Wireless sensor networks (WSN) is an important future technology, in several applications in military,
health, environment and industries. Currently the integration of social and sensor is very important by
considering the characteristics of social networks in designing wireless sensor networks WSN for
improvement such as (number of messages from source to destination, radius of coverage, connectivity, and
spreading). This area has not received much attention and few researches focus on the performance
evaluation. In this paper we have studied the impact of different mobility and distribution models which is a
variable one should define which model is best for the infrastructure given their differences, also study
include the exact effect of nodes distribution and analyzed by calculation the number of messages of 12
cases to get a real performance evaluation under different conditions and same routing techniques. This
work provides us a greater understanding and clear an idea of the effect of mobility plus distribution.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Measuring and Predicting Departures from Routine in Human MobilityDirk Gorissen
Understanding human mobility patterns is a significant research endeavor that has recently received considerable attention. Developing the science to describe and predict how people move from one place to another during their daily lives promises to address a wide range of societal challenges: from predicting the spread of infectious diseases, improving urban planning, to devising effective emergency response strategies. This presentation will discuss a Bayesian framework to analyse an individual’s mobility patterns and identify departures from routine. It is able to detect both spatial and temporal departures from routine based on heterogeneous sensor data (GPS, Cell Tower, social media, ..) and outperforms existing state-of-the-art predictors. Applications include mobile digital assistants (e.g., Google Now), mobile advertising (e.g., LivingSocial), and crowdsourcing physical tasks (e.g., TaskRabbit).
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Measuring and Predicting Departures from Routine in Human MobilityDirk Gorissen
Understanding human mobility patterns is a significant research endeavor that has recently received considerable attention. Developing the science to describe and predict how people move from one place to another during their daily lives promises to address a wide range of societal challenges: from predicting the spread of infectious diseases, improving urban planning, to devising effective emergency response strategies. This presentation will discuss a Bayesian framework to analyse an individual’s mobility patterns and identify departures from routine. It is able to detect both spatial and temporal departures from routine based on heterogeneous sensor data (GPS, Cell Tower, social media, ..) and outperforms existing state-of-the-art predictors. Applications include mobile digital assistants (e.g., Google Now), mobile advertising (e.g., LivingSocial), and crowdsourcing physical tasks (e.g., TaskRabbit).
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited
sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment
algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage
degree constraint of environment while preserving connectivity. The problem is formulated as coverage
maximization subject to connectivity and sensing coverage degree constraint. Considering a desired
distance between neighbouring nodes, an error function which depends on pairwise distance between
nodes is described. The maximization is encoded to an error minimization problem that is solved using
gradient descent algorithm and will yield in moving sensors into appropriate positions. Simulation results
are presented in two different conditions that importance of sensing coverage degree support of
environment is very high and is low.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobility models for delay tolerant network a surveyijwmn
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the
environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route
data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and
application protocols are highly dependent on the underlying mobility of nodes and its characteristics.
Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate DTN
protocols across many scenarios. In DTN mobility modelling literature, a number of mobility models have
been developed based on synthetic theory and real world mobility traces. Furthermore, many researchers
have developed specific application oriented mobility models. All these models do not provide accurate
evaluation in the all scenarios. Therefore, model selection is an important issue in DTN protocol
simulation. In this study, we have summarized various widely used mobility models and made a comparison
of their performances. Finally, we have concluded with future research directions in mobility modelling for
DTN simulation.
A new approach for area coverage problem in wireless sensor networks with hyb...ijmnct
One of the most important and basic problems in Wireless Sensor Networks (WSNs) is the coverage
problem. The coverage problem in WSNs causes the security environments is supervised by the existing
sensors in the networks suitably. The importance of coverage in WSNs is so important that is one of the
quality of service parameters. If the sensors do not suitably cover the physical environments they will not
be enough efficient n supervision and controlling. The coverage in WSNs must be in a way that the energy
of the sensors would be the least to increase the lifetime of the network. The other reasons which had
increase the importance of the problem are the topologic changes of the network which are done by the
damage or deletion of some of the sensors and in some cases the network must not lose its coverage. SO, in
this paper we have hybrid the Particle Swarm Optimization (PSO) and Differential Evolution (DE)
algorithms which are the Meta-Heuristic algorithms and have analyzed the area coverage problem in
WSNs. Also a PSO algorithm is implemented to compare the efficiency of the hybrid model in the same
situation. The results of the experiments show that the hybrid algorithm has made more increase in the
lifetime of the network and more optimized use of the energy of the sensors by optimizing the coverage of
the sensors in comparison to PSO.
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynamically to changes in the environmental conditions, which may affect the visualisation performance by continuously updating the application domain model in a distributed manner. Finally, a distributed self-adaptation function is proposed with the goal of saving more power and generating more accurate data visualisation. We conduct comprehensive experimentation to evaluate the performance of our mapping service and show that it achieves low communication overhead, produces maps of high fidelity, and further minimises the mapping predictive error dynamically through integrating the application domain model in the mapping service.
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...ijdpsjournal
Next generation networks will certainly face requesting access from different parts of the
network. The heterogeneity of communication and application software’s changing situations in
the environment, from the users, the operators, the business requirements as well as the
technologies. Users will be more and more mobile, protocols, etc. will increase and render the
network more complex to manage. Opportunistic communication has emerged as a new
communication paradigm to cope with these problems. Opportunistic networksexploits the
variation of channel conditions, provides an additional degree of freedom in the time domain and
increase network performance.The limited spectrum and the inefficiency in the spectrum usage
require such a new communication to exploit the existing wireless spectrum opportunistically by
allocation of spectrum based on best opportunity among all possibilities
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
To have the ability to “think outside the box” is generally regarded as something positive. At a moment in time when resources are scarce, and the problems facing us are many, innovation and professional excellence becomes a requirement, rather than a matter of choice. At the core of our attempts to come up with new, and better solutions are the digital technologies. Within the structural engineering context, the different types of off-the-shelf packages for finite element analysis play a central role. These “black-box” types of software packages exemplify how user-friendliness may have harmful consequences within a field where knowledge and the successful mastery of relevant skills is key, and consequently- ignorance may lead to fatal results. These tools make any effort “venturing outside” difficult to achieve. A technical paradigm shift is called for- that places learning and creative, informed exploration at the heart of the user experience. Presented during the Knowledge Based Engineering session of the 19th IABSE congress entitled "Challenges in Design and Construction of an Innovative and Sustainable Built Environment" held in Stockholm, September 21-23, 2016.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTijwmn
WLAN has lately been applied to the problem of mobility tracking and behavior analysis. To further the development of the studies in this direction the positioning system that can perform on the network side with minimal human participation is needed. One of the current limitations is the requirement on the number of reference signal available. Thus, methods that require fewer reference signals for positioning are needed. This paper provides the comparison of WLAN based positioning methods that can operate with a single AP.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
Given a 3D space where should be supervised and a group of mobile sensor actor nodes with limited
sensing and communicating capabilities, this paper aims at proposing a distributed self-deployment
algorithm for agents to cover the space as much as possible by considering non-uniform sensing coverage
degree constraint of environment while preserving connectivity. The problem is formulated as coverage
maximization subject to connectivity and sensing coverage degree constraint. Considering a desired
distance between neighbouring nodes, an error function which depends on pairwise distance between
nodes is described. The maximization is encoded to an error minimization problem that is solved using
gradient descent algorithm and will yield in moving sensors into appropriate positions. Simulation results
are presented in two different conditions that importance of sensing coverage degree support of
environment is very high and is low.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobility models for delay tolerant network a surveyijwmn
Delay Tolerant Network (DTN) is an emerging networking technology that is widely used in the
environment where end-to-end paths do not exist. DTN follows store-carry-forward mechanism to route
data. This mechanism exploits the mobility of nodes and hence the performances of DTN routing and
application protocols are highly dependent on the underlying mobility of nodes and its characteristics.
Therefore, suitable mobility models are required to be incorporated in the simulation tools to evaluate DTN
protocols across many scenarios. In DTN mobility modelling literature, a number of mobility models have
been developed based on synthetic theory and real world mobility traces. Furthermore, many researchers
have developed specific application oriented mobility models. All these models do not provide accurate
evaluation in the all scenarios. Therefore, model selection is an important issue in DTN protocol
simulation. In this study, we have summarized various widely used mobility models and made a comparison
of their performances. Finally, we have concluded with future research directions in mobility modelling for
DTN simulation.
A new approach for area coverage problem in wireless sensor networks with hyb...ijmnct
One of the most important and basic problems in Wireless Sensor Networks (WSNs) is the coverage
problem. The coverage problem in WSNs causes the security environments is supervised by the existing
sensors in the networks suitably. The importance of coverage in WSNs is so important that is one of the
quality of service parameters. If the sensors do not suitably cover the physical environments they will not
be enough efficient n supervision and controlling. The coverage in WSNs must be in a way that the energy
of the sensors would be the least to increase the lifetime of the network. The other reasons which had
increase the importance of the problem are the topologic changes of the network which are done by the
damage or deletion of some of the sensors and in some cases the network must not lose its coverage. SO, in
this paper we have hybrid the Particle Swarm Optimization (PSO) and Differential Evolution (DE)
algorithms which are the Meta-Heuristic algorithms and have analyzed the area coverage problem in
WSNs. Also a PSO algorithm is implemented to compare the efficiency of the hybrid model in the same
situation. The results of the experiments show that the hybrid algorithm has made more increase in the
lifetime of the network and more optimized use of the energy of the sensors by optimizing the coverage of
the sensors in comparison to PSO.
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
This paper presents a distributed information extraction and visualisation service, called the mapping service, for maximising information return from large-scale wireless sensor networks. Such a service would greatly simplify the production of higher-level, information-rich, representations suitable for informing other network services and the delivery of field information visualisations. The mapping service utilises a blend of inductive and deductive models to map sense data accurately using externally available knowledge. It utilises the special characteristics of the application domain to render visualisations in a map format that are a precise reflection of the concrete reality. This service is suitable for visualising an arbitrary number of sense modalities. It is capable of visualising from multiple independent types of the sense data to overcome the limitations of generating visualisations from a single type of sense modality. Furthermore, the mapping service responds dynamically to changes in the environmental conditions, which may affect the visualisation performance by continuously updating the application domain model in a distributed manner. Finally, a distributed self-adaptation function is proposed with the goal of saving more power and generating more accurate data visualisation. We conduct comprehensive experimentation to evaluate the performance of our mapping service and show that it achieves low communication overhead, produces maps of high fidelity, and further minimises the mapping predictive error dynamically through integrating the application domain model in the mapping service.
AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNI...ijdpsjournal
Next generation networks will certainly face requesting access from different parts of the
network. The heterogeneity of communication and application software’s changing situations in
the environment, from the users, the operators, the business requirements as well as the
technologies. Users will be more and more mobile, protocols, etc. will increase and render the
network more complex to manage. Opportunistic communication has emerged as a new
communication paradigm to cope with these problems. Opportunistic networksexploits the
variation of channel conditions, provides an additional degree of freedom in the time domain and
increase network performance.The limited spectrum and the inefficiency in the spectrum usage
require such a new communication to exploit the existing wireless spectrum opportunistically by
allocation of spectrum based on best opportunity among all possibilities
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
Recent advances in wireless communication have made it possible to develop low-cost, and low power Wireless Sensor Networks (WSN). The WSN can be used for several application areas (e.g., habitat monitoring, forest fire detection, and health care). WSN Information Extraction (IE) techniques can be classified into four categories depending on the factors that drive data acquisition: event-driven, time-driven, query-based, and hybrid. This paper presents a survey of the state-of-the-art IE techniques in WSNs. The benefits and shortcomings of different IE approaches are presented as motivation for future work into automatic hybridization and adaptation of IE mechanisms.
To have the ability to “think outside the box” is generally regarded as something positive. At a moment in time when resources are scarce, and the problems facing us are many, innovation and professional excellence becomes a requirement, rather than a matter of choice. At the core of our attempts to come up with new, and better solutions are the digital technologies. Within the structural engineering context, the different types of off-the-shelf packages for finite element analysis play a central role. These “black-box” types of software packages exemplify how user-friendliness may have harmful consequences within a field where knowledge and the successful mastery of relevant skills is key, and consequently- ignorance may lead to fatal results. These tools make any effort “venturing outside” difficult to achieve. A technical paradigm shift is called for- that places learning and creative, informed exploration at the heart of the user experience. Presented during the Knowledge Based Engineering session of the 19th IABSE congress entitled "Challenges in Design and Construction of an Innovative and Sustainable Built Environment" held in Stockholm, September 21-23, 2016.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTijwmn
WLAN has lately been applied to the problem of mobility tracking and behavior analysis. To further the development of the studies in this direction the positioning system that can perform on the network side with minimal human participation is needed. One of the current limitations is the requirement on the number of reference signal available. Thus, methods that require fewer reference signals for positioning are needed. This paper provides the comparison of WLAN based positioning methods that can operate with a single AP.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Develop a mobility model for MANETs networks based on fuzzy Logiciosrjce
The study and research in the field of networks MANETs depends alleged understand the protocols
well of the simulation process before they are applied in the real world, so that we create an environment
similar to these networks. The problem of a set of nodes connected with each other wirelessly, this requires the
development of a comprehensive model and full and real emulator for the movement of the contract on behalf of
stochastic models. Many models came to address the problems of random models that restricted the movement
of decade barriers as well as the signals exchanged between them, but these models were not receiving a lot of
light on the movement of the contract, such as direction, speed and path that is going by the node. The main
goal is to get a comprehensive model and simulator for all parts of the environment of the barriers and
obstacles to the movement of the nodes and the mobile signal between them as well as to focus on the movement
transactions for the node of the direction, speed, and best way. . This research aims to provide a realistic
mobility model for MANET networks. It also addresses the problem of imprecision in social relationships and
the location where we apply Fuzzy logic.
A comparative study on different trust based routing schemes in manetijwmn
A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a selfconfiguring
network. Due to dynamic nature of MANET it is very challenging work to employ a secure
route. The intermediate nodes cooperate with each other as there is no such base station or access point.
The routing protocols play important role in transferring data. Cryptographic mechanisms are used in
routing protocols to secure data packets while transmitted in the network. But cryptographic techniques
incur a high computational cost and can’t identify the nodes with malicious intention. So, employing
cryptographic techniques in MANET are quite impractical as MANETs have limited resource and
vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic
technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust
value on the nodes. In this paper we survey different trust based protocols of MANET and compare their
performances.
Performance Simulation and Analysis for LTESystem Using Human Behavior Queue ...ijwmn
Understanding the nature of traffic has been a key concern of the researchers particularly over the last
two decades and it has been noticed through extensive high quality studies that traffic found in different
kinds of IP/wireless IP networks is human operators . Despite the recent findings of real time human
behavior in measured traffic from data networks, much of the current understanding of IP traffic
modeling is still based on simplistic probability distributed traffic. Unlike most existing studies that are
primarily based on simplistic probabilistic model and traditional scheduling algorithms, this research
presents an analytical performance model for real time human behavior queue systems with intelligent
task management traffic input scheduled by a novel and promising scheduling mechanism for 4G-LTE
system. Our proposed model is substantiated on human behavior queuing system that considers real time
of traffic exhibiting homogeneous tasks characteristics. We analyze the model on the basis of newly
proposed scheduling scheme for 4G-LTE system. We present closed form expressions of expected
response times for real time traffic classes. We develop a discrete event simulator to understand the
behavior of real time of arriving tasks traffic under this newly proposed scheduling mechanism for 4GLTE system . The results indicate that our proposed scheduling algorithm provides preferential treatment
to real-time applications such as voice and video but not to that extent that data applications are starving
for bandwidth and outperforms all other scheduling schemes that are available in the market.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are Optimized Link State Routing protocol, end-to-end delay and packet delivery ratio.
ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS USING DATA FUSION ASSURANCEijwmn
Data fusion techniques reduce total network traffic in a wireless sensor network, since data fusion can
integrate multiple raw data sets into one fused data set. However, the security or assurance of the data
requires more processing power and is an important issue. Increasing the security of the fusion data
increases factors such as power consumption, and packet overhead. Therefore any data fusion assurance
scheme must be power efficient as well as secure. There are currently several methods of data fusion
assurance that have been proposed. Therefore, this paper looks at the current data fusion assurance
methods and proposes new schemes focused on reducing power consumption. In this paper, several data
fusion assurance schemes are also compared to determine which scheme is the most energy efficient.
Het concept flipping the classroom kan ook in trainingen gebruikt worden. Bekijk de slideshare wat het concept inhoudt en wat voor- en nadelen zijn. Hoe werkt het voor jou?
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
Wireless mesh networking gained an international interest over the years as a result to high recognition in
the wireless industry as a cost effective, scalable, wider coverage and capacity capable wireless technology.
The contention based distributed medium access in wireless networks has advanced not only in supporting
the quality of multimedia but also achieving high throughput and to minimize packet delay overheads in
legacy systems. Unfortunately, the impact of such enhancement has not been fully justified with mesh
network environments yet. The medium access frames are required to be contended over multi-hops to
overcome the challenges of improving overall system performance through concurrent transmissions. The
goal of this paper is to discuss the issues and challenges of transmission fairness and the effect of
concurrent transmission on system performance. To mitigate transmission fairness issues, we review
existing open literature on mesh networking and provide guidelines for better system design and
deployment. Finally, we conclude the paper with future research directions. This study may help network
designer and planner to overcome the remaining challenging issues in the design and deployment of WMNs
worldwide.
A new channel coding technique to approach the channel capacityijwmn
After Shannon’s 1948 channel coding theorem, we have witnessed many channel coding techniques developed to achieve the Shannon limit. A wide range of channel codes is available with different complexity levels and error correction performance. Many powerful coding schemes have been deployed in the power-limited Additive White Gaussian Noise (AWGN) channel. However, it seems like we have arrived at an end of advancement path, for most of the existing channel codes. This article introduces a new coding technique that can either be used as the last coding stage of concatenated coding scheme or in parallel configuration with other powerful channel codes to achieve reliable error performance with moderately complex decoding. We will go through an example to understand the overall approach of the proposed coding technique, and finally we will look at some simulation results over an AWGN channel to demonstrate its potential.
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor
networks, based on data mining formulation. The proposed adapting routing scheme for sensors for
achieving energy efficiency from temperature wireless sensor network data set. The experimental
validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network
dataset shows that it is possible to achieve energy efficient environment monitoring for wireless sensor
networks, with a trade-off between accuracy and life time extension factor of sensors, using the proposed
approach.
Rsaodv a route stability based ad hoc on demand distance vector routing prot...ijwmn
High mobility of mobile nodes is one of the major reasons for link failures in mobile ad hoc network (MANET). The present paper aims at proposing modification of well known Ad hoc On demand Distance Vector (AODV) routing protocol for MANET seeking stable route for data transmission and incorporating link break avoidance scheme for such networks. The performance of the proposed routing protocol, named as Route Stability based Ad hoc On demand Distance Vector (RSAODV), is evaluated considering some major performance metrics which include average route life time, throughput, packet delivery fraction, normalized routing load and end–to-end delay. The study is based on simulation runs adopting CBR traffic pattern taking care of node failure scenarios. The performance of RAODV is compared with AODV routing protocol. The simulation runs exhibit significant increase in average route life time, packet delivery fraction and throughput for RSAODV, on the other hand, the normalized routing load and end–to-end delay are reduced for this routing protocol as compared to AODV routing protocol.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...CSCJournals
This paper presents a new approach based on the use of many data collectors, which we designate Mini-Sinks (MSs), instead of a single sink to collect the data in order to improve Wireless Sensor Network (WSN) performance. One or more MS are mobile and move according to a controlled arbitrary mobility model inside the sensor field in order to maintain a fully-connected network topology, collecting data within their coverage areas and forwarding it towards the single main sink. Energy Conserving Routing Protocol (ECRP), based on route diversity, is implemented in MSs and sensors in order to optimize the transmission cost of the forwarding scheme. A set of multiple routing paths between MSs and sensors is generated to distribute the global traffic over the entire network. Simulations were performed in order to validate the performance of our new approach. We compare the results obtained with those for a single static sink and mobile sink, and show that our approach can achieve better performances such as packet delivery ratio, throughput, end-to-end delay, network lifetime, residual energy, energy and routing diversity overhead.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Impact of different mobility scenarios on fqm framework for supporting multim...ijwmn
In Mobile Ad hoc Network (MANET), the mobility of nodes is a challenging issue for designers. There are
lots of possibilities of mobile scenarios in this kind of network. The source, destinations and intermediate
nodes may not be using the same mobile scenarios. In this study, three mobile scenarios are taken in
consideration and these scenarios are source mobility, destinations mobility and intermediate nodes
mobility. The impact of the three mobile scenarios on the Quality of service Multicast Framework (FQM)
for supporting multimedia applications in MANETs is studied. The simulation results show that mobility of
group of destinations affects the performance of FQM framework more than mobility of source. In addition,
the analysis of simulation results shows that mobility of intermediate nodes does not have high effect on the
performance of FQM framework when node density is not high.
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELSIJMIT JOURNAL
Mobile Ad hoc Networks (MANETs) are dynamic networks populated by mobile stations, or mobile nodes
(MNs). Specifically, MANETs consist of a collection of nodes randomly placed in a line (not necessarily
straight). MANETs do appear in many real-world network applications such as a vehicular MANETs built
along a highway in a city environment or people in a particular location. MNs in MANETs are usually
laptops, PDAs or mobile phones. These devices may use Bluetooth and/or IEEE 802.11 (Wi-Fi) network
interfaces and communicate in a decentralized manner. Mobility is a key feature of MANETs. Each node
may work as a router and the network can dynamically change with time; when new nodes can join, and
other nodes can leave the network.
This paper presents comparative results that have been carried out via Matlab software simulation. The
study investigates the impact of mobile nodes’ parameters such as the speed, the arrival rate and the size of
mobile nodes in a given area using Poisson distribution. The results have indicated that mobile nodes’
arrival rates may have influence on MNs population (as a larger number) in a location.
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
MOBILE PRIMARY USER IN COGNITIVE RADIO STATE OF THE ARTS AND RECENT ADVANCESjosephjonse
The processing of primary user mobility with static or mobile secondary user in the context of cognitive radio (CR) has recently been the subject of several studies and discussions all over the world. These studies are seeking to broaden the horizons of CR implementation beyond the formalism described in the
diverse existing standards. The mobility of primary users is likely to reduce the overall performance of the Cognitive Radio Network (CRN) and affects the different phases of the cognitive cycle. Said mobility alters the network’s topology, the channel’s availability, and affects spectrum sensing. This makes any endeavor aiming to implement CR technology complicated. This paper is devoted to the analysis and discussion of the scientific literature that has addressed the issue of the primary user’s mobility.
Mobile Primary User in Cognitive Radio State of the Arts and Recent Advancesjosephjonse
The processing of primary user mobility with static or mobile secondary user in the context of cognitive radio (CR) has recently been the subject of several studies and discussions all over the world. These studies are seeking to broaden the horizons of CR implementation beyond the formalism described in the diverse existing standards. The mobility of primary users is likely to reduce the overall performance of the Cognitive Radio Network (CRN) and affects the different phases of the cognitive cycle. Said mobility alters the network’s topology, the channel’s availability, and affects spectrum sensing. This makes any endeavor aiming to implement CR technology complicated. This paper is devoted to the analysis and discussion of the scientific literature that has addressed the issue of the primary user’s mobility.
Mobile Primary User in Cognitive Radio State of the Arts and Recent Advancesjosephjonse
The processing of primary user mobility with static or mobile secondary user in the context of cognitive radio (CR) has recently been the subject of several studies and discussions all over the world. These studies are seeking to broaden the horizons of CR implementation beyond the formalism described in the diverse existing standards. The mobility of primary users is likely to reduce the overall performance of the Cognitive Radio Network (CRN) and affects the different phases of the cognitive cycle. Said mobility alters the network’s topology, the channel’s availability, and affects spectrum sensing. This makes any endeavor aiming to implement CR technology complicated. This paper is devoted to the analysis and discussion of the scientific literature that has addressed the issue of the primary user’s mobility.
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
Mobile information collectors trajectory data warehouse designIJMIT JOURNAL
To analyze complex phenomena which involve moving objects, Trajectory Data Warehouse (TDW) seems to be an answer for many recent decision problems related to various professions (physicians, commercial representatives, transporters, ecologists …) concerned with mobility. This work aims to make trajectories as a first class concept in the trajectory data conceptual model and to design a TDW, in which data resulting from mobile information collectors’ trajectory are gathered. These data will be analyzed, according to trajectory characteristics, for decision making purposes, such as new products commercialization, new commerce implementation, etc.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Effects of mobility models and nodes distribution on wireless sensors networks
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
DOI : 10.5121/ijasuc.2014.5601 1
EFFECTS OF MOBILITY MODELS AND NODES
DISTRIBUTION ON WIRELESS SENSORS
NETWORKS
Ali A.J.Al-Sabbagh1,3
, Ruaa A.S.Alsabah1,2
and Ahmed.Y.Mjhool1,4
1
Electrical and Computer Engineering, Florida Institute of Technology, Florida, USA
2
Department of Computer Science, University of Karbala, Iraq
3
Department of Babylon, SCIS, Ministry of Communication, Iraq
4
University of Kufa, Najaf, Iraq
ABSTRACT
Wireless sensor networks (WSN) is an important future technology, in several applications in military,
health, environment and industries. Currently the integration of social and sensor is very important by
considering the characteristics of social networks in designing wireless sensor networks WSN for
improvement such as (number of messages from source to destination, radius of coverage, connectivity, and
spreading). This area has not received much attention and few researches focus on the performance
evaluation. In this paper we have studied the impact of different mobility and distribution models which is a
variable one should define which model is best for the infrastructure given their differences, also study
include the exact effect of nodes distribution and analyzed by calculation the number of messages of 12
cases to get a real performance evaluation under different conditions and same routing techniques. This
work provides us a greater understanding and clear an idea of the effect of mobility plus distribution.
KEYWORDS
Wireless Sensor Networks, Social networks, Mobility Models, Node Distribution, Performance Analysis.
1. INTRODUCTION
Wireless Sensor Networks (WSNs) have become demand research area because significantly in
touch with several fields in life, WSN are self-configuring, networks containing of dynamic /
static sensor nodes in wireless connection to form an random topology. A typical WSN consists
of many small devices deployed over a geographical area, where each device is called a Sensor,
that can measure or sense an environmental or physical conditions (e.g., Pressure, recognition and
humidity) in a particular area. [1] Data forwarding (routing) in WSNs is the process of choosing
the best strategies for sending data the source to the final destination. WSN are not currently
deployed on a large scale, this research area is mostly simulation founded. Specifically mobile
nodes: Mobile wireless sensor networks owe its name as a mobile sink. An advantage of dynamic
WSN with respect to static WSN are well energy efficiency that’s make forwarding a sense data
from source to destination in first priority , improved coverage and improve target tracking and
larger channel capacity.[2,3] A social network is a description of the relations between a set of
actors. The integration of social networks can help to get better performance and understand the
relations among people and the behavior of actors in a network. Integration WSN with (Social
Network of Sensors) where this aspect comes from the movement of nodes with sensing
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
2
capability such as phones, navigation systems, and other smart objects brought around by
humans, vehicles, or even animals. A mobility model in a dynamic network describes the
movement of mobile nodes and how their positions, directions, and velocity variation by time [4].
In the context of social movement of humans, we need models that have the ability to describe
most of human mobility characteristics or any other models because most of the future sensors
will been carried by cars, human, animal and vehicle. In 2010 proposed a model for human
mobility to better describe by Song et al [5]. Integration with WSN makes them different from
traditional sensor network because some of these sensors can be mobile without needing energy
to achieve mobility. In this paper we have studied the performance of the networks under
different nodes distribution and mobility models as shown in figure (1):
Figure (1) Implementation diagram for multi scenarios
2. RELATED WORK
The most recent studies that related to sensor networks, focus on coverage, algorithms, and
protocols to reposition sensors in the environment. Typically, dynamic networks are the hottest
topic between wireless sensor networks and social networks. Since dynamic networks depends on
mobility models, there are many works discuss nodes mobility from difference perspective.
Nowadays, the general understanding of human mobility patterns are non-random; indeed that
sound completely true because usually the human move or travel with purpose [6] Moreover,
people have a plans before travel to anywhere. For example, going to school or work, the one
normally route specific ways with less distance and time to get our final destination frequently.
So it is clear that our mobility are random. Continuous-time random walk CTRW, in 2006, is a
random walk has been used by Brokmann et al. to explain the scaling laws for the flow of bank
notes and then to infer the dynamics of human travels. Mtibaa et al. in 2010 offered PeopleRank
as a new forwarding method. This method is based on the PageRank algorithm and the centrality
of nodes. Ranking nodes are considered to their social information, a node is given higher weight
if it is socially connected to the significant network nodes [7] . The results exposed that the
PeopleRank method outperforms the Epidemic approach. Song et al. in 2010, has suggest a
pattern model for human mobility according to their preferred locations. This model is based on
two mechanisms which are: exploration and preferential return. Li et al. in 2011, proposed that
mobility of sensors can be used to efficiently decrease the detection time of a stationary intruder.
Tomasini et al. in 2013 proposed that wireless sensor networks with social mobility patterns can
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
3
enhance the performance in terms of nodes’ coverage in addition to data delivery. The same
authors, but in another study, evaluated which mobility models are more convenient among
different mobility models in social networks of sensor for data delivery. The study results are like
that (1) not big changes in the performance when using different mobility models in dense
networks; (2) communication range plays important role in performance in terms of data delivery;
(c) delivery rate is a big issue when using individual mobility model in wireless sensor network.
De Melo et al. in 2013, suggest a new technique called RECAST to analyze individuals’
interactions in a dynamic network. This technique group individuals’ interactions to four groups:
Random, Bridges, Acquaintance and Friends. The results of the research showed friends group
was the highest used to deliver data message and random group was the lowest used. Li et al. in
2014, proposed a social group-based forwarding approach. The initial proposal is depends on the
history of encounters of individuals to choose the right relays to data delivery according to
diverse social relationships between network characters. [7, 8] In this paper have studied the
performance of WSN in both different mobility and different distribution.
3. MOBILITY MODELS
The node mobility to achieve big effect on the performance of mobile ad hoc networks and
wireless sensor networks (WSN). Because mobility is to help security, increase capacity and more
reliable of detection in mobile ad hoc networks and WSN. In contrast mobility can also lead to
reduce the unpredictable random topology and the change of links [2,12]. In this project, we use
two common mobility, which are Brownian motion, and Levy walk.
3.1. Brownian Motion
This type of mobility model is describe the motion of the atoms, which move randomly. Where
the time is divided with an interval of constant slot T. At every slot I .where the destination
(Xi+1, Yi+1) is selected depending on the current location, (Xi, Yi), i.e., [5].
(1)
Where W1 and W2 follows normal distribution.
η is the variance of Brownian motion. So, the jump distance during a slot can be obtained from
the distribution
(2)
3.2. Levy walk with cut off model
The levy model describe the most of human mobility characteristics for this reason it is used in
order to achieve the social movement of humans. This model is first described by Song et al. [9]
proposed a model for individual mobility (IM) to better describe human movements which is
Levy walk. It is a different type of random walk in which the jump distance is distributed
depending on a heavy-tailed distribution for every movement. It follows a power law form.
. (3)
In this model, the upper limit of the jump distance can be set as infinite. To overcome this
limitation, the model has been studied Levy extended so that the probability density cutoffs
should be applied on both small and large distances. So the CDF of the jump distance in the Levy
is expressed by:
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
4
(4)
Where γ and v are the minimum and maximum distances, respectively. This model is based on
two mechanisms which describe the human mobility [10, 12]:
Exploration: The tendency to explore new locations decreases with time. Where the next step is
completely independent of the previously visited locations. Preferential Return: the human's
behavior shows an important property, which is the tendency to return to the most visited
locations (e.g., home, work). Different scenarios can be achieve by the mobility models described
above. For example, in the Brownian motion by changing one parameter η, different levels of
randomness can be offered. On the other hand, the Levy walk can describe the motion
characteristics of human agents in various environments such as campus and downtown, by
altering the parameters α, γ, and v [11]. Figure (2) shoes the difference between the Brownian
motion and Levy Walk.
(a) (b)
Figure (2) mobility model (a) Brownian motion and (b) Levy Walk.
4. EPIDEMIC ROUTING (ER)
The ER is a flooding-based routing protocol mainly used in delay tolerant networks (DTNs). In
DTNs, the assumption of traditional routing of the end to end path from the source to the
destination always exists for successful transmission, is not always valid. Thus, ER rely on transit
transmission in its operation. In ER, if a source node generates a packet and needs to send it to a
destination node, it floods this packet. The source node and all neighboring nodes received this
packet will re-flood this packet whenever they meet a new neighboring node, results in multiple
replica of this packet throughout the network and consequently maximize the probability of one
node encounters the destination node. However, ER causes a massive energy consumption and
therefore, more dead nodes which inversely decrease the probability of packet delivery. [13,14]
If energy consumed by nodes is not an issue, the ER is considered a very efficient in packet
delivery perspective. In wireless sensor networks (WSNs), where the majority of nodes are
battery-powered and battery recharging or replacements is not applicable, renders the energy
consumption is of our highest priority. Each node has to have a buffer to store a created or
received messages destined to other nodes. Message indexing is performed as a way to efficiently
manage the messages. Also, summery vector is an array of bits maintained at each node indicates
the entries stored in hash table.
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
5
Figure (3) Epidemic Routing
The process of anti-entropy session initiated by the node with lowest id with the highest id,
through which the message are forwarded. Each node must have a list of nodes with which the
node has encountered recently to avoid multiple anti-entropy sessions with the same nodes during
a preconfigured period of time. To calculate the delivery ration DR(t), let N be the total number
of nodes moving within a square area L2, and the transmission range r, where r << L. The pair
wise meeting time between nodes is a random variable and it is exponentially distributed. Thus
the probability that two nodes can meet is defined as pairwise meeting rate and can be calculated
by equation (5).
ρ ≈ 2ωrE[v*]/L2 (5)
Where, ω, is a constant depends on the mobility model. E[v*], is the average relative speed
between two nodes. The number of nodes that received a packet after time t, denoted as I(t) can
be calculated by equation (6).
I(t) = N/[1+(N-1)e-ρNt] (6)
It is intuitive that the more nodes have received the packet, the large probability the message will
be delivered to the destination. The delivery ratio of a packet increases with time, so it is a
function of time DR(t) and equals to:
DR(t) = I(t)/N = 1/[1+(N-1)e-ρNt] (7)
5. PROBABILISTIC ROUTING (FLOODING)
The mobility of nodes in social networks is not completely random. Thus, the movement patterns
of nodes are most likely to be predictable. For example, if a location has been frequently visited,
it is probably to be visited again. Delivery predictability is the metric calculated based on node’s
movement pattern and used in probabilistic routing to improve performance. This metric is
calculated at each node for each known destination node mapping the probability of that node
delivering a message to each known destination node. To mitigate resources waste incurred in
ER, nodes exchange only information about delivery predictabilities and each node decide
whether to forward messages or not based on these probabilities. This Probability P ϵ [0, 1]
indicates the probability of encountering a certain node. Whenever a node is encountered,
corresponding P must be updated according eq. (8)
P(a, b) = P(a, b) old + (1-P(a, b) old )*Pinit (8)
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
6
Where, P(a, b) , delivery predictability nod (a) has for node (b) Pinit ϵ [0, 1], an initialization
constant If a node doesn’t encounter the destination node for a while, it is less likely to be a good
forwarder to that destination, thus the delivery predictability must be aged. Equation (9) is the
aging equation.
P(a, b) = P(a, b) old * γk (9)
Where, γ ϵ [0, 1), is the aging constant k, is the number of time units have elapsed since the last
time the metric was aged
6. SIMULATION RESULTS
In this section, we verify our findings by the implantation all cases mentioned in figure (1) to find
number of messages in each cases (source to distention i.e LBF case mean: Lattice, Brownian,
Flooding and ECE: Exponential, Levy with cut off, Epidemic ) and the representation for each
block as shown in table (1):
Table (1) Description for each simulation case
In this work we proposed to change some factor by keeping the other the general case generates
by 300 nodes as a mobile and 50 static for a specific location for both source and sink, then we
have repeated the simulation procedure under different distribution by keeping the mobility and
changing the routing tech. Obviously this work proposed 2 type of routing techniques, Two type
of mobility models and 3 kind of distributions (each option represented by a letter as shown in
figure above). The simulation result of the number of messages and spreading percentage for each
case as follow for example (LBF: Lattice-Brownian-Flooding Prophet) table (2):
Table (2) Simulation results for each case under different distribution, Mobility and Routing
RoutingMobilityNode Distribution
E: EpidemicB: Brownian motion
L: Lattice Uniform
E: Exponential
F: Flooding Prophet
C: Levy walk with
cut offP: Power low
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
7
Obviously simulation results shows that Epidemic Routing will arrive the distention (sink) by
number of message more than Flooding Prophet. Also the levy walk with cut off mobility motion
gives a better results compare with the Brownian motion because higher number of messages
mean higher radiated power. Integration in this paper clearly make the effect of mobility. In other
side node distribution play a main role as well for selection an appropriate routing in designing
WSN and compression of results for each same group case constant like changing only
distribution. For example at lattice distribution and Brownian motion we can implement the WSN
under Epidemic then under Flooding Prophet to get different results as shown in figure (4):
Figure (4) Result compression for each case – A) Messages number from source to destination, B)
Spreading percentage (i.e LBF: Lattice, Brownian, Flooding and ECE: Exponential, Leavy with cut off,
Epidemic )
7. CONCLUSIONS
WSN have greatly extended playing an important role for the data efficient delivery source to
destination and It is an important emerging communication system which takes the advantages of
any possible contact opportunities to deliver data among mobile devices. Integration WSN with
any other connection details like social network will lead to improve the network performance
and provide deep understanding. Routing and forwarding data to the sink are main challenges. In
this paper, we propose a good evaluation procedure to compare different cases in mobility and
distribution to get a full view of each factor how effect on WSN performance. In the previous
section, we analyzed our results for the scenario mentioned in figure (1) by calculation the
number of messages for each case. Now, we can conclude the following:
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
8
1) Mobility motion has a main effect on WSN for any individual application like power
consumption, spreading messages and directions.
2) Routing by probabilistic (PRophet) less than Epidemic by number of message which give
a good indication for power reduction by reduce transmission.
3) Static node has not relevant effect on WSN with compare with mobility nodes. Also
taking in consideration the nude distribution during design WSN.
4) Levy walk with cut off human mobility motion is better than Brownian motion for any
WSN application related to human activities.
5) If the goal is reducing the number of exchanged Messages within the network, the best
option is to select an appropriate routing and mobility techniques for each individual
application. Finally, in future we can mitigate the impact of integration using a different
technology for wireless communications to get better performance in WSN.
ACKNOWLEDGEMENT
Our Team greatly appreciate Mr.Basim Al-khashab who is a PhD student in Florida tech
(FIT), Florida, USA for discussions and valuable comments on the manuscript.
REFERENCES
[1] N. Pantazis, S. Nikolidakis, and D. Vergados, “Energy-efficient routing protocols in wireless sensor
networks: A survey,” Communications Surveys Tutorials, IEEE, vol. 15, no. 2, pp. 551–591,2013.
[2] R.Alagu Pushpa1 A.Vallimayil "Impact of Mobility models on Mobile Sensor Networks"
International Journal of Communication Network & Security, Volume-1, Issue-1, 2011
[3] Nikolaos A. Pantazis, Dimitrios D. Vergados, “A Survey on Power Control Issues in Wireless Sensor
Networks,” IEEE Communications Surveys, 2007, Vol. 9, Issue 4, pp. 86-107.
[4] Marcello Tomasini, Franco Zambonelli, "Evaluating the Performance of Social Networks of Sensors
under Different Mobility Models" biomedcomm,62 IEEE COMPUTER SOCIETY 2013
[5] Wang, Pu, and Ian F. Akyildiz. "Effects of different mobility models on traffic patterns in wireless
sensor networks." Global Telecommunications (GLOBECOM 2010), 2010 IEEE. IEEE, 2010..
[6] C. Song, T. Koren, P. Wang, and A.-L. Barab´asi, “Modelling the scaling properties of human
mobility,” Nature Physics, vol. 6,no. 10, pp. 818–823, 2010.
[7] G. Lin, G. Noubir, and R. Rajaraman, “Mobility models for ad hoc network simulation,” in
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications
Societies, vol. 1. IEEE, 2004.
[8] S. Chellappan, W. Gu, X. Bai, D. Xuan, B. Ma, and K. Zhang, “Deploying wireless sensor networks
under limited mobility constraints,” Mobile Computing, IEEE Transaction 1142–1157, 2007.
[9] C. Song, T. Koren, P. Wang, and A.-L. Barab´asi, “Modelling the scaling properties of human
mobility,” Nature Physics, vol. 6, no. 10, pp. 818–823, 2010.
[10] R. M. M. Tomasini, F. Zambonelli, “Using patterns of social dynamics in the design of social
networks of sensors,” ACM, 2013.
[11] I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong. "On the levy-walk nature of human mobility". In
Proceeding of INFOCOM 2008, pages 924–932, 2008.
[12] Wang, Pu, and Ian F. Akyildiz. "Spatial correlation and mobility-aware traffic modeling for wireless
sensor networks." IEEE/ACM Transactions on Networking (TON) 19.6 (2011).
[13] Xiaofeng Lu, Pan Hui. An Energy-Efficient n-Epidemic Routing Protocol for Delay Tolerant
Networks, IEEE 2010
[14] Floriano De Rango, Salvatore Amelio, Peppino Fazio. University of Calabria, Italy, IEEE 3013.
[15] Anders Lindgrn, Avri Doria, Olov Schelѐn, Lulea University of Technology. Probabilistic Routing in
Intermittently Connected Networks. Maryland, USA 2003