Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
Performance analysis of voip traffic over integrating wireless lan and wan us...ijwmn
A simulation model is presented to analyze and evaluate the performance of VoIP based integrated
wireless LAN/WAN with taking into account various voice encoding schemes. The network model was
simulated using OPNET Modeler software. Different parameters that indicate the QoS like MOS, jitter,
end to end delay, traffic send and traffic received are calculated and analyzed in Wireless LAN/WAN
scenarios. Depending on this evaluation, Selection codecs G.729A consider the best choice for VoIP.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Performance Model of Key Points At the IPTV NetworksCSCJournals
In this paper we propose a new analytical model for modeling of the key points at the IPTV networks. This model uses Gamma distribution with Intergroup Characteristics for modeling self similar nature of processes in key points of IPTV network. Enclosed Gamma Distribution results are compared with results from real measurements. Calculated discrepancies confirm that enclosed analytical model is optimal estimation model for process modeling of the key points at the IPTV network. The used methodology for real-time analyses of the key points at the IPTV Network is very important for achieving IPTV service best performance.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
Energy aware clustering protocol (eacp)IJCNCJournal
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Performance Model of Key Points At the IPTV NetworksCSCJournals
In this paper we propose a new analytical model for modeling of the key points at the IPTV networks. This model uses Gamma distribution with Intergroup Characteristics for modeling self similar nature of processes in key points of IPTV network. Enclosed Gamma Distribution results are compared with results from real measurements. Calculated discrepancies confirm that enclosed analytical model is optimal estimation model for process modeling of the key points at the IPTV network. The used methodology for real-time analyses of the key points at the IPTV Network is very important for achieving IPTV service best performance.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
Energy aware clustering protocol (eacp)IJCNCJournal
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
A new method for controlling and maintainingIJCNCJournal
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Real time audio translation module between iax and rswIJCNCJournal
At the last few years, multimedia communication has
been developed and improved rapidly in order to
enable users to communicate between each other over
the internet. Generally, multimedia communication
consists of audio and video communication. However,
this research concentrates on audio conferencing
only. The audio translation between protocols is a
very critical issue, because it solves the communic
ation
problems between any two protocols. So, it enables
people around the world to talk with each other eve
n
they use different protocols. In this research, a r
eal time audio translation module between two proto
cols
has been done. These two protocols are: InterAsteri
sk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used
to provide two ways audio transfer feature. The
solution here is to provide interworking between th
e two protocols which they have different media
transports, audio codec’s, header formats and diffe
rent transport protocols for the audio transmission
. This
translation will help bridging the gap between the
two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some
related works have been done to provide translation
between IAX and RSW control signalling messages. Bu
t, this research paper concentrates on the
translation that depends on the media transfer. The
proposed translation module was tested and evaluat
ed
in different scenarios in order to examine its perf
ormance. The obtained results showed that the Real-
Time
Audio Translation Module produces lower rates of pa
cket delay and jitter than the acceptance values fo
r
each of the mentioned performance metrics.
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
The Bandwidth Allocation Models (MAM, RDM, G-RDM and AllocTC-Sharing) are management
alternatives currently available which propose different resource (bandwidth) allocation strategies in
multiservice networks. The BAM adoption by a network is typically a management choice and
configuration task executed by the network operations and management system setup in a static or nearly
static way. This paper proposes and explores the alternative of allowing BAM definition and configuration
on a more dynamic way. In effect, one of the basic motivations towards BAM dynamic allocation is the fact
that multiservice networks characteristics (traffic load) may change considerably in daily network
operation and, as such, some dynamics in BAM allocation should be introduced in order to improve
performance. A framework is presented supporting BAM dynamic allocation. The framework adopts an
OpenFlow-based software-defined networking (SDN) implementation approach in order to support
scalability issues with a centralized controller and management network view. The framework architecture
also supports the implementation of some autonomic characteristics which, in brief, look for improving and
facilitating the decision-making process involved with BAM provisioning in a multiservice network. A
proof of concept is presented evaluating different BAM performance under different traffic loads in order to
demonstrate the framework strategy adopted.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
Network jammers can uncover the reliability of the wireless networks, where the position of the jammer node permit the network to cope with jamming leveraging varieties of defence strategies. Wireless Bluetooth network is a short range network, where the Bluetooth transceiver is operating in the 2.4 GHz ISM (industrial, scientific and medical) radio band, and a special type of frequency hopping pattern was included with the specification of the Bluetooth technology to offer the necessity requirement for the matching Radio Frequency RF channels. This paper calculates and evaluates the effect of noise power
jammer and follower jammer on the Personal Area Network (PAN) Bluetooth network. The results prove
that the effect on the Bluetooth network depends on many factors such as power density, distance and
immunity technique, which is used in many Bluetooth networks
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
Pwm technique to overcome the effect ofIJCNCJournal
Many current communication systems suffer from performance degradation due to the high sensitivity to
high power peaks especially in the nonlinear devices. The author introduces a new concept based on the
Pulse Width Modulation (PWM), namely MIMO-OFDM system based PWM (MO-PWM) to overcome this
deficiency. Here, the peak-to-average power ratio (PAPR) problem in Orthogonal Frequency Division
Multiplexing (OFDM) technique is used as a criterion to check the validity of the proposed work.
Moreover, the proposed system work has been implemented over Field Programmable Gate Array (FPGA),
which is designed to characterize both of the complexity and the speed issues.
The systems performance based MO-PWM and validity have been checked based on a numerical analysis
and a conducted simulation. The simulation results show that the MO-PWM can clearly reduce the PAPR
values nevertheless the used OFDM systems’ specifications, and gives a promising results over some
techniques found in the literature, such as clipping, SLM and PTS under same bandwidth occupancy and
system’s specifications.
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the client’s interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the client’s interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum
communication. Confidential modulationrealizes a secret communication by using secret information for
modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication.
The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical
security andthe evaluation depends on the security status of pseudo random numbergenerator (PRNG)
which controls the modulation. On the other hand,our method is based on mode of operation for block
ciphers and clears theweaknesses from structural viewpoint. Using our method, we can comparethe
security of different GCM structures. Our method of security evaluationand comparison does not depend on
the security status of PRNG.From the results of our evaluation, we conclude that the security of GCMis
limited to computational security.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
A comparative analysis of number portability routing schemesIJCNCJournal
To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost
important. NP allows end user to retain their telephone number in case of change of geographical location
or service type or service provider. This paper describes the various number portability routing schemes
namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis
between these routing schemes on various parameters is presented here. The issues pertaining to NP have
also been described.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about student’s academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
–K- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Internet considered as the most important types of wide area networks and the most
important sources for information, that is because its ability to give many electronic services, like
email, communication services, voice over IP, Internet telephony and other services, to get these
services requires accessing to the web server. It is obvious that to make sure the connection oriented
with the Internet service providers, requires remaining and operating the received device within the
arriving zone of Internet signal, and this device will stop to receive this Internet signal, if it moves to
a new position lies outside this area. The researchers presented through their scientific researches
many ideas and ways of ensuring the continued achievement of the Internet access, despite of the
mobility of the recipient device outside the area of the original service provider, the flow of these
ideas led to do a new networking technique known as multi-homing mobility technique, the
researchers are developed several topologies and protocols to suit their operation with this kind of
mobile networks. This paper presents a new approach for developing the multi-homing mobility
network system that increases the performance operation in spite of the far mobility of the recipient
device to new positions. This approach gives also a new way of network topology, new protocols of
programming internetworking devices, as well as applying the mobile IP addressing for sending and
receiving the packets between the Internet service provider and the mobile recipient, and gives a
reliable algorithm for enhancing troubleshooting packet loss. To test and check the ability of this
approach, we design a hypothetical multi-homing mobility network system that operates under these
proposed algorithms, apply packet tracer v.5 simulator for testing the performance of this proposed
approach.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
IPv4 is being replaced by IPv6 due to the increased demand from mobility devices. However, it is necessary that there is a lack of research on what change actually means for the performance of mobility. This research aims at comparing Mobile IPv4 and Mobile IPv6 in terms of performance on latency, TCP/UDP throughput, and connectivity loss while roaming. Thus the study will explore the effects of the future implementation of Mobile IPv6 for mobile devices.
IPv4 is being replaced by IPv6 due to the increased demand from mobility devices. However, it is necessary that there is a lack of research on what change actually means for the performance of mobility. This research aims at comparing Mobile IPv4 and Mobile IPv6 in terms of performance on latency, TCP/UDP throughput, and connectivity loss while roaming. Thus the study will explore the effects of the future implementation of Mobile IPv6 for mobile devices.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPIJNSA Journal
Mobile ip (mip) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from correspondent node (cn) to a mobile node (mn) go first through the mobile node’s home agent (ha), then the ha tunnels them to the mn’s foreign network. One of the main problems in the original mip is the triangle routing problem. Triangle routing problem appears when the indirect path between cn and mn through the ha is longer than the direct path. This paper proposes a new technique to improve the performance of the original mip during the handoff. The proposed technique reduces the delay, the packet loss and the registration time for all the packets transferred between the cn and the mn. In this technique, tunneling occurs at two levels above the ha in a hierarchical network. To show the effectiveness of the proposed technique, it is compared with the original mip and another technique for solving the same problem in which tunneling occurs at one level above the ha. Simulation results presented in this paper are based on the ns2 mobility software on linux platform. The simulations results show that our proposed technique achieves better performance than the others, considering the packet delay, the packet losses during handoffs and the registration time, in different scenarios for the location of the mn with respect to the ha and fas
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
A mobile ad hoc network (MANET) can be seen as a mobile nodes collection
having no support of fixed infrastructure and therefore its communication is
totally dependent on the network's nodes. As a result of the mobility of
nodes, rapid and unpredictable changes occur within the mobile ad hoc
network (MANET) arrangements. Therefore, this makes the analysis of
routing protocols very crucial so as to enhance efficient communication
between the wireless nodes. IPv4 and IpV6 within the MANET is another
issue of concern. IPv4 which has been traditionally used for ages and IPv6;
predicted to be the forthcoming network architecture model is investigated
because of its protection which has been improved as well as its enormous
address space provision. The analysis on Ad Hoc On Demand Vector and
Dynamic Manet On Demand routing protocols are performed using Qualnet
simulator under the IPv4 and IPv6 standards. A thorough evaluation of the
usability and functionality of the simulator software is carried out. The
metrics for performance are; Throughput, End-to-End Delay and Average
jitter. Afterwards, analyses and summary of the results is conducted and
summarized in order to make available an assessment of their performances.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Internet service provider mobile
1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
DOI : 10.5121/ijcnc.2014.6406 65
INTERNET SERVICE PROVIDER-MOBILE
BORDER GATEWAY ROUTE
OPTIMIZATION TECHNIQUE IN MOBILE
IP BASED ON DIFFERENT ISPS
STRUCTURES (ISP-MBG)
Sherif Kamel Hussein
Department of Communications and Electronics
October University for Modern Sciences and Arts
Giza - Egypt
ABSTRACT
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
KEYWORDS
Internet Service Provider, Point of Presence, Mobile IP Border Gateway, PoPs Virtual Mobile IP
Network.
1. INTRODUCTION
Mobile IP is an open standard protocol defined by the Internet Engineering Task Force (IETF)
RFC 2002. That allows users to keep the same IP address, stay connected, and maintain
ongoing applications while roaming or travelling between networks. The operation of Mobile
IP protocol is based on three main functions ,Agent Discovery , Registration and Tunneling [1].
The main problem of Mobile IP is the triangle routing problem in which all the traffics sent by
the Correspondent node (CN) to Mobile Node (MN) will be intercepted by the Home Agent
(HA) which is a main router serving the home network for the Mobile Node .Home Agent will
tunnel the transmitted packets to the Foreign Agent (FA) which is a router serving the foreign
2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
66
network where the mobile node is located .The Foreign Agent then de- tunnels the received
packets and forward the packets finally to the Care of Address (CoA) of the Mobile Node on the
foreign Network [2].
The route taken by the transmitted packets from the Mobile Node to the Correspondent Node is
Triangular in nature which definitely leads to an increase in the delay time and also decrease in
network throughput. Internet Service Provider Mobile Border Gate Way ( ISP MBG) is a route
optimization technique based on using multiple Internet Service Providers (ISPs) separated by a
multiple Mobile Border Gateways (MBGs). This technique has been studied and discussed
before based on using two similar Internet Service Providers structures and the simulation
results showed a better performance compared with the conventional Mobile IP technique . In
This paper the technique will be studied based on using two different Internet Service Providers
Structures[3-4].
The paper is divided into five sections. The second section: introduces the route optimization
technique Internet Service Providers Mobile Border Gateway (ISP MBG) for two similar ISP
structures . The third section: presents the implementation of ISP MBG technique based on
two different ISPSs Structures . Section 4: introduces the evaluation and the simulation results
for the proposed ISP MBG technique compared with conventional Mobile IP technique.
Conclusion and future work are presented in section 5.
2. INTERNET SERVICE PROVIDER MOBILE BORDER
GATEWAY TECHNIQUE [5]
The design is composed of a number of N Internet Service Providers ISP1, ISP2,…….., ISPN,
each covers a definite and different geographical place. They are separated by an L Mobile IP
Border Gateways (MBGs) .Each ISP is serving S equal Areas. Each Area is divided into M
Zones and each Zone is served by K number of Points of Presence nodes (PoPs).Each PoP is
serving X number of nodes with a range W of Addresses. The nodes are classified as either
Local Nodes or Foreign Nodes based on whether they are located in the same Agent or in
different Agents. Each Area is served by an Agent which is considered as a Home Agent for the
local nodes inside the Area or as a Foreign Agent for the nodes located outside the Area .For
each Internet Service Provider there are K PoPs Virtual Networks (PVNs) which handle the
state information for all Mobile Nodes and Correspondent Nodes. Figure 1 show the structure
for a given ISP . Figure 2 show an example of PoPs Virtual Networks (PVNs) for a given ISP.
Figure 1. Structure For a Given ISP
ISP
Area 1
(Agent
Area 2
(Agent
Area S-1
(Agent S-
Area S
(Agent
Zone Zone 2 Zone M- Zone
PoP 1 PoP PoP K- PoP
3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
67
PVNi
∀i∈1..k
PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM),
PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi
(Area2,ZoneM),…..,
PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM).
Figure 2. PoPs Vitual Network for a Given ISP
ISP MBG technique is supporting both the tunneling and routing techniques.MBG will either
maintain the binding information (Home address, Care-of-Address) or only the home
information based on whether the ISP MBG technique is using tunneling or routing technique
in forwarding the packets between the Correspondent Nodes and the Mobile Nodes [5-6].
2.1 ISP MBG Technique Operation Sequence
When a connection is to be started between two nodes the Correspondent Node and Mobile
Node , the execution of the ISP MBG technique will be started by checking the location of both
nodes.If both nodes are located in the same Internet Service Provider (ISP) so the
Correspondent Node will start asking for an information about the Mobile Node by connecting
first to its nearest home PoP. That PoP will search its neighboring PoPs through the PoP Vitual
networks. One of these PoPs should have an information about the Mobile Node and the
connection will be started. In case if both MN and CN are in different ISPs, the same sequence
will be taken but the only difference is that the PoP that is connected to the MN through the PoP
virtual network (PVN) will connect to Mobile Border Gateway (MBG) which maintains the
original home information for the destined MN.MBG will then connect to the nearest PoP in the
destination ISP which is connected to a new virtual Network of the Mobile Node and then the
connection will be started directly between the Correspondent Node (CN) and the Mobile Node
(MN).Figure 3 shows the operation sequence for ISP MBG technique in both cases . In case 1
both MN and CN are in the same Agent but in case 2 both MN and CN are in different Agents
[5-6].
Figure 3. Operation Sequence for the Proposed Technique
Agent1
PoP1
PoP2
PoP - PoP
PoP1
PoP2
PoP -
PoP1
PoP2
PoP -
PoP1
PoP2
PoP - PoP
PoP1
PoP2
PoP -
PoP1
PoP2
PoP -
Agent2
Area
1
Area 2
MBG
Home information for
the transferred MN
(Agent, Area, Zone,
PoP)
MN1
MN2
CN
PVN 1.c
2.e
2.d
2.a
1.a
2.b
1.b
2.c
4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
68
2.2 ISP MBG System Parameters
The key point to establish any System is to define the system parameters .System Parameters
include the simulation parameters , data structures, and the connection parameters. Simulation
parameters are related to the system construction and defined by the number of ISPs, MBGs,
Areas, Zones, PoPs, and the in service or in waiting nodes covered by each PoP .The main data
structures used in the simulation are Nodes, POPs, Areas, Agents, and Mobile IP Border
Gateway (MBG). All the data structures are implemented in C sharp on a microsoft.net platform
[5-6].Finally the connection parameters are the parameters required for the design and the
implementation of the ISP MBG algorithm and are classified as follows:
1. The distance in km equivalent to the distance of 1 pixel.
2. Link speed for PoP connection
3. Link speed for Agents connection
4. PoP nodes count to serve.
5. PoP nodes count to wait
6. Agent nodes count to serve
7. Agent nodes count to wait
3. IMPLEMENTATION OF ISP MBG TECHNIQUE BASED
DIFFERENT ISPS STRUCTURES.
The Implementation of the ISP MBG technique is based on two different ISPs Structures. The
first ISP is serving only one Area with 2 Zones and 4 PoPs per Zone. The second ISP is serving
2 similar Areas with 3 Zones each, and 3 PoPs for every Zone. Each PoP is actually serving 100
nodes with 150 addresses as shown in figure 4. The addresses are classified as 100 addresses
available for the nodes in service and the remaining 50 Addresses for the nodes that are in the
waiting state.For the nodes in service we can split the addresses into 75 addresses for local
generating nodes and 25 addresses for external nodes. In a similar way the waiting nodes
addresses are divided equally between the local and the external generating nodes. The number
of nodes used in the simulation is about 2000 Nodes. Figure 5 shows the design architecture of
the proposed ISP MBG technique based different IPSs structures.
Figure 4. Nodes and Address Classifications for PoPi
PoP i
N1
N75 N76 N100 N101
N125
N126
N150
1-------75
Locally in
services
76-----100
Locally in
waiting
101-----125
Externally in
services
126-----150
Externally in
waiting
5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
69
∑
∈∀ .....im
The total number of PoPs can be calculated by the following equation:
PN = Pik X Niz (1)
Where;
PN is the total number of PoPs
Pik is the number of PoPs within the zone in Internet Service Provider k
Ni is the total number of Zones in Internet Service Provider i
Also the Applicable total number of generating nodes can be calculated from the given
equation.
NT = PN x NC (2)
Where;
NT is the total number of generating nodes
NC is the total number of generating nodes in each connection.
Figure 5. System Construction
P3P2P1
P3P2P1
P3P2P1
Zone 1
Zone 2
Zone 3
Area 1
P3P2P1
P3P2P1
P3P2P1
Zone 1
Zone 2
Zone 3
Area 2
ISP 2
P2P1
P3 P4
MBG
Zone 1
P2P1
P3 P4
Zone 2
Area1
ISP 1
6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
70
∑
−
+
∈∀ 1
1
.....
),(
zi
mm
m
PPD
∑
−
+
∈∀ 1
1
.....
),(
Z
m
mm
im
L
PPD
4. EVALUATION OF THE ISP MBG TECHNIQUE
To evaluate the performance of the proposed ISP MBG technique, the following five measuring
criteria are required: Link Distance, Transmission Time, Blocking, Buffering and Security.Link
distance will be calculated based on the distance between two connecting nodes and it is
calculated in kilometer equivalent to the number of pixel (1 pixel =0.2 Km).The Link distance is
calculated using the following equation:
Dt (Pi, Pz) = (3)
Where; P: Transmission point (PoP or MBG)
D: Euclidian distance
Dt: Total link distance between two transmission points
The transmission time will be calculated based on the location of both nodes, the Mobile Node
(MN) and the Correspondent Node (CN) and whether both are located in the same area, same
Internet Service Provider or either one in different areas or different Internet Service Providers.
the transmission time will be calculated using the following equation:
T (Pi, Pz) = (4)
Where; P: Transmission point (PoP or MBG)
T (Pi, Pz):Total transmission time between two points Pi and Pz
L: Link speed
D: Euclidian distance
Blocking will be calculated as the number of blocked connections and that will define the
network throughput taking into consideration that each connection has 2 nodes. Buffering is
considered as one of the network resources that must be optimally used. In conventional Mobile
IP buffering is based mainly on the storage buffers of the Agents whatever Home or foreign
Agent but in the proposed technique mainly is based on the PoPs storage Buffers and the PoPs
virtual Networks. Security is an important performance parameter to measure how much the
data and the information are secured while travelling from one network to another. Further
study for the performance of the proposed technique will be used to measure the evaluation for
both the buffering and the security parameters [7-8].
4.1 Simulation Results for the case of 2 different ISPs structures
For the case where two different ISPs are used, the first ISP consists of one Area of two Zones
and four PoPs per Zone, and the second ISP consists of two Areas ,each with three Zones and
three PoPs per Zones, the algorithm is applied for a range of 2000 Nodes The comparison
graphs will be detailed in the following subsections .
7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
71
4.1.1 Simulation Results for Link distance
(a) Total Link Distance for the Conventional and the ISP MBG Techniques
Average Link Distance Per Connection (2 Different ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
200
400
600
800
1000
1200
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
Distanc(km)
ISP MBG Link Distance
Per Conection
Conventional Mobile IP
link Distance Per
Connection
(b) Average Link Distance for the Conventional and the ISP MBG Techniques
Figure 6. Link Distance Comparison
Form figures (6.a) and (6.b) we can see that, when different ISPs with different configurations
are connected to each other, the performance of the new technique still outperforms the
conventional techniques.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
72
4.1.2 Simulation Results for Transmission Time
Total Transmission Time Comparison (2 Different ISPs -
1st with 1 Area of 2 Zones and 4PoPs, 2nd with 2 Areas of 3
Zones and 3 PoPs)
0
1000
2000
3000
4000
5000
6000
7000
8000
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
TotalTransmission
Time(sec)
ISP MBG Total
Transmission Time
Conventional Mobile
IP Yotal Transmission
Time
(a) Total Transmission Time for the Conventional and the ISP MBG Techniques
Average Transmission Time Per Connection (2 Different
ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
5
10
15
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
Transmissio
nTime(sec)
ISP MBG Transmission
Timr Per Connection
Conventional Mobile IP
Transmission Time Per
Connection
(b) Average Transmission Time for the Conventional and the ISP MBG Techniques
Figure 7. Transmission Time Comparison
Figures (7.a) and (7.b) show that the same argument applies when comparing the transmission
time performance and the results for the link distance simulation, the new technique
outperforms the conventional technique in the transmission time .
9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
73
4.1.3 Simulation Results for Throughput
Throughput Comaprison (2 Different ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
5
10
15
20
300
375
450
525
600
675
750
825
900
975
#of Connections
BlockedConnections
ISP MBG Blocking
Conventional Mobile IP
Blocking
Figure 8. Throughput Comparison
Figure 8 shows the throughput performance of the new techniques is still better than the
conventional techniques, similar to the case of same ISPs.
4.1.4 Buffering
Concerning Buffering; it has been found that the ISP MBG technique provides better buffering
than the Conventional Mobile IP technique. Using PVN is facilitating the process of accessing
the home information for any mobile nodes roaming between networks . Because of PVN
provides a virtual network among PoPs , the home information of Mobile Node could be
accessed without any redundancy of having multiple copies at each PoP .Comparatively in the
conventional Mobile IP technique the Home Agent Buffer should maintain the home
information for each node travelled to a foreign network and that definitely lead to the need of
high buffering size. On the other side it has been found that the cost for the Agent's buffers is
higher than that of the PoP's buffers [9].Further study will be conducted in the future to
elaborate in more details the comparison between buffering in both the conventional and the
proposed ISP MBG techniques.
4.1.5 Security
The Security design has a great concern in Mobile IP. In ISP MBG technique Mobile IP Border
Gateway (MBG) is used to keep the information (Home address or binding information) for all
Mobile Nodes roaming from one network to another so there will be no need for any
Correspondent Node (CN) to maintain any private information for the new IP network where
the Mobile Node is visiting . Comparatively, the conventional Mobile IP technique needs high
level of security to prevent the malicious users from intercepting the connection between the
MN and the CN which maintains the binding information (Ha, CoA). Further study will be
conducted in the future to Study the comparison between Security level in both the
conventional and the proposed ISP MBG techniques .
10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
74
4.2 Performance Comparison Between The Conventional Mobile IP Technique
And the Proposed ISP MBG Technique Based Different IP Structures
Table1 summarize the performance comparison between the conventional Mobile IP technique
and the proposed ISP MBG techniques for different ISP structures respectively.
Table1. Comparative Parameters for the Conventional and the Proposed ISP MBG Techniques
[Different ISPs structures]
Technique
Parameters
ISP MBG
Technique
Conventional Mobile IP
Technique
Link Distance Shorter Link distance Longer link distance
Transmission Time Lower transmission time Higher transmission time
Blocking lower rate of blocking Higher rate of blocking
Buffering - Less buffering storages
- Lower cost
- More buffering storages
- Higher cost
Security Higher level of security Lower level of security
5. CONCLUSION AND FUTURE WORK
In this paper, a further study on the ISP MBG Route Optimization Technique has been
introduced to check the performance evaluation of the technique when two different ISPs
structures are used. The design and the sequence of operation for ISP MBG technique are
reviewed in this paper .The implementation of the case study for two different ISPs structures
is also detailed in this paper .
For different ISPs structures, the simulated network design of our case study is based on using
two different Internet Service Providers structure separated by one Mobile IP border gateway.
One ISP is composed of one Area, 2 Zones and 4 PoPs serving each Zone. Another ISP is
composed of 2 Areas, each has 3 Zones and 3 PoPs serving each Zone. Each PoP is serving 100
nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission
Time ,Blocking, Buffering, and Security show that the proposed (ISP MBG) technique still
outperforms the conventional Mobile IP technique.
This work can be extended to include investigation of using multiple ISPs and multiple MBGs.
In that case the MBG is not only restricted to hold the home information for the nodes crossing
their local ISP, or to guide in establishing the route to the MN located in an external ISP, but
rather the investigated subjects in that areas are continuing enhance the functionalities of MBG
to do more advanced tasks. Such tasks include, tunneling, conditional Processes for the route
optimization, and others.Moreover, using multiple MBGs will distribute the processing load
among the MBGs.
REFERENCE
1. Abbas Jamalipour, ( 2003) “The Wireless Mobile Internet”, John Wiley & Sons Ltd., England.
2. Philip J. and Nesser II, (2001) “Survey of IPV4 Addresses in Currently Deployed IETF standards”,
Internet-drafts, draft-ietf-ngtrans-ipv4 survey-01.text, work on progress.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
75
3. Sherif kamel Hussein, Khaled Mohamed Almustafa, “Triangle Routing Problem in Mobile IP”,
Journal of Communication and Computer , David Publishing ,JCC-E20140114-3 USA,2014.
4. Ramesh Bharti, Vishnu Kumar Sharma, Navneet, Aman Gupta4, (2013) ”A P2P Based Route
Optimization Architecture for Mobile IP Based on Simulation Work”, International Journal of
Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO
9001:2008 Certified Journal, Volume 3, Issue 2.
5. Sherif Kamel Hussein, (2012) "Extended Study on ISP MBG Route Optimization Technique in
Conventional Mobile IP 4 ", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661
Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35 ww.iosrjournals.org.
6. Rajesh Singh Thakur, Babita Kubde, (2013)” Implementation of Route Optimization Mobile IP to
Analyze the TCP Performance during Handoff”, International Journal of Science and Research
(IJSR), India Online ISSN: 2319-7064,Volume 2 Issue 1.
7. Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh, (2013) “ Secure Connection in Mobile
IPv6” Life Science Journal.
8. Susanna S Henry, Dr. V. Santhosh Kumar, (2012) ”Current status of Mobile Internet Protocol
Version 4 and its security Issues “,IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 2, No 2,.
9. www.Cisco.comgoLogistics
AUTHORS
Sherif kamel Hussein Hassan Ratib : Graduated from the faculty of engineering in 1989
Communications and Electronics Department ,Helwan University. He received his
Diploma MSc,and Doctorate in Computer Science ,Major Information Technology and
Networking. He has been working in many private and governmental universities inside
and outside Egypt for almost 13 years .He shared in the development of many industrial
courses .His research interest is GSM Based Control and Macro mobility based on Mobile
IP .