Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
This document discusses optimizing IPv6 packet headers over Ethernet frames. It proposes:
1. Creating "master packets" that contain all header fields but no data, and "slave packets" that contain only fixed header fields, an ID, tag, and data. This reduces repeated header information.
2. Processing starts with the master packet headers, then slave packets require less processing as they only contain fixed header fields and data.
3. This optimization aims to reduce processing time by decreasing repeated header contents, allowing more space for data in each packet and faster transmission speeds.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
This document analyzes and compares the performance of three routing protocols (AODV, DSR, DSDV) in mobile ad hoc networks (MANETs) using the network simulator NS-2. The protocols are evaluated based on parameters like end-to-end delay, packet delivery ratio, and average routing load. The results show that DSR generally has lower end-to-end delay while DSDV has lower average routing load. Packet delivery ratio increases with node count for AODV and DSDV but varies more for DSR. In general, no single protocol dominates across all parameters and performance depends on network conditions.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
This document discusses optimizing IPv6 packet headers over Ethernet frames. It proposes:
1. Creating "master packets" that contain all header fields but no data, and "slave packets" that contain only fixed header fields, an ID, tag, and data. This reduces repeated header information.
2. Processing starts with the master packet headers, then slave packets require less processing as they only contain fixed header fields and data.
3. This optimization aims to reduce processing time by decreasing repeated header contents, allowing more space for data in each packet and faster transmission speeds.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
This document analyzes and compares the performance of three routing protocols (AODV, DSR, DSDV) in mobile ad hoc networks (MANETs) using the network simulator NS-2. The protocols are evaluated based on parameters like end-to-end delay, packet delivery ratio, and average routing load. The results show that DSR generally has lower end-to-end delay while DSDV has lower average routing load. Packet delivery ratio increases with node count for AODV and DSDV but varies more for DSR. In general, no single protocol dominates across all parameters and performance depends on network conditions.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
This document presents a novel approach to optimally deploy small cells in next-generation cellular networks. The approach aims to minimize total network installation costs, balance resource allocation among small cells, and provide optimal coverage with minimal interference between stations. An accurate formula is derived to determine the optimum number of small cell deployments. Mathematical expressions are also presented to calculate the critical handoff point between neighboring wireless stations. Simulation results demonstrate that the proposed approach can effectively alleviate interference and enhance coverage area compared to non-optimized small cell deployment strategies.
This document discusses the implementation of an interleaver on an FPGA for wireless communication systems. It proposes a novel finite state machine (FSM) based approach to model a multimode address generator for a WiMAX interleaver using VHDL on an FPGA. The proposed interleaver works better at high frequencies compared to existing FPGA approaches and uses minimal logic cells. It also studies interleaving techniques in OFDM-based wireless local area networks and discusses designing the interleaver using the internal memory blocks of an FPGA.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
This document compares the performance of Wu and Li's Connected Dominating Set (CDS) creation algorithm and its location-information-based version under different Medium Access Control (MAC) protocols and network sizes. Simulations were conducted using an ideal MAC protocol and the IEEE 802.11 MAC protocol. The results show that using the 802.11 MAC produces smaller CDS sizes, lower signaling overhead, but longer establishment times compared to the ideal MAC. This is because packet collisions in the 802.11 MAC deprive nodes of accurate neighborhood information, leading to suboptimal CDS construction and longer delays.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Controller Area Network is an ideal serial bus design suitable for modern embedded system based networks. It finds its use in most of critical applications, where error detection and subsequent treatment on error is a critical issue. CRC (Cyclic Redundancy Check) block was developed on FPGA in order to meet the needs for simple, low power and low cost wireless communication. This paper gives a short overview of CRC block in the Digital transmitter based on the CAN 2.0 protocols. CRC is the most preferred method of encoding because it provides very efficient protection against commonly occurring burst errors, and is easily implemented. This technique is also sometimes applied to data storage devices, such as a disk drive. In this paper a technique to model the error detection circuitry of CAN 2.0 protocols on reconfigurable platform have been discussed? The software simulation results are presented in the form of timing diagram.FPGA implementation results shows that the circuitry requires very small amount of digital hardware. The Purpose of the research is to diversify the design methods by using VHDL code entry through Modelsim 5.5e simulator and Xilinx ISE8.3i.The VHDL code is used to characterize the CRC block behavior which is then simulated, synthesized and successfully implemented on Sparten3 FPGA .Here, Simulation and Synthesized results are also presented to verify the functionality of the CRC -16 Block. The data rate of CRC block is 250 kbps .Estimated power consumption and maximum operating frequency of the circuitry is also provided.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
This document presents a novel approach to optimally deploy small cells in next-generation cellular networks. The approach aims to minimize total network installation costs, balance resource allocation among small cells, and provide optimal coverage with minimal interference between stations. An accurate formula is derived to determine the optimum number of small cell deployments. Mathematical expressions are also presented to calculate the critical handoff point between neighboring wireless stations. Simulation results demonstrate that the proposed approach can effectively alleviate interference and enhance coverage area compared to non-optimized small cell deployment strategies.
This document discusses the implementation of an interleaver on an FPGA for wireless communication systems. It proposes a novel finite state machine (FSM) based approach to model a multimode address generator for a WiMAX interleaver using VHDL on an FPGA. The proposed interleaver works better at high frequencies compared to existing FPGA approaches and uses minimal logic cells. It also studies interleaving techniques in OFDM-based wireless local area networks and discusses designing the interleaver using the internal memory blocks of an FPGA.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
This document proposes a physical-layer network coding (PNC) scheme to improve throughput in wireless networks. PNC takes advantage of the broadcast nature of wireless transmissions by allowing signals from multiple nodes to be combined at the physical layer through modulation and demodulation. It demonstrates PNC for a three-node wireless linear network. With PNC, the three nodes can exchange information in two time slots, improving throughput by 100% over traditional scheduling and 50% over straightforward network coding. PNC mapping provides a way to perform network coding operations on electromagnetic signals directly at the physical layer by mapping their combination to binary additions.
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
This document summarizes a study that compares the performance of two routing protocols, AODV and MCF, in a layered wireless sensor network (WSN) using the network simulator NS-2. It first provides background on AODV, describing how it establishes and maintains routes. It then describes the MCF protocol, which formulates lightpath routing as an integer linear program to minimize the impact of fiber failures. The document outlines how both protocols were implemented in NS-2 and compares their performance based on metrics like throughput, packet loss, and end-to-end delay. The simulation results show that MCF generally has better throughput and reliability than AODV in the scenario of a 80-node WSN.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
This summary provides an overview of a document that reviews several algorithms aimed at improving TCP congestion control and addressing route failures in mobile ad hoc networks (MANETs).
The document begins with an introduction to MANETs and the issues they present for TCP, as TCP was designed for wired networks and interprets all packet losses as congestion. It then analyzes and compares five different algorithms that have been proposed to help TCP distinguish between losses due to route failures versus congestion. These algorithms aim to improve network performance metrics like throughput, packet delivery ratio, and end-to-end delay. The document concludes that while these algorithms approach the problem of route failures and TCP performance degradation in different ways, their overall goal is the
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
This document compares the performance of Wu and Li's Connected Dominating Set (CDS) creation algorithm and its location-information-based version under different Medium Access Control (MAC) protocols and network sizes. Simulations were conducted using an ideal MAC protocol and the IEEE 802.11 MAC protocol. The results show that using the 802.11 MAC produces smaller CDS sizes, lower signaling overhead, but longer establishment times compared to the ideal MAC. This is because packet collisions in the 802.11 MAC deprive nodes of accurate neighborhood information, leading to suboptimal CDS construction and longer delays.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.
Controller Area Network is an ideal serial bus design suitable for modern embedded system based networks. It finds its use in most of critical applications, where error detection and subsequent treatment on error is a critical issue. CRC (Cyclic Redundancy Check) block was developed on FPGA in order to meet the needs for simple, low power and low cost wireless communication. This paper gives a short overview of CRC block in the Digital transmitter based on the CAN 2.0 protocols. CRC is the most preferred method of encoding because it provides very efficient protection against commonly occurring burst errors, and is easily implemented. This technique is also sometimes applied to data storage devices, such as a disk drive. In this paper a technique to model the error detection circuitry of CAN 2.0 protocols on reconfigurable platform have been discussed? The software simulation results are presented in the form of timing diagram.FPGA implementation results shows that the circuitry requires very small amount of digital hardware. The Purpose of the research is to diversify the design methods by using VHDL code entry through Modelsim 5.5e simulator and Xilinx ISE8.3i.The VHDL code is used to characterize the CRC block behavior which is then simulated, synthesized and successfully implemented on Sparten3 FPGA .Here, Simulation and Synthesized results are also presented to verify the functionality of the CRC -16 Block. The data rate of CRC block is 250 kbps .Estimated power consumption and maximum operating frequency of the circuitry is also provided.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
The improvement of end to end delays in network management system using netwo...IJCNCJournal
The document summarizes research on improving end-to-end delays in a network management system using network coding. Specifically, it applies network coding to manage radio and television broadcast stations in a wireless network. The study shows that a proposed "Fast Forwarding Strategy" using network coding outperforms a classical routing strategy in reducing end-to-end delays from source to destination. It analyzes end-to-end delays theoretically using network calculus and conducts a practical study on a network of broadcast stations, finding the proposed strategy reduces delays compared to the classical strategy.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
This document summarizes a research paper that evaluates the performance of wired and wireless local area networks using simulation. It describes simulating Ethernet and IEEE 802.11 wireless LANs in OPNET with varying numbers of users. Key performance metrics for wired networks like collision count, throughput, and delay were analyzed. For wireless, metrics like data dropped, throughput, and access delay were studied. As the number of users increased, throughput decreased more for wireless than wired due to transmission limitations in wireless. The paper concludes wireless performs better than wired for small user numbers but degrades more with increasing loads.
Overview of data communication and networkingSisir Ghosh
The document provides an overview of data communication and computer networks. It discusses the key components of data communication including senders, receivers, transmission media, messages, and protocols. It then describes different types of network connections and topologies including point-to-point, multipoint, bus, star, ring, mesh, and hybrid networks. Finally, it discusses network classification based on scale, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers protocols, standards, and reference models like OSI and TCP/IP.
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
With the advent of Wireless Sensor Networks (WSN) and its immense popularity in a wide range of applications, security has been a major concern for these resource-constraint systems. Alongside security, WSNs are currently being integrated with existing technologies such as the Internet, satellite, Wi-Max, WiFi, etc. in order to transmit data over long distances and hand-over network load to more powerful devices. With the focus currently being on the integration of WSNs with existing technologies, security becomes a major concern. The main security requirement for WSN-integrated networks is providing end-to-end security along with the implementation of in-processing techniques of data aggregation. This can be achieved with the implementation of Homomorphic encryption schemes which prove to be computationally inexpensive since they have considerable overheads. This paper addresses the ID-issue of the commonly used Castelluccia Mykletun Tsudik (CMT) [12] homomorphic scheme by proposing an ID slotting mechanism which carries information pertaining to the security keys responsible for the encryption of individual sensor data. The proposed scheme proves to be 93.5% lighter in terms of induced overheads and 11.86% more energy efficient along with providing efficient WSN scalability compared to the existing scheme. The paper provides analytical results comparing the proposed scheme with the existing scheme thus justifying that the modification to the existing scheme can prove highly efficient for resourceconstrained WSNs.
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
With the advent of Wireless Sensor Networks (WSN) a
nd its immense popularity in a wide range of
applications, security has been a major concern for
these resource-constraint systems. Alongside secur
ity,
WSNs are currently being integrated with existing t
echnologies such as the Internet, satellite, Wi-Max
, Wi-
Fi, etc. in order to transmit data over long distan
ces and hand-over network load to more powerful dev
ices.
With the focus currently being on the integration o
f WSNs with existing technologies, security becomes
a
major concern. The main security requirement for WS
N-integrated networks is providing end-to-end
security along with the implementation of in-proces
sing techniques of data aggregation. This can be
achieved with the implementation of Homomorphic enc
ryption schemes which prove to be computationally
inexpensive since they have considerable overheads.
This paper addresses the ID-issue of the commonly
used Castelluccia Mykletun Tsudik (CMT) [12] homomo
rphic scheme by proposing an ID slotting
mechanism which carries information pertaining to t
he security keys responsible for the encryption of
individual sensor data. The proposed scheme proves
to be 93.5% lighter in terms of induced overheads a
nd
11.86% more energy efficient along with providing e
fficient WSN scalability compared to the existing
scheme. The paper provides analytical results compa
ring the proposed scheme with the existing scheme
thus justifying that the modification to the existi
ng scheme can prove highly efficient for resource-
constrained WSNs.
Iterative network channel decoding with cooperative space-time transmissionijasuc
This document summarizes an iterative network-channel decoding scheme for cooperative space-time transmission with network coding. The scheme uses convolutional codes as network codes at the relay node and Reed-Solomon codes as channel codes at the user nodes. An iterative joint network-channel decoder exchanges soft information between convolutional code-based network decoder and Reed-Solomon code-based channel decoders. Extrinsic information transfer analysis is performed to investigate the convergence properties of the proposed iterative decoder.
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
This document summarizes a study that compares the performance of the MAC layer in flat and hierarchical mobile ad hoc networks (MANETs). The study uses simulation to analyze throughput and packet drops. It finds that throughput is the same for both network structures, but that hierarchical networks have fewer packet drops at the MAC layer. Specifically, packet drops only occurred at 3 nodes in the hierarchical network, whereas 14 nodes experienced drops in the flat network structure. Therefore, the hierarchical approach improves MAC layer performance by reducing packet drops.
Air Interface Virtualization using FBMC and OFDM ConfigurationsMalik Saad
Real time on air experiment is performed on Software-defined Radio (SDR) for radio virtualization using orthogonal frequency division multiplexing and filter bank multi carrier to support diverse mobile service requirements for user equipment.
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
This document summarizes a research article that analyzed the performance of three MAC layer protocols (IEEE 802.11, IEEE 802.15.4, and TDMA) in a wireless sensor network considering the effects of the hidden node problem. Six performance metrics were evaluated: goodput, throughput, packet delivery ratio, residual energy, average delay, and node lifetime. The results showed that TDMA provided the best energy conservation and highest delay, while IEEE 802.11 gave the best throughput and goodput as well as lowest delay. IEEE 802.15.4 and TDMA were better than IEEE 802.11 at mitigating the hidden node problem.
This document summarizes research on combining fountain coding and network coding over wireless channels. Fountain coding is an error correction technique that allows recovery from erased packets. Network coding improves throughput in wireless networks by allowing nodes to combine packets. The study models a simple network using both techniques and simulates its performance over different wireless fading channels. The results show that combining fountain and network coding improves throughput by over 70% compared to using only network coding. It also achieves zero error rate under different channel conditions, outperforming the use of only network coding.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network, including network interface cards, hubs, routers, modems, and switches. These components work together to connect devices and allow for the exchange of digital information across computer networks. The document also covers different types of computer networks like local area networks, wide area networks, and wireless networks. It explains how networks are designed and configured, with a focus on important aspects like security, performance, and dependability.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network including network interface cards, hubs, routers, modems, switches, and cables. It describes different types of networks like local area networks, wide area networks, and wireless networks. The document also covers the uses of computer networks like resource sharing, communication, the server-client model, e-commerce, and as a communication medium. Finally, it discusses the benefits of computer networks such as sharing resources, improved communication, increased security, remote access, and cost savings, as well as some potential disadvantages.
Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of
the OSI reference model. Frame Relay originally was designed for use across Integrated Services Digital
Network (ISDN) interfaces. Today, it is used over a variety of other network interfaces as well.
Frame relay is a type of WAN connection use to connect one site to many remote sites through a single
physical circuit; this operation makes it easy to construct reliable and inexpensive networks.
Similar to EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS (20)
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
DOI: 10.5121/ijwmn.2018.10301 1
EFFICIENTLY SECURE BROADCASTING IN 5G
WIRELESS FOG-BASED-FRONTHAUL NETWORKS
Nabeel I. Sulieman and Richard D. Gitlin
Department of Electrical Engineering, University of South Florida
Tampa, Florida 33620, USA
ABSTRACT
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified
Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with
near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and
securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In
particular, this work is directed towards demonstrating the ability of eDC-NC technology to more
efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information
even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our
results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure
broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the
throughput benefits of Network Coding.
KEYWORDS
5G, Diversity Coding, Triangular Network Coding, F-RAN, Secure Multicasting
1. INTRODUCTION
Many wired and wireless networks securely broadcast/multicast messages to a group of receivers.
Several studies [1]-[4] have theoretically analyzed the ability of Network Coding [5] to provide
secure broadcasting/multicasting in any wired or wireless network. These papers assume that the
number of channels that the eavesdropper can wiretap is equal to or less than the number of
tolerated wiretapped channels in the network, which is a design parameter [1]-[4]. However, this
assumption is not valid in real networks, as the eavesdropper might have the ability to wiretap the
entire network of channels. To overcome this vulnerability, Secret (Shared) Key Cryptography and
Network Coding is utilized to provide efficient, secure messages broadcasting. In this study it is
shown that Enhanced Diversity and Network Coding (eDC-NC) [6]-[7], which is the synergistic
combination of Diversity Coding [8] and modified Triangular Network Coding [9], can efficiently
and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks
(F-RANs). F-RANs are an alternative network architecture to Cloud Radio Access Networks
(C-RANs) [10]-[12] that are under consideration for 5G networks, where the centralized processing
in the baseband unit (BBU) of the C-RAN are replaced by edge nodes with the ability to control,
process and store data, and communicate with each other [10]-[12].
It is shown in [6]-[7] that eDC-NC can simultaneously improve the network reliability, reduce
computational complexity, enable extremely fast recovery from simultaneous multiple link/node
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
2
failures, and retain the throughput improvement of Network Coding for broadcasting/multicasting
applications of a F-RAN wireless fronthaul networks.
The contribution of this paper is demonstrating the ability of eDC-NC technology to more
efficiently provide secure messages broadcasting than standardized methods such as Secure
Multicasting [13], such that the adversary cannot acquire any information even if they can wiretap
the entire F-RAN network (except of course the source and destination nodes). In this way,
eDC-NC will enhance secure broadcasting and provide ultra-reliability networking, near-
instantaneous fault recovery, and retain the throughput gain of Network Coding.
The structure of this paper is as follows. The system model based on F-RAN wireless fronthaul
network is described in Section 2. Section 3 demonstrates the ability of eDC-NC coding to provide
secure broadcasting/multicasting followed by the application of secure eDC-NC to F-RAN wireless
fronthaul networks in Section 4 and its efficiency analysis in Section 5. The paper ends with the
concluding remarks in Section 6.
2. SYSTEM MODEL
F-RANs were proposed in [10]-[12] to enhance the performance of C-RANs by migrating a
significant number of functions to edge devices and substantially upgrading the Remote Radio
Heads (RRHs). These functions include controlling, communicating, measuring, managing, and
storing and processing of data. The upgraded RRH is called a Fog Access Point (F-AP), and is
able to communicate with other F-APs. One of the benefits of this architecture is decreasing
latency by performing functionality at the network edge rather than in the core [10]-[12]. There
are three layers in the architecture of F-RANs as illustrated in Figure 1 [10]. The network layer
contains the BBU pool, centralized storage, and communication and computing cloud. The F-APs
represents the access layer. The terminal layer contains Fog-user equipment (F-UE) that access
the F-AP [10]-[11]. Adjacent F-APs can be formed into two topologies: a mesh topology or a
tree-like topology. Both of these topologies can significantly minimize the degrading effects of
capacity-constrained fronthaul links [10].
Figure 1. F-RAN network architecture.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
3
Although there are different transmission modes in a F-RAN, this paper is focused on the Local
Distributed Coordination (LDC) mode, as it is the core mode of the F-RAN as shown in Figure 1
[10]. In the LDC, the F-APs communicate with other F-APs to serve the F-UEs. This will
decrease the burden on the fronthaul network and quickly suppress interference or transmit the
required data to the UE not from the cloud server but from the F-APs [10].
In [7], eDC-NC coding is applied to a wireless sensor network to provide ultra-reliable with
near-instant fault recovery and efficient energy consuming system, and here the ability of eDC-NC
to provide efficient secure messages broadcasting and apply secure eDC-NC coding to the LDC
fronthaul network is demonstrated, where F-APs are connected to each other in a mesh topology
as shown in Figure 2. In this paper, the connections are considered to be wireless links and
wiretapped by an eavesdropper. To minimize interference and be able to communicate with each
other, such F-APs will likely utilize MIMO technology [14].
Figure 2. Example F-RAN fronthaul network with wireless links.
3. SECURE ENHANCED DC-NC BROADCASTING NETWORK
In order to illustrate how Secret (Shared) Key Cryptography is used in eDC-NC type networks and
to provides secure broadcasting, consider the point-to-multipoint network topology depicted in
Figure 3.
Each broadcasting session will have its own secret (shared) session key. The source node (node 1)
and the receiver nodes (nodes 5 and 6) will share the broadcasting session key. Controlling the
distribution of the keys between the source and the legitimate receivers is a primary issue in any
communication network. The IETF Group Domain of Interpretation (GDOI) protocol defined in
Request for Comments (RFC-6407) [15] may be used to facilitate connecting the source and the
destinations to a key server, where using Public Key Cryptography (PKC) the keys are encrypted
and distributed to the members of secure multicast group. The source and the destinations can be
authenticated and authorized to form a specific multicast group by the key server such that the
shared key is utilized to encrypt and decrypt messages between members of the group [15]. In
this way, the broadcasting session (shared) key will be distributed securely to the source and
destination nodes.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
4
Figure 3. Example wireless network with secure broadcasting via eDC-NC coding that
broadcasts two data streams to nodes 5 and 6 and protects each stream from one link/relay node
failure. The solid lines represent the wireless links that carry coded data streams and are used to
improve network throughput whereas dashed lines represent the wireless links that carry coded
data streams and are used to maximize network reliability.
In our example network the source broadcasts two data streams 𝑥1 and 𝑥2 to destination nodes 5
and 6 using relay nodes 2, 3, 4, and 7.
The system proceeds as follows:
(1) The streams 𝑐1 and 𝑐2 are created using eDC-NC encoding [6], which will be referred to as
eDC-NC coded data streams to distinguish them from the encrypted data streams as follows:
𝑐1 = 𝑥1,0 ⊕ 𝑥2,1 (1)
𝑐2 = 𝑥1,0 ⊕ 𝑥2,2 (2)
where 𝑥𝑖,𝑟𝑖
represents the raw data stream 𝑖 and 𝑟𝑖 is the number of redundant “0” bit(s) that are
added at the head of raw data stream 𝑖, 𝑐𝑖 represents the eDC-NC coded data stream 𝑖. Note that
the eDC-NC coded data stream, 𝑐2, will be encrypted using the shared key at the source node 1 then
it will be transmitted. Therefore, it appears in the figure as 𝑐2
𝑒𝑛𝑐
.
(2) The source node (node 1) encrypts the streams 𝑥1, 𝑥2, and 𝑐2 using the Secret (Shared) Key
Cryptography algorithm.
Node 1 transmits 𝑥1
𝑒𝑛𝑐
and 𝑥2
𝑒𝑛𝑐
to nodes 5 and 6 respectively via relay nodes 2 and 3 respectively.
In addition, node 1 transmits 𝑐1 in order to realize the throughput gain provided by eDC-NC
networking [6]-[7] and 𝑐2
𝑒𝑛𝑐
to be able to tolerate one link/relay node failure [6]-[7] to the
destination nodes 5 and 6 via relay nodes 4 and 7 respectively.
(3) At the destination side, for example, node 5 will use the broadcasting session shared key to
decrypt the received data streams using the Secret (Shared) Key Cryptography algorithm depending
on the following situations:
a. If all data streams are correctly received (by checking the CRC), 𝑐2
𝑒𝑛𝑐
is ignored and 𝑥1
𝑒𝑛𝑐
will
be decrypted to find 𝑥1. Next, 𝑥2 will be recovered by applying 𝑥1 to 𝑐1 using the eDC-NC decoding
algorithm that was explained in detail in [6].
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
5
b. If one data stream is either incorrectly received or not received at all (either 𝑐2
𝑒𝑛𝑐
or 𝑥1
𝑒𝑛𝑐
), the
receiver will decrypt the one that is correct (correct CRC) and then apply it to 𝑐1 to obtain 𝑥2
similarly to step a.
c. If 𝑐1 fails, the receiver will decrypt both 𝑐2
𝑒𝑛𝑐
and 𝑥1
𝑒𝑛𝑐
to get 𝑐2 and 𝑥1 then similarly to step a
apply 𝑥1 to 𝑐2 to obtain 𝑥2.
It is worth noting that the intermediate (relay) nodes will not need to decrypt the encrypted raw
and eDC-NC coded data streams because they only need to forward them to the destination nodes.
Hence, they do not have to be secured. Also, they CANNOT decrypt the encrypted raw and
eDC-NC coded data streams because they do not have the broadcasting session secret (shared) key.
Now, suppose that the adversary wiretaps the entire network, he/she will have 𝑥1
𝑒𝑛𝑐
, 𝑥2
𝑒𝑛𝑐
, 𝑐1, and
𝑐2
𝑒𝑛𝑐
. Only 𝑐1 is not encrypted but it will not disclose any information because it is a XOR
combination of raw data streams 𝑥1 and 𝑥2. The other data streams are encrypted so, the adversary
will need to know the broadcasting session secret (shared) key to decrypt them.
In this way, as long as the adversary does not possess the broadcasting session key, it will not be
able to get any information even if he/she wiretaps the entire network (except of course the source
and destination nodes).
4. APPLYING SECURE ENHANCED DC-NC CODING TO F-RANS
Enhancing the security (privacy) of transmitted information in 5G wireless F-RAN fronthaul
networks is critical due to the vulnerability of wireless links. In addition, although F-APs have
specific resources, but these should be used efficiently. Enhanced DC-NC technology was
recently utilized to improve the efficiency and reliability of 5G wireless F-RAN fronthaul
networks and provide rapid recovery time from multiple simultaneous link/node failures while
retaining the throughput enhancement feature of Network Coding for broadcasting applications [6].
Here, secure eDC-NC technology is applied to Local Distributed Coordination (LDC) transmission
mode in an F-RAN network to achieve the above benefits and to efficiently improve its security,
as depicted in Figure 4.
In this example, F-APs are connected to each other in a mesh topology by bi-directional wireless
links. Here, a point-to-multipoint network topology models the application of securely broadcasting
three data streams 𝑥1, 𝑥2, and 𝑥3 from one F-AP (F-AP1) to three F-APs (F-APs 6, 7, and 8) using
intermediate relay nodes F-APs 2, 3, 4, 5, and 9. As mentioned in Section 3, each broadcasting
session will have its own secret (shared) session key. The source node (F-AP1) and the receiver
nodes (F-APs 6, 7, and 8) will share the broadcasting session key using the GDOI protocol.
The system proceeds as follows:
(1) The coded data streams 𝑐1, 𝑐2, and 𝑐3 are created using eDC-NC encoding [6] as follows:
𝑐1 = 𝑥1,0 ⊕ 𝑥2,1 ⊕ 𝑥3,2 (3)
𝑐2 = 𝑥1,0 ⊕ 𝑥2,2 ⊕ 𝑥3,1 (4)
𝑐3 = 𝑥1,0 ⊕ 𝑥2,3 ⊕ 𝑥3,5 (5)
Note that the eDC-NC coded data stream (𝑐3) will be encrypted using the shared key at F-AP1 then
it will be transmitted. Therefore, it appears in the figure as 𝑐3
𝑒𝑛𝑐
.
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
6
Figure 4. Example wireless fronthaul Fog-RAN network with secure eDC-NC coding that
broadcasts three data streams to F-AP6, F-AP7, and F-AP8 and protects each stream from one
link failure. The solid lines represent the links that carry coded data streams and are used to
improve network throughput whereas dashed lines represent the links that carry coded data
streams and are used to maximize network reliability.
(2) F-AP1 encrypts the streams 𝑥1, 𝑥3, and 𝑐3 using the Secret (Shared) Key Cryptography
algorithm. Note that data stream 𝑥2 does not need to be encrypted because there is no need to
transmit it in a separate link. However, it can be recovered from the coded data streams at the
destination F-APs.
F-AP1 transmits 𝑥1
𝑒𝑛𝑐
and 𝑥3
𝑒𝑛𝑐
to F-AP6 and F-AP8 respectively via relays F-APs 2 and 3
respectively. In addition, 𝑐1 and 𝑐2 are transmitted to realize the throughput gain provided by
eDC-NC [6]-[7] and 𝑐3
𝑒𝑛𝑐
to be able to tolerate one link/relay F-AP failure via eDC-NC [6]-[7] to
the destination F-APs 6, 7, and 8 via relays F-APs 4, 5, and 9 respectively.
(3) At the destination side, for example, F-AP6 will use the broadcasting session shared key to
decrypt the arrived data streams via Secret (Shared) Key Cryptography algorithm based on the
following situations:
a. If all data streams are correctly received (by checking the CRC), 𝑐3
𝑒𝑛𝑐
is ignored and 𝑥1
𝑒𝑛𝑐
will
be decrypted to find 𝑥1. Next, 𝑥2 and 𝑥3 will be recovered using the eDC-NC decoding algorithm
that was explained in detail in [6].
b. If one data stream is either incorrectly received or not received at all (either 𝑐3
𝑒𝑛𝑐
or 𝑥1
𝑒𝑛𝑐
), the
receiver will decrypt the one that is correct (by checking the CRC) and then obtain all data streams
in similar way of step a.
c. If 𝑐1 or 𝑐2 fails, the receiver will decrypt both 𝑐3
𝑒𝑛𝑐
and 𝑥1
𝑒𝑛𝑐
to recover 𝑐3 and 𝑥1 then similarly
as in step a obtain 𝑥2 and 𝑥3.
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
7
As it is mentioned in Section 3, the intermediate (relay) F-APs will not need to decrypt the
encrypted raw and eDC-NC coded data streams because they only need to forward the streams to
the destination F-APs. Also, they CANNOT decrypt the encrypted raw and eDC-NC coded data
streams because they do not have the broadcasting session secret (shared) key.
Now, assuming that the eavesdropper wiretaps the entire network, he/she will have 𝑥1
𝑒𝑛𝑐
, 𝑥3
𝑒𝑛𝑐
, 𝑐1,
𝑐2 and 𝑐3
𝑒𝑛𝑐
. Although 𝑐1 and 𝑐2 are not encrypted, no information can be disclosed because they
are XOR combinations of raw data streams 𝑥1, 𝑥2, and 𝑥3. Other data streams are encrypted so, the
eavesdropper will need to know the broadcasting session secret (shared) key to decrypt them.
In this way, as long as the adversary does not have the broadcasting session key, it will not be able
to get any information even if he/she wiretaps the entire network (except, of course, the source and
destination nodes).
Consequently, secure eDC-NC will efficiently enable secure broadcasting and provide ultra-
reliability networking, near-instantaneous fault recovery, and re the throughput gain of Network
Coding of 5G wireless F-RAN fronthaul networks.
5. EFFICIENCY ANALYSIS
Normally, when standard Secure Multicast [13] is utilized to provide network security, the source
has to encrypt all transmitted data streams. However, by applying eDC-NC, the source node does
not need to encrypt all the streams as shown in Section 3 and 4. In the example network in
Section 3, only three out of four data streams have to be encrypted, namely 𝑥1, 𝑥2, and 𝑐2. The
reason for encrypting only three data streams is that the eDC-NC coded data streams 𝑐1 and 𝑐2 are
not plaintext but the mod 2 combination of the raw data streams 𝑥1 and 𝑥2. So, encrypting one
stream (𝑐2
𝑒𝑛𝑐
) in this example network will make recovering the raw data streams impossible
without knowledge of the broadcasting session key to decrypt 𝑐2
𝑒𝑛𝑐
and thus be able to recover both
raw data streams via the eDC-NC decoding algorithm [6]. In this way, the cost/complexity of
encryption will be decreased by 25%. At the receiver, each destination node has only to decrypt
two out of three data streams as a maximum as illustrated in case c in Section 3 above. Hence, the
cost of decryption will be maximum and for two broadcast data streams, there will be no cost
benefits in decryption, (however, for three broadcast data stream, the decryption cost will be
decreased by 33.33%) which is referred to as a minimum decryption cost benefits (Min. DecCB).
However, in some cases, the destination node has only to decrypt one data stream (cases a and b in
Section 3) which decreases the decryption cost by 50%. In this case, the cost of decryption will be
a minimum and there will be 50% decryption cost benefit, which is referred to as a maximum
decryption cost benefits (Max. DecCB). Note that the encryption cost benefit will not vary once the
system parameters are fixed because the source node always needs to encrypt only two raw data
streams and once the number of eDC-NC encoded data stream(s) that will be used to improve the
system reliability has been selected (that is, the number of link failures that can be tolerated) the
benefit will be determined.
In general, for point-to-multipoint network topology, in order to quantify the security cost benefits,
we need to define the following variables:
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
8
𝐷𝑡𝑜𝑡𝑎𝑙: Number of overall transmitted data streams.
𝐷𝑒𝑛𝑐: Number of encrypted (raw and eDC-NC coded) data streams.
𝐷𝑟𝑎𝑤: Number of broadcast raw data streams.
𝐿 𝑓: Number of link failures that can be tolerated in the network.
𝐷 𝑑𝑒𝑐: Number of decrypted data streams.
Therefore, the security cost benefit can be calculated as follows:
The encryption cost benefits (EncCB) in percentage is:
𝐸𝑛𝑐𝐶𝐵 % =
𝐷𝑡𝑜𝑡𝑎𝑙 − 𝐷𝑒𝑛𝑐
𝐷𝑡𝑜𝑡𝑎𝑙
× 100 (6)
where
𝐷𝑡𝑜𝑡𝑎𝑙 = 𝐷𝑟𝑎𝑤 + 𝐿 𝑓 + 1 (7)
and
𝐷𝑒𝑛𝑐 = 𝐿 𝑓 + 2 (8)
Hence,
𝐸𝑛𝑐𝐶𝐵 % =
𝐷𝑟𝑎𝑤 − 1
𝐷𝑟𝑎𝑤 + 𝐿 𝑓 + 1
× 100 (9)
The decryption cost benefits (DecCB) in percentage at each destination node is:
𝐷𝑒𝑐𝐶𝐵 % =
𝐷𝑟𝑎𝑤 − 𝐷 𝑑𝑒𝑐
𝐷𝑟𝑎𝑤
× 100 (10)
where
𝐷 𝑑𝑒𝑐 = {
1 𝑖𝑓 𝑑𝑒𝑠𝑡𝑖𝑛𝑎𝑡𝑖𝑜𝑛 𝑛𝑜𝑑𝑒 ℎ𝑎𝑠 𝑛𝑜 𝑙𝑖𝑛𝑘 𝑓𝑎𝑖𝑙𝑢𝑟𝑒 𝑂𝑅 𝑜𝑛𝑙𝑦 𝑜𝑛𝑒 𝑒𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑 𝑑𝑎𝑡𝑎 𝑠𝑡𝑟𝑒𝑎𝑚 𝑖𝑠 𝑙𝑜𝑠𝑡
𝐿 𝑓 + 1 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
,
Table 1 shows the security cost benefits in percentage for tolerance of one link failure and
different numbers of broadcast data streams.
Table 1. The security cost benefits in percentage for one link failure tolerance.
Number of
broadcast
data streams
Number of
overall data
streams
Number of
encrypted
data streams
EncCB (%)
Min.
DecCB (%)
Max.
DecCB (%)
2 4 3 25 0 50
3 5 3 40 33.33 66.67
4 6 3 50 50 75
5 7 3 57.14 60 80
6 8 3 62.5 66.67 83.3
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
9
Figures 5 and 6 illustrate the relationship between the encryption and decryption cost benefits
percentage respectively and the number of broadcast data streams. Note that by applying Secure
Multicast [13], all data streams have to be encrypted at the source and decrypted at the destination
nodes. However, Figure 5 and Figure 6 show that by applying Secret (Shared) Key Cryptography
to the eDC-NC broadcast networks, there are always security cost benefits (except in the case of
minimum decryption cost for broadcasting two data streams). Also, they depict the scalability of
eDC-NC by decreasing of the security costs with the increasing the number of broadcast data
streams.
Figure 5. eDC-NC encryption cost benefits.
Figure 6. eDC-NC decryption cost benefits.
However, the security costs will increase with increasing the number of link failures that need to
be tolerated as shown in Figure 7 and Figure 8.
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
10
Figure 7. eDC-NC encryption cost benefits for different number of tolerant links.
Figure 8. eDC-NC minimum decryption cost benefits for different number of tolerant links.
6. CONCLUSIONS
This study presented efficient secure broadcasting via eDC-NC technology for 5G wireless F-RAN
fronthaul networks such that the adversary has no ability to acquire any information even if they
wiretap the entire fronthaul network (except of course the source and destination F-APs). The
security of the broadcasting data streams is obtained with lower security cost compared to that of
the standard Secure Multicast protocols. Enhanced secure broadcasting using eDC-NC in F-RAN
wireless fronthaul networks provides ultra-reliable communications, near-instantaneous link/node
failure recovery, and retains the throughput gains of Network Coding.
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
11
ACKNOWLEDGEMENTS
Nabeel I. Sulieman is supported by the Higher Committee for Education Development in Iraq
(HCED-IRAQ).
REFERENCES
[1] N. Cai and W. Yeung, “Secure Network Coding”, IEEE International Symposium on Information
Theory (ISIT), Lausanne, Switzerland, July 2002, pp. 323.
[2] L. Czap, C. Fragouli, V. M. Prabhakaran, and S. Diggavi, “Secure Network Coding with Erasures and
Feedback”, 51st
Annual Allerton Conference on Communication, Control, and Computing (Allerton),
Monticello, IL, USA, Oct. 2013, pp. 1517-1524.
[3] C. Fargouli and E. Soljanin, “(Secure) Linear network coding multicast,” Springer International Journal
of Designs, Codes, and Cryptography, vol. 78, issue. 1, pp. 269-310, Jan. 2016.
[4] S. Rouayheb, E. Soljanin, and A. Sprintson, “Secure Network Coding for Wiretap Networks of Type
II,” IEEE Transactions on Information Theory, vol. 58(3), pp. 1361-1371, March 2012.
[5] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions
on Information Theory, vol. 46, no. 4, July 2000.
[6] N. I. Sulieman, E. Balevi, and R. D. Gitlin, “Near-instant link failure recovery in 5G wireless Fog-base-
fronthaul networks,” IEEE Wireless Telecommunication Symposium, Phoenix, AZ, April 2018.
[7] N. I. Sulieman and R. D. Gitlin, “Ultra-reliable and energy efficient wireless sensor networks,” IEEE
Wireless and Microwave Technology Conference, Sand Key, FL, April 2018.
[8] E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo, “Diversity Coding for transparent self-healing and
fault-tolerant communication networks,” IEEE Trans. Commun., vol. 41, pp. 1677–1686, Nov. 1993.
[9] J. Qureshi, C. H. Foh, and J. Cai, "Optimal solution for the Index Coding problem using Network
Coding over GF(2)," 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad
Hoc Communications and Networks (SECON), Seoul, South Korea, June 2012, pp. 209–217.
[10] M. Peng, S. Yan, K. Zhang, and C. Wang, “Fog-computing-based radio access networks: issues and
challenges,” IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul./Aug. 2016.
[11] M. Peng and K. Zhang, “Recent advances in fog radio access networks: performance analysis and radio
resource allocation,” IEEE Access, vol. 4, pp. 5003-5009, Aug. 2016.
[12] T. Chiu, W. Chung, A. Pang, Y. Yu, and P. Yen, “Ultra-low latency services provision in 5G fog-radio
access networks,” IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications, Valencia, Spain, Sep. 2016.
[13] Cisco System, “Cisco IOS Secure Multicast,” whitepaper, 2006. [Online]. Available:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip-
multicast/prod_white_paper0900aecd8047191e.html
[14] Ezio Biglieri, Robert Calderbank, Anthony Constantinides, Andrea Goldsmith, Arogyaswami Paulraj,
and H. Vincent Poor, MIMO wireless communications. Cambridge University Press, 2007.
[15] B. Weis, S. Rowles, and T. Hardjono, “The Group Domain of Interpretation,” RFC 6407, IETF, October
2011.
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
12
AUTHORS
Nabeel I. Sulieman received his B.S. degree in Electrical Engineering from University
of Baghdad, Baghdad – Iraq in 1998, he was one of the ten highest ranked students in
the Electrical Engineering Department, and he received his M.S. degree with merit in
wireless communications systems from Brunel University, London – UK in 2008.
From 2002 until 2014, he worked for Iraqi Telecommunication and Post Company as
a technical support engineer. In addition, he worked as an instructor for short technical
courses in Higher Institute of Telecommunications-Baghdad-Iraq. Currently, he is a
Ph.D. Candidate in Electrical Engineering Department at the University of South
Florida in the Innovations in Wireless Information Networking Laboratory
(iWINLAB) under the supervision of Dr. Richard Gitlin, and his research interests include Diversity Coding,
Network Coding, 5G Wireless Fronthaul Networks, Synchronization of Diversity and Network Coding,
Software Defined Networking (SDN), and Network Function Virtualization (NFV).
Richard D. Gitlin is a State of Florida 21st Century World Class Scholar,
Distinguished University Professor and the Agere Systems Chaired Distinguished
Professor of Electrical Engineering at the University of South Florida. He has more
than 45 years of leadership in the communications and networking industry. He was
at Bell Labs/Lucent Technologies for 32-years performing and leading pioneering
research and development in digital communications, broadband networking, and
wireless systems. Dr. Gitlin was Senior VP for Communications and Networking
Research at Bell Labs and later CTO of Lucent's Data Networking Business Unit.
After retiring from Lucent, he was visiting professor of Electrical Engineering at
Columbia University, where he supervised several doctoral students and research projects and then Chief
Technology Officer of Hammerhead Systems, a venture funded networking company in Silicon Valley.
Since joining USF in 2008, he has focused on the intersection of communications with medicine and created
an interdisciplinary team that is focused on wireless networking of in vivo miniature wirelessly controlled
devices to advance minimally invasive surgery and other cyber-physical health care systems. Dr. Gitlin has
also directed research on advancing wireless local and 4G and 5G cellular systems by increasing their
reliability and capacity. Dr. Gitlin is a member of the National Academy of Engineering (NAE), a Fellow of
the IEEE, a Bell Laboratories Fellow, a Charter Fellow of the National Academy of Inventors (NAI), and a
member of the Florida Inventors Hall of Fame. He is also a co-recipient of the 2005 Thomas Alva Edison
Patent Award and the S.O. Rice prize, has co-authored a text, published ~150 papers and holds 65 patents.