Dube, E., (2012)
“Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http
Traffic”, DOI: 10.7763/IPEDR, Vol. 54, No. 14, pp 69-74.
[19] M. Quwaider, J. Rao, and S. Biswas, (2008) “Neighborhood route diffusion for packet
salvaging in networks with high mobility”, in IEEE International Performance, Computing
and Communications Conference, pp. 168–175.
18. RACH CONGESTION IN VEHICULAR NETWORKING
Ramprasad Subramanian1 and Kumbesan Sandrasegaran2
1&2Centre for Real-time Information Networks, School of Computing and Communications,
Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia
ABSTRACT
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a
preferred choice for data for human to human (H2H) services and now it is becoming
preferred choice for voice also. In some developed countries the traditional 2G services
gradually decommissioned from the service and getting replaced with LTE for all H2H
services. LTE provided high downlink and uplink bandwidth capacity and is one of the
technology like mobile ad hoc network (MANET) and vehicular ad hoc network (VANET)
being used as the backbone communication infrastructure for vehicle networking
applications. When Compared to VANET and MANET, LTE provides wide area of coverage
and excellent infrastructure facilities for vehicle networking. This helps in transmitting the
vehicle information to the operator and downloading certain information into the vehicle
nodes (VNs) from the operators server. As per the ETSI publications the number of machine
to machine communication (MTC) devices are expected to touch 50 billion by 2020 and this
will surpass H2H communication. With growing congestion in the LTE network, accessing
the network for any request from VN especially during peak hour is a big challenge because
of the congestion in random access channel (RACH). In this paper we will analyse this
RACH congestion problem with the data from the live network. Lot of algorithms are
proposed for resolving the RACH congestion on the basis of simulation results so we would
like to present some practical data from the live network to this issue to understand the extent
RACH congestion issue in the real time scenario.
KEYWORDS
RACH; Congestion; LTE; Human to Human (H2H);Machine to Machine ( M2M);Vehicle
Nodes ( VN); Mobile ad hoc network (MANET);Vehicular ad hoc network ( VANET)
Full Text : https://airccse.org/journal/jwmn/6514ijwmn13.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
19. REFERENCES
[1] Bureau of Infrastructure, Transport and Regional Economics -BITRE, (2009)
"Greenhouse gas emissions from Australian transport: projections to 2020", Working paper
73, 2009, Canberra ACT.
[2] Deloitte survey, (2013) "State of the global mobile consumer - 2013 divergence deepens",
www.deloitte.com/globalmobile2013.
[3] Giuseppe Araniti, Claudia Campolo, Massimo Condoluci, Antonio Iera, and Antonella
Molinaro, (2013) "LTE for Vehicular Networking: A Survey", IEEE Communications
Magazine, May 2013, pp 148 - pp157.
[4] Min Chen, Jiafu Wan and Fang Li, (2012) “Machine-to-Machine Communications:
Architectures, Standards and Applications”, Transactions on Internet and Information
Systems, vol. 6, no. 2, February 2012.
[5] 3GPP TS 22.368 V11.3.0, (2011) “Service requirements for Machine-Type
Communications (MTC)" Stage 1, September 2011.
[6] ETSI, (2011) "Standards on Machine to Machine Communications", Mobile world
congress, Barcelona.
[7] NS-3: Simulator, http://www.nsnam.org/
20. PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING
WIRELESS LAN AND WAN USING DIFFERENT CODECS
Ali M. Alsahlany1
1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Technical Education, Iraq
ABSTRACT
A simulation model is presented to analyze and evaluate the performance of VoIP based
integrated wireless LAN/WAN with taking into account various voice encoding schemes.
The network model was simulated using OPNET Modeler software. Different parameters that
indicate the QoS like MOS, jitter, end to end delay, traffic send and traffic received are
calculated and analyzed in Wireless LAN/WAN scenarios. Depending on this evaluation,
Selection codecs G.729A consider the best choice for VoIP.
KEYWORDS
VoIP, Codecs, QoS
Full Text : https://airccse.org/journal/jwmn/6314ijwmn06.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
21. REFERENCES
[1] Y. Jung, and C. Manzano, "Burst packet loss and enhanced packet loss-based quality
model for mobile voice-over Internet protocol applications," Journal of IET Commun., Vol.
8, Iss. 1, pp. 41–49, 2014.
[2] K. Neupane, and et al, " Measuring the Performance of VoIP over Wireless LAN," In
Proceedings of the 2011 conference on Information technology education (SIGITE '11), New
York, USA, pp. 269- 274, 2011.
[3] S. Anand, and et al, " Performance Analysis of VoIP Traffic using various Protocols and
Throughput enhancement in WLANs," International Conference on Computer,
Communication and Electrical Technology," March 18-19, pp. 176-180, 2011.
[4] T. Anouari, and A. Haqiq, " Performance Analysis of VoIP Traffic in WiMAX using
various Service Classes," International Journal of Computer Applications,Vol. 52, No.20,
August, pp. 29-34, 2012.
[5] Abderrahmane Lakas, " Experimental Analysis of VoIP over Wireless Local Area
Networks," Journal of Communications, Vol. 2, No. 4, June , pp. 3-9, 2007.
[6] M. Atiur, and et al, " An Analytical Approach for Voice Capacity Estimation Over WiFi
Network Using ITU-T E-Model," IEEE Transactions on Multimedia, Vol. 16, No. 2, pp. 360-
372, Feb., 2014.
[7] Hussein, and et al, " The Effects of Different Queuing Algorithmswithin the Router on
QoS VoIP application Using OPNET," International Journal of Computer Networks &
Communications (IJCNC) Vol.5, No.1, Jan , pp. 117-124, 2013.
[8] Ayman Wazwaz, and et al, " Analysis of QoS parameters of VOIP calls over Wireless
Local Area Networks" The 13th International Arab Conference on Information Technology
ACIT', Dec.10-13, pp. 409-414, 2012.
[9] T. Daengsi, and et al, "A Study of Perceptual VoIP Quality Evaluation with Thai Users
and Codec Selection Using Voice Quality - Bandwidth Tradeoff Analysis," ICT Convergence
(ICTC), 2013 International Conference ,pp.691-696, 2013.
[10] S. Brak , and et al, " Speech Quality Evaluation Based CODEC for VOIP over 802.11P,"
International Journal of Wireless & Mobile Networks (IJWMN), Vol. 5, No. 2, April, pp. 59-
69, 2013.
[11] U. R. Alo, and Nweke Henry, " Investigating the Performance of VOIP over WLAN in
Campus Network," Journal of Computer Engineering and Intelligent Systems, Vol.4, No.4,
pp. 47-58, 2013.
22. PERFORMANCE COMPARISON OF LINK, NODE AND ZONE
DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM
HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
Natarajan Meghanathan
Jackson State University, 1400 Lynch St, Jackson, MS, USA
ABSTRACT
The high-level contribution of this paper is a simulation-based analysis to evaluate the
tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint
multi-path routes vis-à-vis singlepath minimum hop routes for mobile ad hoc networks. The
link-disjoint, node-disjoint and zone-disjoint algorithms proposed in this paper can be used to
arrive at benchmarks for the time between successive multi-path route discoveries, the
number of disjoint paths per multi-path set and the hop count per multipath set. We assume a
multi-path set exists as long as at least one path in the set exists. Simulation results indicate
that the number of zone-disjoint paths per multi-path set can be at most 2, which is far lower
than the number of node and link-disjoint paths available per multi-path set. Also, the time
between zonedisjoint multi-path discoveries would be far lower than the time between node
and link-disjoint multi-path route discoveries and can be at most 45% more than the time
between single minimum-hop path route discoveries. However, there is no appreciable
difference in the average hop counts per zone-disjoint, node-disjoint and link-disjoint multi-
path sets and it can be only at most 15% more than the average minimum hop count
determined using single-path routing. We also observe that even though the number of link-
disjoint paths per multi-path set can be as large as 35-78% more than the number of node-
disjoint paths per multi-path set, the time between two successive link-disjoint multi-path
discoveries can be at most 15-25% more than the time between two successive node-disjoint
multi-path discoveries, without any significant difference in the hop count per multi-path set.
KEYWORDS
Multi-path Routing, Zone-Disjoint, Node-Disjoint, Link-Disjoint, Single-path, Route
Discoveries, Hop Count
Full Text : https://airccse.org/journal/jwmn/1110ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current10.html
23. REFERENCES
[1] D. B. Johnson, D. A. Maltz and J. Broch, “DSR: The Dynamic Source Routing Protocol
for Multihop Wireless Ad hoc Networks,” Ad hoc Networking, edited by Charles E. Perkins,
Chapter 5, pp. 139 – 172, Addison Wesley, 2001.
[2] C. E. Perkins and E. M. Royer, “Ad hoc On-demand Distance Vector Routing,”
Proceedings of the 2nd Annual IEEE International Workshop on Mobile Computing Systems
and Applications, pp. 90 – 100, February 1999.
[3] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector
Routing for Mobile Computers,” ACM SIGCOMM, pp. 234 – 244, October 1994.
[4] J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu and J. Jetcheva, “A Performance of
Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols,” Proceedings of
MobiCom, pp. 85 – 97, October 1998.
[5] S. Mueller, R. P. Tsang and D. Ghosal, “Multipath Routing in Mobile Ad Hoc Networks:
Issues and Challenges,” Lecture Notes in Computer Science, Vol. 2965, pp. 209 – 234, April
2004.
[6] M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate
Path Routing for Load Balancing in Mobile Ad hoc Networks,” Proceedings of the 1st
Annual Workshop on Mobile Ad hoc Networking and Computing (MobiHoc), pp. 3 – 10,
August 2000.
[7] W. Xu, P. Yan and D. Xia, “Similar Node-Disjoint Multi-paths Routing in Wireless Ad
Hoc Networks,” Proceedings of the International Conference on Wireless Communications,
Networking and Mobile Computing, Vol. 2, pp. 731 – 734, September 2005.
[8] H. Wang, K. Ma and N. Yu, “Performance Analysis of Multi-path Routing in Wireless Ad
Hoc Networks,” Proceedings of the International Conference on Wireless Communications,
Networking and Mobile Computing, Vol. 2, pp. 723 – 726, September 2005.
[9] K. Wu and J. Harms, “On-demand Multipath Routing for Mobile Ad hoc Networks,”
Proceedings of the 4th European Personal Mobile Communications Conference (EPMCC),
February 2001.
[10] D. Saha, S. Toy, S. Bandyopadhyay, T. Ueda and S. Tanaka, “An Adaptive Framework
for Multipath Routing via Maximally Zone-Disjoint Shortest Paths in Ad hoc Wireless
Networks with Directional Antenna,” Proceedings of the IEEE Global Telecommunications
Conference (GLOBECOM), Vol. 1, pp. 226 – 230, December 2003.
[11] S. Waharte and R. Boutaba, “Totally Disjoint Multipath Routing in Multihop Wireless
Networks,” Proceedings of the IEEE International Conference on Communications (ICC),
Vol. 12, pp. 5576 – 5581, June 2006.
[12] S. Roy, D. Saha, S. Bandyopadhyay, T. Ueda and S. Tanaka, “Improving End-to-End
Delay through Load Balancing with Multipath Routing in Ad hoc Wireless Networks using
Directional Antenna,” Proceedings of the 5th International Workshop on Distributed
Computing, Lecture Notes in Computer Science (LNCS) 2918, pp. 225 – 234, December
2003.
24. [13] S. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc
Networks,” Proceedings of IEEE International Conference on Communications, Vol. 10, pp.
3201-3205, 2001.
[14] M. K. Marina and S. R. Das, “On-demand Multi-path Distance Vector Routing in Ad
Hoc Networks,” Proceedings of the IEEE International Conference on Network Protocols, pp.
14 – 23, Nov. 2001.
[15] L. Bononi and M. D. Felice, “Performance Analysis of Cross-layered Multi-path
Routing and MAC Layer Solutions for Multi-hop Ad Hoc Networks,” Proceedings of the
ACM International Workshop on Mobility Management and Wireless Access, pp. 190 – 197,
2006.
[16] A. Acharya, A. Misra and S. Bansal, “A Label-Switching Packet Forwarding
Architecture for Multihop Wireless LANs,” Proceedings of the 5th ACM International
Workshop on Wireless Mobile Multimedia, September 2002.
[17] Z. Ye, S. V. Krishnamurthy and S. K. Tripathi, “A Framework for Reliable Routing in
Mobile Ad Hoc Networks,” Proceedings of the IEEE International Conference on Computer
Communications, 2003.
[18] V. Loscri and S. Marano, “A New Geographic Multipath Protocol for Ad Hoc Networks
to Reduce the Route Coupling Phenomenon,” Proceedings of the 63rd IEEE Vehicular
Technology Conference, VTC 2006-Spring, Vol. 3, pp. 1102-1106, 2006.
[19] M. Li, L. Zhang, V. O. K. Li, X. Shan and Y. Ren, “An Energy-Aware Multipath
Routing Protocol for Mobile Ad Hoc Networks,” Proceedings of the ACM SIGCOMM Asia,
April 2005.
[20] N. T. Javan and M. Dehghan, “Reducing End-to-End Delay in Multi-path Routing
Algorithms for Mobile Ad hoc Networks,” Proceedings of the International Conference on
Mobile Ad hoc and Sensor Networks (MSN 2007), Lecture Notes in Computer Science
(LNCS) 4864, pp. 703 – 712, December 2007.
[21] S. Vijay, S. C. Sharma, V. Gupta and S. Kumar, “CZM-DSR: A New Cluster/Zone
Disjoint MultiPath Routing Algorithm for Mobile Ad Hoc Networks,” Proceedings of the
IEEE International Advanced Computing Conference (IACC), Patiala, India, pp. 480 – 485,
March 2009.
[22] I. S. Ibrahim, A. Etorban and P. J. B. King, “Multi-path Distance Vector Zone Routing
Protocol for Mobile Ad hoc Networks: MDVZRP,” Proceedings of the 9th Annual
Postgraduate Symposium on The Convergence of Telecommunications, Networking and
Broadcasting (PGET), June 2008.
[23] J. Zhang, C. K. Jeong, G. Y. Lee and H. J. Kim, “Cluster-based Multi-path Routing
Algorithm for Multi-hop Wireless Network,” International Journal of Future Generation
Communication and Networking, Vol. 1, No. 1, pp. 67 – 74, December 2008.
[24] D. Shin and D. Kim, “3DMRP: 3-Directional Zone-Disjoint Multi-path Routing
Protocol,” IEICE Transactions on Information and Systems, Vol. E92-D, No. 4, pp. 620-629,
April 2009.
[25] C. Bettstetter, H. Hartenstein and X. Perez-Costa, “Stochastic Properties of the Random-
Way Point Mobility Model,” Wireless Networks, pp. 555 – 567, Vol. 10, No. 5, Sept. 2004.
25. [26] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to Algorithms,”
2nd Edition, Chapter 23, pp. 561-579, MIT Press, 2001.
[27] G. Lim, K. Shin, S. Lee, H. Yoon and J. S. Ma, “Link Stability and Route Lifetime in Ad
hoc Wireless Networks,” Proceedings of International Conference on Parallel Processing
Workshops, pp. 116 – 123, August 2002.
[28] N. Meghanathan, “Impact of Range of Simulation Time and Network Shape on the Hop
Count and Stability of Routes in Mobile Ad hoc Networks,” IAENG International Journal of
Computer Science, Vol. 36, No. 1, #1, February 2009.
[29] G. G. Md. N. Ali, R. Chakraborty, Md. S. Alam and E. Chain, “An Efficient Approach
for Generalized Load Balancing in Multi-path Packet Switched Networks,” AIRCC
International Journal of Computer Networks and Communications, Vol. 2, No. 2, pp. 142-
153, March 2010.
[30] N. Cooper and N. Meghanathan, “Impact of Mobility Models on Multi-path Routing in
Mobile Ad hoc Networks,” AIRCC International Journal of Computer Networks and
Communications, Vol. 2, No. 1, pp. 185-174, January 2010.
26. INTERFERENCE TOLERANT MULTIUSER OFDMA FOR FEMTO
CELLS
Hadi Alasti
Department of Electrical Engineering, University of North Carolina at Charlotte
ABSTRACT
An interference tolerant OFDMA scheme is proposed for multiuser wireless communications
with specificapplication in femto cells. An interleaved set of subcarriers is dedicated to each
user to provide with ahigh order of frequency diversity. A reduced complexity digital
implementation of the technique is proposed and discussed for the interleaved sub-carrier
arrangement. Both inter-symbol interference andother-user interference are mitigated using a
proper cyclic extension, provided that the relative propagation delays of the users are an
integer multiple of a symbol period. The effect of other-userinterference due to non-integer
propagation delays is investigated using computer simulations. The biterror rate performance
and signal to interference ratio are presented for a few example systems overboth an Additive
White Gaussian Noise (AWGN) and a frequency selective Rayleigh fading channel.
Theamount of other-user interference is shown to be reduced as the number of sub-carriers
per user isincreased. The effect of design parameters on the interference level is discussed.
KEYWORDS
Multiuser OFDMA, Interference, Cyclic extension
Full Text : https://airccse.org/journal/jwmn/0210s11.pdf
Volume Link : https://airccse.org/journal/jwmn_current10.html
27. REFERENCES
[1] K. Pahlavan, A. Levesque, “Wireless Information Networks,” New York ,Wiley 1995.
[2] J.G. Proakis, “Digital Communications,” McGraw-Hill , 1995.
[3] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “On the performance of a coded MCM
over multipath Rayleigh fading channels,” IEEE - ICC’95 ,pp: 1689-1694
[4] A. Chini, “Multi Carrier Modulations in Frequency Selective Fading Channels,”Ph.D.
dissertation, Carleton University, Canada, 1994.
[5] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “Transmission of high rate ATM packets
over indoor radio channels,” IEEE JSAC ,Vol. 14 ,No. 3 ,pp: 469-476 ,April 1996.
[6] J.A.C. Bingham, “Multicarrier modulation for data transmission: An idea whose time has
come,” IEEE Commun. Magazine, pp: 5-14, May 1990.
[7] J.G. Proakis and D.G. Manolakis, “Introduction To Digital Signal Processing” ,Maxwell
Macmillan ,1989.
[8] S.B. Weinstein and P.M. Ebert, “Data transmission by frequency division multiplexing
using the discrete fourrier transform,” IEEE Trans. Communications. Vol. COM-19, No.5,
pp: 628-634, October 1971.
[9] T. S. Rappaport, “Wireless Communication Systems”, Prentice Hall, 1996.
[10] N. Suehiro, “A signal design without co-channel interference for approximately
synchronized CDMA systems,” IEEE J. Selected Areas in Communications, vol. JSAC-12,
pp. 837-841, June 1994.
[11] P.Z. Fan, N. Suehiro, N. Kuroyanagi and X.M. Deng, “Class of binary sequences with
zero correlation zone,” IEE Electronic Letters, vol. 36, pp. 777-779, May 1999
[12] R.D. Gaudenzi, C. Elia and R. Viola, “Bandlimited quasi-synchronous CDMA: a novel
satellite access technique for mobile and personal communication systems,” IEEE Journal on
Selected Areas in Communications, Vol. 10, Issue 2, pp.328 – 343, 1992.
[13] X.D. Lin and K.H. Chang, “Optimal PN sequence design for quasi-synchronous CDMA
communication systems,” IEEE Trans. Communications, vol. 45, pp. 221-226, 1997
[14] S.R. Park, I. Song, S. Yoon and J. Lee, “A new poly-phase sequence with perfect even
and good odd cross correlation function for DS/CDMA systems,” IEEE Trans. Vehi. Tech.,
vol. 51, No.5, 2002.
[15] Hadi Alasti, A. Chini, M.S. El-Tanany and S.A. Mahmoud, “A Discrete Multi-Carrier
Multiple Access (MCMA) Technique for Wireless Communications,” in the proceedings of
IEEE VTC98, Ottawa, Canada, May 18-21, 1998
[16] T. Seki, M. Itami, H. Ohta and K. Itoh, “A study of OFDM system applying frequency
diversity,” in the proceedings of the 11th IEEE International Symposium on Personal, Indoor
and Mobile Radio Communications,. PIMRC 2000, Vol. 2, pp.1385–1389, 2000.
[17] Hadi Alasti, “A Multi-Carrier Multiple Access Technique for Wireless
Communications,” Master Thesis, Isfahan University of Technology, Isfahan, IR, 1998.
28. [18] S. Zhou, G.B. Giannakis, “Frequency-hopped generalized MC-CDMA for multipath and
interference suppression,” in Proc. of MILCOM conference, pp.937-942, 2000.
[19] M. Morelli, C.-C.J. Kuo and M.-O. Pun, “Synchronization Techniques for Orthogonal
Frequency Division Multiple Access (OFDMA): A Tutorial Review,” IEEE Proceedings, vol.
95, Issue 7, pp.1394 – 1427, 2007.
29. MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN
DOWNLINK LTE SELF-ORGANIZING NETWORKS
Hana Jouini1, Mohamed Escheikh1, Kamel Barkaoui2 and Tahar Ezzedine1
1University of Tunis El Manar, Enit, Sys’Com , 1002 Tunis, Tunisia
2Cedric-Cnam : 2 Rue Conté 75003 Paris, France
ABSTRACT
This article investigates mobility load balancing (MLB) algorithm implementation through
network simulator (ns-3) in long term evolution (LTE) systems employing orthogonal
frequency division multiple access (OFDMA) for downlink (DL) data transmission. MLB is
introduced by the third generation partnership project (3GPP) as a key target of LTE self-
organizing networks (SONs) [1]. Our contribution is twofold. First, we implemented
elementary procedures (EPs) related to load management (LM) function of the X2-
application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’.
Second, we implemented a MLB based adaptive handover (HO) algorithm enabling to
configure adaptively HO hysteresis threshold for each neighbouring cell, of an overloaded
cell, according to its current load information. Numerical results show how, through suitable
simulation scenarios, MLB enables enhancing network performance in terms of overall
throughput, packet loss ratio (PLR) and fairness without incurring HO overhead.
KEYWORDS
LTE, load management, X2AP, elementary procedure, mobility load balancing
Full Text : https://aircconline.com/ijwmn/V8N4/8416ijwmn06.pdf
Volume Link : https://airccse.org/journal/jwmn_current16.html
30. REFERENCES
[1] European Telecommunications Standards Institute. LTE; Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON)
use cases and solutions, 2011.
[2] European Telecommunications Standards Institute. LTE; Evolved universal terrestrial
radio access network (E-UTRAN); X2 application protocol (X2AP), 2013.
[3] Kyuho Son, Song Chong, and G. Veciana. Dynamic association for load balancing and
interference avoidance in multi-cell networks. Wireless Communications, IEEE Transactions
on, 8(7):3566–3576, July 2009.
[4] P Mūnoz, R Barco, and I de la Bandera. Load balancing and handover joint optimization
in lte networks using fuzzy logic and reinforcement learning. Computer Networks, 76:112–
125, 2015.
[5] Wen-Yu Li, Xiang Zhang, Shu-Cong Jia, Xin-Yu Gu, Lin Zhang, Xiao-Yu Duan, and
JiaRu Lin. A novel dynamic adjusting algorithm for load balancing and handover co-
optimization in lte son. Journal of Computer Science and Technology, 28(3):437–444, 2013.
[6] Ridha Nasri and Zwi Altman. Handover adaptation for dynamic load balancing in 3gpp
long term evolution systems. arXiv preprint arXiv:1307.1212, 2013.
[7] Zhang Peng Huang, Jing Liu, Qiang Shen, Jin Wu, and Xiaoying Gan. A threshold-based
multi-traffic load balance mechanism in lte-a networks. In Wireless Communications and
Networking Conference (WCNC), 2015 IEEE, pages 1273–1278. IEEE, 2015.
[8] Qi-Ping Yang, Jae-Woo Kim, and Tae-Hyong Kim. Mobility prediction and load
balancing based adaptive handovers for lte systems. International Journal on Computer
Science and Engineering, 4(4):638, 2012.
[9] European Telecommunications Standards Institute. LTE ; Evolved Universal Terrestrial
Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, Nov. 2012.
[10] Lte protocols and specifications. http://lteworld.org/lte-protocols-specifications.
Accessed: Dec. 2015.
[11] X2 interface function in lte a connection between two enodebs.
http://www.teletopix.org/4g-lte/x2- interface-function-in-lte-a-connection-between-two-
enodebs/. Accessed: Dec. 2015.
[12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile
communications. John Wiley & Sons, 2012.
[13] Alcatel-lucent. The LTE Network Architecture: A comprehensive tutorial, 2013.
[14] Self-organizing networks. http://www.3gpp.org/technologies/keywords-acronyms/105-
son. Accessed: Dec. 2015.
[15] Panagiotis Fotiadis, Michele Polignano, Daniela Laselva, Benny Vejlgaard, Preben Mo-
gensen, Ralf Irmer, and Neil Scully. Multi-layer mobility load balancing in a heterogeneous
lte network. In Vehicular Technology Conference (VTC Fall), 2012 IEEE, pages 1–5. IEEE,
2012.
31. [16] Dah-Ming Chiu and Raj Jain. Analysis of the increase and decrease algorithms for
congestion avoidance in computer networks. Computer Networks and ISDN systems,
17(1):1–14, 1989.
[17] Network simulator 3. url: https://www.nsnam.org/. Accessed: Mai 2015.
[18] Nicola Baldo, Manuel Requena-Esteso, Marco Miozzo, and Raymond Kwan. An open
source model for the simulation of LTE handover scenarios and algorithms in ns-3.In
Proceedings of the 16th ACM international conference on Modelling, analysis & simulation
of wireless and mobile systems, pages 289–298. ACM, 2013.
[19] Tracy Camp, Jeff Boleng, and Vanessa Davies. A survey of mobility models for ad
hocnetwork research. Wireless communications and mobile computing, 2(5):483–502, 2002.
[20] Fan Bai and Ahmed Helmy. A survey of mobility models. Wireless Ad hoc
Networks.University of Southern California, USA, 206, 2004.
[21] European Telecommunications Standards Institute. Self-Organizing Networks (SON)
Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information
Service (IS), 2012.