As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
HANDOVER NECESSITY ESTIMATION FOR 4G HETEROGENEOUS NETWORKSijistjournal
One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction in throughput and increase the blocking probability and packet loss. In this paper a new vertical handoff decision algorithm handover necessity estimation (HNE), is proposed to minimize the number of handover failure and unnecessary handover in heterogeneous wireless networks. we have proposed a multi criteria vertical handoff decision algorithm based on two parts: traveling time estimation and time threshold calculation. Our proposed methods are compared against two other methods: (a) the fixed RSS threshold based method, in which handovers between the cellular network and the WLAN are initiated when the RSS from the WLAN reaches a fixed threshold, and (b) the hysteresis based method, in which a hysteresis is introduced to prevent the ping-pong effect. Simulation results show that, this method reduced the number of handover failures and unnecessary handovers up to 80% and 70%, respectively.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
At present, cellular networks provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient Wi-Fi based Internet access from moving vehicles. In our proposed implementation, a group of APs are employed to communicate with a client (called AP diversity), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called opportunistic transmission). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the APs with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (virtual) AP exists, and will always be associated with this virtual AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. The transmission is successful as long as at least one AP receives the packet correctly. Proposed implementation will show that outperforms existing schemes remarkably.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to provide IT-enabled services and applications. The great majority end devices are equipped with multiple network interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous network management algorithm based on machine learning methods which includes roaming and sharing functions. The roaming function provides the multiple network resources in physical and media access control layers. The sharing function supports multiple network resources allocation and the service handover process based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular environments to realize ubiquitous social sharing networks.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
More Related Content
Similar to A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MOBILE AD HOC AND SENSOR NETWORKS
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
Capillary Networks play an important role in the growth of the Internet-of-Things, enabling wireless sensor networks to connect and use the capabilities of cellular networks through Capillary Gateways. Capillary Gateways facilitate the seamless integration of wireless sensor networks with cellular networks. Therefore, an optimal selection of the Capillary Gateways by the wireless sensor network is crucial for balancing the load between the gateways and optimizing the end-to-end path through both networks.
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
Integration of Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) result in ubiquitous connection for end users. In the integrated network, ensuring the quality of service to users and enhancing capacity of network are prominent issues. Bandwidth adaptation technique is one of the solutions to overcome these issues. Bandwidth adaptation based on per flow and per class schemes were proposed for loosely coupled interworking network. In this paper, hybrid coupled UMTS and WLAN interworking network is analyzed with bandwidth adaptation based on per flow and per class schemes and the performances have been compared. Simulation result shows that the proposed hybrid coupled interworking network with bandwidth adaptation based on per class scheme performs better with enhanced quality of service and network capacity.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
To accommodate real-time multimedia applications that achieve Quality of Service (QOS) requirements in
a wireless ad-hoc network, a QOS control mechanisms is needed. Correspondence over such networks
must consider other aspects in regard to network properties; that the time it takes to send a message and
reach its destination faces different variables from one message to the other in a short time. Therefore, the
equation of calculating the time required to resend the message must be able to contain the worst case and
acknowledges different features for the network. The objective of this paper is to improve retransmission
time calculation adaptability when occurring using Transmission Control Protocol (TCP) over wireless Ad
hoc networks. Hence, it aims to obtain more accurate time to ensure retransmission time occurring in
accordance to the network environment variables efficiently.
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
At present, cellular networks provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient Wi-Fi based Internet access from moving vehicles. In our proposed implementation, a group of APs are employed to communicate with a client (called AP diversity), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called opportunistic transmission). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the APs with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (virtual) AP exists, and will always be associated with this virtual AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. The transmission is successful as long as at least one AP receives the packet correctly. Proposed implementation will show that outperforms existing schemes remarkably.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to provide IT-enabled services and applications. The great majority end devices are equipped with multiple network interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous network management algorithm based on machine learning methods which includes roaming and sharing functions. The roaming function provides the multiple network resources in physical and media access control layers. The sharing function supports multiple network resources allocation and the service handover process based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular environments to realize ubiquitous social sharing networks.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
Similar to A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MOBILE AD HOC AND SENSOR NETWORKS (20)
An Optimized Mechanism for Adaptive and Dynamic Policy Based Handover in Clus...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...pijans
Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery and route maintains, discovery and route maintained needed more power consumption for that process. The power of devices is decrease during such process and network lifetimes expire. In this paper, we modified the secured stateless protocol for secured routing and minimized the utilization of power during path discovering and establishment. For the authentication of group node used group signature technique and sleep mode threshold concept for power minimization. Our proposed technique is simulated in ns-2 and compare to other routing protocol gives a better performance in comparison to energy consumption and throughput of network.
As-Puma : Anycast Semantics In Parking Using Metaheuristic Approachpijans
The number of vehicle used in the world are increasing day by day resulting in the obvious problem of
parking of these vehicle’s in residential and vocational areas. We perceive the problem of vehicles parking
in vocational establishments / malls. Today majority of parking systems are manual parking systems where
in, on the spot, parking of the vehicle is done and a parking slip is generated and handed over to customer.
This is cumbersome technique wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so that only that many number of
parking slips/tickets are generated as the number of free parking slots. We address the problem of parking
in Delay Tolerant Network (DTN) by proposing metaheuristic driven approach of Ant Colony optimization
(ACO) technique with anycast semantics models . Here we propose the parking architecture to solve the
problem of parking especially in commercial areas with their design diagrams . In this architecture we
apply the delivery model to deliver the packet correctly to the intended receiver. Using this we can book
various parking’s through remote areas so that the customer can get the information about availability of
various parking’s inside an area and the parking fare for each category of the automobile. Using this
architecture the customer can get the prior knowledge about various vacant parking slots inside a parking
area and he can book the corresponding parking from his location.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Black Hole Attack Prevention Using Random Dispersive Routing for Mobile Adhoc...pijans
Mobile Adhoc Networks is a wireless network and it has become an important technology in current years
in which security has become an important problem. Black hole Attack is one of the promising and severe
security attacks in mobile ad hoc networks which block the communication of secret data during packet
delivery. Black hole attack directly attacks the node’s data traffic on the path and with intent drops, alters
or delays the data traffic passing through that node. In other type of black hole attack which misleadingly
replies for the route request which comes from the node which initiates the route discovery process that it
has as much as necessary routes to the destination even it does not have path to the destination. This paper
deals with prevention of black hole attacks using Shamir’s secret sharing and Random Multipath Routing
Algorithm
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of
nodes makes the route unstable and unreliable for the information exchange and communication between
two nodes in the network. To enhance the performance and throughput of the VANETs, routes between
nodes must be reliable and stable. In this paper, we study the significance of path duration and link
duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes
very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict
the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key
factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task
to perform as it depends on many parameters including node density, transmission range, numbers of hops,
and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in
VANETs.
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
As there is a growing need for the cost effective and highly dynamic large-bandwidth networks over large
coverage area , the Wireless Mesh Network provide first step towards effective communication. A Wireless
Mesh Network is one of the most advanced wireless network used for communication. During their
operating period , the wireless mesh network may suffer from frequent link failure which results in poor
performance of network. Link failure detection plays crucial role in performance of WMN. The proposed
paper presents the review of various techniques used for detection of link failure and the techniques used
for recovery of wireless mesh network.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
This document is Intended for the purpose of Enabling the power of social media to Empower Ridesharing.
this entails the creation of an ad-ridesharing Initiative with a view to tackling real-world problems such as
traffic congestion and the ever-increasing fuel prices. The main objectives include creating applications,
both web and mobile based, to seamlessly integrate the app’s functionality into and everyday user’s
routine.
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
Power Control in Mobile Ad Hoc networks is a critical issue, since nodes are powered by batteries.The
main idea of power control schemes is to use different power levels for RTS/CTS and DATA/ACK. These
schemes may degrade network throughput and reduce energy efficiency of the network. In this paper we
have evaluated the performance of Improved Autonomous Power Control MAC Protocol (IAPCMP),that
allows nodes to dynamically adjust power levels for transmission of DATA/ACK according to the distance
between the transmitter and its neighbors.In IAPCMP power level for transmission of RTS/CTS is also
adjustable. This also used maximum power level for transmitting DATA/ACK periodically to make
neighboring nodes aware about ongoing transmission. The performance of IAPCMP is evaluated through
the metrics namely, packet delivery ratio and rate of energy efficiency.The simulation results show
significant improvement in protocol.
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
In this paper, we present a comprehensive overview on Ad hoc networking by directional antennas. Use of
Directional antennas can largely reduce the interference, increase the spatial reuse and due to their longer
range we can have routes with fewer hop for two distant nodes. However the main problem of using
directional antennas in Ad hoc networks is due to the dynamic nature of the network. Neighbour discovery,
maintenance the track of moving neighbours, exploitation of the benefit of long range and directional MAC
protocols are the most challenging issues. We present three Directional MAC protocols and two
combinational protocols and system which give solutions to MAC and Neighbour discovery and compare
the throughput of them with 802.11 with omnidirectional antennas.
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
The widespread adoption of IEEE 802.11 WLANs is attributed to their inherent mobility, flexibility, and
cost-effectiveness. Within the IEEE 802 working group, a dedicated task group is diligently advancing
WLAN technologies, particularly tailored for dense network scenarios. Amidst these advancements, the
802.11ac protocols have emerged as a preferred choice, delivering superior data transfer rates compared
to the preceding 802.11n standard. Significantly, the sixth-generation wireless protocol, IEEE 802.11ax,
has been introduced, showcasing enhanced performance capabilities that outpace its fifth-generation
predecessor, 802.11ac.In this pioneering investigation, we engage in an in-depth simulation-based scrutiny
of prominentWLAN protocols—namely, IEEE 802.11n, IEEE 802.11ac, and the cutting-edge IEEE
802.11ax. Our exhaustive analyses traverse a spectrum of critical metrics, encompassing throughput,
coverage, spectral efficiency, Tx/Rx gain, and Tx/Rx power.In a single-user and SISO scenario, both
802.11ac and 802.11ax outperform 802.11n. Significantly, 802.11ax surpasses the previous 802.11n/ac
standards, highlighting substantial advancements in wireless performance.
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
Mobile Ad-hoc Networks (MANETS) consists of a collection of mobile nodes without having a central
coordination. In MANET, node mobility and dynamic topology play an important role in the performance.
MANET provide a solution for network connection at anywhere and at any time. The major features of
MANET are quick set up, self organization and self maintenance. Routing is a major challenge in MANET
due to it’s dynamic topology and high mobility. Several routing algorithms have been developed for
routing. This paper studies the AODV protocol and how AODV is performed under multiple connections in
the network. Several issues have been identified. The bandwidth is recognized as the prominent factor
reducing the performance of the network. This paper gives an improvement of normal AODV for
simultaneous multiple connections under the consideration of bandwidth of node.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a challenge. However, the impact of EVs varies significantly between each LVDN area and charging scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and 60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be distributed over several days, thus raising concerns about how to prevent it. The broader implications of our research suggest that, despite initial worries primarily centered on congestion due to unregulated charging during peak hours, a transition to cost-based smart charging, propelled by an increasing awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization, bringing about undesirable consequences for the power distribution network (PDN).
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
This article presents a probabilistic modeling method utilizing smart meter data and an innovative agentbased simulator for electric vehicles (EVs). The aim is to assess the effects of different cost-driven EV
charging strategies on the power distribution network (PDN). We investigate the effects of a 40% EV
adoption on three parts of Frederiksberg's low voltage distribution network (LVDN), a densely urbanized
municipality in Denmark. Our findings indicate that cable and transformer overloading especially pose a
challenge. However, the impact of EVs varies significantly between each LVDN area and charging
scenario. Across scenarios and LVDNs, the share of cables facing congestion ranges between 5% and
60%. It is also revealed that time-of-use (ToU)-based and single-day cost-minimized charging could be
beneficial for LVDNs with moderate EV adoption rates. In contrast, multiple-day optimization will likely
lead to severe congestion, as such strategies concentrate demand on a single day that would otherwise be
distributed over several days, thus raising concerns about how to prevent it. The broader implications of
our research suggest that, despite initial worries primarily centered on congestion due to unregulated
charging during peak hours, a transition to cost-based smart charging, propelled by an increasing
awareness of time-dependent electricity prices, may lead to a significant rise in charging synchronization,
bringing about undesirable consequences for the power distribution network (PDN).
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
In this paper, a multilayer perceptron guided key generation for encryption/decryption (MLPKG) has been
proposed through recursive replacement using mutated character code generation for wireless
communication of data/information. Multilayer perceptron transmitting systems at both ends accept an
identical input vector, generate an output bit and the network are trained based on the output bit which is
used to form a protected variable length secret-key. For each session, different hidden layer of multilayer
neural network is selected randomly and weights or hidden units of this selected hidden layer help to form
a secret session key. The plain text is encrypted using mutated character code table. Intermediate cipher
text is yet again encrypted through recursive replacement technique to from next intermediate encrypted
text which is again encrypted to form the final cipher text through chaining , cascaded xoring of multilayer
perceptron generated session key. If size of the final block of intermediate cipher text is less than the size of
the key then this block is kept unaltered. Receiver will use identical multilayer perceptron generated
session key for performing deciphering process for getting the recursive replacement encrypted cipher text
and then mutated character code table is used for decoding. Parametric tests have been done and results
are compared in terms of Chi-Square test, response time in transmission with some existing classical
techniques, which shows comparable results for the proposed technique.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network’s topology causes weak trust relationship among the nodes in the network. . In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MOBILE AD HOC AND SENSOR NETWORKS
1. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
DOI : 10.5121/ijans.2015.5301 1
A CELLULAR BONDING AND ADAPTIVE LOAD
BALANCING BASED MULTI-SIM GATEWAY FOR
MOBILE AD HOC AND SENSOR NETWORKS
Francesco Beritelli, Aurelio La Corte, Corrado Rametta and Francesco Scaglione
Dipartimento di Ingegneria Elettrica Elettronica e Informatica, University of Catania,
Italy
ABSTRACT
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
KEYWORDS
Mobile Internet Access, Multiple RAN, Cellular Bonding, VPN Bonding, Dynamic Load Balancing, Smart
Hot Spotting.
1.INTRODUCTION
The rapid and continuous consolidation of Mobile Internet access request together with the
significant increase of mobile services provided by third- and fourth generation (3G, HSPA, LTE)
networks, have recently created the conditions for a considerable expansion of mobile IP
applications and services. Mobile IP networks are not designed to support real-time and/or time-
critical traffic because of several drawbacks concerning the wireless medium[1]: resource
sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as
delay, jitter, and packet losses. These are the main causes of quality degradation of numerous
services over the PSTN (public switched telephone network). Some authors of this work proposed
the use of multiple SIM (subscriber identity module) devices in order to improve the QoS offered
by the cellular radio access technology [2][3][4][5]. Following this paradigm, in the present
paper, the authors propose a multiple SIM device, acting as:
1. sink of a wireless sensor network[6], ad hoc network or Internet of Things
network[7];
2. gateway between the local wireless domain (ZigBee, Bluetooth, 802.11 ad-hoc
mode) and the wide area network domain (radio access domain 3G or 4G).
2. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
2
The main idea consists in enhancing the connectivity between the local area network (ad hoc,
sensors, IoT, etc.) domain and a remote command and control node by exploiting the VPNs bond
of two cellular radio access connections coupled with an adaptive load balancing algorithm based
on real time evaluation of the available end-to-end bandwidth offered by two different network
operators. The authors propose a trivial prototype in order to evaluate the effectiveness of the
proposed solution in terms of the enhancement of both the instantaneous available bandwidth and
connection availability between the mobile access point and a remote command and control
and/or monitoring node. As to the costs/benefits balance, the proposed method on the one hand
requires a dual RF module, but on the other hand it is also true that nowadays HSPA or LTE
modems have become very cheap and common and there are a lot of free and open source
operative systems allowing the implementation of advanced networking functions such as load
balancing techniques, VPN creation and bonding, network performance evaluation and so on.
The paper is structured as follows: Section II describes the possible applications and contexts
where the proposed approach can offer considerable benefits in terms of reliability and efficiency
and gives an overview on the overall system; Section III presents the end-to-end bandwidth
measurement algorithm and the adaptive weight assignment procedure; Section IV reports the
performance results of a real test bed; finally, in Section V conclusions are drawn.
2. SCENARIO AND SYSTEM OVERVIEW
This paragraph provides a brief overview of both the application scenario and the proposed
mechanism based on two key features, the VPN bond between two cellular connections and the
adaptive load balancing between the available radio access connections.
2.1 Application scenario
Wireless sensor networks (WSNs) and Internet of Things (IoT)have become very commonly used
technologies enabling a large number of applications and services in everyday life. Usually the
architecture of the above cited networks is based on a certain number of sensors and devices that
communicate among them and towards a critical device called sink that has the scope of
collecting data from the devices for monitoring, control, statistics, etc. Often the sink is designed
to communicate via Internet to a remote command and control (C2) position where a user can
operate over the network.
CORE NETWORK
Access
Network
1
Access
Network
2
Figure1. Scenario overview.
3. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
3
With this scope, the sink provides the functionality of gateway with the external IP world.
Regarding this aspect, the gateway is equipped with at least two network interfaces: the first is
usually a WiFi card operating as access point or a Bluetooth interface acting as master of the ad
hoc network or a ZigBee card operating as sink of the sensors network; the second one is a wide
area network interface like as wifi-mesh mode, 3G/4G modem, WiMaX or other PMR (private
mobile radio) cards in order to communicate with the IP worldaccording to the applicative
scenario for which the ad hoc network has been conceived. In particular, when the sensor network
or the IoT network are deployed for command and/or control, monitoring, surveillance or similar
use in mobile or vehicular contexts and a fixed wide area network connection is not available, it is
mandatory to provide a stable, reliable and effective wireless connection towards the remote
server in order to guarantee the required QoS for time-critical and real time applications.
With this aim the authors propose a Dual SIM 3G/4G wireless access point that acts as the sink
for the sensors or ad-hoc network and, at the same time, acts as gateway towards the IP core
network. To guarantee QoS for time critical and real time applications, the proposed device offers
two main features:
1) a VPN bonding between the two radio access connections, thanks to which it is possible
to obtain a bandwidth almost equal to the sum of the two available end-to-end
bandwidths;
2) a dynamic load balancing algorithm, which is a process that establishes the weights the
device gives to the two different radio connections during the movement of the mobile
sink/gateway on the base of the instantaneous available end-to-end bandwidth offered by
the two different network operators.
It has been observed that in this first phase of the present research the weights are established in
order to maximize the cumulative bandwidth but as a future work the authors will implement a
more complex algorithm able to dynamically calculate the VPN weights based on the traffic
typology (voice, file transfer, best effort, etc) and the related parameters that directly impact on
the quality of experience of the end user willing to use the service.
2.2 System at a glance
The smart gateway proposed by the authors is based on a well known technique called VPNs
bond, usually employed in the Ethernet switch and extended to the cellular domain to counteract
some drawbacks connected to the radio access technology. Due to the application of VPNs bond
it is possible to balance the data load among the available network interfaces but, for the sake of
clarity, it should be highlighted that this technique is much more flexible if compared to the
common load balancing algorithms; in fact, the latter permit to split the data connection between
the source and the destination by using the available connections and according to the weights
assigned to each interface. In such a way, the effectiveness of the mechanism is obtained only
when there are more than one end-to-end connection between the sender and the receiver. In case
there is only a data flow towards the remote server, load balancing permits to assign the data
stream to one of the two connections and the perceived end-to-end bandwidth is equal to the one
offered by the best network operator. Instead, the use of the VPNs bond technique permits to
enhance the available end-to-end bandwidth also in the case of only one data flow from the
source node, i.e. the gateway of the ad hoc network, and the destination, i.e. the remote command
and control position.
4. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
The VPNs bonding consists in unifying two or more layer 2 connections in order to be able to
assign to one data flow a bandwidth ideally equal to the sum of the bandwidth offered by single
L2 connections. This technique is well known and widely employed in
switches where it is possible to unify two or more L2 interfaces to guarantee a larger point
point bandwidth in the core network.
In the present use case, the procedure consists in the creation of a VPN between each 3G/4G
interface and the end point of the communication, i.e. the remote server. Once established the two
VPNs it is possible to make the bonding of the latter in order to establish a large bandwidth
connection between source and destination nodes (see Figure 2). Usual
technique is coupled with a trivial load balancing algorithm that consists in assigning static and
equal weights to each L2 connection. In case of L2 switches or DSL modem/routers this approach
represents a good solution because the networ
remain almost constant in time. Let us suppose that the two available connections provide a
bandwidth equal to 2 Mbps; in such a case a trivial load balancer will assign weights equal to 1 to
each connection and the system will provide a bandwidth equal to 4 Mbps. Now, supposing that
at a time t the connection number 1 provides a bandwidth equal to 2 Mbps whereas the
connection number 2 offers a bandwidth equal to 1 Mbps. Under this condition, if the load
balancing algorithm maintains constant weights, by using a simple round robin mechanism, the
connection 2 will represent a bottleneck for the system because the overall available end
bandwidth will not be equal to the sum of the two bandwidths but
the worst connection.
In a wireless scenario characterized by the high variability of radio coverage, different traffic
conditions, handover procedures, and mobility, each radio interface
SIM - performs according to the infrastructure and the load conditions set by its operator. Under
these conditions, a static weights assignment would result in a drastic reduction in performance
where the worst connection would act as a bottleneck for the whol
overcoming this limit, the authors propose a mechanism of real time bandwidth evaluation to
establish each time and for each L2 connection the weights to assign to the VPNs bond, thus
maximizing the transmission rate towards the d
In the next sections the adaptive load balancing algorithm will be described and the first
performance evaluation of a trivial prototype will be presented.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
Figure 2. VPNs bond architecture.
The VPNs bonding consists in unifying two or more layer 2 connections in order to be able to
assign to one data flow a bandwidth ideally equal to the sum of the bandwidth offered by single
L2 connections. This technique is well known and widely employed in the field of Ethernet
switches where it is possible to unify two or more L2 interfaces to guarantee a larger point
point bandwidth in the core network.
In the present use case, the procedure consists in the creation of a VPN between each 3G/4G
ace and the end point of the communication, i.e. the remote server. Once established the two
VPNs it is possible to make the bonding of the latter in order to establish a large bandwidth
connection between source and destination nodes (see Figure 2). Usually the VPNs bond
technique is coupled with a trivial load balancing algorithm that consists in assigning static and
equal weights to each L2 connection. In case of L2 switches or DSL modem/routers this approach
represents a good solution because the network conditions are similar for each interface and they
remain almost constant in time. Let us suppose that the two available connections provide a
bandwidth equal to 2 Mbps; in such a case a trivial load balancer will assign weights equal to 1 to
tion and the system will provide a bandwidth equal to 4 Mbps. Now, supposing that
the connection number 1 provides a bandwidth equal to 2 Mbps whereas the
connection number 2 offers a bandwidth equal to 1 Mbps. Under this condition, if the load
balancing algorithm maintains constant weights, by using a simple round robin mechanism, the
connection 2 will represent a bottleneck for the system because the overall available end
bandwidth will not be equal to the sum of the two bandwidths but it will be equal to twice that of
In a wireless scenario characterized by the high variability of radio coverage, different traffic
conditions, handover procedures, and mobility, each radio interface – equipped with the related
performs according to the infrastructure and the load conditions set by its operator. Under
these conditions, a static weights assignment would result in a drastic reduction in performance
where the worst connection would act as a bottleneck for the whole system. With the aim of
overcoming this limit, the authors propose a mechanism of real time bandwidth evaluation to
establish each time and for each L2 connection the weights to assign to the VPNs bond, thus
maximizing the transmission rate towards the destination node.
In the next sections the adaptive load balancing algorithm will be described and the first
performance evaluation of a trivial prototype will be presented.
International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
4
The VPNs bonding consists in unifying two or more layer 2 connections in order to be able to
assign to one data flow a bandwidth ideally equal to the sum of the bandwidth offered by single
the field of Ethernet
switches where it is possible to unify two or more L2 interfaces to guarantee a larger point-to-
In the present use case, the procedure consists in the creation of a VPN between each 3G/4G
ace and the end point of the communication, i.e. the remote server. Once established the two
VPNs it is possible to make the bonding of the latter in order to establish a large bandwidth
ly the VPNs bond
technique is coupled with a trivial load balancing algorithm that consists in assigning static and
equal weights to each L2 connection. In case of L2 switches or DSL modem/routers this approach
k conditions are similar for each interface and they
remain almost constant in time. Let us suppose that the two available connections provide a
bandwidth equal to 2 Mbps; in such a case a trivial load balancer will assign weights equal to 1 to
tion and the system will provide a bandwidth equal to 4 Mbps. Now, supposing that
the connection number 1 provides a bandwidth equal to 2 Mbps whereas the
connection number 2 offers a bandwidth equal to 1 Mbps. Under this condition, if the load
balancing algorithm maintains constant weights, by using a simple round robin mechanism, the
connection 2 will represent a bottleneck for the system because the overall available end-to-end
it will be equal to twice that of
In a wireless scenario characterized by the high variability of radio coverage, different traffic
equipped with the related
performs according to the infrastructure and the load conditions set by its operator. Under
these conditions, a static weights assignment would result in a drastic reduction in performance
e system. With the aim of
overcoming this limit, the authors propose a mechanism of real time bandwidth evaluation to
establish each time and for each L2 connection the weights to assign to the VPNs bond, thus
In the next sections the adaptive load balancing algorithm will be described and the first
5. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
5
3. DYNAMIC LOAD BALANCING ALGORITHM
The proposed algorithm can be summarized in three steps:
1. Bandwidth measuremet for each available radio data connection;
2. Results analysis and weight evaluation to establish and set up the VPN bond parameters;
3. Periodic performance evaluation to determinate the most suitable weight for each mobile
connection.
As to the first step, i.e. the end-to-end bandwidth evaluation, it is carried outvia the Self Loading
of Periodic Streams (SloPS) technique[8][9]. The latter is based on a client-server application: the
sender process runs on the multi-SIM access point whereas the receiver process runs on a remote
host,which, in the present architecture, is the remote gathering node of the sensor data network.
The above mentioned architecture is suitable in case the mobile hot spot has to send data towards
a remote sink collecting sensor data; however, if the time-critical application is based on the
transmission from the remote host to the mobile network the upload bandwith will be taken into
consideration. The working principle of the Self Loading of Periodic Streams is very simple: it is
based on the periodic transmission of packet streams from the source to the destination and on the
consequent measure of the One Way Delay (OWD), which is the time interval between the
transmission of the data packet and its reception at the receiver side. The number of packets
transmitted increases until the growing one way delay; when this happens it means that the packet
transmission rate is greater than the available bandwidth provided by the radio access network.
Figure 3 shows the above mentioned procedure: when the transmission rate (R) is compatible
with the available bandwidth (A), i.e. R < A, the one way delay shows an almost constant trend;
however, when the packet rate from the source to the destination is greater than the available
bandwidth, i.e. R > A, the one way delay increases because of the TCP congestion window
mechanism.
Figure 3. One way delay values of the ith packet train in the SLoPS technique[8].
The measurement is obtained by the iterative sending of a series of K packets of L bit each of
which is transmitted during an interval of T seconds. In such a way the transmission rate is equal
to R = L/T [bit/s]. Each packet of the series has a timestamp to indicate when the data packet has
been created and sent to the receiver node. Once the destination node receives the packets stream
it compares the arrival time (Ai) and the sending time (Si) of the packets in order to calculate the
one way delay of the ith stream, i.e. Di = Ai – Si.
6. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
6
The sender and the receiver communicate according to the client-server paradigm in order to
establish the available bandwidth. When the one way delay at the destination side increases, in
fact, the receiver process notifies the sender that behaves as follows:
a. If R(i) < A, the source process will send the following packets stream at R(i+1) > R(i)
b. If R(i) > A, the source process will send the following packets stream at R(i+1) < R(i)
Furthermore, the rate of the stream (i+1) is established as follows [9]:
1. Two start parameters, Rmin ed Rmax, are initialized equal to zero and equal to the ideal
maximum throughput provided by the connection Rmax;
o If R(i) < A then Rmin = R(i)
o If R(i) > A then Rmax = R(i)
2. R(i+1) = (Rmax – Rmin)/2
3. The iterative process ends when Rmax – Rmin< w, where w indicates the value depending
on the precision of the bandwidth evaluation procedure (obviously, the greater the w the
less accurate evaluation but, at the same time, the faster the convergence period required
by the algorithm).
The above mentioned algorithm runs for each radio access connection and converges to the
actually available end-to-end bandwidth. When the process ends, the bandwidth values are
communicated to the adaptive load balancing process that updates the VPNs bond weights as
follows:
a. the VPN weight of the worst connection is set equal to 1;
b. the VPN weight of the best connection is set equal to Abetter / Aworst;
c. in case the bandwidth offered by one of the two operators is equal to 0, e.g. because of a
lack of radio coverage, the whole traffic is routed to the active connection.
The flow diagrams related to the client/server application running in the gateway side and in the
remote command and control node are shown in Figure 4 and Figure 5.
7. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
7
Figure 4. Bandwidth evaluation process at the mobile gateway side.
8. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
8
Figure5. Bandwidth evaluation process at the remote command and control side.
4.PERFORMANCE EVALUATION
In the above sections some problems have been illustrated that arise when a mobile wireless
sensor networks have to be connected to a remote command and control server by using the
9. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
9
public 3G or 4G radio network. In order to overcome such drawbacks as connection interruption,
lack of bandwidth, delay in performance, jitter and packet loss rate not compatible with time
critical applications, a smart dual SIM sink/gateway based on multiple radio access, VPN
bonding and adaptive load balancing between the available connections is proposed. The present
section will prove the effectiveness of the proposed solution showing the results obtained during
the test bed. For this latter we realized a prototype by using a small form factor system boards
optimized for wireless routing and network applications, an ALIX2D2 board[11], equipped with a
500 MHz AMD Geode LX800 CPU and 256 MB DDR DRAM on board; two USB Internet keys
have been used to provide cellular connectivity and the two devices have been equipped with two
SIMs of two different network operators, that we will define as Operator 1 and Operator 2 in the
following sections; ZeroShell[12] and OpenVPN[13] has been used as operative system and VPN
manager respectively, whereas proprietary scripts has been realized by using bash and python
language to evaluate the available end-to-end bandwidth between the couples source-destination
and, consequently, to establish the weights to assign to each VPN in order to maximize the
overall performance of the prototype. For the aim of clarity, the same hardware and software have
been employed to evaluate the performance of the standard static weights assignment procedure
without using, obviously, the scripts for the dynamic evaluation of the VPN weights. A picture of
the hardware employed to realize our prototype is shown in Figure 6.We performed 15 data
transfers from the mobile sink to the remote C2 evaluating the instantaneous throughput for each
operator and for the one obtained by using the bond of the two VPN without the adaptive load
balancing. It has been observed that the VPNs bond performs better than the two single end-to-
end connections providing high bandwidth connections between the mobile sensor network and
the remote C2 position.
As shown in Figure 7, the instantaneous end-to-end throughput is not equal to the sum of the two
single ones because of the presence of the overhead related to the establishment of SSH tunnel
among the two radio network interfaces and the remote server.
Figure 6. The prototype employed during our test bed.
10. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
10
Figure 7. Available bandwidth perceived by a single TCP connection.
Figure8. Average end-to-end bandwidth comparison.
To summarize (refer to Figure 8), the use of a dual SIM sink/gateway permits to enhance the
available end-to-end bandwidth by more than 50% if compared to the best radio operator,
Operator 1, and more than 100% if compared to the worst radio operator in our test bed Operator
2.
Obviously, the use of two or more network accesses guarantees a seamless connectivity between
the source and the destination if compared to the use of only one radio interface. Figure 9 shows
the instantaneous bandwidth of the two network connections and the VPN bond; as it appears
when one of the two operators goes down due to network congestion or lack of radio coverage the
VPN bond performs as the only working operator and the prototype behaves every time like a
common single stream device equipped with the USIM belonging to the best network operator,
i.e. the operator offering the best connectivity at the given time.
The performance delivered by the VPN bond coupled with the static load balancing between the
two available connections is satisfactory in the above mentioned scenarios; however, this
technique has some drawbacks when one of the two operators does not go down but, more
simply, offers an end-to-end bandwidth variety during the sink movement due to such reasons as
11. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
11
radio coverage, traffic congestion, handover procedures and so on. It can appear that during the
sink movement the network operator 2 delivers almost constant performance whereas the network
operator 1 shows a drastic reduction in the bandwidth see Figure 10). In such a case, the VPN
bond and the static load balancing algorithm does not perform as expected and the dual SIM
gateway behaves as the worst of the two network operators; in fact, the load balancing algorithm
splits into two equal flows, the original one assigning to each connection the amount of data to
transmit equal to the available bandwidth offered by the worst operator.
Figure 9. Available bandwidth perceived by a single TCP connection during Operator 2 failure.
Figure10. Available bandwidth perceived by a single TCP connection during Operator 1 bandwidth
degradation in case of static weights.
Figure 10 shows the performance delivered by using the connections offered by Operator 1,
Operator 2 and the traditional VPN bond technique respectively. As shown in the figure, the dual
SIM prototype behaviour is similar to that of the worst operator; the latter representing, in fact,
the bottleneck of the system. In such a case, the VPN bond coupled with the load balancing does
not offer any performance enhancement because of the incorrect assignment of bond weights.
Figure 11, instead, indicates the results obtained by the proposed cellular bonding prototype with
the use of an adaptive load balancing algorithm in order to counteract the drawbacks related to the
variability of the end-to-end bandwidth offered by each radio operator during the movement of
the mobile sink/gateway. The mobile sink/gateway was moved following the same route. It
appears that the cellular bonding almost always outperforms the best cellular operator; however,
12. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
12
when this does not happen it is due to the convergence time of the adaptive weights algorithms.
Also,this case highlights that the final end-to-end bandwidth is not equal to the sum of all
bandwidths because of the presence of the overhead due to the implementation of the VPNs and
their bonding. In the Figure 12 the behaviour of static and dynamic weights is presented, whereas
in the Figure 13 the average end-to-end bandwidth of the two schemes is compared. As we can
see, the VPN bond with adaptive weights assignment outperforms the static assignment scheme
by almost 100% showing the effectiveness of the proposed solution in vehicular applications such
as telemedicine, telemetry, remote command and control, etc.
Figure 11. Available bandwidth perceived by a single TCP connection during Operator 1 bandwidth
degradation in case of adaptive weights.
Figure12. Bandwidth comparison between VPNs bond with static and dynamic weights.
13. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
13
Figure13. Average bandwidth comparison between VPNs bond with static and dynamic weights.
5.CONCLUSION
The present paper proposes a smart gateway for mobile wireless sensor networks, IoT networks
or local area networks for time critical or real time communications based on two approaches, the
VPNs bonding and the dynamic load balancing between the available radio access connections.
The first approach permits to enhance the available end-to-end bandwidth and the reliability of
the connection between the sink and the remote position; the second step consists in the dynamic
weights calculation to be assigned to each connection in order to maximize the cumulative end-
to-end bandwidth. In fact, Mobile IP networks are not designed to support real-time and/or time-
critical traffic because of several drawbacks concerning the wireless medium, such as resources
sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as
bandwidth, delay, jitter, and packet losses that are the main causes of quality degradation of
numerous services over the PSTN. Under this condition, the dynamic assignment of the weight to
each connection of the VPN bonding plays a key role in exploiting the best connection available
at the given time. Performance evaluation of the prototype shows the effectiveness of our
approach in terms of instantaneous throughput. Considering the future work, the authors of the
present paper are currently working on a device that is able to calculate the dynamic weights of
the load balancing algorithm based on the kind of data traffic the sink/gateway has to transmit or
receive from the remote command and control station.
ACKNOWLEDGEMENTS
This work has been partially supported by the "ProgrammaOperativoNazionale
“Ricerca&Competitività” 2007-2013” within the project "PON04a2_E – SINERGREEN – RES
NOVAE – Smart Energy Master per ilgovernoenergetico del territorio” and the project
“PON01_00683 - SIGMA - Sistema Integrato di sensori in ambiente cloud
perlaGestioneMultirischioAvanzata”.
14. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
14
REFERENCES
[1] A. Lamba, J. Yadav, G. U. Devi, “Analysis of Technologies in 3G and 3.5G Mobile Networks”, in
Proc. of Int. Conf. on Communication Systems and Network Technologies (CSNT), 11-13 May,
2012, pp. 330-333.
[2] F. Beritelli, A. Gallotta, C. Rametta, “A Dual Streaming Approach for Speech Quality Enhancement
of VoIP service over 3G networks”, Proceedings of IEEE Digital Signal Processing (DSP), 1-3 July
2013.
[3] F. Beritelli, A. Gallotta, S. Palazzo, C. Rametta, “Dual stream transmission to improve mobile VoIP
services over HSPA: a practical test bed”, Proceedings of IEEE 8th International Symposium on
Image and Signal Processing and Analysis (ISPA), 4-6 September 2013.
[4] F. Beritelli, C. Rametta, “HSDPA Dual Streaming Approach for Improving VoIP Speech Quality in
Forensic Applications”, Proceedings of IEEE 9th International Symposium on on Communications
Systems Networks and Digital Signal Processing (CSNDSP) 2014, 23-25 July 2014, Manchester, UK.
[5] F. Beritelli, C. Rametta, “A Mobile Dual VoIP System for Enhancing Speech Quality and
Intelligibility: Simulation and Test Bed”, Transactions on Networks and Communicat ions; Volume 3,
Issue 2, April 2015.
[6] J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Elsevier Computer Networks,
Volume 52, Issue 12, 2008.
[7] L. Atzori, A. Iera and G. Morabito, “The Internet of Things: A survey”, Elsevier Computer Networks,
Volume 54, Issue 15, 2010.
[8] Manish Jain, Constantinos Dovrolis, “Pathload: a measurement tool for end-to-end available
bandwidth”,in Proc. of Passive and Active Measurements (PAM) Workshop, 2002
[9] R.S. Prasad, M.Murray, C.Dovrolis, K.Claffy, “Bandwith Estimation: metrics, measurement
techniques and tools”, IEEE Network, Nov 2003.
[10] Manish Jain, Constantinos Dovrolis, “End-to-end Available Bandwith: Measurements, Methodology,
Dynamic and Relation with TCP Throughput”, IEEE/ACM Transactions on Networking, Ago 2003.
[11] http://www.pcengines.ch/alix.htm
[12] http://www.zeroshell.net
[13] Openvpn: Building and Integrating Virtual Private Networks, Markus Feilner, Packt Publishing Ltd,
11 mag 2006.
Authors
Francesco Beritelli received the Laurea degree in Electronic Engineering and the Ph.D.
degree in Electronics, Computer Science, and Telecommunications Engineering from the
University of Catania, Catania, Italy, in 1993 and in 1997, respectively. From 1997 to
2000 in collaboration with CSELT (now Telecom Italia LAB) he took an active part in
international ITU-T standardization meetings. From 1998 he is the founding member of
the “Multimedia Technologies Institute - MTI”, applied research laboratory operating in
DSP (Digital Signal Processor) and CTI (Computer Telephony Integration) applications.
Currently, from 2002, he is Assistant Professor in the Department of Electric, Electronic and Computer
Science Engineering at the University of Catania. His main research activities are in the area of robust
audio and speech signal classification and recognition, variable bit-rate speech coding, and adaptive-rate
voice and dual stream transmission for mobile IP telephony applications. His interests also include the field
of biometric identification and cardiac signal processing. He is a member of the Institute of Electrical and
Electronic Engineers (IEEE) and the “IEEE Signal Processing Society” since 1996 and has 100 scientific
publications, mainly in international journals, books and conference proceedings.
Aurelio La Cortereceived the M.Sc. degree in electrical engineering from the University
of Catania in 1988, and the Ph.D. in Electronic Engineering and Computer Science in 1994.
From 1994 he is at the University of Catania. He is an associate professor in
Telecommunication Engineering. His scientific interests include network and QoS
management techniques, risk analysis of ICT systems, bio-inspired models for information
security, protocols and architecture for integrated communications.
15. International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 3, July 2015
15
CorradoRametta received the Laurea degree in Electronic Engineering and the Ph.D.
degree in Computer Science and Telecommunications Engineering from the University of
Catania, Italy, in 2008 and in 2012, respectively. From 2009 to 2012, he was a Research
Engineer in the field of wireless communications with the CNIT
(ConsorzioNazionaleInteruniversitario per le Telecomunicazioni). From 2012 he works as a
post-doc researcher at the University of Catania. His research interests include wireless
mesh networks, ad-hoc and sensor networks, modeling and simulation of communications protocols,
software defined networking, network function virtualization and embedded systems for multimedia
applications.
Francesco Scaglionereceived the Laurea degree in Telecommunications Engineering
from the University of Catania in 2011. His research interests include embedded systems,
VoIP communications and ICT technologies for environmental control and monitoring.