IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...AAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time
transmission for wireless application. But it stream including critical mission application like military use or emergency
recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits
invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide
distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure routing in Hybrid
wireless networks. In this paper, we propose a Enhanced Adaptive ACKnowledgment (EAACK)-implement a new intrusiondetection
system for Hybrid wireless networks. It protect Hybrid wireless networks from attacks that have higher malicious
behavior detection rate. Analytical and simulation result based on the real human mobility mode. EAACK can provide high secure performance in terms of Intrusion-detection, overhead, transmission delay
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
This document discusses handover management in integrated WLAN and WiMAX networks using the IEEE 802.21 Media Independent Handover (MIH) framework. It describes the need for integration of heterogeneous wireless networks to provide ubiquitous coverage and broadband connectivity. It explains homogeneous and heterogeneous handovers and the role of IEEE 802.21 in facilitating handovers across different network types. The MIH framework provides services and events to support handovers between WiFi and WiMAX networks in a seamless manner for mixed network clients.
The aim of next generation wireless network (NGWN) is to integrate different wireless
access technologies such as WLAN, WiMAX, UMTS etc., each with its own characteristics, into a
common IP-based core network to provide mobile user with seamless connectivity. One of the major
issues for the converged heterogeneous networks is to provide seamless connectivity with QoS
support. In this paper we simulated various wireless networks (WLAN, WiMAX and UMTS) for
various applications and evaluated their performance as individual as well as in integrated mode
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...AAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service (QoS) requirements in real time
transmission for wireless application. But it stream including critical mission application like military use or emergency
recovery. Hybrid wireless networks is unified mobile ad-hoc network (MANET) and wireless infrastructure networks. It inherits
invalid reservation and race condition problem in Mobile ad-hoc network (MANET). Whereas open medium and wide
distribution of node make vulnerable to malicious attackers in Hybrid wireless networks. How to secure routing in Hybrid
wireless networks. In this paper, we propose a Enhanced Adaptive ACKnowledgment (EAACK)-implement a new intrusiondetection
system for Hybrid wireless networks. It protect Hybrid wireless networks from attacks that have higher malicious
behavior detection rate. Analytical and simulation result based on the real human mobility mode. EAACK can provide high secure performance in terms of Intrusion-detection, overhead, transmission delay
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
This document discusses integrating the internet with mobile ad-hoc networks using an extended version of the AODV routing protocol. It begins with an introduction to mobile ad-hoc networks and their applications. It then discusses challenges in routing for MANETs and existing routing protocols like AODV. It proposes extending the AODV protocol with additional "I-flag" to discover internet gateways. The extended RREQ and RREP messages are described. It then discusses using the Network Simulator 2 to simulate this extended AODV approach with different scenarios connecting wireless and wired networks via 1 or more hops. The goal is to provide internet connectivity for mobile nodes with high packet delivery and low delay.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks
and enhance the security level in the network.
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
Multimedia communication over wireless Ad-hoc networks has become the driving technology for many of the important applications, experiencing dramatic market growth and promising revolutionary experiences in personal communication, gaming, entertainment, military, security, environment monitoring, and more. The advances in wireless communications and growth of real-time applications have necessitated the development of wireless networks that can support high Quality of Service (QoS) and power control. A node in an ad hoc network is normally battery operated which poses a huge constraint on the power consumption of such a node. Hence, designing a power efficient MAC protocol for ad hoc wireless networks is a major challenge. In this paper, we propose a CDMA based power controlled medium access protocol for mobile and ad hoc network (MNA). The protocol conserves power and provides QoS guarantees for multimedia traffics. In that network one of the fundamental challenger in MANETs is how to increase the overall network throughputs well as reading the delay while maintaining how energy consumption for packet processing in communication. simulation results shows that the performance of the protocol with increase in traffic while QoS is better in terms of Energy consumption, throughput, & communication delay than existing protocol.
This document discusses handover management in integrated WLAN and WiMAX networks using the IEEE 802.21 Media Independent Handover (MIH) framework. It describes the need for integration of heterogeneous wireless networks to provide ubiquitous coverage and broadband connectivity. It explains homogeneous and heterogeneous handovers and the role of IEEE 802.21 in facilitating handovers across different network types. The MIH framework provides services and events to support handovers between WiFi and WiMAX networks in a seamless manner for mixed network clients.
The aim of next generation wireless network (NGWN) is to integrate different wireless
access technologies such as WLAN, WiMAX, UMTS etc., each with its own characteristics, into a
common IP-based core network to provide mobile user with seamless connectivity. One of the major
issues for the converged heterogeneous networks is to provide seamless connectivity with QoS
support. In this paper we simulated various wireless networks (WLAN, WiMAX and UMTS) for
various applications and evaluated their performance as individual as well as in integrated mode
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
Enhanced Mobile IP Handover Using Link Layer InformationCSCJournals
The main source of the problem in Mobile handover is the latency and packet loss introduced by the lengthy registration processes. The registration messages must traverse all the way to the home agent (HA) and back. In addition, the packets sent by the corresponding node (CNs) are lost until they receive the binding update (BU) indicating the new care-of-address (nCoA) of the mobile node (MN). To reduce the number of lost packets during this time, the MN can request the old access router (oAR) to forward all its incoming packets to the new access router (nAR) Mobile IP handovers can be improved through link layer information to reduce packet loss during handovers. It avoids link disruption during Mobile IP handovers and reduces packet loss. Therefore, link layer information allows an MN to predict the loss of connectivity more quickly than the L3 advertisement based algorithm. It is the best choice used to predict a breakdown wireless link before the link is broken. This facilitates the execution of the handover and eliminates the time to detect handover.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
ABSTRACT: Globally, there is a burning desire for a communication system that provides high quality, high capacity and
high speed information exchange and we need to develop an extremely spectrum-efficient transmission technology for the
same. This paper describes a realistic capacity and BER comparison of a robust and secured multiple access schemes and
develops a wireless embedded system at 60 GHz Millimeter-Wave using WiMAX waveform. The system is tested at the
laboratory with multimedia transmission and reception but yet to be tested after mounting on the vehicles. Technical
expertise are developed towards Simulink programming, methods of poring to VSG, IF and millimeter wave hardware, RTSA
use, Data Acquisition and DSP. With proper deployment of this 60 GHz system on vehicles, the existing commercial
products for 802.11P will be required to be replaced or updated soon. Simulation and implementation of the results will
elucidate that a significant amelioration in the spectral efficiency parameter can be achieved using the proposed WiMAX at
60GHz which provides both frequency diversity and spectral efficiency to yield a powerful and affordable solution for superhigh speed/4G transmission and ever-increasing requirement of high throughput in wideband multimedia communications
and ITS in vehicular communication.
Keywords: AWG, C2C-CC, MC-CDMA, VSA, WiMAX and WMAN, 4G
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
This document summarizes key aspects of practical LTE network design and deployment. It describes the end-to-end LTE network architecture including the evolved NodeB (eNB), Evolved Packet Core (EPC), and interfaces. It then analyzes LTE coverage and link budgets for different deployment scenarios. Dimensioning and design considerations are discussed including throughput, capacity, and quality of service (QoS). Latency is analyzed and compared to HSPA+. The document provides guidance on commercial LTE network planning and implementation.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
802.16e provides enhancements to 802.16-2004 to support subscriber stations moving at vehicular speeds. It specifies a system for combined fixed and mobile broadband wireless access using Scalable OFDMA technology. Mobile WiMAX supports seamless handoff between base stations, sleep and idle modes for power management, and smart antenna technologies like beamforming. It can offer full mobility and compete with 3G for IP traffic with peak data rates up to 63Mbps download and 28Mbps upload in a 10MHz channel.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Lossless Image Compression Using Data Folding Followed By Arithmetic Codingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Load Rebalancing for Distributed Hash Tables in Cloud Computingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...iosrjce
IOSR Journal of Dental and Medical Sciences is one of the speciality Journal in Dental Science and Medical Science published by International Organization of Scientific Research (IOSR). The Journal publishes papers of the highest scientific merit and widest possible scope work in all areas related to medical and dental science. The Journal welcome review articles, leading medical and clinical research articles, technical notes, case reports and others.
Privacy Protection in Distributed Industrial Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Developing The active Learning Model to Improve the Effectiveness Study Group...iosrjce
The implementation of the entrepreneurship course in ISI Padang Panjang was not run optimally.
This research was aimed to improve the effectiveness of learning entrepreneurship in ISI Padang Panjang by
developing active learning model by using group learning method. This research used research and
development approach that consisted of preliminary study (needs analysis); model development; and model
testing (validation). Developing a model in this research refers to the ADDIE model (analysis, design,
development, implementation, evaluation). The findings of this research were (1) the process of learning in
entrepreneurship courses at ISI Padang Panjang was not functioned properly; (2) the implementation of the
course only relied on teachers’ learning center which was not effective; (3) developing a model of active
learning by using ADDIE model was valid, practical and effective
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...iosrjce
This sensor based system can compute the speed of vehicle. It also computes the momentum of
vehicles and the traffic density on the approach road. This system will also detect any vehicular problems such
as brake failure, accidents on the roads and also detect the section which is affected or will be affected. The
system can be easily rectified in case there is a failure in the sensors. The system can also be used for estimating
any obstruction in between two ends of the road.
Speech to text conversion for visually impaired person using µ law compandingiosrjce
The paper represents the overall design and implementation of DSP based speech recognition and
text conversion system. Speech is usually taken as a preferred mode of operation for human being, This paper
represent voice oriented command for converting into text. We intended to compute the entire speech processing
in real time. This involves simultaneously accepting the input from the user and using software filters to analyse
the data. The comparison was then to be established by using correlation and µ law companding techniques. In
this paper, voice recognition is carried out using MATLAB. The voice command is a person independent. The
voice command is stored in the data base with the help of the function keys. The real time input speech received
is then processed in the speech recognition system where the required feature of the speech words are extracted,
filtered out and matched with the existing sample stored in the database. Then the required MATLAB processes
are done to convert the received data and into text form.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
Enhanced Mobile IP Handover Using Link Layer InformationCSCJournals
The main source of the problem in Mobile handover is the latency and packet loss introduced by the lengthy registration processes. The registration messages must traverse all the way to the home agent (HA) and back. In addition, the packets sent by the corresponding node (CNs) are lost until they receive the binding update (BU) indicating the new care-of-address (nCoA) of the mobile node (MN). To reduce the number of lost packets during this time, the MN can request the old access router (oAR) to forward all its incoming packets to the new access router (nAR) Mobile IP handovers can be improved through link layer information to reduce packet loss during handovers. It avoids link disruption during Mobile IP handovers and reduces packet loss. Therefore, link layer information allows an MN to predict the loss of connectivity more quickly than the L3 advertisement based algorithm. It is the best choice used to predict a breakdown wireless link before the link is broken. This facilitates the execution of the handover and eliminates the time to detect handover.
IEAACK-Secure Detection System For Packet-Dropping Attack In Manetsijiert bestjournal
MANET is a collection of wireless independent nodes along with transmitter and receiver that communicate with each other via bidirectional link. The self-configuring ability of nodes in MANET made it popular among critical mission applic ations like military use or emergency recovery. But due to the changing topology and open access MANET become vulnerable to problems (such as receiver collision,limited trans mission power,false misbehaviour report,packet dropping) To solve this problem we use three approaches of Intrusion Detection System (IDS) such as Watchdog,TWOACK,and AACK. We have proposed a new protocol design for MANET that is IDS based EAACK which cons ist of ACK,S-ACK and MRA for solving all the problems of Watchdog approach in ID S of MANET.
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
ABSTRACT: Globally, there is a burning desire for a communication system that provides high quality, high capacity and
high speed information exchange and we need to develop an extremely spectrum-efficient transmission technology for the
same. This paper describes a realistic capacity and BER comparison of a robust and secured multiple access schemes and
develops a wireless embedded system at 60 GHz Millimeter-Wave using WiMAX waveform. The system is tested at the
laboratory with multimedia transmission and reception but yet to be tested after mounting on the vehicles. Technical
expertise are developed towards Simulink programming, methods of poring to VSG, IF and millimeter wave hardware, RTSA
use, Data Acquisition and DSP. With proper deployment of this 60 GHz system on vehicles, the existing commercial
products for 802.11P will be required to be replaced or updated soon. Simulation and implementation of the results will
elucidate that a significant amelioration in the spectral efficiency parameter can be achieved using the proposed WiMAX at
60GHz which provides both frequency diversity and spectral efficiency to yield a powerful and affordable solution for superhigh speed/4G transmission and ever-increasing requirement of high throughput in wideband multimedia communications
and ITS in vehicular communication.
Keywords: AWG, C2C-CC, MC-CDMA, VSA, WiMAX and WMAN, 4G
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
This document summarizes key aspects of practical LTE network design and deployment. It describes the end-to-end LTE network architecture including the evolved NodeB (eNB), Evolved Packet Core (EPC), and interfaces. It then analyzes LTE coverage and link budgets for different deployment scenarios. Dimensioning and design considerations are discussed including throughput, capacity, and quality of service (QoS). Latency is analyzed and compared to HSPA+. The document provides guidance on commercial LTE network planning and implementation.
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
A Survey on Vehicle to Infrastructure Communication SystemIOSR Journals
Abstract: Vehicle-to-Infrastructure (V2I) Communications for Safety is the wireless exchange of critical safety
and operational data between vehicles and roadway infrastructure, intended primarily to avoid motor vehicle
crashes. Vehicle-to-infrastructure (V2I) communication based on wireless local area network (WLAN) IEEE
802.11 standard technology can support user in-motion to achieve preferable Internet connectivity. This
standard is created for urgent short message transmission.The IEEE 802.11 standard defines an infracture
mode with at least one central access point connected to a wired network. In this paper we present an
experimental study of IEEE802.11g using off-the-shelf devices in vehicle-to-infrastructure small scale scenario.
In order to evaluate the V2I the type of communication in large scale scenario and intelligent transportation
systems (ITS) will necessitate wireless vehicle-to-infrastructure (V2I) communica-tions. This wireless link can
be implemented by several technolo-gies, such as digital broadcasting, cellular communication, or dedicated
short range communication (DSRC) systems. Analyses of the coverage and capacity requirements are presented
when each of the three systems are used to implement the V2I link
Keywords: Short Range Vehicle Network; 802.11g; wireless network; goodput; network performance;
transport; mobile stations; auto traffic; vehicle speed
802.16e provides enhancements to 802.16-2004 to support subscriber stations moving at vehicular speeds. It specifies a system for combined fixed and mobile broadband wireless access using Scalable OFDMA technology. Mobile WiMAX supports seamless handoff between base stations, sleep and idle modes for power management, and smart antenna technologies like beamforming. It can offer full mobility and compete with 3G for IP traffic with peak data rates up to 63Mbps download and 28Mbps upload in a 10MHz channel.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
AN SDN APPROACH FOR AN ENERGY-EFFICIENT HETEROGENEOUS COMMUNICATION NETWORK I...ijwmn
Wireless access technologies have been extensively developed aiming to give users the ability to connect to
their expected networks anytime, anywhere. This leads to an increment of the number of wireless interfaces
integrated into a single mobile device, hence, it allows the device to be able to connect to multiple access
networks. However, in some specific cases such as natural disasters, having an uncorrupted and timely
information exchanging means is critical for affected victims to survive or to connect to the outside world.This is because the essential network infrastructures in these cases could be destroyed causing a large number of systems to stop working. In that cases, the victims need a heterogeneous communications network in which they can communicate, without a doubt, by using different wireless access technologies, i.e., Bluetooth or Wi-Fi. The network must also be able to smoothly change the access technologies, or
called a vertical handover, to ensure QoS for ongoing applications. In addition, the network must have a mechanism to save energy. For these reasons, an SDN approach, which has been proposed in a previous work, is considered. The performance of the system has been validated by a set of experiments in a real testbed. The obtained results show that the proposed vertical handover can save at least 24.42 per cent of the energy consumed by the wireless communication. The handover delay with different UDP traffic is less
than 150ms. Moreover, the network allows a device using Bluetooth to talk with another one using Wi-Fi over a heterogeneous connection where the end-to-end jitter is mainly below 20ms and the packet loss rate is as small as 0.2 per cent.
Lossless Image Compression Using Data Folding Followed By Arithmetic Codingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Load Rebalancing for Distributed Hash Tables in Cloud Computingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Comparison of Tympanic and Rectal temperature in febrile pediatric patients a...iosrjce
IOSR Journal of Dental and Medical Sciences is one of the speciality Journal in Dental Science and Medical Science published by International Organization of Scientific Research (IOSR). The Journal publishes papers of the highest scientific merit and widest possible scope work in all areas related to medical and dental science. The Journal welcome review articles, leading medical and clinical research articles, technical notes, case reports and others.
Privacy Protection in Distributed Industrial Systemiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Developing The active Learning Model to Improve the Effectiveness Study Group...iosrjce
The implementation of the entrepreneurship course in ISI Padang Panjang was not run optimally.
This research was aimed to improve the effectiveness of learning entrepreneurship in ISI Padang Panjang by
developing active learning model by using group learning method. This research used research and
development approach that consisted of preliminary study (needs analysis); model development; and model
testing (validation). Developing a model in this research refers to the ADDIE model (analysis, design,
development, implementation, evaluation). The findings of this research were (1) the process of learning in
entrepreneurship courses at ISI Padang Panjang was not functioned properly; (2) the implementation of the
course only relied on teachers’ learning center which was not effective; (3) developing a model of active
learning by using ADDIE model was valid, practical and effective
Sensor based System for Computation of Speed, Momentum of Vehicle, Traffic De...iosrjce
This sensor based system can compute the speed of vehicle. It also computes the momentum of
vehicles and the traffic density on the approach road. This system will also detect any vehicular problems such
as brake failure, accidents on the roads and also detect the section which is affected or will be affected. The
system can be easily rectified in case there is a failure in the sensors. The system can also be used for estimating
any obstruction in between two ends of the road.
Speech to text conversion for visually impaired person using µ law compandingiosrjce
The paper represents the overall design and implementation of DSP based speech recognition and
text conversion system. Speech is usually taken as a preferred mode of operation for human being, This paper
represent voice oriented command for converting into text. We intended to compute the entire speech processing
in real time. This involves simultaneously accepting the input from the user and using software filters to analyse
the data. The comparison was then to be established by using correlation and µ law companding techniques. In
this paper, voice recognition is carried out using MATLAB. The voice command is a person independent. The
voice command is stored in the data base with the help of the function keys. The real time input speech received
is then processed in the speech recognition system where the required feature of the speech words are extracted,
filtered out and matched with the existing sample stored in the database. Then the required MATLAB processes
are done to convert the received data and into text form.
Prevalence and Pattern of Tobacco Use among Adults in an Urban Community iosrjce
Tobacco use is a global pandemic and is the leading cause of preventable death. Most of the deaths
are occurring in the low and middle income countries.
Objectives: To determine the prevalence and pattern of tobacco use among adults in an urban community.
Materials and methods: A cross sectional study was conducted using face to face interviews on 403 individuals
aged 18 years and above residing in an urban community of Imphal West, Manipur. Descriptive statistics and
Chi –square test was used for analysis.
Results: The prevalence of ever use of tobacco use was 66.3% and of which 95.5% were current users. Tobacco
was used predominantly in smokeless form (zarda pan, khaini, gutkha) by 85% of the users. Smoked tobacco
was used only by 15% of the users. The commonest influencing factor for tobacco use was peer pressure.
Conclusion: Prevalence of tobacco use in this community was high. There is a need to develop effective health
education and multifactorial tobacco quitting strategies with focus on help and support for those who wish to
quit tobacco.
IOSR Journal of Dental and Medical Sciences is one of the speciality Journal in Dental Science and Medical Science published by International Organization of Scientific Research (IOSR). The Journal publishes papers of the highest scientific merit and widest possible scope work in all areas related to medical and dental science. The Journal welcome review articles, leading medical and clinical research articles, technical notes, case reports and others.
Effect of cold atmospheric pressure plasma needle on DNAiosrjce
Non-thermal argon plasma needle at atmospheric pressure was constructed. The experimental setup
was based on a simple and low cost electric components that generate a sufficiently high electric field at the
electrodes to ionize various gases which flow at atmospheric pressure. A high AC power supply was used with
1.1Kv and 19.57KHz. Non-thermal atmospheric pressure plasma has much potential for medical applications.
The atmospheric pressure plasma needle contains almost equal amounts of positive and negative charges. In
this research we focused on the possible biomedical application of the atmospheric pressure plasma needle,
where we used plasma ignited in Argon (Ar) gas flow to cause strand breaks in DNA. However, the mechanism
by which plasma destroys DNA is not yet understood. In this study we investigated the effects of exposure time
and distance between the plasma source and the DNA sample. In this study we found that plasma does indeed
alter DNA. We came to this conclusion through qualitative interpretations using a standard gel electrophoresis
technique on DNA samples treated with the atmospheric pressure plasma needle.
Political Factors Militating the Success of Hospitality Industry in Nigeria: ...iosrjce
This study examined the extent to which changes in government and political issues have affected the
non-manufacturing sector of the economy putting the hospitality industry as the study base. The study covered
both private and public owned hotels in Rivers State capital, Port Harcourt. Data were collected and analyzed
using simple percentage and frequency distribution table. The results of our study revealed a link that
management of this organization amongst others has contributed to its poor performance. The study concluded
that incessant changes in government and their massive interference in the management of this industry have
great effect. Also, political instability and legal system contributed greatly to their failure. It was therefore
recommended that this sector of the economy should be privatized and not be allowed to be controlled by
government selection and appointment. Management positions should be based on managerial capabilities and
knowledge. Also, educational trainings and seminars should be often conducted to improve knowledge.
The evolution of Indo-Japan economic relations: The economic ties between India and Japan evolved
in the last quarter of the nineteenth century. During that period Japan’s textile industry rapidly expanded which
is largely dependent on outside raw materials. India attracted attention as a reliable source of raw cotton supply.
In the closing years of the nineteenth centaury. Japanese special trade team came to India to examine the
possibility of purchasing Indian cotton and endorsed the proposal for a regular cotton trade with India. The first
shipment sent to Japan in 1889-90 by the House of Tata, consisted of 32 bales.1
BER Analysis ofImpulse Noise inOFDM System Using LMS,NLMS&RLSiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Sentiment Features based Analysis of Online Reviewsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
“Green Economy”- Whether A Relevant Concept For Emerging Economies (BRICS)?iosrjce
BRIC is a group ellipsis used for referring the four influential countries in the 21st century namely,
Brazil, Russia, India and China which are moving in the advanced stage of their development. The document
describes the relevance of Green Economy in reference to the developing economies. Thereby, concluding that
for the BRICS countries in order to benefit from the advantages of the development of the Green Economy, the
objectives of the country should be linked with the overall objectives of the country.
Differentiating Algorithms of Cloud Task Scheduling Based on various Parametersiosrjce
Cloud computing is a new design structure for large, distributed data centers. Cloud computing
system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud
computing need to offer differentiated services to users. QoS differentiation is very important to satisfy
different users with different QoS requirements. In this paper, various QoS based scheduling algorithms,
scheduling parameters and the future scope of discussed algorithms have been studied. This paper summarizes
various cloud scheduling algorithms, findings of algorithms, scheduling factors, type of scheduling and
parameters considered
Mathematics Teachers Motivation, a Veritable Tool for Employment Generation a...iosrjce
This document discusses ways to motivate mathematics teachers in Nigeria to help generate employment and promote sustainability. It argues that teachers are key to achieving educational goals and realizing national development plans. However, teachers' motivation has declined due to issues like poor salaries and working conditions. The document recommends motivating teachers through provision of technology and laboratories, opportunities for professional development like training programs, and improved compensation. If teachers are properly motivated, they can help students gain skills needed for the job market and support Nigeria's goals of reducing poverty and promoting entrepreneurship.
Concept Drift for obtaining Accurate Insight on Process Executioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Effect of estradiol -17 β on arachidonic acid metabolism in sheep uterus: in ...iosrjce
The effect of estradiol-17 β on Arachidonic acid (AA) metabolism in non-pregnant sheep uterus was
studied under in vitro conditions. On incubation of uterine slices with estradiol-17β, the levels of prostaglandins
were altered but not Lipoxygenase (LOX) products. Based on their analysis on conventional TLC technique, the
Cyclooxygenase (COX) products PGF2α, 6-keto PGF1α and PGE2 were shown to be altered over an incubation
period of 0 to 120 minutes. The LOX products, HPETEs and HETEs did not show any change upon incubation
with estradiol-17β. This study gives a preliminary understanding of role of estradiol on AA metabolism.
Engineering-Driven Situational Teaching Study on Electric Control of Mechanic...iosrjce
In order to further improve teaching effect of the course regarding electric control of mechanical
equipments, and strengthen electrical design and PLC control capability about machinery equipments of
students, a situational teaching method under guidance of engineering is presented. The method includes casebased
classroom teaching, field-based course teaching and project-based comprehensive practice. Aiming at the
course knowledge of each chapter, some engineering cases are combined into classroom teaching. Based on
some actual engineering objects, the students can understand electrical systems well through on-site tasks such
as use, dismantling, assembly, connection and commissioning. Based on some training devices, the practical
ability of students can be improved using project tasks. The teaching results show that, for the students who
have no any engineering background, the situational teaching helps them understand, grasp and apply
knowledge well
International Journal of Computer Science, Engineering and Information Techno...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Journal looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the Journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
This document summarizes a research paper that evaluates routing protocols for mobile ad hoc networks (MANETs). It begins by defining MANETs and describing their characteristics, applications, and limitations. It then discusses two main subsets of MANETs - wireless sensor networks and vehicular ad hoc networks. The paper classifies routing protocols for MANETs into four categories - proactive, reactive, hierarchical, and geographic - and provides examples of protocols for each category. It describes simulations conducted using the OPNET simulator to evaluate and compare the performance of six routing protocols based on metrics like traffic, delay, and throughput. The results show that with low node mobility and density, DSR generates the lowest traffic while ZRP has the lowest delay
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
This document provides an overview of contemporary security problems in wireless mesh networks. It discusses security vulnerabilities at different layers of the communication protocol stack for wireless mesh networks, including the physical, link, and network layers. At the physical layer, jamming attacks are a risk. The link layer is vulnerable to passive eavesdropping, spoofing, congestion attacks, and replay attacks. The network layer faces risks from routing attacks like black hole and gray hole attacks, as well as Sybil attacks. Overall, the document analyzes different types of attacks that threaten the security of wireless mesh networks.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
This document summarizes a research paper that proposes a path mechanism approach to reduce packet data loss in wireless mesh networks. The paper emphasizes developing a path protocol where the minimum possible packet drop occurs. Wireless mesh networks are vulnerable to denial of service attacks that can cause packet dropping at the routing layer. Evaluating the performance of wireless mesh networks under various levels of packet dropping based on throughput and data packet loss is discussed. Developing an efficient path mechanism is proposed to minimize packet loss and improve network performance.
Iaetsd manet a reliable network in disaster areasIaetsd Iaetsd
Mobile ad hoc networks (MANETs) provide reliable communication in disaster areas by allowing for the autonomous and decentralized formation of wireless networks without existing infrastructure. MANETs are suitable for disaster relief because they are easy to deploy, can dynamically form multihop networks as nodes move, and do not rely on fixed network components that may be damaged. The key features of MANETs that make them appropriate for disaster areas are their ability to self-configure without centralized administration, adapt to unpredictable node movements, and restore connectivity when infrastructure is compromised or destroyed.
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
This document reviews cluster-based routing protocols for wireless sensor networks. It discusses the challenges facing routing in WSNs such as limited energy, hardware constraints, and dynamic network topologies. It then categorizes cluster-based routing protocols into chain-based, tree-based, grid-based, and block-based approaches. A popular chain-based protocol called PEGASIS is described which forms sensor nodes into a chain to reduce data transmissions to the base station. The document aims to compare different cluster-based routing protocols to improve energy efficiency, network lifetime, and quality of service in WSNs.
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
The proliferation of heterogeneous devices connected through large scale networks is a clear sign that the vision of the Internet of Things IoT is getting closer to becoming a reality. Many researchers and experts in the field share the opinion that the next to come fifth generation 5G cellular systems will be a strong boost for the IoT deployment. Device to Device D2D appears as a key communication paradigm to support heterogeneous objects interconnection and to guarantee important benefits. Future research directions are then presented towards a fully converged 5G IoT ecosystem. In this paper, we analyze existing data about D2D communication systems and its relation of 5G IoT networks. The enhancement of such networks will bring several spheres to learn for. Nozima Musaboyeva Bahtiyor Qizi "Correlation between Terms of 5G Networks, IoT and D2D Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47522.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-network/47522/correlation-between-terms-of-5g-networks-iot-and-d2d-communication/nozima-musaboyeva-bahtiyor-qizi
This document provides a literature review on topological planning of heterogeneous mobile networks in dense areas. It discusses the need for heterogeneous networks using a mix of macro, pico, femtocell and relay base stations. The network architecture is presented, including different types of base stations and their characteristics. Challenges of network planning in dense areas are also addressed, such as mitigating interference between indoor base stations and outdoor macrocells. Pathloss models and different interference scenarios are reviewed to understand their impact on network capacity and coverage optimization.
The International Journal of Engineering and Science (The IJES)theijes
The document summarizes a study on the Enhanced Adaptive Acknowledge (EAACK) scheme for detecting misbehaving nodes in mobile ad hoc networks (MANETs). It discusses the limitations of existing acknowledgment-based intrusion detection systems like Watchdog, TWOACK, and AACK in handling receiver collisions. The key issues related to acknowledgment-based schemes for detecting misbehavior in MANETs are addressed. The focus is on analyzing the limitations of acknowledgment approaches like AACK and studying EAACK as an improved approach for addressing receiver collisions in MANETs.
Similar to A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
1. The document describes a study that designed a balanced scorecard for a nonprofit organization called Yayasan Pembinaan dan Kesembuhan Batin (YPKB) in Malang, Indonesia.
2. The balanced scorecard translated YPKB's vision and mission into strategic objectives across four perspectives: financial, customer, internal processes, and learning and growth.
3. Key strategic objectives included donation growth, budget effectiveness, customer satisfaction, reputation, service quality, innovation, and employee development. Customers perspective had the highest weighting, suggesting a focus on public service over financial growth.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
- The document examines customer experience in supermarkets and hypermarkets in India through a survey of 418 customers.
- It finds that in supermarkets, previous experience, atmosphere, price, social environment and experience in other channels most influence customer experience, while in hypermarkets, previous experience, product assortment, social environment and experience in other channels are most influential.
- The study provides insights for retailers on key determinants of customer experience in each format to help them improve strategies and competitive positioning.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
This document discusses the implementation of quality management principles at Zimbabwe Open University's Matabeleland North Regional Centre. It begins with background information on ZOU and the importance of quality management in open and distance learning institutions. The study aimed to determine if quality management and its principles were being implemented at the regional centre. Key findings included that the centre prioritized customer focus and staff involvement. Decisions were made based on data analysis. The regional centre implemented a quality system informed by its policy documents. The document recommends ensuring staffing levels match needs and providing sufficient resources to the regional centre.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Manufacturing Process of molasses based distillery ppt.pptx
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. II (Mar – Apr. 2015), PP 50-58
www.iosrjournals.org
DOI: 10.9790/0661-17225058 www.iosrjournals.org 50 | Page
A Secure QOS Distributed Routing Protocol for Hybrid Wireless
Networks
S.Aakasham1
, S.R.Mugunthan2
1
PG Scholar, Dept of CSE, SVS College of Engineering, Tamil Nadu, India.
2
Assistent Professor, Dept of CSE, SVS College of Engineering, Tamil Nadu, India
Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion-
detection, overhead, transmission delay.
Index Terms: Hybrid Wireless Networks, Mobile ad-hoc network (MANET), Quality of Service (QoS), QoS-
Oriented Distributed Routing Protocol (QOD), Enhanced Adaptive ACKnowledgment (EAACK)
I. Introduction
The future development of wireless networks has stimulated numerous wireless applications that have
been used in wide areas such as emergency services, education, commerce, military, and entertainment. It
improved technology and reduced costs, wireless networks have gained much more preferences over wired
networks in the past few decades. Nowadays, people wish to watch videos, play games, watch TV, and make
long distance conferencing via wireless mobile devices ―on the go.‖ The widespread use of wireless and mobile
devices and the increasing demand for mobile multimedia streaming services are leading to a promising near
future where wireless multimedia services (e.g., mobile gaming, online TV, and online conferences) are widely
deployed. The emergence and the envisioned future of real time and multimedia applications have stimulated
the need of high Quality of Service (QoS) support in wireless and mobile networking environments [5]. The
QoS support reduces end-to- end transmission delay and enhances throughput to guarantee the seamless
communication between mobile devices and wireless infrastructures.
Hybrid wireless networks have been proven to be a better network structure for the next generation
wireless networks [6], [7], [8], [9], and can help to tackle the stringent end-to end QoS requirements of different
applications. Hybrid networks synergistically combine infrastructure networks and MANETs to leverage each
other. Specifically, infrastructure networks improve the scalability of MANETs, while MANETs automatically
establish self-organizing networks, extending the coverage of the infrastructure networks. In a vehicle
opportunistic access network (an instance of hybrid networks), people in vehicles need to upload or download
videos from remote Internet servers through access points (APs) (i.e., base stations) spreading out in a city.
Since it is unlikely that the base stations cover the entire city to maintain sufficiently strong signal everywhere
to support an application requiring high link rates, the vehicles themselves can form a MANET to extend the
coverage of the base stations, providing continuous network connections.
Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless
transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or
indirectly. Industrial remote access and control via wireless networks are becoming more and more popular
these days [35]. One of the major advantages of wireless networks is its ability to allow data communication
between different parties and still maintain their mobility. However, this communication is limited to the range
of transmitters. This means that two nodes cannot communicate with each other when the distance between the
two nodes is beyond the communication range of their own. MANET solves this problem by allowing
intermediate par- ties to relay data transmissions. This is achieved by dividing MANET into two types of
networks, namely, single-hop and multihop. In a single-hop network, all nodes within the same radio range
2. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 51 | Page
communicate directly with each other. On the other hand, in a multihop network, nodes rely on other
intermediate nodes to transmit if the destination node is out of their radio range. In contrary to the traditional
wireless network, MANET has a decentralized network infrastructure. MANET does not require a fixed
infrastructure; thus, all nodes are free to move randomly [10], [27], [29]. MANET is capable of creating a self-
configuring and self-maintaining network without the help of a centralized infrastructure, which is often
infeasible in critical mission applications like military conflict or emergency recovery. Minimal configuration
and quick deployment make MANET ready to be used in emergency circumstances where an infrastructure is
unavailable or unfeasible to install in scenarios like natural or human-induced disasters, military conflicts, and
medical emergency situations [19], [30].
Owing to these unique characteristics, Hybrid wireless networks is becoming more and more widely
implemented in the industry [14], [28]. However, considering the fact that Hybrid wireless networks is popular
among critical mission applications, network security is of vital importance. Unfortunately, the open medium
and remote distribution of Hybrid wireless networks make it vulnerable to various types of attacks. For example,
due to the nodes’ lack of physical protection, malicious attackers can easily capture and compromise nodes to
achieve attacks. In particular, considering the fact that most routing protocols in Hybrid wireless networks
assume that every node in the network behaves cooperatively with other nodes and presumably not malicious
[5], attackers can easily compromise Hybrid wireless networks by inserting malicious or non-cooperative nodes
into the network. Furthermore, because of Hybrid wireless networks distributed architecture and changing
topology, a traditional centralized monitoring technique is no longer feasible in Hybrid wireless networks. In
such case, it is crucial to develop an intrusion-detection system (IDS). specially designed for Hybrid wireless
networks. Many research efforts have been devoted to such research topic [1], [3], [6]–[9], [15], [16], [22], [24],
[26], [29],[31].
In the next section, we mainly concentrate on discussing the background information required for
understanding this research topic
II. Problem Definition
Our proposed approach EAACK is designed to tackle three of the six weaknesses of Watchdog
scheme, namely, false misbehavior, limited transmission power, and receiver collision.
In this section, we discuss these three weaknesses in detail.
1. False misbehavior
2. Limited transmission power
3. Receiver collision
Fig-1: Reveicer collisions
In a typical example of receiver collisions, shown in Fig. 1, after node A sends Packet 1 to node B, it
tries to overhear if node B forwarded this packet to node C; meanwhile, node X is forwarding Packet 2 to node
C. In such case, node A overhears that node B has successfully forwarded Packet 1 to node C but failed to detect
that node C did not receive this packet due to a collision between Packet 1 and Packet 2 at node C.
Fig-2: Limited Transmission Power
In the case of limited transmission power, in order to preserve its own battery resources, node B
intentionally limits its transmission power so that it is strong enough to be overheard by node A but not strong
enough to be received by node C, as shown in Fig. 2.
3. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 52 | Page
Fig-3: False Misbehavior Report
For false misbehavior report, although node A successfully overheard that node B forwarded Packet 1
to node C, node A still reported node B as misbehaving, as shown in Fig. 3. Due to the open medium and remote
distribution of typical MANETs, attackers can easily capture and compromise one or two nodes to achieve this
false misbehavior report attack. As discussed in previous sections, TWOACK and AACK solve two of these
three weaknesses, namely, receiver collision and limited transmission power. However, both of them are
vulnerable to the false misbehavior attack. In this research work, our goal is to propose a new IDS specially
designed for MANETs, which solves not only receiver collision and limited transmission power but also the
false misbehavior problem.
Furthermore, we extend our research to adopt a digital signature scheme during the packet transmission
process. As in all acknowledgment-based IDSs, it is vital to ensure the integrity and authenticity of all
acknowledgment packets.
III. Network And Service Models
We consider a hybrid wireless network with an arbitrary number of base stations spreading over the
network. N mobile nodes are moving around in network. Each node ni (1≤ i ≤ N) uses IEEE 802.11 interface
with the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [28]. Since a hybrid
network where nodes are equipped with multiinterfaces that transmit packets through multichannels generate
much less interference than a hybrid network where nodes are equipped with a single Wi-Fi interface, we
assume that each node is equipped with a single Wi-Fi interface in order to deal with a more difficult problem.
Therefore, the base stations considered in this paper are access points (APs). The Wi-Fi interface enables nodes
to communicate with both APs and mobile nodes. For example, in a University campus, normally only buildings
have APs. Therefore, people that do not have Wi-Fi access but close to buildings can use two-hop relay
transmissions to connect to the APs in the buildings. Feeney et al. [29] considered the similar scenario in his
work.
Fig-4: Hybrid Wireless Network Model
The QoS requirements mainly include end-to-end delay bound, which is essential for many
applications with stringent real-time requirement. While throughput guarantee is also important, it is
automatically guaranteed by bounding the transmission delay for a certain amount of packets [31]. The source
node conducts admission control to check whether there are enough resources to satisfy the requirements of QoS
of the packet stream. Fig. 4 shows the network model of a hybrid network. For example, when a source node n1
wants to upload files to an Internet server through APs, it can choose to send packets to the APs directly by
itself or require its neighbor nodes n2, n3, or n4 to assist the packet transmission.
We assume that queuing occurs only at the output ports of the mobile nodes [32]. After a mobile node
generates the packets, it first tries to transmit the packets to its nearby APs that can guarantee the QoS
requirements. If it fails (e.g., out of the transmission range of APs or in a hot/dead spot), it relies on its
neighbors that can guarantee the QoS requirements for relaying packets to APs. Relaying for a packet stream
can be modeled as a process, in which packets from a source node traverse a number of queuing servers to some
4. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 53 | Page
APs [31]. In this model, the problem of how to secure QoS routing can be transformed to the problem of how to
schedule the neighbor resources between nodes to ensure secure QoS of packet routing.
IV. Scheme Description
In this paper, we propose a Secure Quality of Service Oriented Distributed routing protocol (SQOD).
SQOD contain two contrivances:
1. QoS-Oriented Distributed Routing Protocol (QOD).
2. Enhanced Adaptive ACKnowledgment (EAACK).
We use first a QoS-Oriented Distributed routing protocol (QOD)[1]. Usually, a hybrid network has
widespread base stations. The data transmission in hybrid networks has two features. 1. An AP can be a source
or a destination to any mobile node. Second, the number of transmission hops between a mobile node and an AP
is small. The first feature allows a stream to have anycast transmission along multiple transmission paths to its
destination through base stations. 2. Enables a source node to connect to an AP through an intermediate node.
Taking full advantage of the two features, QOD transforms the packet routing problem into a dynamic resource
scheduling problem. QOD is the first work for QoS routing in hybrid networks.
This QOD makes five contributions:
Earliest Deadline First scheduling algorithm: The algorithm selects qualified neighbors and employs
deadline-driven scheduling mechanism to guarantee QoS routing.
Distributed packet scheduling algorithm: After qualified neighbors are identified, this algorithm schedules
packet routing. It assigns earlier generated packets to forwarders with higher queuing delays, while assigns more
recently generated packets to forwarders with lower queuing delays to reduce total transmission delay.
Mobility-based segment resizing algorithm: The source
node adaptively resizes each packet in its packet stream for each neighbor node according to the neighbor’s
mobility in order to increase the scheduling feasibility of the packets from the source node.
Least Slack First (LSF) scheduling algorithm: In this algorithm, an intermediate node first forwards the
packet with the least time allowed to wait before being forwarded out to achieve fairness in packet forwarding.
Data redundancy elimination based transmission: Due to the broadcasting feature of the wireless networks,
the APs and mobile nodes can overhear and cache packets. This algorithm eliminates the redundant data to
improve the QoS of the packet transmission.
Specifically, above the algorithms used in QOD, if a source node is not within the transmission range
of the AP, a source node selects nearby neighbors that can provide QoS services to forward its packets to base
stations in a distributed manner. The source node schedules the packet streams to neighbors based on their
queuing condition, channel condition, and mobility, aiming to reduce transmission time and increase network
capacity. The neighbors then forward packets to base stations, which further forward packets to the destination.
If any intermediate node cannot send the packets to destination. Check the node if it is affected from any
attacker or malicious used Enhanced Adaptive ACKnowledgment (EAACK) scheme.
EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior
report authentication (MRA). In order to distinguish different packet types in different schemes, we included a
2-b packet header in EAACK. According to the Internet draft of DSR [42], there is 6 b reserved in the DSR
header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are described in Table I.
Table-1: Packet Type Indicators
5. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 54 | Page
EAACK is consisted of three major parts, namely, ACK, secure ACK (S-ACK), and misbehavior
report authentication (MRA). In order to distinguish different packet types in different schemes, we included a
2-b packet header in EAACK. According to the Internet draft of DSR [11], there is 6 b reserved in the DSR
header. In EAACK, we use 2 b of the 6 b to flag different types of packets. Details are listed in Table I.
Fig-5: System control flow
Fig. 5 presents a flowchart describing the EAACK scheme. Please note that, in our proposed scheme,
we assume that the link between each node in the network is bidirectional. Furthermore, for each
communication process, both the source node and the destination node are not malicious. Unless specified, all
acknowledgment packets described in this research are required to be digitally signed by its sender and verified
by its receiver.
4.1. ACK
ACK is basically an end-to-end acknowledgment scheme. It acts as a part of the hybrid scheme in
EAACK, aiming to reduce network overhead when no network misbehavior is detected.
Fig-6: ACK scheme
In Fig. 6, in ACK mode, node S first sends out an ACK data packet Pad1to the destination node D. If all
the intermediate nodes along the route between nodes S and D are cooperative and node D successfully receives
Pad1, node D is required to send back an ACK acknowledgment packet Pak1 along the same route but in a
reverse order. Within a predefined time period, if node S receives Pak1, then the packet transmission from node S
to node D is successful. Otherwise, node S will switch to S-ACK mode by sending out an S-ACK data packet to
detect the misbehaving nodes in the route.
4.2. S-ACK
The S-ACK scheme is an improved version of the TWOACK scheme proposed by Liu et al. [44]. The
principle is to let every three consecutive nodes work in a group to detect misbehaving nodes. For every three
consecutive nodes in the route, the third node is required to send an S-ACK acknowledgment packet to the first
node. The intention of introducing S-ACK mode is to detect misbehaving nodes in the presence of receiver
collision or limited transmission power. As shown in Fig. 7, in S-ACK mode, the three consecutive nodes (i.e.,
F1, F2, and F3) work in a group to detect misbehaving nodes in the network. Node F1 first sends out S-ACK
data packet Psad1 to node F2. Then, node F2 forwards this packet to node F3. When node F3 receives Psad1, as it
is the third node in this three-node group, node F3 is required to send back an S-ACK acknowledgment packet
Psak1 to node F2. Node F2 forwards Psak1 back to node F1. If node F1 does not receive this acknowledgment
packet within a predefined time period, both nodes F2 and F3 are reported as malicious. Moreover, a
misbehavior report will be generated by node F1 and sent to the source node S.
where the source node immediately trusts the misbehavior report, EAACK requires the source node to
switch to MRA mode and confirm this misbehavior report. This is a vital step to detect false misbehavior report
in our proposed scheme.
4.3. MRA
The MRA scheme is designed to resolve the weakness of Watchdog when it fails to detect misbehaving
nodes with the presence of false misbehavior report. The false misbehavior report can be generated by malicious
6. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 55 | Page
attackers to falsely report innocent nodes as malicious. This attack can be lethal to the entire network when the
attackers break down sufficient nodes and thus cause a network division. The core of MRA scheme is to
authenticate whether the destination node has received the reported missing packet through a different route.
Fig-7: S-ACK schema
To initiate the MRA mode, the source node first searches its local knowledge base and seeks for an
alternative route to the destination node. If there is no other that exists, the source node starts a DSR routing
request to find another route. Due to the nature of MANETs, it is common to find out multiple routes between
two nodes.
By adopting an alternative route to the destination node, we circumvent the misbehavior reporter node.
When the destination node receives an MRA packet, it searches its local knowledge base and compares if the
reported packet was received. If it is already received, then it is safe to conclude that this is a false misbehavior
report and whoever generated this report is marked as malicious. Otherwise, the misbehavior report is trusted
and accepted.
By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite the
existence of false mis-behavior report.
V. Performance Evaluation
This section demonstrates the distinguishing properties of SQOD compared to QOD through
simulations on NS-2 [40]. QOD is a resource reservation-based routing protocol for QoS routing in MANETs.
This protocol extends AODV by adding information of the maximum delay and minimum available bandwidth
of each neighbor in a node’s routing table. To apply QOD in hybrid networks, we let a source node search for
the QoS guaranteed path to an AP. The intermediate nodes along the path reserve the resources for the source
node.
In the simulation, the setup was the same as Six APs with IEEE 802.11 MAC protocol are uniformly
distributed in the area. We randomly selected two source nodes to send packets to APs in every 10 s. A node’s
traffic is generated with constant bit rate (CBR) sources. The generation rate of the CBR traffic is 100 kb/s.
Unless otherwise specified, the speeds of the nodes were randomly selected from [1-40]m/s. Since the number
of successfully delivered packets within a certain delay is critical to the QoS of video streaming applications, we
7. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 56 | Page
define a new metric, namely QoS guaranteed throughput that measures the throughput sent from a source node
to a destination node satisfying a QoS delay requirement as 1 s. This metric can simultaneously reflect delay,
packet delivery ratio, throughput, and jitter features of packet transmission.
5.1 Packet delivery ratio with Different Mobility Speeds
In this experiment, a node’s mobility speed was randomly selected from (1; 10; 20; 30; 40). Fig. 8 plots
the QoS packet delivery ratio of all systems versus the node mobility speed. It shows that the QoS packet
delivery ratio of all systems decrease as node mobility increases. This is because higher mobility causes higher
frequent link breakages, which leads to more packet drops. Reestablishing the broken links results in a long
transmission delay for subsequent packets.
In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit
packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number
of source nodes in the system increases, the percentage of the packet delivery ratio increases. This is because as
more packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded
out, which leads to higher packet delivery ratio and hence more delivery packets. We also see that the
percentage of the packet delivery ration in SQOD is higher than that of QOD.
Fig-8: Packet delivery ratio with Different Mobility Speeds
5.2. Delay with Different Mobility Speeds
In this section, we compare SQOD with QOD for delay. This experiment, a node’s mobility speed was
randomly selected from (1; 10; 20; 30; 40). Fig. 9 plots the QoS delay of all systems versus the node mobility
speed. We let the forwarding nodes receive as many packets from neighbor nodes as possible without admission
control to show the performance of SQOD and QOD when the packets are scheduling infeasible.
In each experiment, during 50 s, we continually selected a certain number of random nodes to transmit
packets to their randomly selected destinations for a time period randomly chosen from [1 to 5]s. As the number
of source nodes in the system increases, the percentage of the delayed packets increases. This is because as more
packets are generated, every packet in the scheduling queue needs to wait for more time to be forwarded out,
which leads to higher delay and hence more delayed packets. We also see that the percentage of the delayed
packets in QOD is higher than that of SQOD. This is because SQOD always tries to meet the deadlines of
packets with the earliest deadlines, while SQOD tries to balance the delay among the packets. Therefore, QOD
is able to meet more deadlines than SQOD support the QoS routing due to lower queue delay, while QoD makes
full use of the resources of the nodes around a source node, and distributively forwards the packets to the APs,
improving the QoS throughput of the system.
8. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 57 | Page
Fig-9: Delay with Different Mobility Speeds
VI. Conclusions
Hybrid wireless networks that integrate MANETs and infrastructure wireless networks have proven to
be a better network structure for the next generation networks. Packet-dropping attack has always been a major
threat to the security in Hybrid wireless networks. In this paper, we propose a Secure QoS oriented distributed
routing protocol (SQOD) for hybrid networks. It provides Secure QoS services in a highly dynamic scenario.
Experimental results show that SQOD can achieve high mobility-resilience, scalability, and contention
reduction.
Furthermore, in an effort to prevent the attackers from initiating forged acknowledgment attacks, we
extended our research to incorporate digital signature in our proposed scheme. Although it generates more ROs
in some cases, as demonstrated in our experiment, it can vastly improve the network’s PDR when the attackers
are smart enough to forge acknowledgment packets. We think that this tradeoff is worthwhile when network
security is the top priority. In the future, we plan to evaluate the performance of SQOD based on the real
testbed.
References
[1]. H. Wu and X. Jia, ―QoS Multicast Routing by Using Multiple Paths/Trees in Wireless Ad Hoc Networks,‖ Ad Hoc Networks, vol.
5, pp. 600-612, 2009.
[2]. H. Luo, R. Ramjeey, P. Sinhaz, L. Liy, and S. Lu, ―UCAN: A Unified Cell and Ad-Hoc Network Architecture,‖ Proc. ACM
MobiCom, 2003.
[3]. P.K. Mckinley, H. Xu, A. Esfahanian, and L.M. Ni, ―Unicast-Based Multicast Communication in Wormhole-Routed Direct
Networks,‖ IEEE Trans. Parallel Data and Distributed Systems, vol. 5, no. 12, pp. 1252-1265, Dec. 1992.
[4]. H. Wu, C. Qiao, S. De, and O. Tonguz, ―Integrated Cell and Ad Hoc Relaying Systems: iCAR,‖ IEEE J. Selected Areas in Comm.,
vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5]. J. Zhou and Y.R. Yang, ―PAR CelS: Pervasive Ad-Hoc Relaying for Cell Systems,‖ Proc. IFIP Mediterranean Ad Hoc Networking
Workshop (Med-Hoc-Net), 2002.
[6]. R. Braden, D. Clark, and S. Shenker, Integrated Services in the Internet Architecture: An Overview, IETF RFC 1633, 1994.
[7]. E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, Resource Reservation Protocol RSVP, IETF RFC 2205, 1998.
[8]. I. Jawhar and J. Wu, ―Quality of Service Routing in Mobile Ad Hoc Networks,‖ Network Theory and Applications, Springer, 2004.
[9]. T. Reddy, I. Karthigeyan, B. Manoj, and C. Murthy, ―Quality of Service Provisioning in Ad Hoc Wireless Networks: A Survey of
Issues and Solutions,‖ Ad Hoc Networks, vol. 4, no. 1, pp. 83-124, 2006.
[10]. X. Du, ―QoS Routing Based on Multi-Class Nodes for Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol. 2, pp. 241-254, 2004.
[11]. S. Jiang, Y. Liu, Y. Jiang, and Q. Yin, ―Provisioning of Adaptability to Variable Topologies for Routing Schemes in MANETs,‖
IEEE J. Selected Areas in Comm., vol. 22, no. 7, pp. 1347-1356, Sept. 2004.
[12]. M. Conti, E. Gregori, and G. Maselli, ―Reliable and Efficient Forwarding in Ad Hoc Networks,‖ Ad Hoc Networks, vol. 4, pp. 398-
415, 2006.
[13]. G. Chakrabarti and S. Kulkarni, ―Load Balancing and Resource Reservation in Mobile Ad Hoc Networks,‖ Ad Hoc Networks, vol.
4, pp. 186-203, 2006.
[14]. A. Argyriou and V. Madisetti, ―Using a New Protocol to Enhance Path Reliability and Realize Load Balancing in Mobile Ad Hoc
Networks,‖ Ad Hoc Networks, vol. 4, pp. 60-74, 2006.
[15]. C. Shen and S. Rajagopalan, ―Protocol-Independent Multicast Packet Delivery Improvement Service for Mobile Ad Hoc
Networks,‖ Ad Hoc Networks, vol. 5, pp. 210-227, 2007.
[16]. C.E. Perkins, E.M. Royer, and S.R. Das, Quality of Service in Ad Hoc On-Demand Distance Vector Routing, IETF Internet draft,
2001.
[17]. Z. Shen and J.P. Thomas, ―Security and QoS Self-Optimization in Mobile Ad Hoc Networks,‖ IEEE Trans. Mobile Computing, vol.
7, pp. 1138-1151, Sept. 2008.
[18]. Y. Li and A. Ephremides, ―A Joint Scheduling Power Control and Routing Algorithm for Ad Hoc Networks,‖ Ad Hoc Networks,
2008.
9. A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
DOI: 10.9790/0661-17225058 www.iosrjournals.org 58 | Page
[19]. S. Ibrahim, K. Sadek, W. Su, and R. Liu, ―Cooperative Communications with Relay-Selection: When to Cooperate and Whom to
Cooperate With?‖ IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2814-2827, July 2008.
[20]. A. Bletsas, A. Khisti, D.P. Reed, and A. Lippman, ―A Simple Cooperative Diversity Method Based on Network Path Selection,‖
IEEE J. Selected Areas in Comm., vol. 24, no. 3, pp. 659-672, Mar. 2006.
[21]. T. Ng and W. Yu, ―Joint Optimization of Relay Strategies and Resource Allocations in Cellular Networks,‖ IEEE J. Selected Areas
in Comm., vol. 25, no. 2, pp. 328-339, Feb. 2004.
[22]. J. Cai, X. Shen, J.W. Mark, and A.S. Alfa, ―Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay
Networks,‖ IEEE Trans. Wireless Comm., vol. 7, no. 4, pp. 1348- 1357, Apr. 2008.
[23]. Y. Wei and D. Gitlin, ―Two-Hop-Relay Architecture for Next- Generation WWAN/WLAN Integration,‖ IEEE Wireless Comm.,
vol. 11, no. 2, pp. 24-30, Apr. 2004.
[24]. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE-SA Standards Board, 1999.
[25]. L. Feeney, B. Cetin, D. Hollos, M. Kubisch, S. Mengesha, and H. Karl, ―Multi-Rate Relaying for Performance Improvement in
IEEE 802.11 WLANS,‖ Proc. Fifth Int’l Conf. Wired/Wireless Internet Comm., 2007.
[26]. P. Gupta and P.R. Kumar, ―The Capacity of Wireless Networks,‖ IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388- 404,
Mar. 2000.
[27]. H. Zhang, ―Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks,‖ Proc. IEEE, vol. 83, no. 10,
pp. 1374-1396, Oct. 1995.
[28]. [28] M. Karol, M. Hluchyj, and S. Mogan, ―Input versus Output Queueing on a Space-Division Packet Switch,‖ IEEE Trans.
Comm.,vol. 35, no. 12, pp. 1347-1356, Dec. 1987.
[29]. [29] S. Sahu, P. Nain, C. Diot, V. Firoiu, and D. Towsley, ―On Achievable Service Differentiation with Token Bucket Marking for
TCP,‖ Proc. ACM SIGMETRICS Int’l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), 2000.
[30]. [30] C. Liu and J. Layland, ―Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment,‖ J. ACM, vol. 20,
pp. 46- 61, 1973.
[31]. [31] D. Lin and R. Morris, ―Dynamics of Random Early Detection,‖ Proc. ACM Special Interest Group Data Comm.
(SIGCOMM),1997.
[32]. K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, ―Which wireless technology for industrial
wireless sensor networks? The development of OCARI technol,‖ IEEE Trans. Ind. Electron.,vol. 56, no. 10, pp. 4266–4278, Oct.
2009.
[33]. R. Akbani, T. Korkmaz, and G. V. S. Raju, ―Mobile Ad hoc Network Security,‖ in Lecture Notes in Electrical Engineering, vol.
127.New York: Springer-Verlag, 2012, pp. 659–666.
[34]. R. H. Akbani, S. Patel, and D. C. Jinwala, ―DoS attacks in mobile ad hoc networks: A survey,‖ in Proc. 2nd Int. Meeting ACCT,
Rohtak, Haryana, India, 2012, pp. 535–541.
[35]. T. Anantvalee and J. Wu, ―A Survey on Intrusion Detection in Mobile Ad Hoc Networks,‖ in Wireless/Mobile Security. New York:
Springer-Verlag, 2008.
[36]. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug.
2007.
[37]. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, ―Modeling and optimization of a solar energy harvester system for
self-powered wireless sensor networks,‖ IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.
[38]. V. C. Gungor and G. P. Hancke, ―Industrial wireless sensor networks: Challenges, design principles, and technical approach,‖ IEEE
Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
[39]. Y. Hu, D. Johnson, and A. Perrig, ―SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,‖ in Proc.
4th IEEEWorkshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.
[40]. Y. Hu, A. Perrig, and D. Johnson, ―ARIADNE: A secure on-demand routing protocol for ad hoc networks,‖ in Proc. 8th ACM Int.
Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.
[41]. G. Jayakumar and G. Gopinath, ―Ad hoc mobile wireless networks routing protocol—A review,‖ J. Comput. Sci., vol. 3, no. 8, pp.
574–582, 2007.
[42]. D. Johnson and D. Maltz, ―Dynamic Source Routing in ad hoc wireless networks,‖ in Mobile Computing. Norwell, MA: Kluwer,
1996, ch. 5, pp. 153–181.
[43]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting misbehaving nodes in MANETs,‖ in Proc. 12th Int. Conf. iiWAS, Paris,
France, Nov. 8–10, 2010, pp. 216–222.
[44]. N. Kang, E. Shakshuki, and T. Sheltami, ―Detecting forged acknowledgements in MANETs,‖ in Proc. IEEE 25th Int. Conf. AINA,
Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494.
[45]. N. Nasser and Y. Chen, ―Enhanced intrusion detection systems for discovering malicious nodes in mobile ad hoc network,‖ in Proc.
IEEE Int Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159.
[46]. J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi, ―On intrusion detection and response for mobile ad hoc networks,‖ in Proc.
IEEE Int. Conf. Perform., Comput., Commun., 2004, pp. 747–752.
[47]. A. Patcha and A. Mishra, ―Collaborative security architecture for black hole attack prevention in mobile ad hoc networks,‖ in Proc.
Radio Wireless Conf., 2003, pp. 75–78.
[48]. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, ―Secure routing and intrusion detection in ad hoc networks,‖ in
Proc. 3rd
Int. Conf. Pervasive Comput. Commun., 2005, pp. 191–199.