Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency. The bulk binding approaches were used to enhance the mobility signaling for MNs which are moving together from one MAG to another by exchanging a single bulk binding update message. However, in some cases there might be several MNs move at the same time but among different MAGs. In this paper, a bulk registration scheme based on the clustered sensor PMIPv6 architecture is proposed to reduce the mobility signaling cost by creating a single bulk message for all MNs attached to the cluster. Our mathematical results show that the proposed bulk scheme enhances the PMIPv6 performance by reducing the total handoff latency.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
Devices in a beacon-enabled network use slotted CSMA/CA to contend for channel usage. Each node in the
network competes for the channels when ready to transmit data. The slotted CSMA/CA mechanism based
on the super-frame structure fairly provides communication chance for each node and makes a reasonable
usage of the available energy in beacon-enabled Zigbee networks. When wireless nano-sensor nodes are
implanted into the target human body area for detecting disease symptoms or virus existence, each node
also requires a similar characteristic in channel sharing and in the transmission of event-driven data with
a short length. In this paper, we suggest a wireless network model with nano-sensor nodes for the in-body
application. We propose a novel MAC protocol derived from an existing Zigbee MAC protocol scheme and
analyze the performance of energy usage with variable super-frame durations and packet sizes.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
This document contains information about several M.Phil Computer Science Cloud Computing projects written in C# and NS2. It provides the titles, languages, links, and short abstracts for each project. The projects focus on topics related to cloud computing including secure cloud storage, data integrity verification, privacy-preserving auditing, and keyword search over encrypted cloud data.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
Devices in a beacon-enabled network use slotted CSMA/CA to contend for channel usage. Each node in the
network competes for the channels when ready to transmit data. The slotted CSMA/CA mechanism based
on the super-frame structure fairly provides communication chance for each node and makes a reasonable
usage of the available energy in beacon-enabled Zigbee networks. When wireless nano-sensor nodes are
implanted into the target human body area for detecting disease symptoms or virus existence, each node
also requires a similar characteristic in channel sharing and in the transmission of event-driven data with
a short length. In this paper, we suggest a wireless network model with nano-sensor nodes for the in-body
application. We propose a novel MAC protocol derived from an existing Zigbee MAC protocol scheme and
analyze the performance of energy usage with variable super-frame durations and packet sizes.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
This document contains information about several M.Phil Computer Science Cloud Computing projects written in C# and NS2. It provides the titles, languages, links, and short abstracts for each project. The projects focus on topics related to cloud computing including secure cloud storage, data integrity verification, privacy-preserving auditing, and keyword search over encrypted cloud data.
M phil-computer-science-wireless-communication-projectsVijay Karan
List of Wireless Communication IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Wireless Communication for M.Phil Computer Science students.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
This document summarizes previous work on integrating Mobile IP with mobile ad hoc networks (MANETs) to provide Internet connectivity. It discusses several proposals that implemented Mobile IP on different MANET routing protocols, including proactive protocols like DSDV and reactive protocols like AODV. The document then reviews related work that evaluated the performance of Mobile IP on MANETs using simulations. It concludes by stating that this thesis will further evaluate and compare the performance of Mobile IP implemented on AODV, AOMDV and DSDV routing protocols using the NS2 simulator.
The document contains a list of project codes for various topics from the IEEE 2014 projects. There are codes for projects related to cloud computing (GC001-GC022), data mining (GD001-GD018), distributed systems (GDS01-GDS38), mobile computing (GM001-GM020), network security (GNS01-GNS38), networking (GN001-GN024), and software engineering (GS001-GS027). The codes provide brief titles for each project within each topic area.
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
This document proposes a secure clock synchronization technique for wireless sensor networks used in event-driven measurement applications. The technique aims to 1) provide high synchronization accuracy around detected events, 2) ensure long network lifetime, and 3) provide secure packet transmission. It divides nodes into an improved synchronization subset (ISS) with high accuracy around events, and a default synchronization subset (DSS) with lower accuracy elsewhere. When an event is detected, neighboring nodes in the ISS exchange synchronization packets more frequently for better accuracy. Authentication is used to securely transmit packets and identify intercepted messages. Simulation results show the technique accurately records event occurrence times while maintaining network lifetime through efficient energy usage.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
NGN definition, its architecture and benefit in low ARPU market.
Shahriar Rashid, one of the pioneer telecommunication professionals in Bangladesh, delivered the speech on NGN, its starts in Bangladesh, Architecture, benefits in low ARPU market like Bangladesh on 20th August 2013 at 10th Asia Pacific Telecommunication and ICT Development Forum held at Sonargoan Hotel Dhaka
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
This document compares the performance of HS-TCP and TCP in a hierarchical mobile IPv6 (HMIPv6) network. It summarizes a simulation conducted using the Network Simulator 2 (NS-2) to model an HMIPv6 topology with one home agent, two foreign agents, one mobile node, and one correspondent node. The simulation measured throughput as the mobile node moved between the foreign agents while communicating with the correspondent node. The results showed that HS-TCP had better throughput than TCP, with HS-TCP performing 32-96% better depending on the bandwidth level.
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSIJCI JOURNAL
Access network architecture and media access control technique are the requirements of beyond 3G mobile
communication systems for B3G systems [1]. The proposed novel access network architecture is that the network complexity is minimized and maximizes system performance. The Centralized mini-slot packet reservation multiple access (CMPRMA based on OFDMA is proposed which not only can acquire the advantages or good assets of MPRMA and support or guide Real-time traffic in well manner but can also give the resource reservation scheme for data traffic and support transmission for data traffic efficiently.
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
This document describes a new routing protocol called MCS-RPL for mobile crowd sensing applications in smart cities. MCS-RPL is based on the RPL routing protocol and introduces improvements to address RPL's issues with mobility support. It utilizes a clustering mechanism and 2D grid structure to reduce control overhead from frequent topology changes. The performance evaluation shows MCS-RPL delivers a higher packet delivery ratio and lower power consumption compared to RPL, with reductions in control packet overhead of over 75% in tested scenarios. MCS-RPL provides an alternative for mobile devices in smart city applications to opportunistically send collected sensor data to a central server without using cellular networks.
Pantech offers b.tech and m.tech projects for engineering students.We support on MIMO concepts, OFDM, CR Networks, 4G and 5 G, NS3, IoT with NS3, VANET, MANET
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
"Evaluating content-centric networking over PLC infrastructure for smart grids" (ci-joint), cet article sera présenté à la conférence AWICT du 07 au 09 Octobre 2015 (http://www.awict.net/)
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile systems face challenges when connecting to Next Generation Networks (NGN) due to differences between circuit-switched mobile networks and the IP-based NGN. A new Base Station Gateway is proposed to provide these connections. NGN aims to reduce costs and offer integrated services via common IP technology, while mobile networks have evolved through generations based on circuit switching and packet technologies. Connecting mobile networks to the NGN backbone allows access to NGN services but requires protocol conversion through mobile media gateways.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
An enhanced group mobility protocol for 6 lowpan based wireless body area net...Kamal Spring
The document proposes an enhanced group mobility protocol for 6LoWPAN-based wireless body area networks (WBANs) to reduce handoff delay and signaling costs. It describes how proxy mobile IPv6 (PMIPv6) can be used to manage network-based mobility but has limitations for group-based WBAN mobility. The proposed protocol uses a new format for router solicitation and router advertisement messages that can carry information for multiple sensor identifiers, reducing the number of control messages needed during handoffs. Simulation results show the proposed protocol reduces handoff delay, signaling costs, packet loss, and overhead on the mobile access gateway compared to existing group-based PMIPv6 protocols.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
M phil-computer-science-wireless-communication-projectsVijay Karan
List of Wireless Communication IEEE 2006 Projects. It Contains the IEEE Projects in the Domain Wireless Communication for M.Phil Computer Science students.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
This document summarizes previous work on integrating Mobile IP with mobile ad hoc networks (MANETs) to provide Internet connectivity. It discusses several proposals that implemented Mobile IP on different MANET routing protocols, including proactive protocols like DSDV and reactive protocols like AODV. The document then reviews related work that evaluated the performance of Mobile IP on MANETs using simulations. It concludes by stating that this thesis will further evaluate and compare the performance of Mobile IP implemented on AODV, AOMDV and DSDV routing protocols using the NS2 simulator.
The document contains a list of project codes for various topics from the IEEE 2014 projects. There are codes for projects related to cloud computing (GC001-GC022), data mining (GD001-GD018), distributed systems (GDS01-GDS38), mobile computing (GM001-GM020), network security (GNS01-GNS38), networking (GN001-GN024), and software engineering (GS001-GS027). The codes provide brief titles for each project within each topic area.
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
This document proposes a secure clock synchronization technique for wireless sensor networks used in event-driven measurement applications. The technique aims to 1) provide high synchronization accuracy around detected events, 2) ensure long network lifetime, and 3) provide secure packet transmission. It divides nodes into an improved synchronization subset (ISS) with high accuracy around events, and a default synchronization subset (DSS) with lower accuracy elsewhere. When an event is detected, neighboring nodes in the ISS exchange synchronization packets more frequently for better accuracy. Authentication is used to securely transmit packets and identify intercepted messages. Simulation results show the technique accurately records event occurrence times while maintaining network lifetime through efficient energy usage.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
NGN definition, its architecture and benefit in low ARPU market.
Shahriar Rashid, one of the pioneer telecommunication professionals in Bangladesh, delivered the speech on NGN, its starts in Bangladesh, Architecture, benefits in low ARPU market like Bangladesh on 20th August 2013 at 10th Asia Pacific Telecommunication and ICT Development Forum held at Sonargoan Hotel Dhaka
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
The third-generation partnership project 3GPP and 3GPP2 have standardized the IP multimedia subsystem
(IMS) to provide ubiquitous and access network-independent IP-based services for next-generation
networks via merging cellular networks and the Internet. The IP Multimedia Subsystem (IMS) seems to be
the technology that will prevail in Next Generation Networks (NGNs). The users wish to communicate
through collections of networks using different protocols; rendering service mapping from one network to
another with the similar QoS is a complex issue thereby. The heterogeneous networks are collections of
communication platforms using different protocols. This heterogeneity implies the need to offer many
different services on the market within short time. In this paper we propose a heterogeneous network model
based on the IMS that provides guaranteed QoS. Our method presents, in the first, an informational
solution. Decisional information is added to the HSS basis to enrich the knowledge base, which is
expressed under the form of "profile of QoSR", where the new information informs directly the decisions to
be taken according to the user’s profile (preferences QoS and pricing, bandwidth, location ...). In the
second, a solution for multi provider’s context which can allow a subscriber to register with one or more
operator(s) according to QoS offered. Thirdly, a mechanism which can be deployed in heterogeneous
networks to preserve the original QoS values of the user session and thus eliminate the cumulative effect of
QoS rounding across the entire communication path. And it is feasible via the “Interworking QoS
Management Sub-network” while adding the new interworking management components, namely: SICs,
DIC, QPA AS and HSS-PQoSR.
This document compares the performance of HS-TCP and TCP in a hierarchical mobile IPv6 (HMIPv6) network. It summarizes a simulation conducted using the Network Simulator 2 (NS-2) to model an HMIPv6 topology with one home agent, two foreign agents, one mobile node, and one correspondent node. The simulation measured throughput as the mobile node moved between the foreign agents while communicating with the correspondent node. The results showed that HS-TCP had better throughput than TCP, with HS-TCP performing 32-96% better depending on the bandwidth level.
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSIJCI JOURNAL
Access network architecture and media access control technique are the requirements of beyond 3G mobile
communication systems for B3G systems [1]. The proposed novel access network architecture is that the network complexity is minimized and maximizes system performance. The Centralized mini-slot packet reservation multiple access (CMPRMA based on OFDMA is proposed which not only can acquire the advantages or good assets of MPRMA and support or guide Real-time traffic in well manner but can also give the resource reservation scheme for data traffic and support transmission for data traffic efficiently.
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
This document describes a new routing protocol called MCS-RPL for mobile crowd sensing applications in smart cities. MCS-RPL is based on the RPL routing protocol and introduces improvements to address RPL's issues with mobility support. It utilizes a clustering mechanism and 2D grid structure to reduce control overhead from frequent topology changes. The performance evaluation shows MCS-RPL delivers a higher packet delivery ratio and lower power consumption compared to RPL, with reductions in control packet overhead of over 75% in tested scenarios. MCS-RPL provides an alternative for mobile devices in smart city applications to opportunistically send collected sensor data to a central server without using cellular networks.
Pantech offers b.tech and m.tech projects for engineering students.We support on MIMO concepts, OFDM, CR Networks, 4G and 5 G, NS3, IoT with NS3, VANET, MANET
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
"Evaluating content-centric networking over PLC infrastructure for smart grids" (ci-joint), cet article sera présenté à la conférence AWICT du 07 au 09 Octobre 2015 (http://www.awict.net/)
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile systems face challenges when connecting to Next Generation Networks (NGN) due to differences between circuit-switched mobile networks and the IP-based NGN. A new Base Station Gateway is proposed to provide these connections. NGN aims to reduce costs and offer integrated services via common IP technology, while mobile networks have evolved through generations based on circuit switching and packet technologies. Connecting mobile networks to the NGN backbone allows access to NGN services but requires protocol conversion through mobile media gateways.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
An enhanced group mobility protocol for 6 lowpan based wireless body area net...Kamal Spring
The document proposes an enhanced group mobility protocol for 6LoWPAN-based wireless body area networks (WBANs) to reduce handoff delay and signaling costs. It describes how proxy mobile IPv6 (PMIPv6) can be used to manage network-based mobility but has limitations for group-based WBAN mobility. The proposed protocol uses a new format for router solicitation and router advertisement messages that can carry information for multiple sensor identifiers, reducing the number of control messages needed during handoffs. Simulation results show the proposed protocol reduces handoff delay, signaling costs, packet loss, and overhead on the mobile access gateway compared to existing group-based PMIPv6 protocols.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
An overview of internet engineering task force mobility management protocols...IJECEIAES
In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...IOSR Journals
The document discusses handoff management protocols for 4G wireless networks, specifically Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). It provides an overview of handoff processes including network discovery, decision, and execution. It then describes MIPv6, noting it allows continuous communication but can cause interruptions and signaling overhead during handoffs. Finally, it introduces HMIPv6 which aims to reduce signaling traffic and handoff latency by handling local mobility within a region separately from global mobility.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
- The document discusses developing quality of service (QoS) in Internet of Things (IoT) networks by using priority routing for real-time data.
- It proposes a novel solution that integrates mobile ad hoc networks (MANETs) to improve delivery of high priority real-time application data over low latency MANET paths.
- Experimental results showed the proposed approach was effective in reducing network overhead and congestion, while also improving routing protocol performance in terms of packet delay and throughput.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Optimal Coverage Path Planningin a Wireless Sensor Network for Intelligent Tr...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent T...IJCNCJournal
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
Devices in a beacon-enabled network use slotted CSMA/CA to contend for channel usage. Each node in the network competes for the channels when ready to transmit data. The slotted CSMA/CA mechanism based on the super-frame structure fairly provides communication chance for each node and makes a reasonable usage of the available energy in beacon-enabled Zigbee networks. When wireless nano-sensor nodes are implanted into the target human body area for detecting disease symptoms or virus existence, each node also requires a similar characteristic in channel sharing and in the transmission of event-driven data with a short length. In this paper, we suggest a wireless network model with nano-sensor nodes for the in-body application. We propose a novel MAC protocol derived from an existing Zigbee MAC protocol scheme and analyze the performance of energy usage with variable super-frame durations and packet sizes.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
This document summarizes a research paper that proposes improvements to distributed mobility management (DMM) in software defined networking (SDN) and network functions virtualization-based mobile network architectures. The paper presents a new "Software defined plus virtualization featured Mobile Network (S+ MN)" architecture that uses SDN controllers and virtualization to distribute gateway functions. This allows for more efficient mobility management across heterogeneous networks, removal of IP address preservation chains during handovers, and optimal data path management according to application needs. The paper then evaluates the S+ MN architecture in terms of inter-system handover performance relative to control plane delay requirements for 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications such as mobile crowd sensing, real time mobile health monitoring, mobile social network in proximity and so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and computation power, the frequent usage of high
performance multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device. Although numerous previous researchers have tried to overcome the resource intensive issues in mobile embedded service provisioning domain, most of the efforts were constrained because of the underlying resource intensive technologies. This paper presents a lightweight mobile Web service provisioning framework for mobile sensing which utilises the protocols that were designed for constrained Internet of Things environment. The prototype experimental results show that the proposed framework can provide higher throughput and less resource consumption than the traditional mobile Web service frameworks.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Lightweight Mobile Web Service Provisioning for the Internet of Things Mediat...ijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...acijjournal
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET), when two
or more of these devices find themselves within transmission range. MANETs are stand-alone (no existing
infrastructure needed), autonomous networks that utilise multi-hop communication to reach nodes out of
transmitter range. Unlike infrastructure networks e.g. the Internet with fixed topology, MANETs are
dynamic. Despite the heterogeneous nature of these two networks, integrating MANETs with the Internet
extends the network coverage area of the Internet, and adds to the application domain of MANETs. One of
the many ways of combining MANETs with the Internet, is the use of Mobile Internet Protocol (Mobile IP)
alongside a MANET routing protocol, to route packets between the Internet and the MANET, via Gateway
agents. In this paper, we evaluate the performance of Mobile IP on MANET in Network Simulator 2 (NS2).
We have implemented Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand
Multiple Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols, and compared performances based on Throughput, End-to-End Delay (E2ED), Packet Delivery
Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results suggest that, on-demand routing
within the MANET better serves Mobile IP on MANETs.
Similar to Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT (Adnan J. Jabir)
1895
should install complex mobility protocols. In addition, in case where an MN has no capability to transmit the
mobility related signaling, host-centric mobility management protocols will be no longer functional [10].
Therefore, methods for relieving MNs from participating in mobility process and reducing handoff latency,
packet loss, and communication path are indeed essential for the IoT [11].
Proxy Mobile IPv6 (PMIPv6) [12] was standardized by the IETF NETLMM working group as a
network-based mobility management protocol to solve these problems associated to the host-based protocols
by relocating the mobility procedure from MNs to the network components. PMIPv6 adds two functional
entities which are the Mobile Access Gateway (MAG) and the Local Mobility Anchor (LMA). The main role
of LMA is to maintain reachability to the MN address while it moves in the local PMIPv6 domain. The MAG
is responsible for detecting the MN movements and initiating the required signaling to register the MN with
the LMA.
The salient feature of the PMIPv6 is its network-based attribute, in which, the network detects the
node mobility and initiates the required mobility signals, so that, it relieves the MN from participating in the
handoff process. This feature allows MNs which installed only the conventional IP protocol to roam freely
between wireless networks without any need for the installation of complicated mobility management
protocols [13]. Considering both the network-based feature of PMIPv6 and the low capabilities of WSN
which makes the use of host-based mobility protocols like MIPv6 insufficient; researchers are motivated to
use PMIPv6 for managing the WSN mobility. For example, the SPMIPv6 was proposed by Islam in [14] as
an adaptation of the PMIPv6 protocol.
Although PMIPv6 fits with the WSN needs as it reduces the signaling cost, mobility cost, and the
level of energy consumption. However, in PMIPv6, for each node a separate handoff signaling should be
exchanged between MAG and LMA to register the MN’s new location. This may cause an extensive network
signaling if there is a large number of moving MNs [15].
Several research works were done to reduce the signaling overhead by introducing the bulk
registration principles. By using the bulk registration, a single binding message is required to register a
number of MNs which are moving together from one MAG to another. However, MNs are not always
moving together between two MAGs, they may move at the same time among different MAGs. These MNs
do not share any common property that allows the conventional bulk schemes to register them by a single
bulk message. In this paper, we propose a new bulk registration scheme based on the Clustered Sensor
PMIPv6 (CSPMIPv6) [16] architecture, named BCSPMIPv6, to address the problem of MNs registrations
which are moving at the same time but between different MAGs. Although MNs move among different
MAGs, a group of these MNs belong to the same cluster. Thus, the clustering principle provides the required
common property for those MNs in order to create a single bulk registration message.
2. RELATED WORK
Reducing the handoff signaling cost for the MNs which are moving together was addressed by
several researches. The mobile node group identifier was first introduced in [17] to identify a set of mobile
nodes which have common characteristics. It provides performing the required binding update function for a
set of MNs using only a single binding message rather than using multiple atomic binding per mobile node.
The mobile node group identifier is exchanged between LMA and MAGs and can be used to optimize the re-
registration or revocation functions for a set of MNs. The bulk re-registration allows MAGs to extend the
binding life time for a set of MNs belong to the same group by requesting a bulk re-registration message. In
this case, the re-registration messages are independent on the number of MNs; instead it depends on the
number of MAGs [18].
To optimize the bulk message size, authors in [15] proposed a new optimized bulk message format
based on the bitmap structure. In the conventional bulk registration, the message is built by simply
concatenating multiple PBU messages tied for the MNs which are belonging to the same group. In this case,
the mobility options are repeated for each MN which enlarges the bulk message size. Instead, by using the
bitmap structure, only a single instance of the mobility options is added to the bitmap matrix. Hence, the bulk
message size is reduced and there will be no need for breaking the bulk message into multiple parts to avoid
the packet drop.
Reducing the number of binding update messages for a numerous number of MNs moving together
has attracted researchers to apply the bulk registration principles into the network mobility domains. Authors
in [19] introduced a bulk binding update to the intelligent transportation systems where a number of mobile
routers are moving between access networks. By assigning a mobile node group identifier to this set of
moving routers, the overall signaling overhead required during the periodic binding update is reduced.
When mobile router moves between MAGs in the LMA domain, a large number of binding update
and binding acknowledgement messages is required to be exchanged for MNs registration or update their
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1894 - 1901
1896
new locations. Since these MNs are moving together as a single unit, authors in [20], [21] introduced the use
of bulk registration to combine individual binding messages of all nodes in mobile network and sends them
together as a single binding message. Heading this way, handoff time and number of signaling messages to
be exchanged during mobile network movement are reduced.
The conventional bulk scheme solves the group mobility scenarios, where a group of MNs move
between two MAGs, by introducing the bulk PBU and PBA messages to register a group of MNs using a
single bulk message. In many scenarios, as shown in Figure 1, MNs may move individually among different
MAGs, but they move at the same time. However, the current solutions are not able to use the bulk
registration for such mobility scenario since there is no common characteristic shared by these MNs. This is
due to the distribution of MNs among different MAGs which makes it difficult to create a single bulk
message for these MNs. Therefore, the case when a number of MNs belonging to different MAGs, move at
the same time to other MAGs need to be addressed to enhance the PMIPv6 performance.
Figure 1. Node mobility scenarios
3. PROPOSED SCHEME
In this section, the CSPMIPv6 architecture with it signaling and control messages are presented first,
and then we deliberate on the proposed bulk registration scheme.
3.1. CSPMIPv6 architecture
The main idea behind the CSPMIPv6 is to divide the PMIPv6 domain into a number of local sub-
domains. Each sub-domain is represented as a cluster which constitutes a group of MAGs with a one Head
MAG (HMAG). The HMAG is one of the LMA’s domain MAGs which is elected to play the role of a cluster
head [16].
The main roles of the HMAG are: providing a local mobility management for each cluster, reducing
the handoff latency for the MNs moving inside the cluster, and is used to provide a sufficient buffering
scheme for the MNs during the handoff process [16].
In CSPMIPv6, a number of messages should be exchanged among entities to perform the
registration and handoff processes. These messages include the Proxy Binding Update (PBU), Proxy Binding
Acknowledge (PBA), Local PBU (LPBU), Local PBA (LPBA). In addition, all the LMA, HMAGs, and the
MAGs maintain their own binding list to store the required information of the MN’s current location [16].
The PBU and PBA are used to register the MN with the LMA in the same manner of the [12], while the
LPBU and the LPBA are used between MAGs and their HMAGs for the local MN’s registration.
When MN enters the CSPMIPv6 domain for the first time, the registration of the MN’s information
in the MAG, HMAG, and the LMA is required, as follows: once a MAG detects an attachment of an MN, it
sends an LPBU request to its HMAG contains the MN identifier (MN-ID). Upon receiving the LPBU by
HMAG, it searches its BUL for an MN entry. Since it is a new MN registration process, the HMAG will not
find a matching MN entry. Therefore, the HMAG sends a PBU request to the LMA containing the MN’s
4. Int J Elec & Comp Eng ISSN: 2088-8708
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT (Adnan J. Jabir)
1897
identifier and the requesting HMAG. Upon receiving the PBU, the LMA creates a new BCE for the MN and
sends a PBA message back to the requesting HMAG. Then the LMA sets up a global bidirectional tunnel
with the corresponding HMAG to be used for routing the traffic to and from the MN. Upon receiving the
PBA message, the HMAG registers the MN in its BUL and sends an LPBA message back to the
corresponding MAG containing the MN prefix. Then the HMAG configures a local tunnel with the MAG to
be used for routing the packets destined to the MN. Upon receiving the LPBA by the requesting MAG, it
registers the MN in its BUL and sends a router advertisement message to the requesting node.
3.2. Bulk CSPMIPv6 scheme
Conventional bulk schemes assume that MNs move as a group from one or more MAGS to one
destination MAG. As it can be seen from Figure 2, when a MAG detects the attachment of a group of MNs, it
creates one bulk PBU message to register these MNs with LMA [15]. However, if a number of MNs move at
the same time among different MAGs such that a single MN moves to one MAG, the LMA receives a
number of PBU equals to the number of the attached MNs, as shown in Figure 3. Thus, we propose a bulk
scheme which can cope with this case by creating a single bulk message for MNs move among different
MAGs.
Figure 2. Bulk Registration Signaling
Figure 3. Single Registration per MN
The proposed scheme is designed based on the CSPMIPv6 architecture to reduce the extensive
network signaling by using a single bulk binding message for every group of MNs which have a common
property. By introducing the bulk registration to the CSPMIPv6 architecture, the case when MNs move
individually among different MAGs can be solved by utilizing the HMAG entity. As shown in Figure 4,
when MNs move among different MAGs, each MAG sends a single LPBU message to the HMAG which in
turn collects all these requests and creates a single bulk PBU message to the LMA.
In the proposed scheme, when a group of MNs move between two MAGs belonging to one or more
clusters, the new MAG sends a single bulk LPBU to its HMAG for the MNs group registration. If the source
and destination MAGs belong to the same cluster, the HMAG replies by a single bulk PBA message for this
group registration. Adversely, if the MAGs belong to different clusters, the HMAG sends a bulk PBU to the
LMA. On the other hand, when MNs move between MAGs belonging to different clusters, each MAG sends
a normal or bulk LPBU to the HMAG which in turn sends a bulk PBU to the LMA for these MNs
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1894 - 1901
1898
registrations. The HMAG collects the PBU requests from its attached MAGs and sends it as a single bulk
PBU message to the LMA.
Figure 4. Proposed Bcspmipv6 Bulk Scheme Signaling
4. PERFORMANCE EVALUATION
In this section, the performance of the proposed BCSPMIPv6 is evaluated and compared against the
basic PMIP and the conventional bulk schemes (BPMIPv6), in terms of total handoff latency.
4.1. Analytical model
In this section, the total Handoff Latency (HL) is derived to compare the performance of the
proposed BCSPMIPv6 with the basic PMIPv6 and BPMIPv6 schemes. It is necessary to mention here that
we focus on the intra-domain mobility only (i.e. the MN moves within the same LMA domain). In addition,
for the proposed BCSPMIPv6 scheme we consider both the intra- and inter-cluster mobility within the same
domain. The performance notations used in the analysis, are presented in Table 1.
Table 1: Parameters for Performance Analysis
Parameter Description
Cx-y Hop count between nodes x and y
Sctrl Size of a control packet (byte)
Size of bulk message for MAGi or HMAGi
IPhs IPv6 packet header size
MNci Number if MNs in MAGi or HMAGi
t Unit transmission cost of packet per a wired link
Bw Link bandwidth
HLx Handoff Latency for x protocol
4.2. Signaling cost analysis
In this section, the MN’s handoff latency is derived for all schemes under consideration. We assume
the distance between any two entities is symmetric. In addition to simplify the mathematical calculations, we
are not going to consider the AAA functions and the processing cost for LMA, MAGs, HMAGs, and the
intermediate routers.
4.2.1. Basic PMIPv6
In the basic PMIPv6 protocol, the location update is performed by exchanging the PBU and PBA
messages between the LMA and MAGs when the MN moves from one MAG to another, which can be
derived as follows:
(1)
4.2.2. BPMIPv6
In BPMIPv6 scheme, the bulk PBU and PBA messages are exchanged between MAGs and LMA to
register the MNs which are moving as a group between MAGs. Therefore, the handoff latency for BPMIPv6
6. Int J Elec & Comp Eng ISSN: 2088-8708
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT (Adnan J. Jabir)
1899
can be derived as follows:
∑ (2)
( ) (3)
4.2.3. BCSPMIPv6
In BCSPMIPv6, the intra-cluster mobility is controlled by HMAG through exchanging the
LPBU/LPBA messages with its attached MAGs. On the other hand, the inter-cluster mobility requires the
involvement of LMA to update the MN’s information using the PBU and PBA messages. Accordingly, the
total handoff latency, which is the sum of intra-cluster handoff and inter-cluster handoff signaling costs, can
be derived as follows:
∑ ∑ (4)
5. NUMERICAL RESULTS
The numerical results based on the derivations in the previous section are presented here. The
assumptions and parameter values used in this research are shown in Table 2. In addition, a simulator has
been designed to simulate the MN mobility based on fluid-flow mobility model, in which, MNs are rarely
changing their speed and directions. The number of MNs crossing MAGs at every simulation time is
obtained by the simulator.
Table 2: Parameters Values
Parameter Default Value
t 2
v 25 (m/s)
R 500 (m)
Sctrl 96 bytes
IPhs 40 bytes
CMAG-LMA 16
CMAG-MAG √
MNc 1000
Mobility model Fluid-flow
Figure 5 shows the effect of the wired link delay on the handoff latency. It can be clearly seen that
the handoff latency of all schemes is increased with the increment of the wired link delay. However,
BCSPMIPv6 performs better than other schemes because of the reduction of the signaling required for
performing the inter- and intra-cluster mobility.
Figure 5. Impact of Wired Link Delay on the Handoff Latency
The handoff latency is proportional to the number of hopes between the communicating entities.
Figure 6 shows the impact of LMA-MAG distance on the handoff latency. The basic PMIPv6 incurs the
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1894 - 1901
1900
highest handoff latency due to its highly dependent on the LMA. The low effect of the distance on the
BCSPMIPv6 is due to the use of bulk registration for the inter-cluster mobility and the exclusion of LMA
from participating in the intra-cluster operations.
The handoff latency is also affected by the number of MNs moving between MAGs, which is shown
in Figure 7. It can be seen that when the number of MNs increased, the handoff delay is increased for all
schemes. However, BCSPMIPv6 presents the lowest handoff delay due to rely the intra-cluster mobility on
the HMAGs and the use of bulk registration for the inter-cluster mobility.
Figure 6. Impact of LMA-MAG Distance on the Handoff Latency
Figure 7. Impact of the Number of MNs on the Handoff Latency
6. CONCLUSIONS
In this paper, the BCSPMIPv6 is proposed as a new bulk scheme based on the CSPMIPv6
architecture to reduce the total handoff latency. The main idea of the clustered PMIPv6, which is the base of
BCSPMIPv6, is to divide the proxy domain into sub-domains formed as clusters, such that the intra-cluster
handoff is performed locally by the HMAG which thereby leads to low handoff latency. In our proposed
BCSPMIPv6 scheme, the MNs which are moving among different MAGs at the same time are registered by
using a single bulk PBU message. Our analysis and numerical results prove that the proposed BCSPMIPv6
scheme outperforms the previous work including the basic PMIPv6 and the conventional bulk scheme
BPMIPv6 in terms of handoff latency. Future investigations could focus on the implementation of the
BCSPMIPv6 scheme to validate its scalability using a high and random mobility environment.
REFERENCES
[1] Jamali, M.S., P. Kumar, and U.A. Khan, "Internet of Things: Architecture & Integration with Other Networks,"
First International Conference on Modern Communication & Computing Technologies (MCCT'14), 2014.
[2] Akyildiz, I.F., et al., "Wireless sensor networks: a survey," Computer networks, vol. 38(4), pp. 393-422, 2002.
[3] Mahyastuty, Veronica Windha, and M. Sigit Arifianto, "Wireless Sensor Network over High Altitude Platform."
Telecommunication, Computing, Electronics and Control (TELKOMNIKA), vol. 16(1), pp. 129-133, 2018.
[4] Rodrigues J.J. and P.A. Neves, "A survey on IP‐based wireless sensor network solutions," International Journal of
Communication Systems, 23(8), pp. 963-981, 2010.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT (Adnan J. Jabir)
1901
[5] Zinonos Z. and V. Vassiliou, "Inter-mobility support in controlled 6LoWPAN networks," in GLOBECOM
Workshops (GC Wkshps). 2010: IEEE.
[6] Chen Y.-S., C.-S. Hsu, and H.-K. Lee, "An enhanced group mobility protocol for 6LoWPAN-based wireless body
area networks," In Wireless Communications and Networking Conference (WCNC). 2013: IEEE.
[7] Johnson D., C. Perkins, and J. Arkko, "Mobility support in IPv6," IETF RFC 3775, 2004.
[8] Soliman H., L. Bellier, and K.E. Malki, "Hierarchical mobile IPv6 mobility management (HMIPv6),", IETF RFC
4140, 2005.
[9] Koodli, R., "Fast handovers for mobile" IPv6, IETF RFC 4068, 2005.
[10] Jabir A.J., Shamala S., Zuriati Z. and Hamid N.," A comprehensive survey of the current trends and extensions for
the proxy mobile IPv6 protocol," IEEE Systems Journal, 2015.
[11] Bojkovic Z., B. Bakmaz, and M. Bakmaz, "Some Challenging Issues for Internet of Things Realization,"
Proceedings of the 12th International Conference on Data Networks, Communications, Computers (DNCOCO '13),
March 2013.
[12] Gundavelli S., et al., "Proxy mobile ipv6," IETF RFC 5213, 2008.
[13] Hashim, Aisha, Azana Hafizah Mohd Aman, and Huda Adibah Mohd Ramli. "Throughput and Handover Latency
Evaluation for Multicast Proxy Mobile IPV6," Bulletin of Electrical Engineering and Informatics (BEEI), vol. 6(4),
pp. 311-316, 2017.
[14] Islam M.M. and E.-N. Huh, "Sensor proxy mobile IPv6 (SPMIPv6)—A novel scheme for mobility supported IP-
WSNs," Sensors, vol 11(2), pp. 1865-1887, 2011.
[15] Jeyatharan M. and C.-W. Ng, "Bulk PBU using Bitmaps", 2009.
[16] Jabir, A.J., et al., "A cluster-based proxy mobile IPv6 for IP-WSNs," EURASIP Journal on Wireless
Communications and Networking, pp. 1-17, 2012.
[17] Gundavelli S., et al., "Mobile Node Group Identifier option," 2009.
[18] Krishnan S., et al., "Bulk Re-registration for Proxy Mobile IPv6," 2009.
[19] Vasu K., S. Mahapatra and C. Kumar, "Bulk Binding Update Procedure for Pmipv6 Based Intelligent Tansportation
Systems" 2012.
[20] Jebaseeli S.A. and J. Sundararajan, "Reducing Binding update in NEMO Supported PMIPV6," International
Journal of Computer Trends and Technology (IJCTT), vol. 6(3), pp.150-157, 2013.
[21] Guan, Jianfeng, Ilsun You, Changqiao Xu, and Hongke Zhang, "The PMIPv6-Based Group Binding Update for IoT
Devices," Mobile Information Systems, 2016.
BIOGRAPHY OF AUTHORS
Adnan J. Jabir received the B.Sc. and M.Sc. degrees in Computer Science from the University of
Baghdad, Iraq in 1995 and 1998, respectively. He received his Ph.D. degree at the Department of
Communication Technology and Networks, Faculty of Computer Science and Information
Technology, University Putra Malaysia (UPM), Malaysia in 2015. He is currently a senior lecturer
at University of Baghdad, college of Science, computer Science Department. His major research
interests are wireless sensor networks, ubiquitous computing, and network mobility management.