SlideShare a Scribd company logo
1 of 31
Download to read offline
Top Ten Read Articles in
Wireless&Mobile Networks
International Journal of Wireless &
MobileNetworks (IJWMN)
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D
SCENARIOS
Hoda Nematy
Malek-Ashtar University of Technology, Shabanlou, Babaee Hwy, Lavizan,Tehran.
ABSTRACT
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular
network, D2D is considered as a novel channel of communication. This form of
communication has introduced for 4th cellular communication and enacts a significant role in
the 5th generation. Four D2D communication scenarios defined in the references, includes
direct D2D and relaying D2D communication both with and without cellular infrastructure.
One of the major challenges addressing D2D protocols contributes to the fact that they have
one single secure protocol that can adapt to the four scenarios. In the current study, we
propose a secure D2D protocol based on ARIADNE. To authenticate and key agreement
between Source and Destination, we employ LTE-A AKA protocol, further for broadcast
authentication between relaying nodes TESLA was applied. In Contrary to the recent
protocols, our proposed protocol has inconsiderable computation overhead and trivial
communication overhead than SODE and preserve many security properties such as
Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and Secure
Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure
Key Agreement of the proposed protocol with ProVerif verification tools.
KEYWORDS
5th generation, Four D2D scenarios, LTE-A AKA protocol, secure D2D protocol, ProVerif
Full Text : https://aircconline.com/ijwmn/V13N4/13421ijwmn01.pdf
Volume Link : https://airccse.org/journal/jwmn_current21.html
REFERENCES
[1] H. H. Hussein, H. A. Elsayed, and S. M. A. El-kader, “Intensive Benchmarking of D2D
communication over 5G cellular networks: prototype, integrated features, challenges, and
main applications,” Wirel. Networks, pp. 1–20, 2019.
[2] N. Kato, “On device-to-device (D2D) communication [Editor’s note],” IEEE Netw., vol.
30, no. 3, p. 2, 2016.
[3] Y.-D. Lin and Y.-C. Hsu, “Multihop cellular: A new architecture for wireless
communications,” in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE
Computer and Communications Societies. Proceedings. IEEE, 2000, vol. 3, pp. 1273–1282.
[4] D. Wu, L. Zhou, Y. Cai, R. Q. Hu, and Y. Qian, “The role of mobility for D2D
communications in LTE-Advanced networks: energy vs. bandwidth efficiency,” IEEE Wirel.
Commun., vol. 21, no. 2, pp. 66–71, 2014.
[5] N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5G: The next generation of mobile
communication,” Phys. Commun., vol. 18, pp. 64–84, 2016.
[6] S. K. Tetarave and S. Tripathy, “Secure Opportunistic Data Exchange Using Smart
Devices in 5G/LTEA Networks,” in International Conference on Security & Privacy, 2019,
pp. 3–16.
[7] T. Balan, A. Balan, and F. Sandu, “SDR Implementation of a D2D Security
Cryptographic Mechanism,” IEEE Access, vol. 7, pp. 38847–38855, 2019.
[8] L. Wang, Y. Tian, D. Zhang, and Y. Lu, “Constant-round authenticated and dynamic
group key agreement protocol for D2D group communications,” Inf. Sci. (Ny)., vol. 503, pp.
61–71, 2019.
[9] P. Gope, “LAAP: Lightweight Anonymous Authentication Protocol for D2D-Aided Fog
Computing Paradigm,” Comput. Secur., 2019.
[10] M. Cao et al., “Sec-D2D: A Secure and Lightweight D2D Communication System With
Multiple Sensors,” IEEE Access, vol. 7, pp. 33759–33770, 2019.
[11] P. P. Tayade and P. Vijayakumar, “Enhancement of Security and Confidentiality for
D2D Communication in LTE-Advanced Network Using Optimised Protocol,” in Wireless
Communication Networks and Internet of Things, Springer, 2019, pp. 131–139.
[12] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol
for ad hoc networks,” Wirel. networks, vol. 11, no. 1–2, pp. 21–38, 2005.
[13] H. Tan, Y. Song, S. Xuan, S. Pan, and I. Chung, “Secure D2D group authentication
employing smartphone sensor behavior analysis,” Symmetry (Basel)., vol. 11, no. 8, p. 969,
2019.
[14] M. Wang and Z. Yan, “Privacy-preserving authentication and key agreement protocols
for D2D group communications,” IEEE Trans. Ind. Informatics, vol. 14, no. 8, pp. 3637–
3647, 2017.
[15] R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “GRAAD: Group anonymous and
accountable D2D communication in mobile networks,” IEEE Trans. Inf. Forensics Secur.,
vol. 13, no. 2, pp. 449–464, 2017.
[16] A. Zhang, L. Wang, X. Ye, and X. Lin, “Light-weight and robust security-aware D2D-
assist data transmission protocol for mobile-health systems,” IEEE Trans. Inf. Forensics
Secur., vol. 12, no. 3, pp. 662–675, 2016.
[17] A. Zhang, J. Chen, R. Q. Hu, and Y. Qian, “SeDS: Secure data sharing strategy for D2D
communication in LTE-Advanced networks,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp.
2659–2672, 2015.
[18] B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, “ProVerif 2.00: Automatic
Cryptographic Protocol Verifier, User Manual and Tutorial,” Version from, pp. 5–16, 2018.
SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO
CELLULAR NETWORKS
1Shiqi Xing, 2Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan
Sandrasegaran
Centre for Real-time Information Networks
School of Computing and Communications, Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia.
ABSTRACT
LTE is an emerging wireless communication technology to provide high- speed data service
for the mobile phones and data terminals. To improve indoor coverage and capacity
Femtocells are included in 3GPP since Release 8. There is no common simulation platform is
available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented
open source simulator which incorporates a complete protocol stack can be used for
simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides
the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment
with interference from Microcells and Macrocell users along with the scripting.
KEYWORDS
Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB),
Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to
Interference Plus Noise Ratio(SINR), Physical Layer(PHY)
Full Text : https://airccse.org/journal/jwmn/6614ijwmn01.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork,
2008.
[2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile
Broadband. Academia Press, USA, 2008.
[3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE
femtocells using an open source simulator," in EURASIP Journal on Wireless
Communication and Networking, 2012.
[4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an
opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011.
[5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE
Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and
Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014.
[6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma
and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8
[7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie,
"Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE
Wireless Commun., vol. 18, pp. 22-30, 2011.
[8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells
in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE
Trans. Wireless Commun., vol. 18 pp. 2011.
[9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From
homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study,"
in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011.
[10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for
femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio
Commun. , Palo Alto, USA, pp. 1–5, 2009.
[11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN
WG1#42, London, UK, January 2006.
[12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network
research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug.
2002.
[13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation
framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and
Techniques(ICST), Desenzano, Italy, pp.1-3, 2012.
[14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF
THINGS: A COMPARATIVE STUDY
Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung
School of Computing, Engineering and Mathematics, Western Sydney University, Sydney,
Australia
ABSTRACT
The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area
wireless networks and technologies into the designs of IoT applications. This enables
numerous business opportunities in fields as diverse as e-health, smart cities, smart homes,
among many others. This research analyses some of the major evolving and enabling wireless
technologies in the IoT. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low
Energy, LoRa, and the different versions of Wi-Fi including the recent IEEE 802.11ah
protocol. The studies evaluate the capabilities and behaviours of these technologies regarding
various metrics including the data range and rate, network size, RF Channels and Bandwidth,
and power consumption. It is concluded that there is a need to develop a multifaceted
technology approach to enable interoperable and secure communications in the IoT.
KEYWORDS
Internet of Things, Wireless Technologies, Low-power, M2M Communications.
Full Text : https://aircconline.com/ijwmn/V8N5/8516ijwmn05.pdf
Volume Link : https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] B. Sanou, "The World in 2013: ICT facts and figures," International Telecommunications
Union, 2013.
[2] C. V. N. Index, "Global mobile data traffic forecast update, 2010-2015," White Paper,
February, 2011.
[3] C. V. N. Index, "The zettabyte era–trends and analysis," Cisco white paper, 2013.
[4] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, "The applications of WiFi-based wireless
sensor network in internet of things and smart grid," in 2011 6th IEEE Conference on
Industrial Electronics and Applications (ICIEA), 2011, pp. 789-793.
[5] R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," Computer, pp. 28-
35, 2015.
[6] D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, "Wireless Sensor Networks and
the Internet of Things: Selected Challenges," presented at the The 8th GI/ITG
KuVSFachgesprächDrahtloseSensornetze, 2009.
[7] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf
protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE
Wireless Communications, vol. 20, pp. 91-98, 2013.
[8] S. Lee, D. Yoon, and A. Ghosh, "Intelligent parking lot application using wireless sensor
networks," in International Symposium on Collaborative Technologies and Systems, 2008,
pp. 4857.
[9] W. Lemstra, V. Hayes, and J. Groenewegen, The innovation journey of Wi-Fi: The road
to global success: Cambridge University Press, 2010.
[10] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al.,
"Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal
Processing Magazine, vol. 30, pp. 40- 60, 2013.
[11] E. Perahia and R. Stacey, Next Generation Wireless LANs: 802.11 n and 802.11 ac:
Cambridge university press, 2013.
[12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor
Networks: A Survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[13] L. Verma, M. Fakharzadeh, and S. Choi, "WiFi on Steroids: 802.11 ac and 802.11 ad,"
IEEE Wireless Communications, vol. 20, pp. 30-35, 2013.
[14] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, "IEEE 802.11 AH: theWiFi
approach for M2M communications," IEEE Wireless Communications, vol. 21, pp. 144-152,
2014.
[15] IEEE. (2015, 30/05/2014). IEEE P802.11 Sub 1GHz Study Group. Available:
http://www.ieee802.org/11/Reports/tgah_update.htm
[16] E. Khorov, A. Lyakhov, A. Krotov, and A. Guschin, "A survey on IEEE 802.11 ah: An
enabling networking technology for smart cities," Computer Communications, pp. 53-69,
2014.
[17] T. Adame, A. Bel, B. Bellalta, J. Barcelo, J. Gonzalez, and M. Oliver, "Capacity analysis
of IEEE 802.11 ah WLANs for M2M communications," in Multiple Access Communcations,
ed: Springer, 2013, pp. 139- 155.
[18] Qualcomm. (2014, 12/10/2014). Improving whole home coverage and power efficiency.
Available: https://www.qualcomm.com/invention/research/projects/wi-fi-evolution/80211ah
[19] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, "Performance
evaluation of IEEE 802.11 ah and its restricted access window mechanism," in 2014 IEEE
International Conference on Communications Workshops (ICC), 2014, pp. 460-466.
[20] S. Aust, R. V. Prasad, and I. G. Niemegeers, "Outdoor long-range WLANs: a lesson for
IEEE 802.11 ah," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1761-1775, 2015.
[21] P. Valerio. (2014) Can Sub-1GHz WiFi Solve The IoT Connectivity Issues? The New
Global Enterprise. Available: http://www.frontwave.eu/2014_12_01_archive.html
[22] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "IEEE 802.11
af: a standard for TV white space spectrum sharing," IEEE Communications Magazine, vol.
51, pp. 92100, 2013.
[23] S. K. Mohapatra, R. R. Choudhury, and P. Das, "The Future Directions in Evolving WI-
FI: Technologies, Applications, and Services," International Journal of Next-Generation
Networks, vol. 6, pp. 13-22, 2014.
[24] Bluetooth SIG. (2001, 01/05/2014). Bluetooth specification version 1.1. Available:
http://www.bluetooth.com
[25] (2015, 11/12/2014). Bluetooth Smart Technology: Powering the Internet of Things.
Available: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx
[26] J. Decuir, "Bluetooth Smart Support for 6LoBTLE: Applications and connection
questions," IEEE Consumer Electronics Magazine, vol. 4, pp. 67-70, 2015.
[27] Bluetooth SIG. (2012, 11/04/2015). Bluetooth Core Version 4.0. Available:
https://www.bluetooth.org/Technical/Specifications/adopted.htm
[28] J. Hui and D. Culler. 6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture.
Available: http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf
[29] M. B. Baria, A. P. Gharge, and N. D. Sheth, "A Review of Zigbee Smart Energy," in
International Journal of Engineering Development and Research, 2014.
[30] N. Baker, "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications,"
Computing and Control Engineering, vol. 16, pp. 20-25, 2005.
[31] A. J. Jara, L. Ladid, and A. F. Gómez-Skarmeta, "The Internet of Everything through
IPv6: An Analysis of Challenges, Solutions and Opportunities," JoWUA, vol. 4, pp. 97-118,
2013.
[32] L. Alliance, "LoRa alliance–wide area networks for IoT," ed, 2015.
[33] F. Siddiqui, S. Zeadally, and K. Salah, "Gigabit Wireless Networking with IEEE 802.11
ac: Technical Overview and Challenges," Journal of Networks, vol. 10, pp. 164-171, 2015.
[34] F. Stroud. (2015, 15/01/2015). 802.11ac. Available:
http://www.webopedia.com/TERM/8/802_11ac.html
[35] P. Anitha and C. Chandrasekar, "Energy Aware Routing Protocol ForZigbee Networks,"
Journal of Computer Applications (JCA), vol. 4, pp. 92-94, 2011.
[36] P. McDermott-Wells, "What is bluetooth?," IEEE Potentials, vol. 23, pp. 33-35, 2004.
[37] IEEE 802.11 Working Group, "IEEE Standard for Information Technology–
Telecommunications and information exchange between systems–Local and metropolitan
area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in
Vehicular Environments," IEEE Std, vol. 802, p. 11, 2010.
[38] A. Dementyev, S. Hodges, S. Taylor, and J. Smith, "Power Consumption Analysis of
Bluetooth Low Energy, ZigBee and ANT Sensor Nodes in a Cyclic Sleep Scenario "
Microsoft Research, pp. 1-5, 2013.
[39] B. B. Olyaei, J. Pirskanen, O. Raeesi, A. Hazmi, and M. Valkama, "Performance
comparison between slotted IEEE 802.15. 4 and IEEE 802.1 lah in IoT based applications,"
in IEEE 9th International Conference on Wireless and Mobile Computing, Networking and
Communications (WiMob), Lyon, France, 2013, pp. 332-337.
ENERGY EFFICIENT ANIMAL SOUND RECOGNITION SCHEME IN WIRELESS
ACOUSTIC SENSORS NETWORKS
Saad Al-Ahmadi and Badour AlMulhem
Department of Computer Science, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
Wireless sensor network (WSN) has proliferated rapidly as a cost-effective solution for data
aggregation and measurements under challenging environments. Sensors in WSNs are cheap,
powerful, and consume limited energy. The energy consumption is considered to be the
dominant concern because it has a direct and significant influence on the application’s
lifetime. Recently, the availability of small and inexpensive components such as microphones
has promoted the development of wireless acoustic sensor networks (WASNs). Examples of
WASN applications are hearing aids, acoustic monitoring, and ambient intelligence.
Monitoring animals, especially those that are becoming endangered, can assist with biology
researchers’ preservation efforts. In this work, we first focus on exploring the existing
methods used to monitor the animal by recognizing their sounds. Then we propose a new
energy-efficient approach for identifying animal sounds based on the frequency features
extracted from acoustic sensed data. This approach represents a suitable solution that can be
implemented and used in various applications. However, the proposed system considers the
balance between application efficiency and the sensor’s energy capabilities. The energy
savings will be achieved through processing the recognition tasks in each sensor, and the
recognition results will be sent to the base station.
KEYWORDS
Wireless Acoustic Sensor Network, Animal sound recognition, frequency features extraction,
energyefficient recognition schema in WASN
Full Text : https://aircconline.com/ijwmn/V12N4/12420ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current20.html
REFERENCES
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput.
Networks, vol. 52, no. 12, pp. 2292–2330, 2008.
[2] A. Bertrand, “Applications and trends in wireless acoustic sensor networks: A signal
processing perspective,” 2011 18th IEEE Symp. Commun. Veh. Technol. Benelux, SCVT,
2011, 2011.
[3] B. Chen, “Audio Recognition with Distributed Wireless Sensor Networks,” pp. 1–48,
2010.
[4] J. Xie, “Acoustic classification of Australian frogs for ecosystem surveys,” 2017.
[5] D. Mitrovic, M. Zeppelzauer, and C. Breiteneder, “Discrimination and Retrieval of
Animal Sounds,” 2006 12th Int. Multi-Media Model. Conf., pp. 339–343, 2005.
[6] J. Colonna, T. Peet, C. A. Ferreira, A. M. Jorge, E. F. Gomes, and J. Gama, “Automatic
Classification of Anuran Sounds Using Convolutional Neural Networks,” Proc. Ninth Int. C*
Conf. Comput. Sci. Softw. Eng. - C3S2E ’16, pp. 73–78, 2016.
[7] A. D. Mane, R. A. Rashmi, and S. L. Tade, “Identification & Detection System for
Animals from their Vocalization,” no. 3, pp. 1–6, 2013.
[8] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Frog call classification: a survey,” Artif. Intell.
Rev., pp. 1–17, 2016.
[9] M. P. Malumbres and C. Science, “On the Design of a Bioacoustic Sensor for the Early
Detection of the Red Palm Weevil,” pp. 1706–1729, 2013.
[10] P. Xie, Jie, Towsey, Michael, Yasumiba, Kiyomi, Zhang, Jinglan, Roe, “Detection of
anuran calling activity in long field recordings for bio-acoustic monitoring,” IEEE Int. Conf.,
2015.
[11] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Acoustic classification of Australian frogs
based on enhanced features and machine learning algorithms,” Appl. Acoust., vol. 113, pp.
193–201, 2016.
[12] Q. F. Gary G. Yen, “Automatic frog call monitoring system: a machine learning
approach,” Appl. Sci. Comput. Intell. V.
[13] C. J. Huang et al., “Intelligent feature extraction and classification of anuran
vocalizations,” Appl. Soft Comput. J., vol. 19, pp. 1–7, 2014.
[14] J. G. Colonna, A. D. Ribas, E. M. Santos, and E. F. Nakamura, “Feature Subset
Selection for Automatically Classifying Anuran Calls Using Sensor Networks,” pp. 10–15,
2012.
[15] Z. Chen and R. C. Maher, “Semi-automatic classification of bird vocalizations using
spectral peak tracks,” J. Acoust. Soc. Am., vol. 120, no. 5, pp. 2974–2984, 2006.
[16] C. J. Huang, Y. J. Yang, D. X. Yang, Y. J. Chen, and H. Y. Wei, “Realization of an
intelligent frog call identification agent,” Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4953 LNAI, pp. 93–102, 2008.
[17] C. Bedoya, J. M. Daza, and J. D. Lopez, “Automatic Recognition of Anuran Species
Based on Syllable Identification,” Ecol. Inform., vol. 24, no. January 2016, 2014.
[18] J. G. Colonna, M. Cristo, M. Salvatierra, and E. F. Nakamura, “An incremental
technique for realtime bioacoustic signal segmentation,” Expert Syst. Appl., vol. 42, no. 21,
pp. 7367–7374, 2015.
[19] C. J. Huang, Y. J. Yang, D. X. Yang, and Y. J. Chen, “Frog classification using machine
learning techniques,” Expert Syst. Appl., vol. 36, no. 2, PART 2, pp. 3737–3743, 2009.
[20] S. Chu, S. Narayanan, and C.-C. J. Kuo, “Environmental Sound Recognition With Time-
Frequency Audio Features,” IEEE Trans. Audio. Speech. Lang. Processing, vol. 17, no. 6, pp.
1142–1158, 2009.
[21] N. C. Han, S. V. Muniandy, and J. Dayou, “Acoustic classification of Australian anurans
based on hybrid spectral-entropy approach,” Appl. Acoust., vol. 72, no. 9, pp. 639–645, 2011.
[22] J. Xie, Z. Jinglan, and P. Roe, “Acoustic features for multi-level classification of
Australian frogs : Family, Genus and Species,” IEEE, pp. 1–5, 2015.
[23] J. Xie, M. Towsey, A. Truskinger, P. Eichinski, J. Zhang, and P. Roe, “Acoustic
classification of Australian anurans using syllable features,” Information, Commun. Signal
Process. (ICICS), 10th
Int. Conf. on. IEEE, 2015.
[24] A. Camacho, A. Garcia Rodriguez, and F. Bolanos, “Automatic detection of
vocalizations of the frog Diasporus hylaeformis in audio recordings,” J. Acoust. Soc. Am.,
vol. 130, no. 4, p. 2500, 2011.
[25] S. Gunasekaran and K. Revathy, “Automatic Recognition and Retrieval of Wild Animal
Vocalizations,” IJCTE Int. J. Comput. Theory Eng., vol. 3, no. 1, p. 136�140, 2011.
[26] J. Xie, M. Towsey, P. Eichinski, J. Zhang, and P. Roe, “Acoustic feature extraction
using perceptual wavelet packet decomposition for frog call classification,” Proc. - 11th IEEE
Int. Conf. eScience, eScience 2015, pp. 237–242, 2015.
[27] B. Croker and N. Kottege, “Using feature vectors to detect frog calls in wireless sensor
networks,” J. Acoust. Soc. Am., vol. 131, no. 5, pp. EL400–EL405, 2012.
[28] Vaca-Castano, Gonzalo, and D. Rodriguez, “Using Syllabic Mel Cepstrumfeatures and
K-Nearest Neighbors to Identify Anurans and Birds Species,” Signal Process. Syst. (SIPS),
2010 IEEE Work. On. IEEE, pp. 466–471, 2010.
[29] X. Dong, M. Towsey, J. Zhang, and P. Roe, “Compact Features for Birdcall Retrieval
from Environmental Acoustic Recordings,” Proc. - 15th IEEE Int. Conf. Data Min. Work.
ICDMW, 2015, pp. 762–767, 2016.
[30] M. Vasile, C. Rusu, R. Ciprian, and J. Astola, “Audio based solutions for detecting
intruders in wild areas,” Signal Processing, vol. 92, no. 3, pp. 829–840, 2012.
[31] M. Nikolic and J. Goldstein, “Enabling Signal Processing over Data Streams,” 2017.
[32] F. Alías, J. C. Socoró, and X. Sevillano, “A review of physical and perceptual feature
extraction techniques for speech, music and environmental sounds,” Appl. Sci., vol. 6, no. 5,
2016.
[33] S. Fagerlund, “Bird species recognition using support vector machines,” EURASIP J.
Adv. Signal Process., vol. 2007, 2007.
[34] D. Bzdok, M. Krzywinski, and N. Altman, “Machine learning : Supervised methods ,
SVM and kNN,” pp. 1–6, 2018.
[35] W. D Randall and M. Tony R, “Reduction Techniques for Instance-Based Learning
Algorithms,” Mach. Learn., vol. 38, pp. 257–286, 2000.
[36] K. J. Piczak, “ESC: Dataset for Environmental Sound Classification,” Proc. 23rd ACM
Int. Conf. Multimedia, MM 2015, pp. 1015–1018, 2015.
[37] Y. Aytar, C. Vondrick, and A. Torralba, “SoundNet: Learning Sound Representations
from Unlabeled Video,” no. Nips, 2016.
[38] F. Yu, “A Survey of Wireless Sensor Network Simulation Tools,” Washingt. Univ. St.
Louis, Dep. …, pp. 1–10, 2011.
[39] K. Erciyes, O. Dagdeviren, O. Yılmaz, and H. Gumus, “Modeling and Simulation Tools
for Mobile Ad Hoc Networks,” no. November, pp. 37–70, 2011.
PERFORMANCE EVALUATION AND ENHANCEMENT OF VLAN
VIA WIRELESS NETWORKS USING OPNET MODELER
Tareq Al-Khraishi and Muhannad Quwaider
Department of Computer Engineering, Jordan University of Science and Technology, Irbid ,
Jordan
ABSTRACT
A VLAN is a logical connection that allows hosts to be grouped together in the same
broadcast domain, so that packets are delivered only to ports that are combined to the same
VLAN. We can improve wireless network performance and save bandwidth through the
characteristic VLAN network. In addition, the implementation of VLAN greatly improves
wireless network security by reducing the number of hosts receiving copies of frames
broadcast by switches, thus keeping hosts holding critical data on a separate VLAN. In this
paper we compare wireless network with VLAN via wireless network. The proposed network
is evaluated within terms of delay and average throughput using web browsing applications
and file transfer in heavy traffic. The simulation was carried out using OPNET 14.5 modeler
and the results show that the use of VLAN via wireless network improved performance by
reducing traffic resulting in a minimized delay time. Furthermore, VLAN implementation
reduces network throughput because the traffic received and transmitted has a positive
relationship with throughput. Eventually, we investigated the use of adhoc routing protocols
such as AODV, DSR, OLSR, TORA and GPR to improve the performance of wireless
VLAN networks.
KEYWORDS
WLAN, OPNET, Throughput, VLAN, Routing Protocols, Access Point
Full Text : https://aircconline.com/ijwmn/V12N3/12320ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current20.html
REFERENCES
[1] Tambe, S. S., (2015) “Wireless technology in networks”, International Journal of
Scientific and Research Publications, Vol. 5, No. 7, pp1-3.
[2] Mittal, I., & Anand, A., (2014) “WLan Architecture. International Journal of Computer
Trends and Technology”, Vol. 8, No. 3, pp. 148-151.
[3] Alimi, I. A., & Mufutau, A. O., (2015) “Enhancement of network performance of an
enterprises network with VLAN”, American Journal of Mobile Systems, Applications and
Services, Vol. 1, No. 2, pp 82-93.
[4] Elechi Onyekachi O., (2014) “Design and Simulation of Wireless Local Area Network for
Administrative Office using OPNET Network Simulator: A Practical Approach”, Information
and Knowledge Management, Vol.4, No.10, pp. 27-34.
[5] Krupanek, B., & Bogacz, R., (2016) “OPNET Modeler simulations of performance for
multi nodes wireless systems”, International Journal of Metrology and Quality Engineering,
Vol. 7, No. 1, pp 105.
[6] H.S.Mewara , Mukesh Kumar Saini, (2014) “ Performance Analysis of Access Point for
IEEE802.11g Wireless LAN Using Opnet Simulator” , International Journal of Advanced
Engineering Research and Science (IJAERS), Vol.1, Issue.1, pp. 14-18.
[7] Sarah Ali Abdullah, (2016) “Simulation of Virtual LANs (VLANs) Using OPNET”,
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol .11, Issue.
6, Ver. II, pp. 67-80.
[8] AL-Khaffaf, D. A. J., (2018) “Improving LAN Performance Based on IEEE802. 1Q
VLAN Switching Techniques”, Journal of University of Babylon, Vol. 26, No. 1, pp 286-
297.
[9] Chokshi, R., & Yu, C, (2007) “Study on VLAN in Wireless Networks”, Technical Report.
[10] Ali, A. H., Abbas, A. N., & Hassan, M. H., (2013) “Performance Evaluation of
IEEE802. 11g WLANs Using OPNET Modeler”, American Journal of Engineering Research
(AJER), Vol. 2, Issue. 12, pp. 9-15.
[11] Meenakshi, Parneek Kaur, (2014) “Performance Metrics of WLAN for Different
Applications using OPNET”, International Journal of P2P Network Trends and Technology
(IJPTT), Vol. 4 Issue. 5.
[12] Alisa, Z. T., (2013) “Evaluating the performance of wireless network using OPNET
modeler”, International Journal of Computer Applications, Vol. 62, No. 13.
[13] Jayakumar, G., & Ganapathy, G., (2007) “Performance comparison of mobile ad-hoc
network routing protocol”, International Journal of Computer Science and Network Security
(IJCSNS), Vol. 7, No. 11, pp 77-84.
[14] Manickam, P., Baskar, T. G., Girija, M., & Manimegalai, D. D., (2011) “Performance
comparisons of routing protocols in mobile ad hoc networks”, arXiv preprint
arXiv:1103.0658.
[15] Shrivastava, L., Bhadauria, S. S., & Tomar, G. S., (2011) “Performance Evaluation of
Routing Protocols in MANET with different traffic loads”, In 2011 International Conference
on Communication Systems and Network Technologies (pp. 13-16). IEEE.
[16] Maheswara, P. V., & Naik, K. B., (2013) “Routing protocol performance issues and
evaluation considerations in MANET”, International Journal of Engineering Research and
Applications (IJERA), Vol. 3, Issue. 4, pp.01-05.
[17] Elsadig, M. A., & Fadlalla, Y. A. (2018) “Mobile Ad Hoc Network Routing Protocols:
Performance Evaluation and Assessment”, International Journal of Computing and Digital
Systems, Vol. 7, No. 1, pp 59-66.
[18] Kadyamatimba, A., Mbougni, M., Helberg, Z. P. N. A., & Dube, E., (2012)
“Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http
Traffic”, DOI: 10.7763/IPEDR, Vol. 54, No. 14, pp 69-74.
[19] M. Quwaider, J. Rao, and S. Biswas, (2008) “Neighborhood route diffusion for packet
salvaging in networks with high mobility”, in IEEE International Performance, Computing
and Communications Conference, pp. 168–175.
RACH CONGESTION IN VEHICULAR NETWORKING
Ramprasad Subramanian1 and Kumbesan Sandrasegaran2
1&2Centre for Real-time Information Networks, School of Computing and Communications,
Faculty of Engineering and Information
Technology, University of Technology Sydney, Sydney, Australia
ABSTRACT
Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a
preferred choice for data for human to human (H2H) services and now it is becoming
preferred choice for voice also. In some developed countries the traditional 2G services
gradually decommissioned from the service and getting replaced with LTE for all H2H
services. LTE provided high downlink and uplink bandwidth capacity and is one of the
technology like mobile ad hoc network (MANET) and vehicular ad hoc network (VANET)
being used as the backbone communication infrastructure for vehicle networking
applications. When Compared to VANET and MANET, LTE provides wide area of coverage
and excellent infrastructure facilities for vehicle networking. This helps in transmitting the
vehicle information to the operator and downloading certain information into the vehicle
nodes (VNs) from the operators server. As per the ETSI publications the number of machine
to machine communication (MTC) devices are expected to touch 50 billion by 2020 and this
will surpass H2H communication. With growing congestion in the LTE network, accessing
the network for any request from VN especially during peak hour is a big challenge because
of the congestion in random access channel (RACH). In this paper we will analyse this
RACH congestion problem with the data from the live network. Lot of algorithms are
proposed for resolving the RACH congestion on the basis of simulation results so we would
like to present some practical data from the live network to this issue to understand the extent
RACH congestion issue in the real time scenario.
KEYWORDS
RACH; Congestion; LTE; Human to Human (H2H);Machine to Machine ( M2M);Vehicle
Nodes ( VN); Mobile ad hoc network (MANET);Vehicular ad hoc network ( VANET)
Full Text : https://airccse.org/journal/jwmn/6514ijwmn13.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] Bureau of Infrastructure, Transport and Regional Economics -BITRE, (2009)
"Greenhouse gas emissions from Australian transport: projections to 2020", Working paper
73, 2009, Canberra ACT.
[2] Deloitte survey, (2013) "State of the global mobile consumer - 2013 divergence deepens",
www.deloitte.com/globalmobile2013.
[3] Giuseppe Araniti, Claudia Campolo, Massimo Condoluci, Antonio Iera, and Antonella
Molinaro, (2013) "LTE for Vehicular Networking: A Survey", IEEE Communications
Magazine, May 2013, pp 148 - pp157.
[4] Min Chen, Jiafu Wan and Fang Li, (2012) “Machine-to-Machine Communications:
Architectures, Standards and Applications”, Transactions on Internet and Information
Systems, vol. 6, no. 2, February 2012.
[5] 3GPP TS 22.368 V11.3.0, (2011) “Service requirements for Machine-Type
Communications (MTC)" Stage 1, September 2011.
[6] ETSI, (2011) "Standards on Machine to Machine Communications", Mobile world
congress, Barcelona.
[7] NS-3: Simulator, http://www.nsnam.org/
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING
WIRELESS LAN AND WAN USING DIFFERENT CODECS
Ali M. Alsahlany1
1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Technical Education, Iraq
ABSTRACT
A simulation model is presented to analyze and evaluate the performance of VoIP based
integrated wireless LAN/WAN with taking into account various voice encoding schemes.
The network model was simulated using OPNET Modeler software. Different parameters that
indicate the QoS like MOS, jitter, end to end delay, traffic send and traffic received are
calculated and analyzed in Wireless LAN/WAN scenarios. Depending on this evaluation,
Selection codecs G.729A consider the best choice for VoIP.
KEYWORDS
VoIP, Codecs, QoS
Full Text : https://airccse.org/journal/jwmn/6314ijwmn06.pdf
Volume Link : https://airccse.org/journal/jwmn_current14.html
REFERENCES
[1] Y. Jung, and C. Manzano, "Burst packet loss and enhanced packet loss-based quality
model for mobile voice-over Internet protocol applications," Journal of IET Commun., Vol.
8, Iss. 1, pp. 41–49, 2014.
[2] K. Neupane, and et al, " Measuring the Performance of VoIP over Wireless LAN," In
Proceedings of the 2011 conference on Information technology education (SIGITE '11), New
York, USA, pp. 269- 274, 2011.
[3] S. Anand, and et al, " Performance Analysis of VoIP Traffic using various Protocols and
Throughput enhancement in WLANs," International Conference on Computer,
Communication and Electrical Technology," March 18-19, pp. 176-180, 2011.
[4] T. Anouari, and A. Haqiq, " Performance Analysis of VoIP Traffic in WiMAX using
various Service Classes," International Journal of Computer Applications,Vol. 52, No.20,
August, pp. 29-34, 2012.
[5] Abderrahmane Lakas, " Experimental Analysis of VoIP over Wireless Local Area
Networks," Journal of Communications, Vol. 2, No. 4, June , pp. 3-9, 2007.
[6] M. Atiur, and et al, " An Analytical Approach for Voice Capacity Estimation Over WiFi
Network Using ITU-T E-Model," IEEE Transactions on Multimedia, Vol. 16, No. 2, pp. 360-
372, Feb., 2014.
[7] Hussein, and et al, " The Effects of Different Queuing Algorithmswithin the Router on
QoS VoIP application Using OPNET," International Journal of Computer Networks &
Communications (IJCNC) Vol.5, No.1, Jan , pp. 117-124, 2013.
[8] Ayman Wazwaz, and et al, " Analysis of QoS parameters of VOIP calls over Wireless
Local Area Networks" The 13th International Arab Conference on Information Technology
ACIT', Dec.10-13, pp. 409-414, 2012.
[9] T. Daengsi, and et al, "A Study of Perceptual VoIP Quality Evaluation with Thai Users
and Codec Selection Using Voice Quality - Bandwidth Tradeoff Analysis," ICT Convergence
(ICTC), 2013 International Conference ,pp.691-696, 2013.
[10] S. Brak , and et al, " Speech Quality Evaluation Based CODEC for VOIP over 802.11P,"
International Journal of Wireless & Mobile Networks (IJWMN), Vol. 5, No. 2, April, pp. 59-
69, 2013.
[11] U. R. Alo, and Nweke Henry, " Investigating the Performance of VOIP over WLAN in
Campus Network," Journal of Computer Engineering and Intelligent Systems, Vol.4, No.4,
pp. 47-58, 2013.
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE
DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM
HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
Natarajan Meghanathan
Jackson State University, 1400 Lynch St, Jackson, MS, USA
ABSTRACT
The high-level contribution of this paper is a simulation-based analysis to evaluate the
tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint
multi-path routes vis-à-vis singlepath minimum hop routes for mobile ad hoc networks. The
link-disjoint, node-disjoint and zone-disjoint algorithms proposed in this paper can be used to
arrive at benchmarks for the time between successive multi-path route discoveries, the
number of disjoint paths per multi-path set and the hop count per multipath set. We assume a
multi-path set exists as long as at least one path in the set exists. Simulation results indicate
that the number of zone-disjoint paths per multi-path set can be at most 2, which is far lower
than the number of node and link-disjoint paths available per multi-path set. Also, the time
between zonedisjoint multi-path discoveries would be far lower than the time between node
and link-disjoint multi-path route discoveries and can be at most 45% more than the time
between single minimum-hop path route discoveries. However, there is no appreciable
difference in the average hop counts per zone-disjoint, node-disjoint and link-disjoint multi-
path sets and it can be only at most 15% more than the average minimum hop count
determined using single-path routing. We also observe that even though the number of link-
disjoint paths per multi-path set can be as large as 35-78% more than the number of node-
disjoint paths per multi-path set, the time between two successive link-disjoint multi-path
discoveries can be at most 15-25% more than the time between two successive node-disjoint
multi-path discoveries, without any significant difference in the hop count per multi-path set.
KEYWORDS
Multi-path Routing, Zone-Disjoint, Node-Disjoint, Link-Disjoint, Single-path, Route
Discoveries, Hop Count
Full Text : https://airccse.org/journal/jwmn/1110ijwmn02.pdf
Volume Link : https://airccse.org/journal/jwmn_current10.html
REFERENCES
[1] D. B. Johnson, D. A. Maltz and J. Broch, “DSR: The Dynamic Source Routing Protocol
for Multihop Wireless Ad hoc Networks,” Ad hoc Networking, edited by Charles E. Perkins,
Chapter 5, pp. 139 – 172, Addison Wesley, 2001.
[2] C. E. Perkins and E. M. Royer, “Ad hoc On-demand Distance Vector Routing,”
Proceedings of the 2nd Annual IEEE International Workshop on Mobile Computing Systems
and Applications, pp. 90 – 100, February 1999.
[3] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector
Routing for Mobile Computers,” ACM SIGCOMM, pp. 234 – 244, October 1994.
[4] J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu and J. Jetcheva, “A Performance of
Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols,” Proceedings of
MobiCom, pp. 85 – 97, October 1998.
[5] S. Mueller, R. P. Tsang and D. Ghosal, “Multipath Routing in Mobile Ad Hoc Networks:
Issues and Challenges,” Lecture Notes in Computer Science, Vol. 2965, pp. 209 – 234, April
2004.
[6] M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate
Path Routing for Load Balancing in Mobile Ad hoc Networks,” Proceedings of the 1st
Annual Workshop on Mobile Ad hoc Networking and Computing (MobiHoc), pp. 3 – 10,
August 2000.
[7] W. Xu, P. Yan and D. Xia, “Similar Node-Disjoint Multi-paths Routing in Wireless Ad
Hoc Networks,” Proceedings of the International Conference on Wireless Communications,
Networking and Mobile Computing, Vol. 2, pp. 731 – 734, September 2005.
[8] H. Wang, K. Ma and N. Yu, “Performance Analysis of Multi-path Routing in Wireless Ad
Hoc Networks,” Proceedings of the International Conference on Wireless Communications,
Networking and Mobile Computing, Vol. 2, pp. 723 – 726, September 2005.
[9] K. Wu and J. Harms, “On-demand Multipath Routing for Mobile Ad hoc Networks,”
Proceedings of the 4th European Personal Mobile Communications Conference (EPMCC),
February 2001.
[10] D. Saha, S. Toy, S. Bandyopadhyay, T. Ueda and S. Tanaka, “An Adaptive Framework
for Multipath Routing via Maximally Zone-Disjoint Shortest Paths in Ad hoc Wireless
Networks with Directional Antenna,” Proceedings of the IEEE Global Telecommunications
Conference (GLOBECOM), Vol. 1, pp. 226 – 230, December 2003.
[11] S. Waharte and R. Boutaba, “Totally Disjoint Multipath Routing in Multihop Wireless
Networks,” Proceedings of the IEEE International Conference on Communications (ICC),
Vol. 12, pp. 5576 – 5581, June 2006.
[12] S. Roy, D. Saha, S. Bandyopadhyay, T. Ueda and S. Tanaka, “Improving End-to-End
Delay through Load Balancing with Multipath Routing in Ad hoc Wireless Networks using
Directional Antenna,” Proceedings of the 5th International Workshop on Distributed
Computing, Lecture Notes in Computer Science (LNCS) 2918, pp. 225 – 234, December
2003.
[13] S. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc
Networks,” Proceedings of IEEE International Conference on Communications, Vol. 10, pp.
3201-3205, 2001.
[14] M. K. Marina and S. R. Das, “On-demand Multi-path Distance Vector Routing in Ad
Hoc Networks,” Proceedings of the IEEE International Conference on Network Protocols, pp.
14 – 23, Nov. 2001.
[15] L. Bononi and M. D. Felice, “Performance Analysis of Cross-layered Multi-path
Routing and MAC Layer Solutions for Multi-hop Ad Hoc Networks,” Proceedings of the
ACM International Workshop on Mobility Management and Wireless Access, pp. 190 – 197,
2006.
[16] A. Acharya, A. Misra and S. Bansal, “A Label-Switching Packet Forwarding
Architecture for Multihop Wireless LANs,” Proceedings of the 5th ACM International
Workshop on Wireless Mobile Multimedia, September 2002.
[17] Z. Ye, S. V. Krishnamurthy and S. K. Tripathi, “A Framework for Reliable Routing in
Mobile Ad Hoc Networks,” Proceedings of the IEEE International Conference on Computer
Communications, 2003.
[18] V. Loscri and S. Marano, “A New Geographic Multipath Protocol for Ad Hoc Networks
to Reduce the Route Coupling Phenomenon,” Proceedings of the 63rd IEEE Vehicular
Technology Conference, VTC 2006-Spring, Vol. 3, pp. 1102-1106, 2006.
[19] M. Li, L. Zhang, V. O. K. Li, X. Shan and Y. Ren, “An Energy-Aware Multipath
Routing Protocol for Mobile Ad Hoc Networks,” Proceedings of the ACM SIGCOMM Asia,
April 2005.
[20] N. T. Javan and M. Dehghan, “Reducing End-to-End Delay in Multi-path Routing
Algorithms for Mobile Ad hoc Networks,” Proceedings of the International Conference on
Mobile Ad hoc and Sensor Networks (MSN 2007), Lecture Notes in Computer Science
(LNCS) 4864, pp. 703 – 712, December 2007.
[21] S. Vijay, S. C. Sharma, V. Gupta and S. Kumar, “CZM-DSR: A New Cluster/Zone
Disjoint MultiPath Routing Algorithm for Mobile Ad Hoc Networks,” Proceedings of the
IEEE International Advanced Computing Conference (IACC), Patiala, India, pp. 480 – 485,
March 2009.
[22] I. S. Ibrahim, A. Etorban and P. J. B. King, “Multi-path Distance Vector Zone Routing
Protocol for Mobile Ad hoc Networks: MDVZRP,” Proceedings of the 9th Annual
Postgraduate Symposium on The Convergence of Telecommunications, Networking and
Broadcasting (PGET), June 2008.
[23] J. Zhang, C. K. Jeong, G. Y. Lee and H. J. Kim, “Cluster-based Multi-path Routing
Algorithm for Multi-hop Wireless Network,” International Journal of Future Generation
Communication and Networking, Vol. 1, No. 1, pp. 67 – 74, December 2008.
[24] D. Shin and D. Kim, “3DMRP: 3-Directional Zone-Disjoint Multi-path Routing
Protocol,” IEICE Transactions on Information and Systems, Vol. E92-D, No. 4, pp. 620-629,
April 2009.
[25] C. Bettstetter, H. Hartenstein and X. Perez-Costa, “Stochastic Properties of the Random-
Way Point Mobility Model,” Wireless Networks, pp. 555 – 567, Vol. 10, No. 5, Sept. 2004.
[26] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to Algorithms,”
2nd Edition, Chapter 23, pp. 561-579, MIT Press, 2001.
[27] G. Lim, K. Shin, S. Lee, H. Yoon and J. S. Ma, “Link Stability and Route Lifetime in Ad
hoc Wireless Networks,” Proceedings of International Conference on Parallel Processing
Workshops, pp. 116 – 123, August 2002.
[28] N. Meghanathan, “Impact of Range of Simulation Time and Network Shape on the Hop
Count and Stability of Routes in Mobile Ad hoc Networks,” IAENG International Journal of
Computer Science, Vol. 36, No. 1, #1, February 2009.
[29] G. G. Md. N. Ali, R. Chakraborty, Md. S. Alam and E. Chain, “An Efficient Approach
for Generalized Load Balancing in Multi-path Packet Switched Networks,” AIRCC
International Journal of Computer Networks and Communications, Vol. 2, No. 2, pp. 142-
153, March 2010.
[30] N. Cooper and N. Meghanathan, “Impact of Mobility Models on Multi-path Routing in
Mobile Ad hoc Networks,” AIRCC International Journal of Computer Networks and
Communications, Vol. 2, No. 1, pp. 185-174, January 2010.
INTERFERENCE TOLERANT MULTIUSER OFDMA FOR FEMTO
CELLS
Hadi Alasti
Department of Electrical Engineering, University of North Carolina at Charlotte
ABSTRACT
An interference tolerant OFDMA scheme is proposed for multiuser wireless communications
with specificapplication in femto cells. An interleaved set of subcarriers is dedicated to each
user to provide with ahigh order of frequency diversity. A reduced complexity digital
implementation of the technique is proposed and discussed for the interleaved sub-carrier
arrangement. Both inter-symbol interference andother-user interference are mitigated using a
proper cyclic extension, provided that the relative propagation delays of the users are an
integer multiple of a symbol period. The effect of other-userinterference due to non-integer
propagation delays is investigated using computer simulations. The biterror rate performance
and signal to interference ratio are presented for a few example systems overboth an Additive
White Gaussian Noise (AWGN) and a frequency selective Rayleigh fading channel.
Theamount of other-user interference is shown to be reduced as the number of sub-carriers
per user isincreased. The effect of design parameters on the interference level is discussed.
KEYWORDS
Multiuser OFDMA, Interference, Cyclic extension
Full Text : https://airccse.org/journal/jwmn/0210s11.pdf
Volume Link : https://airccse.org/journal/jwmn_current10.html
REFERENCES
[1] K. Pahlavan, A. Levesque, “Wireless Information Networks,” New York ,Wiley 1995.
[2] J.G. Proakis, “Digital Communications,” McGraw-Hill , 1995.
[3] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “On the performance of a coded MCM
over multipath Rayleigh fading channels,” IEEE - ICC’95 ,pp: 1689-1694
[4] A. Chini, “Multi Carrier Modulations in Frequency Selective Fading Channels,”Ph.D.
dissertation, Carleton University, Canada, 1994.
[5] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “Transmission of high rate ATM packets
over indoor radio channels,” IEEE JSAC ,Vol. 14 ,No. 3 ,pp: 469-476 ,April 1996.
[6] J.A.C. Bingham, “Multicarrier modulation for data transmission: An idea whose time has
come,” IEEE Commun. Magazine, pp: 5-14, May 1990.
[7] J.G. Proakis and D.G. Manolakis, “Introduction To Digital Signal Processing” ,Maxwell
Macmillan ,1989.
[8] S.B. Weinstein and P.M. Ebert, “Data transmission by frequency division multiplexing
using the discrete fourrier transform,” IEEE Trans. Communications. Vol. COM-19, No.5,
pp: 628-634, October 1971.
[9] T. S. Rappaport, “Wireless Communication Systems”, Prentice Hall, 1996.
[10] N. Suehiro, “A signal design without co-channel interference for approximately
synchronized CDMA systems,” IEEE J. Selected Areas in Communications, vol. JSAC-12,
pp. 837-841, June 1994.
[11] P.Z. Fan, N. Suehiro, N. Kuroyanagi and X.M. Deng, “Class of binary sequences with
zero correlation zone,” IEE Electronic Letters, vol. 36, pp. 777-779, May 1999
[12] R.D. Gaudenzi, C. Elia and R. Viola, “Bandlimited quasi-synchronous CDMA: a novel
satellite access technique for mobile and personal communication systems,” IEEE Journal on
Selected Areas in Communications, Vol. 10, Issue 2, pp.328 – 343, 1992.
[13] X.D. Lin and K.H. Chang, “Optimal PN sequence design for quasi-synchronous CDMA
communication systems,” IEEE Trans. Communications, vol. 45, pp. 221-226, 1997
[14] S.R. Park, I. Song, S. Yoon and J. Lee, “A new poly-phase sequence with perfect even
and good odd cross correlation function for DS/CDMA systems,” IEEE Trans. Vehi. Tech.,
vol. 51, No.5, 2002.
[15] Hadi Alasti, A. Chini, M.S. El-Tanany and S.A. Mahmoud, “A Discrete Multi-Carrier
Multiple Access (MCMA) Technique for Wireless Communications,” in the proceedings of
IEEE VTC98, Ottawa, Canada, May 18-21, 1998
[16] T. Seki, M. Itami, H. Ohta and K. Itoh, “A study of OFDM system applying frequency
diversity,” in the proceedings of the 11th IEEE International Symposium on Personal, Indoor
and Mobile Radio Communications,. PIMRC 2000, Vol. 2, pp.1385–1389, 2000.
[17] Hadi Alasti, “A Multi-Carrier Multiple Access Technique for Wireless
Communications,” Master Thesis, Isfahan University of Technology, Isfahan, IR, 1998.
[18] S. Zhou, G.B. Giannakis, “Frequency-hopped generalized MC-CDMA for multipath and
interference suppression,” in Proc. of MILCOM conference, pp.937-942, 2000.
[19] M. Morelli, C.-C.J. Kuo and M.-O. Pun, “Synchronization Techniques for Orthogonal
Frequency Division Multiple Access (OFDMA): A Tutorial Review,” IEEE Proceedings, vol.
95, Issue 7, pp.1394 – 1427, 2007.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN
DOWNLINK LTE SELF-ORGANIZING NETWORKS
Hana Jouini1, Mohamed Escheikh1, Kamel Barkaoui2 and Tahar Ezzedine1
1University of Tunis El Manar, Enit, Sys’Com , 1002 Tunis, Tunisia
2Cedric-Cnam : 2 Rue Conté 75003 Paris, France
ABSTRACT
This article investigates mobility load balancing (MLB) algorithm implementation through
network simulator (ns-3) in long term evolution (LTE) systems employing orthogonal
frequency division multiple access (OFDMA) for downlink (DL) data transmission. MLB is
introduced by the third generation partnership project (3GPP) as a key target of LTE self-
organizing networks (SONs) [1]. Our contribution is twofold. First, we implemented
elementary procedures (EPs) related to load management (LM) function of the X2-
application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’.
Second, we implemented a MLB based adaptive handover (HO) algorithm enabling to
configure adaptively HO hysteresis threshold for each neighbouring cell, of an overloaded
cell, according to its current load information. Numerical results show how, through suitable
simulation scenarios, MLB enables enhancing network performance in terms of overall
throughput, packet loss ratio (PLR) and fairness without incurring HO overhead.
KEYWORDS
LTE, load management, X2AP, elementary procedure, mobility load balancing
Full Text : https://aircconline.com/ijwmn/V8N4/8416ijwmn06.pdf
Volume Link : https://airccse.org/journal/jwmn_current16.html
REFERENCES
[1] European Telecommunications Standards Institute. LTE; Evolved Universal Terrestrial
Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON)
use cases and solutions, 2011.
[2] European Telecommunications Standards Institute. LTE; Evolved universal terrestrial
radio access network (E-UTRAN); X2 application protocol (X2AP), 2013.
[3] Kyuho Son, Song Chong, and G. Veciana. Dynamic association for load balancing and
interference avoidance in multi-cell networks. Wireless Communications, IEEE Transactions
on, 8(7):3566–3576, July 2009.
[4] P Mūnoz, R Barco, and I de la Bandera. Load balancing and handover joint optimization
in lte networks using fuzzy logic and reinforcement learning. Computer Networks, 76:112–
125, 2015.
[5] Wen-Yu Li, Xiang Zhang, Shu-Cong Jia, Xin-Yu Gu, Lin Zhang, Xiao-Yu Duan, and
JiaRu Lin. A novel dynamic adjusting algorithm for load balancing and handover co-
optimization in lte son. Journal of Computer Science and Technology, 28(3):437–444, 2013.
[6] Ridha Nasri and Zwi Altman. Handover adaptation for dynamic load balancing in 3gpp
long term evolution systems. arXiv preprint arXiv:1307.1212, 2013.
[7] Zhang Peng Huang, Jing Liu, Qiang Shen, Jin Wu, and Xiaoying Gan. A threshold-based
multi-traffic load balance mechanism in lte-a networks. In Wireless Communications and
Networking Conference (WCNC), 2015 IEEE, pages 1273–1278. IEEE, 2015.
[8] Qi-Ping Yang, Jae-Woo Kim, and Tae-Hyong Kim. Mobility prediction and load
balancing based adaptive handovers for lte systems. International Journal on Computer
Science and Engineering, 4(4):638, 2012.
[9] European Telecommunications Standards Institute. LTE ; Evolved Universal Terrestrial
Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, Nov. 2012.
[10] Lte protocols and specifications. http://lteworld.org/lte-protocols-specifications.
Accessed: Dec. 2015.
[11] X2 interface function in lte a connection between two enodebs.
http://www.teletopix.org/4g-lte/x2- interface-function-in-lte-a-connection-between-two-
enodebs/. Accessed: Dec. 2015.
[12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile
communications. John Wiley & Sons, 2012.
[13] Alcatel-lucent. The LTE Network Architecture: A comprehensive tutorial, 2013.
[14] Self-organizing networks. http://www.3gpp.org/technologies/keywords-acronyms/105-
son. Accessed: Dec. 2015.
[15] Panagiotis Fotiadis, Michele Polignano, Daniela Laselva, Benny Vejlgaard, Preben Mo-
gensen, Ralf Irmer, and Neil Scully. Multi-layer mobility load balancing in a heterogeneous
lte network. In Vehicular Technology Conference (VTC Fall), 2012 IEEE, pages 1–5. IEEE,
2012.
[16] Dah-Ming Chiu and Raj Jain. Analysis of the increase and decrease algorithms for
congestion avoidance in computer networks. Computer Networks and ISDN systems,
17(1):1–14, 1989.
[17] Network simulator 3. url: https://www.nsnam.org/. Accessed: Mai 2015.
[18] Nicola Baldo, Manuel Requena-Esteso, Marco Miozzo, and Raymond Kwan. An open
source model for the simulation of LTE handover scenarios and algorithms in ns-3.In
Proceedings of the 16th ACM international conference on Modelling, analysis & simulation
of wireless and mobile systems, pages 289–298. ACM, 2013.
[19] Tracy Camp, Jeff Boleng, and Vanessa Davies. A survey of mobility models for ad
hocnetwork research. Wireless communications and mobile computing, 2(5):483–502, 2002.
[20] Fan Bai and Ahmed Helmy. A survey of mobility models. Wireless Ad hoc
Networks.University of Southern California, USA, 206, 2004.
[21] European Telecommunications Standards Institute. Self-Organizing Networks (SON)
Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information
Service (IS), 2012.

More Related Content

What's hot

A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies Radha Mahalle
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020ijmnct
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014HarshitParkar6677
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipvilla1451
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...IJCSIS Research Publications
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Fahmi Yasser
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkIJERA Editor
 

What's hot (20)

A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
 
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020Trends in mobile network communication and telematics in 2020
Trends in mobile network communication and telematics in 2020
 
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...
 
Perfil y resumen de ekram hossain
Perfil y resumen de ekram hossainPerfil y resumen de ekram hossain
Perfil y resumen de ekram hossain
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
9.references
9.references9.references
9.references
 
Sohail cv (updated) (1)
Sohail cv (updated) (1)Sohail cv (updated) (1)
Sohail cv (updated) (1)
 
Most Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And EngineeringMost Cited Survey Article in Computer Science And Engineering
Most Cited Survey Article in Computer Science And Engineering
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( PDF FILE )
 
International journal of computer networks & communications (ijcnc) --no...
International journal of computer networks & communications (ijcnc)  --no...International journal of computer networks & communications (ijcnc)  --no...
International journal of computer networks & communications (ijcnc) --no...
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
Hsing cuhk talk wireless 5_g_why-how-what_mar 31 2014
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 
Smart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasipSmart antennas for next generation wireless systems eurasip
Smart antennas for next generation wireless systems eurasip
 
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
Mathematical Modeling of Security Issues of WLAN’s using Space Time Processin...
 
Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)Monet cf ps-5_g networks_final(1)
Monet cf ps-5_g networks_final(1)
 
A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 

Similar to Top Ten Read Articles - International Journal of Wireless & Mobile Networks (IJWMN)

Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensorAhmed Tememe
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...ijp2p
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to Top Ten Read Articles - International Journal of Wireless & Mobile Networks (IJWMN) (20)

Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...Top 10 reseach articles for academia - International Journal of peer-to-peer ...
Top 10 reseach articles for academia - International Journal of peer-to-peer ...
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 WIRELESS SENSOR NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Top Ten Read Articles - International Journal of Wireless & Mobile Networks (IJWMN)

  • 1. Top Ten Read Articles in Wireless&Mobile Networks International Journal of Wireless & MobileNetworks (IJWMN) ISSN: 0975-3834 [Online]; 0975-4679 [Print] http://airccse.org/journal/ijwmn.html
  • 2. A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOS Hoda Nematy Malek-Ashtar University of Technology, Shabanlou, Babaee Hwy, Lavizan,Tehran. ABSTRACT To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is considered as a novel channel of communication. This form of communication has introduced for 4th cellular communication and enacts a significant role in the 5th generation. Four D2D communication scenarios defined in the references, includes direct D2D and relaying D2D communication both with and without cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable computation overhead and trivial communication overhead than SODE and preserve many security properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key Agreement of the proposed protocol with ProVerif verification tools. KEYWORDS 5th generation, Four D2D scenarios, LTE-A AKA protocol, secure D2D protocol, ProVerif Full Text : https://aircconline.com/ijwmn/V13N4/13421ijwmn01.pdf Volume Link : https://airccse.org/journal/jwmn_current21.html
  • 3. REFERENCES [1] H. H. Hussein, H. A. Elsayed, and S. M. A. El-kader, “Intensive Benchmarking of D2D communication over 5G cellular networks: prototype, integrated features, challenges, and main applications,” Wirel. Networks, pp. 1–20, 2019. [2] N. Kato, “On device-to-device (D2D) communication [Editor’s note],” IEEE Netw., vol. 30, no. 3, p. 2, 2016. [3] Y.-D. Lin and Y.-C. Hsu, “Multihop cellular: A new architecture for wireless communications,” in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2000, vol. 3, pp. 1273–1282. [4] D. Wu, L. Zhou, Y. Cai, R. Q. Hu, and Y. Qian, “The role of mobility for D2D communications in LTE-Advanced networks: energy vs. bandwidth efficiency,” IEEE Wirel. Commun., vol. 21, no. 2, pp. 66–71, 2014. [5] N. Panwar, S. Sharma, and A. K. Singh, “A survey on 5G: The next generation of mobile communication,” Phys. Commun., vol. 18, pp. 64–84, 2016. [6] S. K. Tetarave and S. Tripathy, “Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTEA Networks,” in International Conference on Security & Privacy, 2019, pp. 3–16. [7] T. Balan, A. Balan, and F. Sandu, “SDR Implementation of a D2D Security Cryptographic Mechanism,” IEEE Access, vol. 7, pp. 38847–38855, 2019. [8] L. Wang, Y. Tian, D. Zhang, and Y. Lu, “Constant-round authenticated and dynamic group key agreement protocol for D2D group communications,” Inf. Sci. (Ny)., vol. 503, pp. 61–71, 2019. [9] P. Gope, “LAAP: Lightweight Anonymous Authentication Protocol for D2D-Aided Fog Computing Paradigm,” Comput. Secur., 2019. [10] M. Cao et al., “Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors,” IEEE Access, vol. 7, pp. 33759–33770, 2019. [11] P. P. Tayade and P. Vijayakumar, “Enhancement of Security and Confidentiality for D2D Communication in LTE-Advanced Network Using Optimised Protocol,” in Wireless Communication Networks and Internet of Things, Springer, 2019, pp. 131–139. [12] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Wirel. networks, vol. 11, no. 1–2, pp. 21–38, 2005. [13] H. Tan, Y. Song, S. Xuan, S. Pan, and I. Chung, “Secure D2D group authentication employing smartphone sensor behavior analysis,” Symmetry (Basel)., vol. 11, no. 8, p. 969, 2019. [14] M. Wang and Z. Yan, “Privacy-preserving authentication and key agreement protocols for D2D group communications,” IEEE Trans. Ind. Informatics, vol. 14, no. 8, pp. 3637– 3647, 2017. [15] R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “GRAAD: Group anonymous and accountable D2D communication in mobile networks,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 2, pp. 449–464, 2017.
  • 4. [16] A. Zhang, L. Wang, X. Ye, and X. Lin, “Light-weight and robust security-aware D2D- assist data transmission protocol for mobile-health systems,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 3, pp. 662–675, 2016. [17] A. Zhang, J. Chen, R. Q. Hu, and Y. Qian, “SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2659–2672, 2015. [18] B. Blanchet, B. Smyth, V. Cheval, and M. Sylvestre, “ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial,” Version from, pp. 5–16, 2018.
  • 5. SYSTEM LEVEL SIMULATION FOR TWO TIER MACRO-FEMTO CELLULAR NETWORKS 1Shiqi Xing, 2Pantha Ghosal, 3Shouman Barua, 4 Ramprasad Subramanian and 5Kumbesan Sandrasegaran Centre for Real-time Information Networks School of Computing and Communications, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, Australia. ABSTRACT LTE is an emerging wireless communication technology to provide high- speed data service for the mobile phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells. LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with interference from Microcells and Macrocell users along with the scripting. KEYWORDS Channel quality indicator (CQI), Femto Access Point (FAP), Macro eNodeB (MeNB), Macrocell User Equepment (MUE), Moblity Management Entity(MME), Signal to Interference Plus Noise Ratio(SINR), Physical Layer(PHY) Full Text : https://airccse.org/journal/jwmn/6614ijwmn01.pdf Volume Link : https://airccse.org/journal/jwmn_current14.html
  • 6. REFERENCES [1] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. Wiley, NewYork, 2008. [2] E Dahlman, S Parkvall, J Skold, P Beming, 3G Evolution HSPA and LTE for Mobile Broadband. Academia Press, USA, 2008. [3] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, "On Accurate simulations of LTE femtocells using an open source simulator," in EURASIP Journal on Wireless Communication and Networking, 2012. [4] G Piro, L Grieco, G Boggia, F Capozzi, P Camarda,”Simulating LTE cellular systems: an opensource framework, ” in Vehicular Technology, IEEE Trans. vol. 60, pp. 498-513, 2011. [5] Raheem, Rand, Aboubaker Lasebae, and Jonathan Loo. "Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells." Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. IEEE, 2014. [6] WCDMA for UMTS – HSPA Evolution and LTE, Fourth Edition. Edited by Harri Holma and Antti Toskala © 2007 John Wiley & Sons, Ltd. ISBN: 978-0-470-31933-8 [7] D. Lopez-Perez, I. Guvenc, G. de la Roche, M. Kountouris, T. Q. S. Quek, and Z. Jie, "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Commun., vol. 18, pp. 22-30, 2011. [8] D. Xenakis, N. Passas, L. Merakos, C. Verikoukis, “Mobility Management for Femtocells in LTEAdvanced: Key Aspects and Survey of Handover Decision Algorithms” in IEEE Trans. Wireless Commun., vol. 18 pp. 2011. [9] R. Bendlin, V. Chandrasekhar, C. Runhua, A. Ekpenyong, and E. Onggosanusi, "From homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel. 8/9 case study," in 45th Annu. Conf., Inform. Sci. and Syst. (CISS), Baltimore, MD, pp. 1-5, 2011. [10] H. Mahmoud, I .Guvenc,” A comparative study of different deployment modes for femtocell networks,” in IEEE Int. Symposium on Personal, Indoor and Mobile Radio Commun. , Palo Alto, USA, pp. 1–5, 2009. [11] Siemens, R1-060135, “Interference Mitigation by Partial Frequency Reuse,” 3GPP RAN WG1#42, London, UK, January 2006. [12] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483–502, Aug. 2002. [13] F. Capozzi, G. Piro, L. Grieco, G. Boggia, P. Camarda, " A system-level simulation framework for LTE Femtocell," in Proc. of International Conference on Simulation Tools and Techniques(ICST), Desenzano, Italy, pp.1-3, 2012. [14] http://www.infoutils.com/frequency-reuse-in-ofdma-based-ltewimax-system/
  • 7. EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDY Mahmoud Elkhodr, Seyed Shahrestani and Hon Cheung School of Computing, Engineering and Mathematics, Western Sydney University, Sydney, Australia ABSTRACT The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. This research analyses some of the major evolving and enabling wireless technologies in the IoT. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and the different versions of Wi-Fi including the recent IEEE 802.11ah protocol. The studies evaluate the capabilities and behaviours of these technologies regarding various metrics including the data range and rate, network size, RF Channels and Bandwidth, and power consumption. It is concluded that there is a need to develop a multifaceted technology approach to enable interoperable and secure communications in the IoT. KEYWORDS Internet of Things, Wireless Technologies, Low-power, M2M Communications. Full Text : https://aircconline.com/ijwmn/V8N5/8516ijwmn05.pdf Volume Link : https://airccse.org/journal/jwmn_current16.html
  • 8. REFERENCES [1] B. Sanou, "The World in 2013: ICT facts and figures," International Telecommunications Union, 2013. [2] C. V. N. Index, "Global mobile data traffic forecast update, 2010-2015," White Paper, February, 2011. [3] C. V. N. Index, "The zettabyte era–trends and analysis," Cisco white paper, 2013. [4] L. Li, H. Xiaoguang, C. Ke, and H. Ketai, "The applications of WiFi-based wireless sensor network in internet of things and smart grid," in 2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 789-793. [5] R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," Computer, pp. 28- 35, 2015. [6] D. Christin, A. Reinhardt, P. S. Mogre, and R. Steinmetz, "Wireless Sensor Networks and the Internet of Things: Selected Challenges," presented at the The 8th GI/ITG KuVSFachgesprächDrahtloseSensornetze, 2009. [7] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities," IEEE Wireless Communications, vol. 20, pp. 91-98, 2013. [8] S. Lee, D. Yoon, and A. Ghosh, "Intelligent parking lot application using wireless sensor networks," in International Symposium on Collaborative Technologies and Systems, 2008, pp. 4857. [9] W. Lemstra, V. Hayes, and J. Groenewegen, The innovation journey of Wi-Fi: The road to global success: Cambridge University Press, 2010. [10] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Processing Magazine, vol. 30, pp. 40- 60, 2013. [11] E. Perahia and R. Stacey, Next Generation Wireless LANs: 802.11 n and 802.11 ac: Cambridge university press, 2013. [12] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, pp. 393-422, 2002. [13] L. Verma, M. Fakharzadeh, and S. Choi, "WiFi on Steroids: 802.11 ac and 802.11 ad," IEEE Wireless Communications, vol. 20, pp. 30-35, 2013. [14] T. Adame, A. Bel, B. Bellalta, J. Barcelo, and M. Oliver, "IEEE 802.11 AH: theWiFi approach for M2M communications," IEEE Wireless Communications, vol. 21, pp. 144-152, 2014. [15] IEEE. (2015, 30/05/2014). IEEE P802.11 Sub 1GHz Study Group. Available: http://www.ieee802.org/11/Reports/tgah_update.htm [16] E. Khorov, A. Lyakhov, A. Krotov, and A. Guschin, "A survey on IEEE 802.11 ah: An enabling networking technology for smart cities," Computer Communications, pp. 53-69, 2014.
  • 9. [17] T. Adame, A. Bel, B. Bellalta, J. Barcelo, J. Gonzalez, and M. Oliver, "Capacity analysis of IEEE 802.11 ah WLANs for M2M communications," in Multiple Access Communcations, ed: Springer, 2013, pp. 139- 155. [18] Qualcomm. (2014, 12/10/2014). Improving whole home coverage and power efficiency. Available: https://www.qualcomm.com/invention/research/projects/wi-fi-evolution/80211ah [19] O. Raeesi, J. Pirskanen, A. Hazmi, T. Levanen, and M. Valkama, "Performance evaluation of IEEE 802.11 ah and its restricted access window mechanism," in 2014 IEEE International Conference on Communications Workshops (ICC), 2014, pp. 460-466. [20] S. Aust, R. V. Prasad, and I. G. Niemegeers, "Outdoor long-range WLANs: a lesson for IEEE 802.11 ah," IEEE Communications Surveys & Tutorials, vol. 17, pp. 1761-1775, 2015. [21] P. Valerio. (2014) Can Sub-1GHz WiFi Solve The IoT Connectivity Issues? The New Global Enterprise. Available: http://www.frontwave.eu/2014_12_01_archive.html [22] A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "IEEE 802.11 af: a standard for TV white space spectrum sharing," IEEE Communications Magazine, vol. 51, pp. 92100, 2013. [23] S. K. Mohapatra, R. R. Choudhury, and P. Das, "The Future Directions in Evolving WI- FI: Technologies, Applications, and Services," International Journal of Next-Generation Networks, vol. 6, pp. 13-22, 2014. [24] Bluetooth SIG. (2001, 01/05/2014). Bluetooth specification version 1.1. Available: http://www.bluetooth.com [25] (2015, 11/12/2014). Bluetooth Smart Technology: Powering the Internet of Things. Available: http://www.bluetooth.com/Pages/Bluetooth-Smart.aspx [26] J. Decuir, "Bluetooth Smart Support for 6LoBTLE: Applications and connection questions," IEEE Consumer Electronics Magazine, vol. 4, pp. 67-70, 2015. [27] Bluetooth SIG. (2012, 11/04/2015). Bluetooth Core Version 4.0. Available: https://www.bluetooth.org/Technical/Specifications/adopted.htm [28] J. Hui and D. Culler. 6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture. Available: http://www.ipso-alliance.org/wp-content/media/6lowpan.pdf [29] M. B. Baria, A. P. Gharge, and N. D. Sheth, "A Review of Zigbee Smart Energy," in International Journal of Engineering Development and Research, 2014. [30] N. Baker, "ZigBee and Bluetooth: Strengths and weaknesses for industrial applications," Computing and Control Engineering, vol. 16, pp. 20-25, 2005. [31] A. J. Jara, L. Ladid, and A. F. Gómez-Skarmeta, "The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities," JoWUA, vol. 4, pp. 97-118, 2013. [32] L. Alliance, "LoRa alliance–wide area networks for IoT," ed, 2015. [33] F. Siddiqui, S. Zeadally, and K. Salah, "Gigabit Wireless Networking with IEEE 802.11 ac: Technical Overview and Challenges," Journal of Networks, vol. 10, pp. 164-171, 2015.
  • 10. [34] F. Stroud. (2015, 15/01/2015). 802.11ac. Available: http://www.webopedia.com/TERM/8/802_11ac.html [35] P. Anitha and C. Chandrasekar, "Energy Aware Routing Protocol ForZigbee Networks," Journal of Computer Applications (JCA), vol. 4, pp. 92-94, 2011. [36] P. McDermott-Wells, "What is bluetooth?," IEEE Potentials, vol. 23, pp. 33-35, 2004. [37] IEEE 802.11 Working Group, "IEEE Standard for Information Technology– Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements–Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6: Wireless Access in Vehicular Environments," IEEE Std, vol. 802, p. 11, 2010. [38] A. Dementyev, S. Hodges, S. Taylor, and J. Smith, "Power Consumption Analysis of Bluetooth Low Energy, ZigBee and ANT Sensor Nodes in a Cyclic Sleep Scenario " Microsoft Research, pp. 1-5, 2013. [39] B. B. Olyaei, J. Pirskanen, O. Raeesi, A. Hazmi, and M. Valkama, "Performance comparison between slotted IEEE 802.15. 4 and IEEE 802.1 lah in IoT based applications," in IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 2013, pp. 332-337.
  • 11. ENERGY EFFICIENT ANIMAL SOUND RECOGNITION SCHEME IN WIRELESS ACOUSTIC SENSORS NETWORKS Saad Al-Ahmadi and Badour AlMulhem Department of Computer Science, King Saud University, Riyadh, Saudi Arabia ABSTRACT Wireless sensor network (WSN) has proliferated rapidly as a cost-effective solution for data aggregation and measurements under challenging environments. Sensors in WSNs are cheap, powerful, and consume limited energy. The energy consumption is considered to be the dominant concern because it has a direct and significant influence on the application’s lifetime. Recently, the availability of small and inexpensive components such as microphones has promoted the development of wireless acoustic sensor networks (WASNs). Examples of WASN applications are hearing aids, acoustic monitoring, and ambient intelligence. Monitoring animals, especially those that are becoming endangered, can assist with biology researchers’ preservation efforts. In this work, we first focus on exploring the existing methods used to monitor the animal by recognizing their sounds. Then we propose a new energy-efficient approach for identifying animal sounds based on the frequency features extracted from acoustic sensed data. This approach represents a suitable solution that can be implemented and used in various applications. However, the proposed system considers the balance between application efficiency and the sensor’s energy capabilities. The energy savings will be achieved through processing the recognition tasks in each sensor, and the recognition results will be sent to the base station. KEYWORDS Wireless Acoustic Sensor Network, Animal sound recognition, frequency features extraction, energyefficient recognition schema in WASN Full Text : https://aircconline.com/ijwmn/V12N4/12420ijwmn02.pdf Volume Link : https://airccse.org/journal/jwmn_current20.html
  • 12. REFERENCES [1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Networks, vol. 52, no. 12, pp. 2292–2330, 2008. [2] A. Bertrand, “Applications and trends in wireless acoustic sensor networks: A signal processing perspective,” 2011 18th IEEE Symp. Commun. Veh. Technol. Benelux, SCVT, 2011, 2011. [3] B. Chen, “Audio Recognition with Distributed Wireless Sensor Networks,” pp. 1–48, 2010. [4] J. Xie, “Acoustic classification of Australian frogs for ecosystem surveys,” 2017. [5] D. Mitrovic, M. Zeppelzauer, and C. Breiteneder, “Discrimination and Retrieval of Animal Sounds,” 2006 12th Int. Multi-Media Model. Conf., pp. 339–343, 2005. [6] J. Colonna, T. Peet, C. A. Ferreira, A. M. Jorge, E. F. Gomes, and J. Gama, “Automatic Classification of Anuran Sounds Using Convolutional Neural Networks,” Proc. Ninth Int. C* Conf. Comput. Sci. Softw. Eng. - C3S2E ’16, pp. 73–78, 2016. [7] A. D. Mane, R. A. Rashmi, and S. L. Tade, “Identification & Detection System for Animals from their Vocalization,” no. 3, pp. 1–6, 2013. [8] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Frog call classification: a survey,” Artif. Intell. Rev., pp. 1–17, 2016. [9] M. P. Malumbres and C. Science, “On the Design of a Bioacoustic Sensor for the Early Detection of the Red Palm Weevil,” pp. 1706–1729, 2013. [10] P. Xie, Jie, Towsey, Michael, Yasumiba, Kiyomi, Zhang, Jinglan, Roe, “Detection of anuran calling activity in long field recordings for bio-acoustic monitoring,” IEEE Int. Conf., 2015. [11] J. Xie, M. Towsey, J. Zhang, and P. Roe, “Acoustic classification of Australian frogs based on enhanced features and machine learning algorithms,” Appl. Acoust., vol. 113, pp. 193–201, 2016. [12] Q. F. Gary G. Yen, “Automatic frog call monitoring system: a machine learning approach,” Appl. Sci. Comput. Intell. V. [13] C. J. Huang et al., “Intelligent feature extraction and classification of anuran vocalizations,” Appl. Soft Comput. J., vol. 19, pp. 1–7, 2014. [14] J. G. Colonna, A. D. Ribas, E. M. Santos, and E. F. Nakamura, “Feature Subset Selection for Automatically Classifying Anuran Calls Using Sensor Networks,” pp. 10–15, 2012. [15] Z. Chen and R. C. Maher, “Semi-automatic classification of bird vocalizations using spectral peak tracks,” J. Acoust. Soc. Am., vol. 120, no. 5, pp. 2974–2984, 2006. [16] C. J. Huang, Y. J. Yang, D. X. Yang, Y. J. Chen, and H. Y. Wei, “Realization of an intelligent frog call identification agent,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4953 LNAI, pp. 93–102, 2008.
  • 13. [17] C. Bedoya, J. M. Daza, and J. D. Lopez, “Automatic Recognition of Anuran Species Based on Syllable Identification,” Ecol. Inform., vol. 24, no. January 2016, 2014. [18] J. G. Colonna, M. Cristo, M. Salvatierra, and E. F. Nakamura, “An incremental technique for realtime bioacoustic signal segmentation,” Expert Syst. Appl., vol. 42, no. 21, pp. 7367–7374, 2015. [19] C. J. Huang, Y. J. Yang, D. X. Yang, and Y. J. Chen, “Frog classification using machine learning techniques,” Expert Syst. Appl., vol. 36, no. 2, PART 2, pp. 3737–3743, 2009. [20] S. Chu, S. Narayanan, and C.-C. J. Kuo, “Environmental Sound Recognition With Time- Frequency Audio Features,” IEEE Trans. Audio. Speech. Lang. Processing, vol. 17, no. 6, pp. 1142–1158, 2009. [21] N. C. Han, S. V. Muniandy, and J. Dayou, “Acoustic classification of Australian anurans based on hybrid spectral-entropy approach,” Appl. Acoust., vol. 72, no. 9, pp. 639–645, 2011. [22] J. Xie, Z. Jinglan, and P. Roe, “Acoustic features for multi-level classification of Australian frogs : Family, Genus and Species,” IEEE, pp. 1–5, 2015. [23] J. Xie, M. Towsey, A. Truskinger, P. Eichinski, J. Zhang, and P. Roe, “Acoustic classification of Australian anurans using syllable features,” Information, Commun. Signal Process. (ICICS), 10th Int. Conf. on. IEEE, 2015. [24] A. Camacho, A. Garcia Rodriguez, and F. Bolanos, “Automatic detection of vocalizations of the frog Diasporus hylaeformis in audio recordings,” J. Acoust. Soc. Am., vol. 130, no. 4, p. 2500, 2011. [25] S. Gunasekaran and K. Revathy, “Automatic Recognition and Retrieval of Wild Animal Vocalizations,” IJCTE Int. J. Comput. Theory Eng., vol. 3, no. 1, p. 136�140, 2011. [26] J. Xie, M. Towsey, P. Eichinski, J. Zhang, and P. Roe, “Acoustic feature extraction using perceptual wavelet packet decomposition for frog call classification,” Proc. - 11th IEEE Int. Conf. eScience, eScience 2015, pp. 237–242, 2015. [27] B. Croker and N. Kottege, “Using feature vectors to detect frog calls in wireless sensor networks,” J. Acoust. Soc. Am., vol. 131, no. 5, pp. EL400–EL405, 2012. [28] Vaca-Castano, Gonzalo, and D. Rodriguez, “Using Syllabic Mel Cepstrumfeatures and K-Nearest Neighbors to Identify Anurans and Birds Species,” Signal Process. Syst. (SIPS), 2010 IEEE Work. On. IEEE, pp. 466–471, 2010. [29] X. Dong, M. Towsey, J. Zhang, and P. Roe, “Compact Features for Birdcall Retrieval from Environmental Acoustic Recordings,” Proc. - 15th IEEE Int. Conf. Data Min. Work. ICDMW, 2015, pp. 762–767, 2016. [30] M. Vasile, C. Rusu, R. Ciprian, and J. Astola, “Audio based solutions for detecting intruders in wild areas,” Signal Processing, vol. 92, no. 3, pp. 829–840, 2012. [31] M. Nikolic and J. Goldstein, “Enabling Signal Processing over Data Streams,” 2017. [32] F. Alías, J. C. Socoró, and X. Sevillano, “A review of physical and perceptual feature extraction techniques for speech, music and environmental sounds,” Appl. Sci., vol. 6, no. 5, 2016.
  • 14. [33] S. Fagerlund, “Bird species recognition using support vector machines,” EURASIP J. Adv. Signal Process., vol. 2007, 2007. [34] D. Bzdok, M. Krzywinski, and N. Altman, “Machine learning : Supervised methods , SVM and kNN,” pp. 1–6, 2018. [35] W. D Randall and M. Tony R, “Reduction Techniques for Instance-Based Learning Algorithms,” Mach. Learn., vol. 38, pp. 257–286, 2000. [36] K. J. Piczak, “ESC: Dataset for Environmental Sound Classification,” Proc. 23rd ACM Int. Conf. Multimedia, MM 2015, pp. 1015–1018, 2015. [37] Y. Aytar, C. Vondrick, and A. Torralba, “SoundNet: Learning Sound Representations from Unlabeled Video,” no. Nips, 2016. [38] F. Yu, “A Survey of Wireless Sensor Network Simulation Tools,” Washingt. Univ. St. Louis, Dep. …, pp. 1–10, 2011. [39] K. Erciyes, O. Dagdeviren, O. Yılmaz, and H. Gumus, “Modeling and Simulation Tools for Mobile Ad Hoc Networks,” no. November, pp. 37–70, 2011.
  • 15. PERFORMANCE EVALUATION AND ENHANCEMENT OF VLAN VIA WIRELESS NETWORKS USING OPNET MODELER Tareq Al-Khraishi and Muhannad Quwaider Department of Computer Engineering, Jordan University of Science and Technology, Irbid , Jordan ABSTRACT A VLAN is a logical connection that allows hosts to be grouped together in the same broadcast domain, so that packets are delivered only to ports that are combined to the same VLAN. We can improve wireless network performance and save bandwidth through the characteristic VLAN network. In addition, the implementation of VLAN greatly improves wireless network security by reducing the number of hosts receiving copies of frames broadcast by switches, thus keeping hosts holding critical data on a separate VLAN. In this paper we compare wireless network with VLAN via wireless network. The proposed network is evaluated within terms of delay and average throughput using web browsing applications and file transfer in heavy traffic. The simulation was carried out using OPNET 14.5 modeler and the results show that the use of VLAN via wireless network improved performance by reducing traffic resulting in a minimized delay time. Furthermore, VLAN implementation reduces network throughput because the traffic received and transmitted has a positive relationship with throughput. Eventually, we investigated the use of adhoc routing protocols such as AODV, DSR, OLSR, TORA and GPR to improve the performance of wireless VLAN networks. KEYWORDS WLAN, OPNET, Throughput, VLAN, Routing Protocols, Access Point Full Text : https://aircconline.com/ijwmn/V12N3/12320ijwmn02.pdf Volume Link : https://airccse.org/journal/jwmn_current20.html
  • 16. REFERENCES [1] Tambe, S. S., (2015) “Wireless technology in networks”, International Journal of Scientific and Research Publications, Vol. 5, No. 7, pp1-3. [2] Mittal, I., & Anand, A., (2014) “WLan Architecture. International Journal of Computer Trends and Technology”, Vol. 8, No. 3, pp. 148-151. [3] Alimi, I. A., & Mufutau, A. O., (2015) “Enhancement of network performance of an enterprises network with VLAN”, American Journal of Mobile Systems, Applications and Services, Vol. 1, No. 2, pp 82-93. [4] Elechi Onyekachi O., (2014) “Design and Simulation of Wireless Local Area Network for Administrative Office using OPNET Network Simulator: A Practical Approach”, Information and Knowledge Management, Vol.4, No.10, pp. 27-34. [5] Krupanek, B., & Bogacz, R., (2016) “OPNET Modeler simulations of performance for multi nodes wireless systems”, International Journal of Metrology and Quality Engineering, Vol. 7, No. 1, pp 105. [6] H.S.Mewara , Mukesh Kumar Saini, (2014) “ Performance Analysis of Access Point for IEEE802.11g Wireless LAN Using Opnet Simulator” , International Journal of Advanced Engineering Research and Science (IJAERS), Vol.1, Issue.1, pp. 14-18. [7] Sarah Ali Abdullah, (2016) “Simulation of Virtual LANs (VLANs) Using OPNET”, IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), Vol .11, Issue. 6, Ver. II, pp. 67-80. [8] AL-Khaffaf, D. A. J., (2018) “Improving LAN Performance Based on IEEE802. 1Q VLAN Switching Techniques”, Journal of University of Babylon, Vol. 26, No. 1, pp 286- 297. [9] Chokshi, R., & Yu, C, (2007) “Study on VLAN in Wireless Networks”, Technical Report. [10] Ali, A. H., Abbas, A. N., & Hassan, M. H., (2013) “Performance Evaluation of IEEE802. 11g WLANs Using OPNET Modeler”, American Journal of Engineering Research (AJER), Vol. 2, Issue. 12, pp. 9-15. [11] Meenakshi, Parneek Kaur, (2014) “Performance Metrics of WLAN for Different Applications using OPNET”, International Journal of P2P Network Trends and Technology (IJPTT), Vol. 4 Issue. 5. [12] Alisa, Z. T., (2013) “Evaluating the performance of wireless network using OPNET modeler”, International Journal of Computer Applications, Vol. 62, No. 13. [13] Jayakumar, G., & Ganapathy, G., (2007) “Performance comparison of mobile ad-hoc network routing protocol”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 7, No. 11, pp 77-84. [14] Manickam, P., Baskar, T. G., Girija, M., & Manimegalai, D. D., (2011) “Performance comparisons of routing protocols in mobile ad hoc networks”, arXiv preprint arXiv:1103.0658. [15] Shrivastava, L., Bhadauria, S. S., & Tomar, G. S., (2011) “Performance Evaluation of Routing Protocols in MANET with different traffic loads”, In 2011 International Conference on Communication Systems and Network Technologies (pp. 13-16). IEEE.
  • 17. [16] Maheswara, P. V., & Naik, K. B., (2013) “Routing protocol performance issues and evaluation considerations in MANET”, International Journal of Engineering Research and Applications (IJERA), Vol. 3, Issue. 4, pp.01-05. [17] Elsadig, M. A., & Fadlalla, Y. A. (2018) “Mobile Ad Hoc Network Routing Protocols: Performance Evaluation and Assessment”, International Journal of Computing and Digital Systems, Vol. 7, No. 1, pp 59-66. [18] Kadyamatimba, A., Mbougni, M., Helberg, Z. P. N. A., & Dube, E., (2012) “Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http Traffic”, DOI: 10.7763/IPEDR, Vol. 54, No. 14, pp 69-74. [19] M. Quwaider, J. Rao, and S. Biswas, (2008) “Neighborhood route diffusion for packet salvaging in networks with high mobility”, in IEEE International Performance, Computing and Communications Conference, pp. 168–175.
  • 18. RACH CONGESTION IN VEHICULAR NETWORKING Ramprasad Subramanian1 and Kumbesan Sandrasegaran2 1&2Centre for Real-time Information Networks, School of Computing and Communications, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, Australia ABSTRACT Long term evolution (LTE) is replacing the 3G services slowly but steadily and become a preferred choice for data for human to human (H2H) services and now it is becoming preferred choice for voice also. In some developed countries the traditional 2G services gradually decommissioned from the service and getting replaced with LTE for all H2H services. LTE provided high downlink and uplink bandwidth capacity and is one of the technology like mobile ad hoc network (MANET) and vehicular ad hoc network (VANET) being used as the backbone communication infrastructure for vehicle networking applications. When Compared to VANET and MANET, LTE provides wide area of coverage and excellent infrastructure facilities for vehicle networking. This helps in transmitting the vehicle information to the operator and downloading certain information into the vehicle nodes (VNs) from the operators server. As per the ETSI publications the number of machine to machine communication (MTC) devices are expected to touch 50 billion by 2020 and this will surpass H2H communication. With growing congestion in the LTE network, accessing the network for any request from VN especially during peak hour is a big challenge because of the congestion in random access channel (RACH). In this paper we will analyse this RACH congestion problem with the data from the live network. Lot of algorithms are proposed for resolving the RACH congestion on the basis of simulation results so we would like to present some practical data from the live network to this issue to understand the extent RACH congestion issue in the real time scenario. KEYWORDS RACH; Congestion; LTE; Human to Human (H2H);Machine to Machine ( M2M);Vehicle Nodes ( VN); Mobile ad hoc network (MANET);Vehicular ad hoc network ( VANET) Full Text : https://airccse.org/journal/jwmn/6514ijwmn13.pdf Volume Link : https://airccse.org/journal/jwmn_current14.html
  • 19. REFERENCES [1] Bureau of Infrastructure, Transport and Regional Economics -BITRE, (2009) "Greenhouse gas emissions from Australian transport: projections to 2020", Working paper 73, 2009, Canberra ACT. [2] Deloitte survey, (2013) "State of the global mobile consumer - 2013 divergence deepens", www.deloitte.com/globalmobile2013. [3] Giuseppe Araniti, Claudia Campolo, Massimo Condoluci, Antonio Iera, and Antonella Molinaro, (2013) "LTE for Vehicular Networking: A Survey", IEEE Communications Magazine, May 2013, pp 148 - pp157. [4] Min Chen, Jiafu Wan and Fang Li, (2012) “Machine-to-Machine Communications: Architectures, Standards and Applications”, Transactions on Internet and Information Systems, vol. 6, no. 2, February 2012. [5] 3GPP TS 22.368 V11.3.0, (2011) “Service requirements for Machine-Type Communications (MTC)" Stage 1, September 2011. [6] ETSI, (2011) "Standards on Machine to Machine Communications", Mobile world congress, Barcelona. [7] NS-3: Simulator, http://www.nsnam.org/
  • 20. PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of Technical Education, Iraq ABSTRACT A simulation model is presented to analyze and evaluate the performance of VoIP based integrated wireless LAN/WAN with taking into account various voice encoding schemes. The network model was simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter, end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP. KEYWORDS VoIP, Codecs, QoS Full Text : https://airccse.org/journal/jwmn/6314ijwmn06.pdf Volume Link : https://airccse.org/journal/jwmn_current14.html
  • 21. REFERENCES [1] Y. Jung, and C. Manzano, "Burst packet loss and enhanced packet loss-based quality model for mobile voice-over Internet protocol applications," Journal of IET Commun., Vol. 8, Iss. 1, pp. 41–49, 2014. [2] K. Neupane, and et al, " Measuring the Performance of VoIP over Wireless LAN," In Proceedings of the 2011 conference on Information technology education (SIGITE '11), New York, USA, pp. 269- 274, 2011. [3] S. Anand, and et al, " Performance Analysis of VoIP Traffic using various Protocols and Throughput enhancement in WLANs," International Conference on Computer, Communication and Electrical Technology," March 18-19, pp. 176-180, 2011. [4] T. Anouari, and A. Haqiq, " Performance Analysis of VoIP Traffic in WiMAX using various Service Classes," International Journal of Computer Applications,Vol. 52, No.20, August, pp. 29-34, 2012. [5] Abderrahmane Lakas, " Experimental Analysis of VoIP over Wireless Local Area Networks," Journal of Communications, Vol. 2, No. 4, June , pp. 3-9, 2007. [6] M. Atiur, and et al, " An Analytical Approach for Voice Capacity Estimation Over WiFi Network Using ITU-T E-Model," IEEE Transactions on Multimedia, Vol. 16, No. 2, pp. 360- 372, Feb., 2014. [7] Hussein, and et al, " The Effects of Different Queuing Algorithmswithin the Router on QoS VoIP application Using OPNET," International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, Jan , pp. 117-124, 2013. [8] Ayman Wazwaz, and et al, " Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks" The 13th International Arab Conference on Information Technology ACIT', Dec.10-13, pp. 409-414, 2012. [9] T. Daengsi, and et al, "A Study of Perceptual VoIP Quality Evaluation with Thai Users and Codec Selection Using Voice Quality - Bandwidth Tradeoff Analysis," ICT Convergence (ICTC), 2013 International Conference ,pp.691-696, 2013. [10] S. Brak , and et al, " Speech Quality Evaluation Based CODEC for VOIP over 802.11P," International Journal of Wireless & Mobile Networks (IJWMN), Vol. 5, No. 2, April, pp. 59- 69, 2013. [11] U. R. Alo, and Nweke Henry, " Investigating the Performance of VOIP over WLAN in Campus Network," Journal of Computer Engineering and Intelligent Systems, Vol.4, No.4, pp. 47-58, 2013.
  • 22. PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA ABSTRACT The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint multi-path routes vis-à-vis singlepath minimum hop routes for mobile ad hoc networks. The link-disjoint, node-disjoint and zone-disjoint algorithms proposed in this paper can be used to arrive at benchmarks for the time between successive multi-path route discoveries, the number of disjoint paths per multi-path set and the hop count per multipath set. We assume a multi-path set exists as long as at least one path in the set exists. Simulation results indicate that the number of zone-disjoint paths per multi-path set can be at most 2, which is far lower than the number of node and link-disjoint paths available per multi-path set. Also, the time between zonedisjoint multi-path discoveries would be far lower than the time between node and link-disjoint multi-path route discoveries and can be at most 45% more than the time between single minimum-hop path route discoveries. However, there is no appreciable difference in the average hop counts per zone-disjoint, node-disjoint and link-disjoint multi- path sets and it can be only at most 15% more than the average minimum hop count determined using single-path routing. We also observe that even though the number of link- disjoint paths per multi-path set can be as large as 35-78% more than the number of node- disjoint paths per multi-path set, the time between two successive link-disjoint multi-path discoveries can be at most 15-25% more than the time between two successive node-disjoint multi-path discoveries, without any significant difference in the hop count per multi-path set. KEYWORDS Multi-path Routing, Zone-Disjoint, Node-Disjoint, Link-Disjoint, Single-path, Route Discoveries, Hop Count Full Text : https://airccse.org/journal/jwmn/1110ijwmn02.pdf Volume Link : https://airccse.org/journal/jwmn_current10.html
  • 23. REFERENCES [1] D. B. Johnson, D. A. Maltz and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad hoc Networks,” Ad hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139 – 172, Addison Wesley, 2001. [2] C. E. Perkins and E. M. Royer, “Ad hoc On-demand Distance Vector Routing,” Proceedings of the 2nd Annual IEEE International Workshop on Mobile Computing Systems and Applications, pp. 90 – 100, February 1999. [3] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing for Mobile Computers,” ACM SIGCOMM, pp. 234 – 244, October 1994. [4] J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu and J. Jetcheva, “A Performance of Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols,” Proceedings of MobiCom, pp. 85 – 97, October 1998. [5] S. Mueller, R. P. Tsang and D. Ghosal, “Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges,” Lecture Notes in Computer Science, Vol. 2965, pp. 209 – 234, April 2004. [6] M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad hoc Networks,” Proceedings of the 1st Annual Workshop on Mobile Ad hoc Networking and Computing (MobiHoc), pp. 3 – 10, August 2000. [7] W. Xu, P. Yan and D. Xia, “Similar Node-Disjoint Multi-paths Routing in Wireless Ad Hoc Networks,” Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Vol. 2, pp. 731 – 734, September 2005. [8] H. Wang, K. Ma and N. Yu, “Performance Analysis of Multi-path Routing in Wireless Ad Hoc Networks,” Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Vol. 2, pp. 723 – 726, September 2005. [9] K. Wu and J. Harms, “On-demand Multipath Routing for Mobile Ad hoc Networks,” Proceedings of the 4th European Personal Mobile Communications Conference (EPMCC), February 2001. [10] D. Saha, S. Toy, S. Bandyopadhyay, T. Ueda and S. Tanaka, “An Adaptive Framework for Multipath Routing via Maximally Zone-Disjoint Shortest Paths in Ad hoc Wireless Networks with Directional Antenna,” Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), Vol. 1, pp. 226 – 230, December 2003. [11] S. Waharte and R. Boutaba, “Totally Disjoint Multipath Routing in Multihop Wireless Networks,” Proceedings of the IEEE International Conference on Communications (ICC), Vol. 12, pp. 5576 – 5581, June 2006. [12] S. Roy, D. Saha, S. Bandyopadhyay, T. Ueda and S. Tanaka, “Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad hoc Wireless Networks using Directional Antenna,” Proceedings of the 5th International Workshop on Distributed Computing, Lecture Notes in Computer Science (LNCS) 2918, pp. 225 – 234, December 2003.
  • 24. [13] S. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks,” Proceedings of IEEE International Conference on Communications, Vol. 10, pp. 3201-3205, 2001. [14] M. K. Marina and S. R. Das, “On-demand Multi-path Distance Vector Routing in Ad Hoc Networks,” Proceedings of the IEEE International Conference on Network Protocols, pp. 14 – 23, Nov. 2001. [15] L. Bononi and M. D. Felice, “Performance Analysis of Cross-layered Multi-path Routing and MAC Layer Solutions for Multi-hop Ad Hoc Networks,” Proceedings of the ACM International Workshop on Mobility Management and Wireless Access, pp. 190 – 197, 2006. [16] A. Acharya, A. Misra and S. Bansal, “A Label-Switching Packet Forwarding Architecture for Multihop Wireless LANs,” Proceedings of the 5th ACM International Workshop on Wireless Mobile Multimedia, September 2002. [17] Z. Ye, S. V. Krishnamurthy and S. K. Tripathi, “A Framework for Reliable Routing in Mobile Ad Hoc Networks,” Proceedings of the IEEE International Conference on Computer Communications, 2003. [18] V. Loscri and S. Marano, “A New Geographic Multipath Protocol for Ad Hoc Networks to Reduce the Route Coupling Phenomenon,” Proceedings of the 63rd IEEE Vehicular Technology Conference, VTC 2006-Spring, Vol. 3, pp. 1102-1106, 2006. [19] M. Li, L. Zhang, V. O. K. Li, X. Shan and Y. Ren, “An Energy-Aware Multipath Routing Protocol for Mobile Ad Hoc Networks,” Proceedings of the ACM SIGCOMM Asia, April 2005. [20] N. T. Javan and M. Dehghan, “Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad hoc Networks,” Proceedings of the International Conference on Mobile Ad hoc and Sensor Networks (MSN 2007), Lecture Notes in Computer Science (LNCS) 4864, pp. 703 – 712, December 2007. [21] S. Vijay, S. C. Sharma, V. Gupta and S. Kumar, “CZM-DSR: A New Cluster/Zone Disjoint MultiPath Routing Algorithm for Mobile Ad Hoc Networks,” Proceedings of the IEEE International Advanced Computing Conference (IACC), Patiala, India, pp. 480 – 485, March 2009. [22] I. S. Ibrahim, A. Etorban and P. J. B. King, “Multi-path Distance Vector Zone Routing Protocol for Mobile Ad hoc Networks: MDVZRP,” Proceedings of the 9th Annual Postgraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGET), June 2008. [23] J. Zhang, C. K. Jeong, G. Y. Lee and H. J. Kim, “Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network,” International Journal of Future Generation Communication and Networking, Vol. 1, No. 1, pp. 67 – 74, December 2008. [24] D. Shin and D. Kim, “3DMRP: 3-Directional Zone-Disjoint Multi-path Routing Protocol,” IEICE Transactions on Information and Systems, Vol. E92-D, No. 4, pp. 620-629, April 2009. [25] C. Bettstetter, H. Hartenstein and X. Perez-Costa, “Stochastic Properties of the Random- Way Point Mobility Model,” Wireless Networks, pp. 555 – 567, Vol. 10, No. 5, Sept. 2004.
  • 25. [26] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, “Introduction to Algorithms,” 2nd Edition, Chapter 23, pp. 561-579, MIT Press, 2001. [27] G. Lim, K. Shin, S. Lee, H. Yoon and J. S. Ma, “Link Stability and Route Lifetime in Ad hoc Wireless Networks,” Proceedings of International Conference on Parallel Processing Workshops, pp. 116 – 123, August 2002. [28] N. Meghanathan, “Impact of Range of Simulation Time and Network Shape on the Hop Count and Stability of Routes in Mobile Ad hoc Networks,” IAENG International Journal of Computer Science, Vol. 36, No. 1, #1, February 2009. [29] G. G. Md. N. Ali, R. Chakraborty, Md. S. Alam and E. Chain, “An Efficient Approach for Generalized Load Balancing in Multi-path Packet Switched Networks,” AIRCC International Journal of Computer Networks and Communications, Vol. 2, No. 2, pp. 142- 153, March 2010. [30] N. Cooper and N. Meghanathan, “Impact of Mobility Models on Multi-path Routing in Mobile Ad hoc Networks,” AIRCC International Journal of Computer Networks and Communications, Vol. 2, No. 1, pp. 185-174, January 2010.
  • 26. INTERFERENCE TOLERANT MULTIUSER OFDMA FOR FEMTO CELLS Hadi Alasti Department of Electrical Engineering, University of North Carolina at Charlotte ABSTRACT An interference tolerant OFDMA scheme is proposed for multiuser wireless communications with specificapplication in femto cells. An interleaved set of subcarriers is dedicated to each user to provide with ahigh order of frequency diversity. A reduced complexity digital implementation of the technique is proposed and discussed for the interleaved sub-carrier arrangement. Both inter-symbol interference andother-user interference are mitigated using a proper cyclic extension, provided that the relative propagation delays of the users are an integer multiple of a symbol period. The effect of other-userinterference due to non-integer propagation delays is investigated using computer simulations. The biterror rate performance and signal to interference ratio are presented for a few example systems overboth an Additive White Gaussian Noise (AWGN) and a frequency selective Rayleigh fading channel. Theamount of other-user interference is shown to be reduced as the number of sub-carriers per user isincreased. The effect of design parameters on the interference level is discussed. KEYWORDS Multiuser OFDMA, Interference, Cyclic extension Full Text : https://airccse.org/journal/jwmn/0210s11.pdf Volume Link : https://airccse.org/journal/jwmn_current10.html
  • 27. REFERENCES [1] K. Pahlavan, A. Levesque, “Wireless Information Networks,” New York ,Wiley 1995. [2] J.G. Proakis, “Digital Communications,” McGraw-Hill , 1995. [3] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “On the performance of a coded MCM over multipath Rayleigh fading channels,” IEEE - ICC’95 ,pp: 1689-1694 [4] A. Chini, “Multi Carrier Modulations in Frequency Selective Fading Channels,”Ph.D. dissertation, Carleton University, Canada, 1994. [5] A. Chini, M.S. El-Tanany and S.A. Mahmoud, “Transmission of high rate ATM packets over indoor radio channels,” IEEE JSAC ,Vol. 14 ,No. 3 ,pp: 469-476 ,April 1996. [6] J.A.C. Bingham, “Multicarrier modulation for data transmission: An idea whose time has come,” IEEE Commun. Magazine, pp: 5-14, May 1990. [7] J.G. Proakis and D.G. Manolakis, “Introduction To Digital Signal Processing” ,Maxwell Macmillan ,1989. [8] S.B. Weinstein and P.M. Ebert, “Data transmission by frequency division multiplexing using the discrete fourrier transform,” IEEE Trans. Communications. Vol. COM-19, No.5, pp: 628-634, October 1971. [9] T. S. Rappaport, “Wireless Communication Systems”, Prentice Hall, 1996. [10] N. Suehiro, “A signal design without co-channel interference for approximately synchronized CDMA systems,” IEEE J. Selected Areas in Communications, vol. JSAC-12, pp. 837-841, June 1994. [11] P.Z. Fan, N. Suehiro, N. Kuroyanagi and X.M. Deng, “Class of binary sequences with zero correlation zone,” IEE Electronic Letters, vol. 36, pp. 777-779, May 1999 [12] R.D. Gaudenzi, C. Elia and R. Viola, “Bandlimited quasi-synchronous CDMA: a novel satellite access technique for mobile and personal communication systems,” IEEE Journal on Selected Areas in Communications, Vol. 10, Issue 2, pp.328 – 343, 1992. [13] X.D. Lin and K.H. Chang, “Optimal PN sequence design for quasi-synchronous CDMA communication systems,” IEEE Trans. Communications, vol. 45, pp. 221-226, 1997 [14] S.R. Park, I. Song, S. Yoon and J. Lee, “A new poly-phase sequence with perfect even and good odd cross correlation function for DS/CDMA systems,” IEEE Trans. Vehi. Tech., vol. 51, No.5, 2002. [15] Hadi Alasti, A. Chini, M.S. El-Tanany and S.A. Mahmoud, “A Discrete Multi-Carrier Multiple Access (MCMA) Technique for Wireless Communications,” in the proceedings of IEEE VTC98, Ottawa, Canada, May 18-21, 1998 [16] T. Seki, M. Itami, H. Ohta and K. Itoh, “A study of OFDM system applying frequency diversity,” in the proceedings of the 11th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications,. PIMRC 2000, Vol. 2, pp.1385–1389, 2000. [17] Hadi Alasti, “A Multi-Carrier Multiple Access Technique for Wireless Communications,” Master Thesis, Isfahan University of Technology, Isfahan, IR, 1998.
  • 28. [18] S. Zhou, G.B. Giannakis, “Frequency-hopped generalized MC-CDMA for multipath and interference suppression,” in Proc. of MILCOM conference, pp.937-942, 2000. [19] M. Morelli, C.-C.J. Kuo and M.-O. Pun, “Synchronization Techniques for Orthogonal Frequency Division Multiple Access (OFDMA): A Tutorial Review,” IEEE Proceedings, vol. 95, Issue 7, pp.1394 – 1427, 2007.
  • 29. MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZING NETWORKS Hana Jouini1, Mohamed Escheikh1, Kamel Barkaoui2 and Tahar Ezzedine1 1University of Tunis El Manar, Enit, Sys’Com , 1002 Tunis, Tunisia 2Cedric-Cnam : 2 Rue Conté 75003 Paris, France ABSTRACT This article investigates mobility load balancing (MLB) algorithm implementation through network simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation partnership project (3GPP) as a key target of LTE self- organizing networks (SONs) [1]. Our contribution is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function of the X2- application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs ’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring HO overhead. KEYWORDS LTE, load management, X2AP, elementary procedure, mobility load balancing Full Text : https://aircconline.com/ijwmn/V8N4/8416ijwmn06.pdf Volume Link : https://airccse.org/journal/jwmn_current16.html
  • 30. REFERENCES [1] European Telecommunications Standards Institute. LTE; Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON) use cases and solutions, 2011. [2] European Telecommunications Standards Institute. LTE; Evolved universal terrestrial radio access network (E-UTRAN); X2 application protocol (X2AP), 2013. [3] Kyuho Son, Song Chong, and G. Veciana. Dynamic association for load balancing and interference avoidance in multi-cell networks. Wireless Communications, IEEE Transactions on, 8(7):3566–3576, July 2009. [4] P Mūnoz, R Barco, and I de la Bandera. Load balancing and handover joint optimization in lte networks using fuzzy logic and reinforcement learning. Computer Networks, 76:112– 125, 2015. [5] Wen-Yu Li, Xiang Zhang, Shu-Cong Jia, Xin-Yu Gu, Lin Zhang, Xiao-Yu Duan, and JiaRu Lin. A novel dynamic adjusting algorithm for load balancing and handover co- optimization in lte son. Journal of Computer Science and Technology, 28(3):437–444, 2013. [6] Ridha Nasri and Zwi Altman. Handover adaptation for dynamic load balancing in 3gpp long term evolution systems. arXiv preprint arXiv:1307.1212, 2013. [7] Zhang Peng Huang, Jing Liu, Qiang Shen, Jin Wu, and Xiaoying Gan. A threshold-based multi-traffic load balance mechanism in lte-a networks. In Wireless Communications and Networking Conference (WCNC), 2015 IEEE, pages 1273–1278. IEEE, 2015. [8] Qi-Ping Yang, Jae-Woo Kim, and Tae-Hyong Kim. Mobility prediction and load balancing based adaptive handovers for lte systems. International Journal on Computer Science and Engineering, 4(4):638, 2012. [9] European Telecommunications Standards Institute. LTE ; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification, Nov. 2012. [10] Lte protocols and specifications. http://lteworld.org/lte-protocols-specifications. Accessed: Dec. 2015. [11] X2 interface function in lte a connection between two enodebs. http://www.teletopix.org/4g-lte/x2- interface-function-in-lte-a-connection-between-two- enodebs/. Accessed: Dec. 2015. [12] Christopher Cox. An introduction to LTE: LTE, LTE-advanced, SAE and 4G mobile communications. John Wiley & Sons, 2012. [13] Alcatel-lucent. The LTE Network Architecture: A comprehensive tutorial, 2013. [14] Self-organizing networks. http://www.3gpp.org/technologies/keywords-acronyms/105- son. Accessed: Dec. 2015. [15] Panagiotis Fotiadis, Michele Polignano, Daniela Laselva, Benny Vejlgaard, Preben Mo- gensen, Ralf Irmer, and Neil Scully. Multi-layer mobility load balancing in a heterogeneous lte network. In Vehicular Technology Conference (VTC Fall), 2012 IEEE, pages 1–5. IEEE, 2012.
  • 31. [16] Dah-Ming Chiu and Raj Jain. Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Computer Networks and ISDN systems, 17(1):1–14, 1989. [17] Network simulator 3. url: https://www.nsnam.org/. Accessed: Mai 2015. [18] Nicola Baldo, Manuel Requena-Esteso, Marco Miozzo, and Raymond Kwan. An open source model for the simulation of LTE handover scenarios and algorithms in ns-3.In Proceedings of the 16th ACM international conference on Modelling, analysis & simulation of wireless and mobile systems, pages 289–298. ACM, 2013. [19] Tracy Camp, Jeff Boleng, and Vanessa Davies. A survey of mobility models for ad hocnetwork research. Wireless communications and mobile computing, 2(5):483–502, 2002. [20] Fan Bai and Ahmed Helmy. A survey of mobility models. Wireless Ad hoc Networks.University of Southern California, USA, 206, 2004. [21] European Telecommunications Standards Institute. Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information Service (IS), 2012.