Performance evaluation of ns2 and omnet++ simulators for aodv protocol in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance evaluation of ns2 and omnet++ simulators for aodv protocol in maneteSAT Journals
Abstract In order to observe the behaviour of a protocol in various scenarios, network simulators are used. There are few network simulators available for usage but which one will provide optimum performance and suitability of network simulator for a particular scenario is always an important decision. In this paper we analyse behaviour of two different network simulators for a same MANET routing protocol. The MANET routing protocol that we have selected is popular Ad-hoc on demand Distance Vector (AODV). In this paper, we analyse the performance of routing protocol by using NS2 simulator and then the same on INET, which is a simulation framework from OMNeT++. The main purpose behind this work is to understand what role simulator plays when we try to simulate a particular protocol on desired Simulator. This study of difference in performance of simulator shows how the underlying architecture of a simulator affects the performance of the simulator. We considered these simulators for comparison purpose due to the amount of their usage in the industry as well as in education and research area. NS2 is one of the oldest and most preferred simulators by researchers and industry people while usage of OMNeT++ is also increasing with the time. Keywords: MANET, AODV, NS2, OMNeT++, Performance Evaluation.
A survey on trust based secure routing in manetcsandit
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
The lack of static infrastructure causes several issues in mobile Ad Hoc network , such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and
secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the network functionality. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. Major attacks on Mobile Ad hoc networks are flooding, selective forwarding, sinkhole, wormhole etc. We have presented various intrusion detection techniques in MANET. Then we have proposed a method to detect flooding attack in MANET.
Performance evaluation of ns2 and omnet++ simulators for aodv protocol in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance evaluation of ns2 and omnet++ simulators for aodv protocol in maneteSAT Journals
Abstract In order to observe the behaviour of a protocol in various scenarios, network simulators are used. There are few network simulators available for usage but which one will provide optimum performance and suitability of network simulator for a particular scenario is always an important decision. In this paper we analyse behaviour of two different network simulators for a same MANET routing protocol. The MANET routing protocol that we have selected is popular Ad-hoc on demand Distance Vector (AODV). In this paper, we analyse the performance of routing protocol by using NS2 simulator and then the same on INET, which is a simulation framework from OMNeT++. The main purpose behind this work is to understand what role simulator plays when we try to simulate a particular protocol on desired Simulator. This study of difference in performance of simulator shows how the underlying architecture of a simulator affects the performance of the simulator. We considered these simulators for comparison purpose due to the amount of their usage in the industry as well as in education and research area. NS2 is one of the oldest and most preferred simulators by researchers and industry people while usage of OMNeT++ is also increasing with the time. Keywords: MANET, AODV, NS2, OMNeT++, Performance Evaluation.
A survey on trust based secure routing in manetcsandit
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
A Novel Energy Efficient and Administrator Based Secured Routing in MANETIJNSA Journal
The lack of static infrastructure causes several issues in mobile Ad Hoc network , such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and
secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the network functionality. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. Major attacks on Mobile Ad hoc networks are flooding, selective forwarding, sinkhole, wormhole etc. We have presented various intrusion detection techniques in MANET. Then we have proposed a method to detect flooding attack in MANET.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Secure Routing using Detection Method in Wireless Ad Hoc networkijsrd.com
An Ad Hoc network is the collection of multiple nodes which can work together and they can send data over multiple hopes without any infrastructure like base station and antenna. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as selfish nodes, they use network and its service but don't cooperate with other nodes so as to save resources for themselves. This paper discusses the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack.
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
Wireless networks are been used now-a-days. The most paramount fact about wireless network is it is mobile. It is thus utilized in many fields. One of the most paramount applications of wireless networks is Mobile AdhocNETwork (MANET) in which that all the nodes work as both transmitter and receiver. MANETs are utilized in sundry fields like military, industry and emergency recuperation. So it is paramount to have a firsthand erudition about MANETs. But there is a certain drawback in MANETs, in which it becomes prone to malicious attacks very expeditious. To evade such attacks a good intrusion detection system is needed. In this paper, we have proposed a system which can recognize and additionally keep the malicious attacks. The system is named as Enhanced Adaptive Acknowledgments (EAACK). EAACK gives a superior malicious attack than the standard strategies.
VMware Virtual SAN is a distributed object storage platform that depends on IP Network connectivity to provide access to storage resources and storage management infrastructure services. Virtual SAN requires that all of the participating hosts can communicate over an IP network and are members of the same vSphere Cluster.The locally attached storage devices from all of the hosts are pooled and presented as a single datastore to all members of the cluster once they have established IP connectivity and can communicate on the same Ethernet Layer 2 domain. Virtual SAN clusters can also be formed with hosts that are connected to different Layer 3 network segments.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...ijwmn
Location-aided routing protocol (LAR) utilizes the position information for routing. This system is
simulated position information in specific areas by using mobile nodes. Movement of hosts results in
routes, requiring some mechanism for determining new routes. This system finds position information using
Location aided routing algorithm between each nodes. In real application, mobile nodes can apply without
time consuming and saving cost to get location information using wireless sensor network. Each of the
nodes is involved with calculating its position. If the position information is searched in the routing
protocol, then position-based routing protocol is used. After creating the position table, all mobile nodes
can transmit 64B data within active mobile nodes via Base station. The algorithm is determined locations
of nodes based on the connectivity for every node in specific area. This system is demonstrated location
information by using Location-Aided Routing (LAR) protocol for route discovery. This system can assist to
detect location of the specific areas using mobiles nodes. Simulation results are used to draw conclusions
regarding to the proposed routing algorithm. The simulation of system is implemented mobile nodes and
node movement function by using C# programming language.
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
Wireless sensor network is a type of network which have no communications pattern for communication between nodes, any node can easily join the network and leave the network so attacks are more probable. Gray hole is one of such attacks and it is tough to detect since malicious node switches behavior between normal node and malicious node. For detection and prevention of gray hole attacks our proposed technique is based on Cluster head and RREQ based approach in WSN. In our proposed technique we select a node which has the highest energy as a cluster head and remaining node are marked as work as cluster member. For each node we decide a threshold for sending RREQ if any node generate RREQ more than threshold then we check its RREP threshold value if it’s less than one than cluster head will conclude this node as a malicious node and broadcast its node id so that all other nodes also mark it as malicious node and drop the request arrive from this malicious node and for gray hole detection.
The presentation describes the successful experience in creating and launching a portfolio of different training methods for various categories of adult students, which combine job and study.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Secure Routing using Detection Method in Wireless Ad Hoc networkijsrd.com
An Ad Hoc network is the collection of multiple nodes which can work together and they can send data over multiple hopes without any infrastructure like base station and antenna. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as selfish nodes, they use network and its service but don't cooperate with other nodes so as to save resources for themselves. This paper discusses the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack.
Prevention and Detection of Misbehaving Node in WSN Based On the Intrusion De...theijes
Wireless networks are been used now-a-days. The most paramount fact about wireless network is it is mobile. It is thus utilized in many fields. One of the most paramount applications of wireless networks is Mobile AdhocNETwork (MANET) in which that all the nodes work as both transmitter and receiver. MANETs are utilized in sundry fields like military, industry and emergency recuperation. So it is paramount to have a firsthand erudition about MANETs. But there is a certain drawback in MANETs, in which it becomes prone to malicious attacks very expeditious. To evade such attacks a good intrusion detection system is needed. In this paper, we have proposed a system which can recognize and additionally keep the malicious attacks. The system is named as Enhanced Adaptive Acknowledgments (EAACK). EAACK gives a superior malicious attack than the standard strategies.
VMware Virtual SAN is a distributed object storage platform that depends on IP Network connectivity to provide access to storage resources and storage management infrastructure services. Virtual SAN requires that all of the participating hosts can communicate over an IP network and are members of the same vSphere Cluster.The locally attached storage devices from all of the hosts are pooled and presented as a single datastore to all members of the cluster once they have established IP connectivity and can communicate on the same Ethernet Layer 2 domain. Virtual SAN clusters can also be formed with hosts that are connected to different Layer 3 network segments.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SIMULATION PROCESS FOR MOBILE NODES INFORMATION USING LOCATION-AIDED ROUTING ...ijwmn
Location-aided routing protocol (LAR) utilizes the position information for routing. This system is
simulated position information in specific areas by using mobile nodes. Movement of hosts results in
routes, requiring some mechanism for determining new routes. This system finds position information using
Location aided routing algorithm between each nodes. In real application, mobile nodes can apply without
time consuming and saving cost to get location information using wireless sensor network. Each of the
nodes is involved with calculating its position. If the position information is searched in the routing
protocol, then position-based routing protocol is used. After creating the position table, all mobile nodes
can transmit 64B data within active mobile nodes via Base station. The algorithm is determined locations
of nodes based on the connectivity for every node in specific area. This system is demonstrated location
information by using Location-Aided Routing (LAR) protocol for route discovery. This system can assist to
detect location of the specific areas using mobiles nodes. Simulation results are used to draw conclusions
regarding to the proposed routing algorithm. The simulation of system is implemented mobile nodes and
node movement function by using C# programming language.
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
Wireless sensor network is a type of network which have no communications pattern for communication between nodes, any node can easily join the network and leave the network so attacks are more probable. Gray hole is one of such attacks and it is tough to detect since malicious node switches behavior between normal node and malicious node. For detection and prevention of gray hole attacks our proposed technique is based on Cluster head and RREQ based approach in WSN. In our proposed technique we select a node which has the highest energy as a cluster head and remaining node are marked as work as cluster member. For each node we decide a threshold for sending RREQ if any node generate RREQ more than threshold then we check its RREP threshold value if it’s less than one than cluster head will conclude this node as a malicious node and broadcast its node id so that all other nodes also mark it as malicious node and drop the request arrive from this malicious node and for gray hole detection.
The presentation describes the successful experience in creating and launching a portfolio of different training methods for various categories of adult students, which combine job and study.
Virtual learning: for students and adults. For high education and lifelong learning.
For teachers and students, for training organizations and universities.
Types, methods, tools.
PMP exam changes since November, 1, 2015.
And CCR (continual certification requirements for all PMI certifications) changes since Decembaer, 1, 2015.
In the presentation you find useful information about changes and links to the appropriate PMI resources.
Presentation of the combined e-learning and class-based training methods at the seminar in the Institute of Informatics and Applied Mathematics in the Vilnius University.
The presentation deals with the author's and his colleagues' experience in webinars, teleconferences, open and distant training methods in a life long learning.
The presentation shows three most distinguished features of the www.petralexsolutions.com software:
- transform agent's voice to more persuasive and expressive mode;
- decrease stressing notes in a voice of an angry/disturbed customer;
- protect agent's hearing by adapting incoming audio to agent's personal hearing profile and surrounding noises.
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Akraino API TSC Ike Alisson 5G Mobility Edge MEC synergy present 2020 11 06 R...Ike Alisson
Edge in 5G Mobility context evolvement from NGMN 5G WP in Feb 2015 and ETSI MEC renaming MEC to Multi-access Edge Computing by March 2017 and setting Phase 2 New Scope with some examples from 3GPP Rel 15 NSA New Services and System Aspects enhancements revisiosn preceding ETSI MEC renaming and latest 5G Capabilities for Traffic Routing & Service Steering impact on MEC and latest support for AVT (Alternative Virtualized Technologies) and 5G SCEF/NEF SCS/AS for CIoT integrated (like in 5G MEC case through CAPIF/NAPS) with 5G SL IoT Platform oneM2M with support to Ontology SAREF across 10 UCs.
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
Wireless reprogramming during a wireless detector net- work (WSN) is that the method of propagating a
replacement code image or relevant commands to detector nodes. As a WSN is sometimes deployed in
hostile environments, secure reprogramming is and can continue to be a significant concern. Whereas all
existing insecure/secure reprogramming protocols square measure supported the centralized approach,
it\'s necessary to support distributed reprogramming during which multiple licensed network users will at
the same time and directly reprogram detector nodes while not involving the bottom station. Terribly
recently, a novel secure rationalize and distributed reprogramming protocol named SRDRP has been
planned, that is that the initial work of its kind. However, during this paper, we have a tendency to establish
associate inherent style weakness within the increased signature verification of SRDRP associated demonstrate
that it\'s at risk of associate impersonation attack by that an resister will simply impersonate any
licensed user to hold out reprogramming. Later on, we have a tendency to propose a straightforward
modification to mend the known security drawback while not losing any options of SRDRP. Our
experimental results demonstrate that it\'s able to eliminate the planning weakness by adding one-B
redundant information which the execution time of the prompt answer during a 1.6-GHz laptop personal
computer is not any quite one ms. Therefore, our answer is possible and secure for real-world applications.
Moreover, we have a tendency to show that, so as to additional improve the safety and potency of SRDRP;
any higher established identity-based position formula will be directly utilized in SRDRP. Supported
implementation results, we have a tendency to demonstrate potency improvement over the initial SRDRP
Similar to A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance (20)
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A New Technique for Adapting SIP Protocol to Ad Hoc Networks: VNSIP (Virtual Network for SIP) Illustration and Evaluation of Performance
1. International Journal of Computer Networks and Communications Security
C
VOL. 1, NO. 1, JUNE 2013, 23–29
Available online at: www.ijcncs.org
ISSN 2308-9830
N
C
S
A New Technique for Adapting SIP Protocol to Ad Hoc Networks:
VNSIP (Virtual Network for SIP) Illustration and Evaluation of
Performance
I. Mourtaji1, M. Bouhorma2, M. Benahmed3, A. Bouhdir4
1234
LIST laboratory, FST of Tangier, Morroco
E-mail: 1imourtaji@gmail.com, 2bouhorma@gmail.com, 3med.benahmed@gmail.com,
4
hakim.anouar@gmail.com
ABSTRACT
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However
they remain a particular computation environment, characterized by the deficiency of pre-existed and
centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet
networks, requires centralized entities, like proxy server, registrar server and location service; consequently
SIP is not adapted to Ad Hoc networks. In this paper, we present and evaluate a new technique, which we
have called Virtual Network for SIP (VNSIP) to fix the problem related to the constraints of SIP
deployment in Ad Hoc network. The main idea of this technique is to create a virtual infrastructure,
enabling SIP to proceed in a distributed architecture inside the Ad hoc Network.
Keywords: Ad hoc, SIP, Evaluation of performance
1
INTRODUCTION
Using this technique, we will be able to design a
virtual sub-network, which will be used by SIP [1,
2, 10] in a high mobility Ad Hoc network.
VNSIP allows decentralization of SIP proxies,
specially registrar, proxy and location servers, by
integrating those server functionalities in each
MANET node. VNSIP node contains a supervisor
module which we called Virtual Network
Algorithm (VNA), and which is responsible of
activating and deactivating server functionalities
depending on the position of the node in the
MANET [3].
This paper is organized as follows. In the first
section we’ll introduce VNSIP solution. In the
second section we’ll illustrate VNSIP design.
Afterward in the next section, we’ll present TCA
solution. In the last section we will evaluate VNSIP
performance using comparison with TCA approach.
In the end, we will achieve this paper with a
conclusion, with future works and perspectives.
2
VNSIP SOLUTION PRESENTATION
The presence of Proxy Server, Registrar Server
and Location Service is a prerequisite for SIP
operations. Thus it’s necessary to decentralize those
servers to enabling SIP integration in Ad Hoc netw
The most evident solution, to fix this problem, is to
include all SIP servers’ functionalities in each node
of the ad hoc network [4, 5]. However this solution
consumes a lot of energy when broadcasting
messages to find a node location [6], and generates
many failure connections because of message
collisions. Making this solution not optimal.
VNSIP solution tries to define a dynamic virtual
network inside the MANET, to be exploited by
nodes, to adequately choose which one will be in
charge to execute SIP server tasks. VNA (Virtual
Network Algorithm) will be the entity in charge to
activate or deactivate SIP server functionalities in
each MANET node. A VNSIP node (see Figure 1)
consists of several entities, when interacting
between them; they allow communication in
MANET using SIP protocol.
2. 24
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
Fig. 2. Generation of nodes belonging to the VN
Fig. 1. VNSIP Node Architecture
3
VNSIP DESIGN
The first step is the construction of the Virtual
Network (VN), which will be used by VNSIP to
affect SIP server functionalities to the different
nodes.
To complete the construction of a connected VN,
we define Gateway nodes to ensure connections
between all nodes belonging to the VN. Gateways
are generated using the execution of the two rules
below:
3.1
Rule 1: if two nodes belonging to the VN,
and don’t have a connection between them,
and have a same neighbor node which
doesn’t belong to the VN, then this node is
considered as a Gateway.
Rule 2: if two neighbor nodes, which don't
belong to the VN, and there neighbors are
respectively belonging to the VN, then
those two nodes are considered as
Gateways.
When finishing the selection of gateway
nodes the construction of the VN is
completed (see Figure 3).
Virtual Network Algorithm (VNA)
VNA starts by the construction of neighbor tables.
Thus each node of the MANET broadcasts a
HELLO message [7]. When receiving this message
for the first time, each node can populate its own
neighbors table with its 1-hop neighbor’s number
information.
HELLO message is then sent for a second time,
including
the
1-hop
neighbor’s
number
information. When receiving the second HELLO
message, each node upgrades its neighbors table
with its 1-hop neighbor’s number and 2-hop
neighbors number information.
VNA defines a flag “VN_membership_flag”
which shows if a node belongs to the VN or not.
When executing VNA, the VN will include all
nodes having VN_membership_flag=1. VNA is
characteri-zed by two conditions (see Figure 2):
Condition1: if a node doesn’t belong to the
VN and the number of its neighbors which
belong to the VN is lower than the number
of its neighbors which don’t belong to the
VN then the VN_membership_flag of this
node is set to 1.
Condition 2: if a node belongs to the VN
and the number of its neighbors which
belong to the VN is higher than the number
of its neighbors which don’t belong to the
VN then the VN_membership_flag of this
node is set to 0.
Fig. 3. VN construction
3. 25
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
3.2
Interaction between VNA and SIP
entities
As it shown in Figure 3, when finishing the
construction of the VN, three kinds of nodes are
defined:
- If a node belongs to the VN, then it plays SIP
User Agent role and all its SIP server’s
functionalities (Proxy server (PS), Registrar (RG)
and location service (LS)) are activated,
- If a node is a gateway, then it plays SIP User
Agent role and PS role. RG and LS are deactivated.
- If a node doesn’t belong to the VN, then it plays
only SIP User Agent role and its SIP server’s
functionalities are deactivated.
3.3
Implementation of SIP Operations
Fig. 5. Registration for a node don't belonging to the
VN
Registration:
When a node of the ad hoc network decides to
registrar to the SIP network generated by VNSIP,
two possibilities are treated:
The node belongs to the VN: in this case,
SIP servers for this node are activated.
Thus its User Agent sends a Registrar
message to its own RG, making a local
registration (see Figure 4).
Session Initiation:
When a node A decides to initiate a session with
a node B. if SIP servers of A are activated then it
sends INVITE message directly to its own PS (see
Figure 6). Or if its SIP servers are deactivated, in
this case, it broadcasts the INVITE to its 1-hop
neighbors (see Figure 7).
When a PS receives the INVITE, it sends a
request to its LS to verify in the data base if he
knows the route to B. if it does then the PS redirects
the INVITE directly to B (see Figure 6). If not, it
broadcast the INVITE to its 1-hop neighbors (see
Figure 7).
When the User Agent of B receives the INVITE,
its answers by a 200 OK message, which will
follow the reverse path of the INVITE.
Fig. 4. Registration for a node belonging to the VN
The node doesn’t belong to the VN: in this case,
the User Agent of this node broadcasts a Register
message to all its 1-hop neighbors, each neighbor
register this node to its own RS if it belong to the
VN (see Figure 5).
Fig. 6. PS of Node A knows location of Node B
4. 26
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
Fig. 8. TCA Node architecture
SIP UA module: realizes UAC and UAS
functions, it initiates and responses to SIP requests.
SIP Servers module: represents the different SIP
servers (LS, RG and PS).
Fig. 7. PS of Node C doesn't know location of Node B
4
TCA APPROACH
In this chapter we will describe the design of
TCA solution [9], to be compared with our solution
VNSIP. TCA approach has been chosen because of
its good results and because of its similarity with
VNSIP.
4.1
SIP terminal presentation in TCA
Topo module: constructs a cluster topology to be
used by the different SIP modules.
4.2
TCA Operating System
TCA solution is essentially based on topology
construction module, which is inspired by
clustering approach. In fact, the topology
construction algorithm chooses nodes to ensure
cluster-head role. Nodes which not considered as
cluster-heads will be considered as cluster
members. Clusters will be related between them
using gateway nodes (see Figure 9).
For TCA approach, each node of the ad hoc
network should be able to guarantee the
functionalities below:
SIP User Agent Client (UAC),
SIP User Agent Server (UAS),
SIP Proxy Server (PS),
SIP Registrar (RG),
SIP Location Server (LS),
Topology construction
To achieve those functions, many models have
been integrated in the same terminal; Figure 8
illustrates SIP node composition and interaction
between those nodes.
Fig. 9. Cluster construction
5. 27
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
When topology construction is achieved, the topo
module assigns to each SIP module its role in the
network. Each node is considered as a simple User
Agent and according to its position in the network;
additional tasks may be attributed to this node:
A node which is considered as clusterhead will guarantee, in addition to UA
role, PS, RG and LS role.
A node which is cluster member and
gateway node will guarantee, in addition
to UA role, PS role.
After analyzing the graph above, we can note that
our approach guarantees a better time, than TCA
solution, to establish sessions between nodes. We
can justify this behavior by the fact that our
solution VNSIP uses, to forward SIP messages, a
higher number of nodes than TCA. And we can add
that, replication mechanism used by VNSIP, allows
performing many research on different SIP proxies
on the same time, which helps to receive responses
on shortest time.
The figure 11 illustrates session setting time, from
TCA and VNSIP, according to the number of nodes
A node which is only considered as cluster
member will guarantee a simple UA role
.
SIMULATIONS AND EVALUATION
OF PERFORMANCES
5
5.1
Configuration
Simulations scenarios were achieved using the
network simulator NS2 [8]. The simulation area
was 1000m by 1000m. The node number was
between 10 and 50 nodes. The movement speed of
nodes was between 0 and 18 m/s, and times of
simulations were 180 seconds.
5.2
Scenarios of simulations
To define the difference between VNSIP behavior
and TCA behavior, we achieved many types of
simulations, and we analyzed the behaviors when
node speeds and node numbers are increased.
5.2.1
Session setting time
The figure 10 illustrates session setting time, from
TCA and VNSI, according to nodes mobility.
Fig. 11. Session setting time according to number of
nodes
Comparing curves above, we observe that VNSIP
gives better performance than TCA. In fact when
the number of nodes, which are in charge to
forward SIP messages, is increasing, it directly
involves that session setting time decreased. Unlike
TCA mechanism, which uses only one cluster-head
to manage cluster members by forwarding SIP
messages,
generating
largest
queue
and
consequently the session setting time is increased.
5.2.2
Failure rates
The figure 12 illustrates the failure rates of session
setting according to nodes mobility for TCA and
VNSIP methods.
Fig. 10. Session setting time according to mobility
6. 28
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
When we compare both graphs, we note that
VNSIP gives lower results than TCA; in fact
consumption of bandwidth is higher and increases
when number of nodes is rising. This behaviour can
be warranted by the high number of message sent
when applying our replication mechanism, which
consists of achieving several registration and
localization in the same time for the same node.
6.
Fig. 12. Failure rates by mobility of nodes
When we compare failure rates to establish SIP
sessions between both methods, we observe that
VNSIP performs better results in terms of
successful sessions setting. This result can be easily
justified by the difference between VNSIP and
TCA architectures. VNSIP uses replication
mechanism, which allows forwarding SIP messages
by several nodes, unlike TCA which uses only
cluster-heads to forward SIP messages, this
involves that there is only one registration for each
node. Therefore TCA mechanism is very sensitive
and vulnerable to cluster-heads moves.
5.2.3
Bandwidth consumption
The figure 13 illustrates bandwidth consumption
when establishing SIP sessions according to
number of nodes.
Fig. 13. Bandwidth consumption by number of nodes
CONCLUSION
In this paper we have analyzed and evaluated the
performance of a new approach for adapting SIP
protocol to Ad Hoc Networks. To achieve this
evaluation of performance, we have compared our
solution to the TCA approach, which is consider as
a solution giving a very interesting result to fix the
problem of SIP adaptation to Ad Hoc Networks.
The simulation of both approaches has shown
that our solution guarantees better results than
TCA in terms of setting time and failure rates of
SIP sessions. These good results were obtained
thanks to VNA, the algorithm used to construct the
VNSIP topology, and thanks to the mechanism of
replication of SIP messages. On the other side, this
mechanism has its own disadvantage, which
involve that our solution proposes lower results
than TCA in term of bandwidth consumption.
For our future works, we’ll try to improve our
solution to reduce the consumption of bandwidth.
Actually we are designing a new algorithm, to
guarantee a good MANET QoS.
7.
REFERENCES
[1] J. Westcott et G. Lauer, ‘Hierarchical routing
for very large networks’, Proc. IEEE MILCOM
’84, pp 214-218, 21-24 October 1984.
[2] J. Rosenberg, H. Schulzrinne, G. Camarillo, A.
Johnston, J. Peterson, R. Sparks, M. Handeley
et E. Schooler, “SIP: Session Initiation
Protocol”, RFC 3261, Juin 2002.
[3] S. Corson, J. Macker, ‘Mobile Ad hoc
Networking (MANET): Routing Protocol
Performance
Issues
and
Evaluation
Considerations’, REC 2501, Janvier 1999.
[4] M. Jiang, J. Li and Y. C. Tay, “Cluster Based
Routing Protocol (CBRP),” IETF Internet
Draft draft-ietf-manet-cbrp-spec-01.txt, August
1999.
[5] C. R. Lin and M. Gerla, “Adaptive clustering
for mobile, wireless networks,” Journal on
Selected Areas of Communication, Vol. 15,
No. 7, 1997.
7. 29
I Mourtaji et al. / International Journal of Computer Networks and Communications Security, 1 (1), JUNE 2013
[6] J. Rosenberg and H. Schulzrinne, “SIP:
Locating SIP Servers”, IETF RFC 3263, June
2002.
[7] C. Perkins, E. Belding-Royer, and S. Das “ Ad
hoc On-Demand Distance Vector (AODV)
Routing ”, IETF RFC 3561, July 2003.
[8] “The network simulator”, available at
http://www.isi.edu/nsnam/ns
[9] N. Banerjee, A. Acharya and S.K. Das,
“Enabling SIP-Based Sessions in Ad Hoc
Networks “, Winet, April 2006.
[10] A.B. Roach, “Session Initiation Protocol (SIP)
– Specific Event Notification”, RFC 3265, Juin
2002.
[11] P. Stuedi, M. Bihr, A. Remund et G. Alonso, «
Siphoc : Efficient sip middleware for ad hoc
networks » studi2007siphoc, LECTURE
NOTES IN COMPUTER SCIENCE, 2007,
Springer
[12] S. Leggio, J. Manner, A. Hulkkonen, et K.
Raatikainen, “Session initiation protocol
deployment in ad hoc networks: a
decentralized approach”, In 2nd International
Workshop on Wireless Ad-hoc Networks
(IWWAN), London, May, 2005.