Indoor wireless communication is an essential part of next generation wireless communication system.For
an indoor communication number of users and their device are increasing very rapidly so as a result
capacity of frequency spectrum to accommodate further users in future is limited and also it would be
difficult for service providers to provide more user reliable and high speed communication so this short
come can be solve in future by using Li-Fi based indoor communication system. Li-Fi which is an emerging
branch of optical wireless communication can be useful in future as a replacement and backup of Wireless
Fidelity (Wi-Fi)for indoor communication because it can provide high data rate of transmission along with
high capacity to utilize more users as its spectrum bandwidth is much broader than the radio spectrum. In
this paper we will look at the different aspects of the Li-Fi based indoor communication system,summarizes
some of the research conducted so far andwe will also proposed a Li-Fi based communication model
keeping in mind coverage area for multiple user and evaluate its performance under different scenarios .
Li-Fi is a wireless communication technology that uses light from LED lights to transmit data. It provides a more secure and higher bandwidth alternative to Wi-Fi. The document discusses the history and development of Li-Fi, including early experiments in the 1990s. It also explains the technology behind Li-Fi including how it works at the physical and data link layers using LED lights to vary signal strength to transmit data. Li-Fi is positioned to handle the rapidly increasing demand for wireless data capacity into the future.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
This document provides documentation for a project implementing Li-Fi technology using Arduino boards. It includes descriptions of the members' responsibilities, an introduction to Li-Fi technology explaining the working principles of VLC transmitters and receivers, and details of the functional design including the software used and hardware components. The software uses Manchester encoding and decoding to transmit and receive data over visible light. The hardware prototype uses an Arduino board with an LED as the transmitter and a solar panel as the receiver to set up a basic communication channel for testing Li-Fi.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This project progress report summarizes work on optimizing optical CDMA technology for fiber optic communication. The report discusses principles of OCDMA coding, major challenges like bit error rate and multi-access interference, and methods to overcome challenges such as using spectral amplitude coding and spectral phase coding. It also summarizes simulations conducted to measure bit error rate at different distances using an OCDMA system based on fiber Bragg grating encoders and decoders. Finally, the report outlines applications of OCDMA including use in passive optical networks and providing virtual private networks over metro optical networks.
Li fi (light fidelity) – the changing scenario of wireless communicationeSAT Journals
Abstract
Sustainability has been a major parameter in evaluation of construction industry. Sustainable construction can be defined simply as the application of methods which fulfill the needs of the present generation without compromising the needs of the future generation [1]. One of such methods used is LCA. Life Cycle Assessment of a construction material is done to get a broader picture of the environmental impact of the particular material in terms of carbon footprint. LCA Methods helps in pointing out the specific process of the material procurement or usage during which cynically affects the environment. The analysis of the results may help in informing the consumer or producer to reduce the life cycle greenhouse gas emissions. In this paper, EIO-LCA software is discussed and alternative construction materials are analyzed against conventional materials thereby, suggesting the better one between them. Necessary incentives to enhance the use of LCA were also discussed.
Keywords – Sustainability, Life Cycle Assessment, carbon footprint, EIO-LCA
This document evaluates the performance of digital modulation techniques in a WCDMA radio over fiber communication system. It discusses how radio over fiber combines wireless and optical networks to increase network capacity and mobility while decreasing costs. The document specifically looks at 64-PSK modulation and analyzes its performance based on metrics like bit error rate, eye diagrams, and scatter plots. Radio over fiber is presented as a promising technique for next generation wireless networks as it can support high data transmission rates and seamlessly integrate various communication services.
Mitigating effect of flickering and dimming in visible light communication us...Ramesh Patriotic
This paper proposes using MIMO techniques in visible light communication (VLC) systems to achieve high data transmission rates. It simulates various VLC system configurations (SISO, MISO, MIMO) using overlapping pulse position modulation. The results show that a MIMO system using an array of LEDs at the transmitter and receiver achieves much lower bit error rates than SISO or MISO systems as SNR increases. Specifically, at high SNR the MIMO system can provide bit error rates several orders of magnitude smaller than SISO. This confirms that MIMO is well-suited for VLC and can enable data rates of several hundred Mbps or even Gbps. The paper also evaluates modulation techniques for mitigating flickering and
Li-Fi is a wireless communication technology that uses light from LED lights to transmit data. It provides a more secure and higher bandwidth alternative to Wi-Fi. The document discusses the history and development of Li-Fi, including early experiments in the 1990s. It also explains the technology behind Li-Fi including how it works at the physical and data link layers using LED lights to vary signal strength to transmit data. Li-Fi is positioned to handle the rapidly increasing demand for wireless data capacity into the future.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
This document provides documentation for a project implementing Li-Fi technology using Arduino boards. It includes descriptions of the members' responsibilities, an introduction to Li-Fi technology explaining the working principles of VLC transmitters and receivers, and details of the functional design including the software used and hardware components. The software uses Manchester encoding and decoding to transmit and receive data over visible light. The hardware prototype uses an Arduino board with an LED as the transmitter and a solar panel as the receiver to set up a basic communication channel for testing Li-Fi.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This project progress report summarizes work on optimizing optical CDMA technology for fiber optic communication. The report discusses principles of OCDMA coding, major challenges like bit error rate and multi-access interference, and methods to overcome challenges such as using spectral amplitude coding and spectral phase coding. It also summarizes simulations conducted to measure bit error rate at different distances using an OCDMA system based on fiber Bragg grating encoders and decoders. Finally, the report outlines applications of OCDMA including use in passive optical networks and providing virtual private networks over metro optical networks.
Li fi (light fidelity) – the changing scenario of wireless communicationeSAT Journals
Abstract
Sustainability has been a major parameter in evaluation of construction industry. Sustainable construction can be defined simply as the application of methods which fulfill the needs of the present generation without compromising the needs of the future generation [1]. One of such methods used is LCA. Life Cycle Assessment of a construction material is done to get a broader picture of the environmental impact of the particular material in terms of carbon footprint. LCA Methods helps in pointing out the specific process of the material procurement or usage during which cynically affects the environment. The analysis of the results may help in informing the consumer or producer to reduce the life cycle greenhouse gas emissions. In this paper, EIO-LCA software is discussed and alternative construction materials are analyzed against conventional materials thereby, suggesting the better one between them. Necessary incentives to enhance the use of LCA were also discussed.
Keywords – Sustainability, Life Cycle Assessment, carbon footprint, EIO-LCA
This document evaluates the performance of digital modulation techniques in a WCDMA radio over fiber communication system. It discusses how radio over fiber combines wireless and optical networks to increase network capacity and mobility while decreasing costs. The document specifically looks at 64-PSK modulation and analyzes its performance based on metrics like bit error rate, eye diagrams, and scatter plots. Radio over fiber is presented as a promising technique for next generation wireless networks as it can support high data transmission rates and seamlessly integrate various communication services.
Mitigating effect of flickering and dimming in visible light communication us...Ramesh Patriotic
This paper proposes using MIMO techniques in visible light communication (VLC) systems to achieve high data transmission rates. It simulates various VLC system configurations (SISO, MISO, MIMO) using overlapping pulse position modulation. The results show that a MIMO system using an array of LEDs at the transmitter and receiver achieves much lower bit error rates than SISO or MISO systems as SNR increases. Specifically, at high SNR the MIMO system can provide bit error rates several orders of magnitude smaller than SISO. This confirms that MIMO is well-suited for VLC and can enable data rates of several hundred Mbps or even Gbps. The paper also evaluates modulation techniques for mitigating flickering and
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsEditor IJCATR
This document describes the VHDL implementation of an FPGA-based OFDM modem for wireless applications. It discusses Orthogonal Frequency Division Multiplexing (OFDM) and how it can be used for high-speed wireless communications. The document outlines the basic blocks of an OFDM modulator and demodulator system, including QAM/PSK modulation, serial to parallel conversion, inverse fast Fourier transform (IFFT), and how these can be implemented using VHDL on an FPGA for applications such as software defined radio. It provides a block diagram of the OFDM modem and discusses the advantages of implementing the design using a field programmable gate array.
This document provides an overview of topics covered in an Introduction to Computing course for a Bachelor of Science in Information Systems final term. The topics covered include computer networks, communication media like twisted pair cables, coaxial cables and fiber optic cables. It also introduces Java programming, the Java Eclipse IDE, and how to write a simple "Hello World" program. The objectives are to understand computer networks, different communication media, and to learn about programming languages and how to write a basic Java program.
This document discusses speed adaptive mobile IP over wireless LAN. It first analyzes the relationship between performance and moving speed for mobile IP over wireless LAN, showing that current mobile IP is not suitable for rapid movement. It then proposes a speed adaptive mobile IP protocol that extends registration messages with speed information to allow the network behavior to automatically adapt based on node speed, improving performance for rapid movement without high resource costs. The protocol is emulated and shown to greatly improve mobile IP performance for rapid movement over wireless LAN.
In data communication,
Transmission media is a pathway that carries the information from sender to receiver.
We use different types of cables or waves to transmit data.
Data is transmitted normally through electrical or electromagnetic signals.
Synchronous optical networking (SONET) is a standardized digital communication protocol that is used to transmit a large volume of data over relatively long distances using a fiber optic medium. With SONET, multiple digital data streams are transferred at the same time over optical fiber using LEDs and laser beams.
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
This document analyzes the performance of different modulation schemes using WiMAX and LTE. It compares these two advanced wireless technologies in the physical layer and provides performance analysis of modulation schemes like BPSK, QPSK, and 16-QAM based on SNR or Eb/No and BER. MATLAB is used to simulate and analyze the performance of modulation schemes in WiMAX and LTE networks. The document also discusses the evolution of wireless access technologies and highlights the need for higher data rate technologies like WiMAX and LTE.
This document summarizes research on improving the performance of WiMAX systems using FEC zigzag coding and MIMO techniques. It first provides background on WiMAX and discusses how OFDM, MIMO, and various channel coding schemes like zigzag codes work. It then evaluates the bit-error rate performance of WiMAX systems using zigzag-coded modulation with different code rates and lengths. The results show zigzag coding presents stronger error correction than Reed-Solomon with Convolutional coding. Encoding and decoding of zigzag codes is explained, along with how concatenated zigzag codes provide even stronger error correction through interleaving and turbo processing.
Seminar on vlc / visible light communicationSAMBIT SWAIN
The document discusses visible light communication (VLC) using sustainable LED lights. VLC uses LED lights to transmit data through subtle and fast variations in light intensity. This takes advantage of LED lights' high efficiency and long lifespan. Examples of VLC applications discussed include indoor location services, use in industrial settings where radio waves are restricted, and onboard aircraft where it would not interfere with radio communications. VLC provides a cleaner, greener and safer alternative to wireless data transmission when compared to traditional radio-based WiFi.
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK bioejjournal
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um
Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence
software, for health care applications. The ultimate goal for such application is to minimize the trade-offs
between performance and cost, and between performance and low power consumption design. This paper
introduces the design of a 2.4GHz class AB power amplifier which consists of two stage amplifiers. This
power amplifier can transmit 10dBm output power to a 50Ω load. The power added efficiency is 7.5% at
1dB compression point and the power gain is 10dB, the total power consumption is 0.135W. The
performance of the power amplifier meets the specification requirements of the desired.
This presentation provides an overview of advanced telecom technologies, including digital switching principles, fiber optics communication, mobile communication principles like GSM and CDMA, broadband DSL technologies, intelligent networks, ISDN, and next generation networks. It was presented by Ashish Nandan to the Department of Electronics and Communication Engineering at Future Institute of Engineering and Management.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Ranjeet Bidwe
This document discusses issues with using TCP in wireless networks and proposed solutions. The main issues are higher bit error rates, lower bandwidth, mobility, and longer round trip times in wireless networks compared to wired networks. TCP was designed for wired networks and assumes packet loss is always due to congestion, but in wireless networks loss can occur for other reasons like bit errors, handoffs, or disconnections. This wrong assumption causes TCP to reduce its window size unnecessarily, degrading performance. The document surveys proposed solutions like Snoop to cache packets at base stations to hide losses from the sender, and Explicit Congestion Notification to signal congestion before queue overflows.
This document discusses dispersion compensation techniques for optical code division multiple access (OCDMA) systems using dispersion compensation fiber (DCF) and fiber gratings. It compares the performance of an 8-user OCDMA system using DCF versus fiber gratings. The results show that DCF more effectively compensates for dispersion, as evidenced by a lower bit error rate and higher Q factor, making it a better dispersion compensation method for OCDMA systems compared to fiber gratings.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission. LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices.
This document discusses Li-Fi (Light Fidelity) technology for wireless data transmission using visible light communication (VLC). Li-Fi uses light-emitting diodes (LEDs) for fully networked wireless systems and can provide high-speed data transmission. The document describes how Li-Fi works, comparing it to Wi-Fi, and outlines its advantages like wider spectrum, higher security, and applications like use in aircraft. It then discusses the proposed work of implementing a module to control a buggy using Li-Fi data transmission.
The document summarizes the evolution of mobile telephone systems from analog to digital technologies. It describes early analog systems like Advanced Mobile Phone System (AMPS) and its features. It then discusses the transition to digital with Digital AMPS (D-AMPS) and the widespread adoption of Global System for Mobile Communications (GSM) as the dominant 2G standard. It also provides a brief overview of Code Division Multiple Access (CDMA) technology and 3G standards like W-CDMA and CDMA2000.
IRJET-Visible Light Communication (Li-Fi)IRJET Journal
The document discusses the emerging technology of Li-Fi (Light Fidelity), which uses visible light communication through LED bulbs to transmit data wirelessly. It provides advantages over traditional Wi-Fi such as higher speeds, better security, and avoiding health risks from radio waves. The document proposes a Li-Fi system using a laser transmitter and photodetector receiver to transmit text data between computers through light signals modulated by an ARM7 processor.
The document proposes a clustering-based approach to dynamically allocate bandwidth in wireless networks. It extracts student data from a university's course timetable to predict user distributions over time. It then applies K-means clustering to group buildings into wireless nodes based on expected user loads. This clusters student devices and allows wireless nodes to adapt their bandwidth allocation according to predicted user demands at different times. The approach is tested on a university campus network, extracting student data to predict building loads and applying K-means clustering to allocate optimal bandwidth across wireless nodes over time.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
This document summarizes the scope and contents of the International Journal of Computer Networks & Communications (IJCNC). IJCNC is a bi-monthly peer-reviewed journal that publishes articles on all aspects of computer networks and data communications. Topics of interest include network protocols, architectures, routing techniques, wireless networks, next generation networks, network operations and management, and more. The goal is to bring together researchers and industry practitioners to advance networking concepts and collaboration.
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
The appearance of infinite computing resources that available on demand and fast enough to adapt with
load surges makes Cloud computing favourable service infrastructure in IT market. Core feature in Cloud
service infrastructures is Service Level Agreement (SLA) that led seamless service at high quality of service
to client. One of the challenges in Cloud is providing heterogeneous computing services for the clients.
With the increasing number of clients/tenants in the Cloud, unsatisfied agreement is becoming a critical
factor. In this paper, we present an adaptive resource allocation policy which attempts to improve
accountable in Cloud SLA while aiming for enhancing system performance. Specifically, our allocation
incorporates dynamic matching SLA rules to deal with diverse processing requirements from
tenants.Explicitly, it reduces processing overheadswhile achieving better service agreement. Simulation
experiments proved the efficacy of our allocation policy in order to satisfy the tenants; and helps improve
reliable computing.
Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
VHDL Implementation of FPGA Based OFDM Modem for Wireless ApplicationsEditor IJCATR
This document describes the VHDL implementation of an FPGA-based OFDM modem for wireless applications. It discusses Orthogonal Frequency Division Multiplexing (OFDM) and how it can be used for high-speed wireless communications. The document outlines the basic blocks of an OFDM modulator and demodulator system, including QAM/PSK modulation, serial to parallel conversion, inverse fast Fourier transform (IFFT), and how these can be implemented using VHDL on an FPGA for applications such as software defined radio. It provides a block diagram of the OFDM modem and discusses the advantages of implementing the design using a field programmable gate array.
This document provides an overview of topics covered in an Introduction to Computing course for a Bachelor of Science in Information Systems final term. The topics covered include computer networks, communication media like twisted pair cables, coaxial cables and fiber optic cables. It also introduces Java programming, the Java Eclipse IDE, and how to write a simple "Hello World" program. The objectives are to understand computer networks, different communication media, and to learn about programming languages and how to write a basic Java program.
This document discusses speed adaptive mobile IP over wireless LAN. It first analyzes the relationship between performance and moving speed for mobile IP over wireless LAN, showing that current mobile IP is not suitable for rapid movement. It then proposes a speed adaptive mobile IP protocol that extends registration messages with speed information to allow the network behavior to automatically adapt based on node speed, improving performance for rapid movement without high resource costs. The protocol is emulated and shown to greatly improve mobile IP performance for rapid movement over wireless LAN.
In data communication,
Transmission media is a pathway that carries the information from sender to receiver.
We use different types of cables or waves to transmit data.
Data is transmitted normally through electrical or electromagnetic signals.
Synchronous optical networking (SONET) is a standardized digital communication protocol that is used to transmit a large volume of data over relatively long distances using a fiber optic medium. With SONET, multiple digital data streams are transferred at the same time over optical fiber using LEDs and laser beams.
Performance Analysis of Different Modulation Schemes using Wi-Max And LTEIRJET Journal
This document analyzes the performance of different modulation schemes using WiMAX and LTE. It compares these two advanced wireless technologies in the physical layer and provides performance analysis of modulation schemes like BPSK, QPSK, and 16-QAM based on SNR or Eb/No and BER. MATLAB is used to simulate and analyze the performance of modulation schemes in WiMAX and LTE networks. The document also discusses the evolution of wireless access technologies and highlights the need for higher data rate technologies like WiMAX and LTE.
This document summarizes research on improving the performance of WiMAX systems using FEC zigzag coding and MIMO techniques. It first provides background on WiMAX and discusses how OFDM, MIMO, and various channel coding schemes like zigzag codes work. It then evaluates the bit-error rate performance of WiMAX systems using zigzag-coded modulation with different code rates and lengths. The results show zigzag coding presents stronger error correction than Reed-Solomon with Convolutional coding. Encoding and decoding of zigzag codes is explained, along with how concatenated zigzag codes provide even stronger error correction through interleaving and turbo processing.
Seminar on vlc / visible light communicationSAMBIT SWAIN
The document discusses visible light communication (VLC) using sustainable LED lights. VLC uses LED lights to transmit data through subtle and fast variations in light intensity. This takes advantage of LED lights' high efficiency and long lifespan. Examples of VLC applications discussed include indoor location services, use in industrial settings where radio waves are restricted, and onboard aircraft where it would not interfere with radio communications. VLC provides a cleaner, greener and safer alternative to wireless data transmission when compared to traditional radio-based WiFi.
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK bioejjournal
The objective of this research was to design a 2.4 GHz class AB Power Amplifier (PA), with 0.18um
Semiconductor Manufacturing International Corporation (SMIC) CMOS technology by using Cadence
software, for health care applications. The ultimate goal for such application is to minimize the trade-offs
between performance and cost, and between performance and low power consumption design. This paper
introduces the design of a 2.4GHz class AB power amplifier which consists of two stage amplifiers. This
power amplifier can transmit 10dBm output power to a 50Ω load. The power added efficiency is 7.5% at
1dB compression point and the power gain is 10dB, the total power consumption is 0.135W. The
performance of the power amplifier meets the specification requirements of the desired.
This presentation provides an overview of advanced telecom technologies, including digital switching principles, fiber optics communication, mobile communication principles like GSM and CDMA, broadband DSL technologies, intelligent networks, ISDN, and next generation networks. It was presented by Ashish Nandan to the Department of Electronics and Communication Engineering at Future Institute of Engineering and Management.
This paper presents a comparative study of IEEE 802.11 a/b/g/n wireless LAN standards in an ELearning classroom network using adhoc networks as communication support. The evaluation is performed through a series of scenarios schematizing communication between students and practitioners in an educational context. The first objective is to plan the physical layer via the choice of the suitable transmission standard that satisfy the implementation specifications. Given the real-time traffic considered, a good traffic transmission must be ensured.
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Ranjeet Bidwe
This document discusses issues with using TCP in wireless networks and proposed solutions. The main issues are higher bit error rates, lower bandwidth, mobility, and longer round trip times in wireless networks compared to wired networks. TCP was designed for wired networks and assumes packet loss is always due to congestion, but in wireless networks loss can occur for other reasons like bit errors, handoffs, or disconnections. This wrong assumption causes TCP to reduce its window size unnecessarily, degrading performance. The document surveys proposed solutions like Snoop to cache packets at base stations to hide losses from the sender, and Explicit Congestion Notification to signal congestion before queue overflows.
This document discusses dispersion compensation techniques for optical code division multiple access (OCDMA) systems using dispersion compensation fiber (DCF) and fiber gratings. It compares the performance of an 8-user OCDMA system using DCF versus fiber gratings. The results show that DCF more effectively compensates for dispersion, as evidenced by a lower bit error rate and higher Q factor, making it a better dispersion compensation method for OCDMA systems compared to fiber gratings.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission. LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices.
This document discusses Li-Fi (Light Fidelity) technology for wireless data transmission using visible light communication (VLC). Li-Fi uses light-emitting diodes (LEDs) for fully networked wireless systems and can provide high-speed data transmission. The document describes how Li-Fi works, comparing it to Wi-Fi, and outlines its advantages like wider spectrum, higher security, and applications like use in aircraft. It then discusses the proposed work of implementing a module to control a buggy using Li-Fi data transmission.
The document summarizes the evolution of mobile telephone systems from analog to digital technologies. It describes early analog systems like Advanced Mobile Phone System (AMPS) and its features. It then discusses the transition to digital with Digital AMPS (D-AMPS) and the widespread adoption of Global System for Mobile Communications (GSM) as the dominant 2G standard. It also provides a brief overview of Code Division Multiple Access (CDMA) technology and 3G standards like W-CDMA and CDMA2000.
IRJET-Visible Light Communication (Li-Fi)IRJET Journal
The document discusses the emerging technology of Li-Fi (Light Fidelity), which uses visible light communication through LED bulbs to transmit data wirelessly. It provides advantages over traditional Wi-Fi such as higher speeds, better security, and avoiding health risks from radio waves. The document proposes a Li-Fi system using a laser transmitter and photodetector receiver to transmit text data between computers through light signals modulated by an ARM7 processor.
The document proposes a clustering-based approach to dynamically allocate bandwidth in wireless networks. It extracts student data from a university's course timetable to predict user distributions over time. It then applies K-means clustering to group buildings into wireless nodes based on expected user loads. This clusters student devices and allows wireless nodes to adapt their bandwidth allocation according to predicted user demands at different times. The approach is tested on a university campus network, extracting student data to predict building loads and applying K-means clustering to allocate optimal bandwidth across wireless nodes over time.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
This document summarizes the scope and contents of the International Journal of Computer Networks & Communications (IJCNC). IJCNC is a bi-monthly peer-reviewed journal that publishes articles on all aspects of computer networks and data communications. Topics of interest include network protocols, architectures, routing techniques, wireless networks, next generation networks, network operations and management, and more. The goal is to bring together researchers and industry practitioners to advance networking concepts and collaboration.
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
The appearance of infinite computing resources that available on demand and fast enough to adapt with
load surges makes Cloud computing favourable service infrastructure in IT market. Core feature in Cloud
service infrastructures is Service Level Agreement (SLA) that led seamless service at high quality of service
to client. One of the challenges in Cloud is providing heterogeneous computing services for the clients.
With the increasing number of clients/tenants in the Cloud, unsatisfied agreement is becoming a critical
factor. In this paper, we present an adaptive resource allocation policy which attempts to improve
accountable in Cloud SLA while aiming for enhancing system performance. Specifically, our allocation
incorporates dynamic matching SLA rules to deal with diverse processing requirements from
tenants.Explicitly, it reduces processing overheadswhile achieving better service agreement. Simulation
experiments proved the efficacy of our allocation policy in order to satisfy the tenants; and helps improve
reliable computing.
Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
In a conventional network, most network devices, such as routers, are dedicated devices that do not
have much variation in capacity. In recent years, a new concept of Network Functions
Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions
with software on general-purpose servers and this allows the network operator to select any
capabilities and locations of network functions without any physical constraints.
This paper focuses on the deployment of NFV-based routing functions which are one of critical
virtual network functions, and present the algorithm of virtual routing function allocation that
minimize the total network cost. In addition, this paper presents the useful allocation policy of
virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy
takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the
network into consideration. Furthermore, this paper shows that there are cases where the use of
NFV-based routing functions makes it possible to reduce the total network cost dramatically, in
comparison to a conventional network, in which it is not economically viable to distribute smallcapacity
routing functions
Fuzzy based clustering and energy efficientIJCNCJournal
Underwater Wireless Sensor Network (UWSN) is a particular kind of sensor networks which is
characterized by using acoustic channels for communication. UWSN is challenged by great issues specially
the energy supply of sensor node which can be wasted rapidly by several factors. The most proposed
routing protocols for terrestrial sensor networks are not adequate for UWSN, thus new design of routing
protocols must be adapted to this constrain. In this paper we propose two new clustering algorithms based
on Fuzzy C-Means mechanisms. In the first proposition, the cluster head is elected initially based on the
closeness to the center of the cluster, then the node having the higher residual energy elects itself as a
cluster head. All non-cluster head nodes transmit sensed data to the cluster head. This latter performs data
aggregation and transmits the data directly to the base station. The second algorithm uses the same
principle in forming clusters and electing cluster heads but operates in multi-hop mode to forward data
from cluster heads to the underwater sink (uw-sink). Furthermore the two proposed algorithms are tested
for static and dynamic deployment. Simulation results demonstrate the effectiveness of the proposed
algorithms resulting in an extension of the network lifetime.
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMIJCNCJournal
Today any geographic information system (GIS) layers became vital part of any GIS system , and
consequently , the need for developing automatic approaches to extract GIS layers from different image
maps like digital maps or satellite images is very important.
Map classification can be defined as an image processing technique which creates thematic maps from
scanned paper maps or remotely sensed images. Each resultant theme will represent a GIS layer of the
images.
A new proposed approach to extract GIS layers (classes) automatically based on L*A*B colorsystem
selected from ( A and B ) is proposed in this paper, our experiments shows that the hsi color space gives
better than L*A*B.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
This document proposes a simplified method for evaluating and selecting a network management system (NMS) for integration into an existing computer network. The method evaluates NMS options based on 3 criteria: 1) the level of integration risk, 2) the expected increase in network maintenance effectiveness, and 3) the level of management tasks completed by the system. Each criterion is evaluated on a standardized scale of 0 to 2. The scores are combined to calculate an overall value for each NMS, with the highest scoring option selected for integration. The method aims to provide a rapid evaluation that does not require extensive expertise, resources or time.
A proposal to enhance cellular and wifiIJCNCJournal
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many years. However, the interoperability issue between the two networks needs to be enhanced so that WiFi can efficiently supplement for the cellular network in case of congestion or outage. In this paper, we propose a novel network roaming and selection scheme based on 3GPP TS 24.312 and IEEE 802.11k, u standards to enhance cellular and WiFi interworking. The proposed scheme is aimed at enhancing the network roaming and selection so that WiFi network can serve as a supplement and backup access network for the cellular not only for congestion control but also in case of unexpected network failure event. We also model and evaluate the proposed scheme in a typical HetNet with interworking WiFi access points and cellular base stations. The simulation result shows that our proposed scheme quickly detects unexpected network failure event and assists active UEs to perform handoff to preferable alternative point of access. As a result, service disruption is substantially reduced and quality of experience (downlink/uplink’s throughput) is improved. Therefore, our proposed scheme can be used for a more reliable HetNet in terms of congestion control and disruption tolerance.
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...IJCNCJournal
Orthogonal Wavelet Division Multiplexing (OWDM) has been considered as an alternative of Orthogonal
Frequency Division Multiplexing (OFDM) in the recent years. OWDM has lower computational complexity
and higher flexibility compared to its OFDM counterpart. The core component of OWDM is wavelet.
Wavelet has been a much investigated and applied topic in digital image processing for a long time.
Recently, it has drawn considerable attention of the researchers working in communication field. In this
work we investigate the performances of OWDM under different channel conditions. We consider three
channel conditions namely Additive White Gaussian Noise (AWGN), Rayleigh, Ricean, and frequency
selective. We consider a number of wavelets namely Haar, Daubechies, Biorthogonal, Reverse
Biorthogonal, Coiflets, and Symlets in OWDM design. For system model we choose Digital Video
Broadcasting-Terrestrial (DVB-T). Originally DVB-T system was designed based on OFDM. In this work
we use OWDM instead. The simulation results show OWDM outperforms OFDM in terms of bit error rate
(BER), noise resiliency, and peak-to-average ration. The results also show that the Haar wavelet based
OWDM outperforms other wavelets based OWDM system under all three considered three channel
conditions.
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
In the current Internet-based systems, there are many problems using anonymity of the network
communication such as personal information leak and crimes using the Internet systems. This is because
the TCP/IP protocol used in Internet systems does not have the user identification information on the
communication data, and it is difficult to supervise the user performing the above acts immediately. As a
solution for solving the above problem, there is the approach of Policy-based Network Management
(PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication
control of every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the
whole LAN by locating the communication control mechanisms on the course between network servers and
clients. The second is the scheme of managing the whole LAN by locating the communication control
mechanisms on clients. As the second scheme, we have been studied theoretically about the Destination
Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system
management, we intend to realize the policy-based Internet system management finally. In the DACS
Scheme, the inspection is not done about compatibility to cloud environment with virtualization technology
that spreads explosively. As the result, the coverage of the DACS Scheme is limited only in physical
environment now. In this study, we inspect compatibility of the DACS Scheme for the cloud environment
with virtualization technology, and enlarge coverage of this scheme. With it, the Virtual DACS Scheme
(vDACS Scheme) is established.
Efficient management of bandwidth in wireless networks is a critical factor for a successful communication system. Special features of wireless networks such user mobility and growth of wireless applications and their high bandwidth intensity create a major challenge to utilize bandwidth resources optimally. In this research, we propose a model for an adaptable network bandwidth management method that combines bandwidth reservation and bandwidth adaptation to reduce call blocking and dropping probabilities. The model is an integer program that determines whether or not to accept new calls and decides how to allocate bandwidth optimally in a way to maximize user satisfaction. The results of a simulation study show that the proposed method outperforms an existing method with respect to key performance measures such as call blocking and dropping probabilities and call time survivability. This survivability indicator is a new measure that is introduced for the first time in this paper. We also present a second tradeoff model to allow the network manager to control call dropping probability. The results of a second simulation study show that network users are better off if a zero call dropping policy is adopted as proposed in the first model.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMIJCNCJournal
Autism is a pervasive neuro-developmental disorder, primarily encompassing difficulties in the social,
language, and communicative domains. Because autism is a spectrum disorder, it affects each individual
differently and has varying degrees. There are three core aspects of impairment based upon the Diagnostic
and Statistical Manual of Mental Disorders (DSM-IV), namely impairment in socialization, impairment in
communication, and restricted repetitive activities or interests. This work describes the experiment aims at
expressing autistic traits through the use of self-organizing map. Works related to simulating autism
through self-organizing map is limited. This work compare and contrast the difference in attention index
for normal learning and marred attention shift learning ability. It was found that the attention index of
normal learning is 9 times better marred attention shift for both random and pre-fixed input data. In the
marred attention shift context, neurons adapt more towards the mean of both sources combined under
marred context while some neurons adapt towards mean of one source under normal context. The normal
learning ability produces maps with neurons orienting towards mean values of combined stimuli source.
Impairment in learning ability produces similar cortical maps compared to normal learning ability. The
major difference is in the attention index.
Mobile paymentmethodbased on public keyIJCNCJournal
Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash,
cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is
summarized in three processes: firstly, the authentication process, which involves the authentication phases
for the applied customers. Secondly, the member recognition process which tests and ensures the customer
membership by the market server. Finally, payment processwhich will be done by ciphering the customer
information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to
the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since
the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key
encryption system ensures the security of the proposed method. However, to prevent a brute force attack,
the choice of the key size becomes crucial.
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
We introduce a family of authenticated data structures — Ordered Merkle Trees (OMT) — and illustrate
their utility in security kernels for a wide variety of sub-systems. Specifically, the utility of two types of
OMTs: a) the index ordered merkle tree (IOMT) and b) the range ordered merkle tree (ROMT), are
investigated for their suitability in security kernels for various sub-systems of Border Gateway Protocol
(BGP), the Internet’s inter-autonomous system routing infrastructure. We outline simple generic security
kernel functions to maintain OMTs, and sub-system specific security kernel functionality for BGP subsystems
(like registries, autonomous system owners, and BGP speakers/routers), that take advantage of
OMTs.
Comparison of LI-FI with Wireless MediaIRJET Journal
This document provides an overview of Li-Fi (Light Fidelity) technology, comparing it to wireless media like Wi-Fi. It discusses how Li-Fi works using visible light communication between LED light sources and photodetectors. The key components of a Li-Fi system and its applications are described. Li-Fi provides advantages over Wi-Fi such as higher speed and bandwidth capacity. However, it also has limitations since the light signals do not pass through walls like radio waves. The document aims to explain Li-Fi technology and its potential to deliver high-speed internet access as an alternative to wireless networks.
Li-Fi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission. It can provide higher speeds than Wi-Fi and does not interfere with other wireless networks. Li-Fi uses visible light communication and infrared light to transmit data and requires line-of-sight between transmitters and receivers. Researchers have achieved data rates over 500 megabytes per second in the lab using Li-Fi technology.
Li-Fi is a visible light communication technology that can provide wireless internet access at high speeds using LED light bulbs. It works by varying the intensity of LED lights faster than what the human eye can detect to transmit data. Researchers have achieved speeds over 500 megabytes per second in the lab. Li-Fi was pioneered by Professor Harald Haas and could offer connection speeds faster than most broadband internet access. It provides a safe and unlimited spectrum alternative to Wi-Fi for wireless connectivity indoors.
This document discusses Li-Fi technology, which transmits data through visible light communication. It describes how Li-Fi works by modulating the intensity of LED lights faster than the human eye can detect. This allows for transmission of digital data through light. The key components of a Li-Fi system are LED lights and photodiodes. Li-Fi provides several advantages over Wi-Fi such as higher speeds, more available bandwidth, more security as light cannot penetrate walls, and higher energy efficiency. Potential applications of Li-Fi include use in places where Wi-Fi signals cannot reach or are banned, like on airplanes or in hospitals.
This document describes a proposed home automation system using Li-Fi (Light Fidelity) technology. Li-Fi uses visible light communication to transmit data using LED lights, providing a more secure alternative to Wi-Fi technology. The proposed system would allow users to control home appliances and transmit audio using Li-Fi modules connected to an Arduino microcontroller. It aims to address issues with existing Wi-Fi systems like bandwidth limitations, interference, and security concerns. The system is designed to transmit data and control devices in a home automation setting using Li-Fi technology.
Li-Fi can be thought of as a light-based Wi-Fi. That is, it uses light instead of radio waves to transmit information. And instead of Wi-Fi modems, Li-Fi would use transceiver-fitted LED lamps that can light a room as well as transmit and receive information. Since simple light bulbs are used, there can technically be any number of access points.
Light–Fidelity (Li-Fi) is a technology that uses the Light Emitting Diodes (LEDs) to transmit wireless data instead of radio waves.
This is going to be the future of wireless data transmission.
Wireless Networks using Visible Light Communication: A Reviewijwmn
Provisioning of quality of service (QoS) is a critical issue in visible light communication (VLC) systems and other wireless communication systems. LED lights are becoming widely used for homes and offices for their luminous efficacy improvement. VLC is a new way of wireless communication. Typical transmitters used for visible-light communication are visible-light LEDs, and receivers are photodiodes and image sensors. We present new applications that will be made possible by visible light communication technology. Especially location-based services are considered suitable for visible light communication applications.
This document provides an overview and comparison of Wi-Fi and Li-Fi technologies. It begins with an abstract describing how current wireless networks can become slow when multiple devices are connected. It then discusses some limitations of Wi-Fi including limited bandwidth and security issues. The document introduces Li-Fi technology, which uses light from LED bulbs to transmit data at high speeds. It provides details on the architecture and working of a Li-Fi system. Key advantages of Li-Fi discussed are higher speeds, more bandwidth availability, better security as light cannot penetrate walls, and lower costs. The document concludes that Li-Fi has significant potential to advance wireless data transmission.
IRJET- Visible Light Communication (Li-Fi)IRJET Journal
The document discusses the emerging technology of Li-Fi (Light Fidelity), which uses visible light communication through LED bulbs to transmit data wirelessly. It provides advantages over traditional Wi-Fi such as higher speeds, better security, and avoiding health risks from radio waves. The paper proposes a Li-Fi system using a laser transmitter and photodetector receiver to transmit text data between computers through light signals modulated by an ARM7 processor.
The characteristic of li fi technology comparing with wi-fizaidinvisible
This document compares Wi-Fi and Li-Fi wireless technologies. It discusses that Wi-Fi operates using radio frequencies and has limitations like bandwidth constraints and interference. Li-Fi is an emerging alternative that uses visible light communication through LED lights. It has higher data rates of up to 10 Gbps and does not experience the same interference issues as Wi-Fi. However, Li-Fi signals can be interrupted by obstacles and it requires line of sight between transmitters and receivers. The document provides tables comparing characteristics and standards of Li-Fi and Wi-Fi.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
1) Li-Fi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission. It can provide higher speeds than Wi-Fi and does not cause any radio interference.
2) Li-Fi works by varying the intensity of light from an LED to transmit data. An LED bulb acts as a transmitter and a photo-sensitive detector acts as a receiver. Data is encoded by switching the LED bulb on and off at extremely high speeds undetectable to the human eye.
3) Potential applications of Li-Fi include use in places where Wi-Fi is restricted like hospitals and aircraft, as well as enabling faster internet access in public places using street lights outfitted
Li-Fi_Technology_for_Vehicle-to-Vehicle_Communication.pdfHieu Le Dinh
The document discusses using Li-Fi (Light Fidelity) technology for vehicle-to-vehicle communication. It proposes that Li-Fi could provide a cheap way to communicate between cars with high data rates and bandwidth efficiency. The key aspects covered include:
1) The working methodology of Li-Fi which involves modulating the intensity of LED lights to transmit data to photodiodes, with the intensity changes too fast for the human eye to detect.
2) The potential advantages of Li-Fi for vehicle communication including higher speeds, availability since it uses light versus radio frequencies, and better security since the signals can't pass through obstructions.
3) The system implementation proposed using LEDs and photodiodes
This document provides information about Li-Fi (Light Fidelity) technology. It discusses:
- How Li-Fi works by transmitting data through subtle variations in LED light intensity faster than the human eye can detect.
- Applications including use in airplanes, hospitals, and as an alternative to Wi-Fi in crowded areas with bandwidth issues.
- Components needed for a basic Li-Fi system including resistors, capacitors, transistors, operational amplifiers, solar panels, lasers, speakers and PCB boards.
- How different components like resistors, capacitors, transistors and operational amplifiers function and their roles in a Li-Fi system.
Conceptual Design of LiFi Audio Transmission Using Pre-Programmed ModulesAuwal Amshi
We design a concept of Li-fi audio signal transmission by reusing and repurposing pre-programmed modules to simplify and discuss visible light communication (VLC) in other to give a new researcher the idea on how the concept of LiFi and VLC.
Similar to LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEM
1. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
DOI: 10.5121/ijcnc.2016.8302 21
LIGHT FIDELITY (LI-FI) BASED INDOOR
COMMUNICATION SYSTEM
Farooq Aftab, Muhammad Nafees Ulfat khan,Shahzad Ali
School of Computer and Communication Engineering,University of Science and
Technology Beijing china (USTB)
ABSTRACT
Indoor wireless communication is an essential part of next generation wireless communication system.For
an indoor communication number of users and their device are increasing very rapidly so as a result
capacity of frequency spectrum to accommodate further users in future is limited and also it would be
difficult for service providers to provide more user reliable and high speed communication so this short
come can be solve in future by using Li-Fi based indoor communication system. Li-Fi which is an emerging
branch of optical wireless communication can be useful in future as a replacement and backup of Wireless
Fidelity (Wi-Fi)for indoor communication because it can provide high data rate of transmission along with
high capacity to utilize more users as its spectrum bandwidth is much broader than the radio spectrum. In
this paper we will look at the different aspects of the Li-Fi based indoor communication system,summarizes
some of the research conducted so far andwe will also proposed a Li-Fi based communication model
keeping in mind coverage area for multiple user and evaluate its performance under different scenarios .
KEYWORDS
LightFidelity,Indoor communication, Visible light communications, Wi-Fi.
1. INTRODUCTION
Light Fidelity (Li-Fi) is a new paradigm of revolution which is a continuation of the trend to
move toward higher frequency spectrum[2] in the field of indoor wireless communication. If we
talk about high speed indoor wireless communication, Li-Fi can bring new dimension in term of
data communication speed by utilizing visible light spectrum. The concept behind this technology
is that the data can be transmitted with the help of light emitting diode (LED) bulbs and
transmission rate can be control by using intensity of LED bulb which can be varies even faster
than light intensity human eye can observe [1]. Keeping in mind number of users increase day by
day and heavy traffic of data, Li-Fi technology can be used as a solution to provide users an
environment of high speed data transmission.
Li-Fi system is a bi-directional multiuser communication system and it could be classified as
nanometer-wave communication system [2]. Li-Fi based communication system is different from
Visible light communication (VLC) system[2] because VLC is only a point to point
communication system while Li-Fi is a proper wireless based networking system which supports
point to multipoint communication.In Li-Fi system, data rate can be related with LEDs so LEDs
selection plays a vital role. Parameters like LEDs size, ON-OFF speed and number of LEDs can
affect data rate of the communication model. Data rate is inversely proportional to the Size of
LEDs which means smaller the size of LED more will be the data rate. If ON-OFF speed of LED
is faster than we can transmit data at higher rates in the form of 1’s and 0’s. Higher the number of
2. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
22
LED’s in a system results in more transmission of data. In Li-Fi based system LED Panel (LP) is
a Light source which can perform the function of illumination and data communication at a same
time. Depending upon the situation and requirement of indoor communication model a Single
LED bulb can also act as a LP and it is also possible that multiple LEDs bulb are combined
together to form a single LP . Number of LEDs in a single LP depends upon the size of room and
number of users to accommodate at a specific time. LED Placement approach (LPA) plays an
important role in Li-Fi based indoor communication system because it can limit data rate and
affect the communication. The placement of LP in indoor environment must be adjusted in such a
way that every Li-Fi user can achieve high intensity of light.
Significant research effort is being directed toward the development of Li-Fi indoor system. For
an indoor system the LED is declared as most power efficient illuminating device for future
indoor lighting system [3]. In [4] researchers investigate how the distance between LEDs can
change the behavior of indoor communication system. The impact of multipath reflections on a
two-dimensional in door positioning is investigated in [5] .In current indoor visible light
positioning systems, several algorithms are proposed to calculate the receiver position as in [6]
researchers propose a novel architecture system that can be used for both indoor positioning and
communications. In [7] light positioning architecture for a typical room has been investigated by
considering different performance related parameters. In [8] researcher designed an optimal
constellation for Indoor 2×2 MIMO based Communication system under arbitrary channel
correlation. Keeping in mind all the research conducted by different researchers until now this
Paper is organized as follow In Section II, we have discussed theoverview of Li-Fi based indoor
communication system which is consists of detail regarding key elements that Indoor
communication system must possess in order to satisfy the demand of implementation of
Wireless communication system. In Section IIIwe have described Scenario based indoor Li-Fi
architecture design in which we have proposeddifferent types of LP in term of coverage area and
Section IV is consists of performance evaluation of proposed designed system followed by
conclusion.
2. LI-FI BASED INDOOR COMMUNICATION SYSTEM OVERVIEW
2.1.LI-FI TRANSMITTER AND RECEIVER
The transmitter in an indoor Li-Fi system is an LED bulb. The most likely candidate for front-end
transmitter devices is incoherent solid-state lighting LEDs due to their low cost. Due to the
physical properties of these components, information can only be encoded by using the intensity
of the emitted light. Different LED’s of different color like red, blue, orange, yellow can be used
in Li-Fi Communication System. But if we talk about high data rates, 1 Giga bits per second has
been reported using phosphor-coated white LEDs [9] and 3.4 Giga bits per second has been red-
green-blue (RGB) LEDs [10], the highest speed that has ever been reported from a single color
incoherent LEDs is 3.5 Giga bits per second.
LED luminaire commonly use white light to perform both the function of illumination and
communication. One way of producing white light is to use blue LED with yellow phosphor
coating. When a beam of blue light passes through yellow phosphor coating layer it becomes
white light. Another way is to use a combination of red, green and blue (RGB) LEDs .when red,
green and blue light properly mixed together it becomes white light.As the light emitted by LEDs
are incoherent in nature so therefore there is a need of Intensity Modulation (IM). In IM signal is
modulated in to optical signal of instantaneous power. This signal is received at a receiver by
using Direct Detection (DD) method. In Direct Detection (DD) a photodiode is used to convert
the optical signal power into a proportional current.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
23
Table 1. Method to generate white light.
White light production
method
Advantage Disadvantage
Blue light with yellow
phosphor coating
Easy to implement and cost
effective
phosphor coating limits the speed at
which LED can switched to a few
MHz
RGB light Easy to modulate the data
using three different color
wavelength LEDs
Not cost effective
As Li-Fi system is based on IM/DD therefore Avalanche Photo Detector (APD) is more effective
as compare to PIN based PD.
2.2. MODULATION
In Li-Fi based system, Dimming based modulation schemes are most commonly used modulation
schemes which are single carrier based schemes. In dimming based modulation schemes desire
data rate is achieve by controlling the On-Off level of LED. On-off keying (OOK),Pulse Width
Modulation (PWM),Pulse position modulation (PPM), Variable pulse position modulation
(VPPM),Overlapping PPM (OPPM) and optical spatial modulation (OSM) are the main dimming
based modulation schemes which can be implemented in Li-Fi based indoor system .Dimming
based modulation schemes are explained in table 2.
To achieve higher data rate and to decrease the effect of distortion and interference, multicarrier
modulation can also be useful in Li-Fi based communication system but multicarrier modulation
schemes are less energy efficient. One of the most common schemes is OFDM [11] but OFDM
based signal is complex and bipolar in nature so to implement OFDM for Li-Fi system some
modifications are required in conventional technique for better performance. In [12] researchers
proposed a Asymmetrically-Clipped Optical OFDM (ACO-OFDM) in which odd subcarriers are
modulated DC-biased Optical OFDM (DCO-OFDM) [13] is a scheme in which all subcarriers are
modulated and unipolar signal is generated by adding positive direct current. ACO-OFDM is
more energy-efficient as compare to DCO-OFDM. The relationship between light emitted by
LED and current is nonlinear so this nonlinearity based nature of LED affects the performance of
OFDM based modulation schemes.
There are some modulation schemes which are designed to support both purpose of
communication and illumination by using multicolored LEDs. Color shift keying (CSK) is a
scheme [14]in which signals are encoded into color intensities emitted by red, green and blue
(RGB) LEDs .The constant color is maintained by mapping the transmitting bits in to
instantaneous chromatics of LEDs to ensure constant luminous flux. CSK has Reliability on LED
performance due to constant luminous flux and has no flicker effect over all frequencies. In [15]
researchers proposed a Metameric modulation (MM) which modulate data in the visible spectrum
while maintaining a constant lighting state.MM has a better Color quality control and higher
energy efficiency. Color intensity modulation (CIM) proposed in [16] provides dimming in color
space. CIM also satisfy the need of color matching and increases the data rate in signal space for
multicolored LED based system.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
24
Table 2. Dimming based modulation schemes.
Modulation scheme working Advantage Disadvantage
On-off
keying(OOK)
OOK is a dimming based
modulation scheme which
transmits data by
sequentially turning the LED
on and off.
OOK provides a
good trade-off
between system
performance and
implementation
complexity
Increasing or
decreasing the
brightness of the
LED from 50%
dimming level
would cause the
data rate to
decrease.
Pulse Width
Modulation (PWM)
In PMW signal pulses carry
the
modulated signal in the form
of a square wave and the
widths of the pulses are
adjusted based on the
desired level of dimming
PMW achieves
the dimming
without
changing the
intensity level of
pulses.
Data rate is low.
Pulse position
modulation (PPM)
PPM allows one pulse per
symbol duration .The
symbol duration is divided
into time slots of equal
duration and a pulse is
transmitted in one of
the time slots.
PPM is more
power-efficient
as compare to
OOK.
PPM has a lower
spectral efficiency
and limited data
rate.
Variable pulse
position modulation
(VPPM)
VPPM is a combination of
PPM and PMW .In VPPM
width of signal pulses is
changed according to a
specified brightness level to
support Dimming.
Better spectral
efficiency as
compare to
PPM.
VPPM lack power
efficiency.
Overlapping PPM
(OPPM)
OPPM allows more than one
pulse to be transmitted
during the symbol duration
and the different pulse
symbols can be overlap.
OPPM can
achieve a higher
spectral
efficiency as
compared to
PPM and
VPPM.
wide range of
dimming levels can
be obtained due to
overlapping.
optical spatial
modulation(OSM)
OSM is a single-carrier
transmission modulation
technique in which input bits
sequence is mapped and
correspond to a certain LED
index.
Power and
bandwidth
efficient.
performance can
be deteriorates due
to the high optical
channel correlation
because it depend
upon transmitter
and receiver units
2.3. COMMUNICATION MODES IN LI-FI BASED SYSTEM
One possible mode of communication in a Li-Fi system can be a Bi-directional based Indoor
Communication System .If we considered a case where two users want to exchange their data
using an indoor Li-fi based system then there is a need of duplexer on both sides. Duplexer is
used here to support bi-directional communication by separating the transmitted and receive
5. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
25
signal. When user1 wants to send data it will pass through the LED driving circuit toward the
LED Light source panel.LED light source panel is consists of LED bulbs while LED driving
circuit is used to power LED bulb. This circuit must provide sufficient current to light the LED at
the required brightness, but must limit the current to prevent damaging the LED. Receiver can
receive an optical signal with the help of photo detector and then data will be passing through the
trans-impedance amplifier and duplexer. Then eventually receiver will receive its data as shown
in figure 1.
Figure 1. Bi-directional based Architecture of Indoor Communication System
If we consider multiple input and multiple output (MIMO) based Indoor Communication system
then signal processing play a vital role to ensure desire data rates in the presence of high Signal to
noise ratio (SNR).
Figure 2. Data Processing Unit of User Terminal
6. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
26
In an indoor system, MIMO technique can be useful to have parallel data transmission to increase
the data rate [17] But the MIMO channel need to be highly correlated, which increases the
complexity of decoding parallel channels in the receiver [18] We consider here as shown in
figure 3.
Figure 3. Architecture of MIMO based Indoor Communication System
At transmitter end we can avoid the complications of multiple user interface (MUI) by processing
data signal at each terminal using Data Processing nodes. Data Processing Unit as shown in figure
3 is consists of Modulation and pre-coding Technique. This can allow us easy demodulation of
signal at receiver end without any complication of high processing and will reduce burden on user
terminals in result we can also achieve low energy consumption.
3. SCENARIO BASED INDOOR LI-FI ARCHITECTURE DESIGN
For an indoor communication system coverage area is important therefore we have proposed a
scenario based Li-Fi system design in which coverage area is taken in term of LP. We can control
the coverage area by considering fixed, moveable and hybrid types of LP.
3.1. FIXED LP
To consider the importance of coverage area in a fixed LP case we have consider here a scenario
in which we have 2 users one is using laptop while other is using tablet personal computer .If we
suppose in our Li-Fi system 1 LED is acting as a LP then covering area of LP can be adjusted in
two ways dedicated LP approach and single LP with wide coverage area as shown in figure 4.
In section A we have placed a fixed LP of wider coverage area to accommodate two users. U1
and U2 are both connected to T1 because they both lie inside the coverage area of single LED. In
section B we used a dedicated approach in which for each user individual LP is assigned.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
27
Figure 4. LP in term of Covering Area
3.2. MOVEABLE LP
The moveable LP is an approach in which LED bulb can rotate at a certain angle to adjust the
coverage area according to the requirement of receiver placement. As shown in figure 5 A
coverage area of a transmitter is controlled by rotation of LED at certain angel. As angle of
irradianceis the angle with respect to the transmitter perpendicular axis and angle of incidence is
the angle with respect to the receiver axis. By using moveable LP approach the light intensity on
PD can be controlled by using certain angle of irradiance as a result we can also control the
distance between the receiver and the transmitter to achieve desire normalized received power.
Figure 5. Moveable LP approach
3.3.HYBRID LP
Hybrid approach can also be used by deploying both moveable and fixed LP at a same time as
shown in figure 5 B and 6.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
28
Figure 6. hybrid LP approach
4. PERFORMANCE EVALUATION OF PROPOSED DESIGN
For performance evaluation we assumed line of sight(LOS) link between transmitter and receiver.
The LEDs are assumed to be lambertian sources and receiver is fixed at a certain height. The
angle of irradiance is denoted by and angle of incidence is denoted by .
For moveable LP case we assume the receiver is fixed at a place so we have a fixed angle of
incidence = 45 and we can adjust transmitter according to the placement of receiver.
SNR can be expressed as the ratio of the received visible light power and ambient noise as shown
below [19]
SNR= (1)
Where the received signal is power and is the total noise variance whereas
representbrightness level.Table 3 and figure 7 shows corresponding SNR value with respect to
transmission angle to achieve BER of 10 for a PD receiver.
Table 3. Performance evaluation based on SNR for PD
Angle of irradiance( ) Angle of incidence( ) Signal to noise ratio(SNR)
65 45 128dB
68 45 124dB
70 45 121dB
75 45 117dB
78 45 114dB
In our selected scenario we can achieve desire BER value when angle of irradiance is smaller
then 70 while keeping angle of incidence constant for each case .when angle of irradiance is
greater then 70 we cannot achieve satisfactory BER which can affect the data rate and
performance of system.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
29
Figure 7. Performance evaluation by taking SNR with respect to angle of irradiance ( )
LP of wider coverage area which covers multiple users is better approach if we keep in mind cost
efficiency but the small distance separation between the LED and PD can affect signal to noise
ratio (SNR). With dedicated LP Approach we can achieve more secure, high data rate and fast
communication because coverage area formed by adjacent LED is not overlapped so in this case
there is a tradeoff between cost and high speed.
Moveable LP approach is also useful for practical implementation in indoor communication
system because in moveable LP approach we can adjust the transmission angles of the LEDs. By
transmitting a beam of light at certain angle of irradiance we can achieve desire angle of
incidence as a result we can get efficient communication without overlapping coverage area
between adjacent LEDs. But due to wide Field of view (FOV) of receiver the reflection
components can cause the signal spread and channel bandwidth will also be decrease as a result it
will limit overall data rate of system. So in moveable LP approach there is a need of tunable or
fixed FOV to overcome signal spread to achieve high data rates.
Hybrid approach can also be utilized if we need to accommodate more number of users at a time
and it is an efficient option of implementation without any adjacent overlapping coverage area.
5.CONCLUSION
We have proposed a scenario based Li-Fi system design in which coverage area is taken in term
of LP. We can control the coverage area by considering fixed, moveable and hybrid types of LP.
We have explained which type of LP is better in which scenario and also evaluated the effect of
proposed design in term of SNR. We have also presented an overview of Li-Fi based indoor
communication system. Li-Fi based indoor communication network can provide us more efficient
and genuine substitute of RF based indoor wireless network and this technology has the ability to
turn every light Bulb in to a Wireless Hotspot.Li-Fi based Indoor communication system has high
Initial Installation cost but when it is implemented at large scale area it can accommodate us by
its less operating cost like electricity bills, less operational staff and limited maintenance charges
10. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
30
as compare to RF system. Li-Fi communication user always need line of sight connectivity with
its light source therefore some advance research work is required to overcome this limitation to
implement this technology in practical use. Service Providers while providing Li-Fi Indoor
services has to consider major issues like reliability and availability of system and companies also
need to consider how to maintain network for better performance.
REFERENCES
[1] Taner Cevik and Serdar Yilmaz “An overview of visible light communication system” International
Journal of Computer Networks & Communications (IJCNC) Vol.7, No.6, November 2015.
[2] Harald Haas, Member, IEEE, Liang Yin, Student Member, IEEE, Yunlu Wang, Student Member,and
Cheng Chen, Student Member, IEEE, ”what is LiFi?”Journal of Light wave, vol. 34, no. 6, MARCH
15, 2016.
[3] T.Komine and M. Nakagawa,“Fundamental analysis for visible light communication system using
LED lights,” IEEE Trans.consumerElectron., vol. 50, no. 1, pp. 100–107, Feb. 2004.
[4] J.Ding, K. Wang, and Z. Xu, “Impact of different LED-spacing in arrayed LED transmitter on VLC
channel modeling,” in Proc. 6th Int. Conf. Wireless Commun. Signal Process. (WCSP) , Oct. 2014,
pp. 1–6.
[5] Indoor Visible Light Positioning System with Multipath Reflection Analysis Wenjun Gu, Student
Member, IEEE, Mohammadreza Aminikashani, Student Member, IEEE, and Mohsen Kavehrad,
Fellow, IEEE, 2016 IEEE International Conference on Consumer Electronics (ICCE).
[6] Indoor Positioning with OFDM Visible Light Communications, Mohammadreza Aminikashani,
Wenjun Gu, and Mohsen Kavehrad, 2016 13th IEEE Annual Consumer Communications &
Networking Conference (CCNC).
[7] Impact of Multipath Reflections on the Performance of Indoor Visible Light Positioning Systems
Wenjun Gu, Student Member, IEEE , Mohammadreza Aminikashani , Student Member, IEEE, Peng
Deng, and Mohsen Kavehrad , Fellow, IEEEJOURNAL OF LIGHTWAVE TECHNOLOGY, VOL.
34, NO. 10, MAY 15, 2016.
[8] Optimal Constellation Design for Indoor 2×2 MIMO Visible Light Communications ,Heng-Bin Cai,
Jian Zhang, Yi-Jun Zhu,Member, IEEE, Jian-Kang Zhang,Senior Member, IEEE,and XinYang, IEEE
COMMUNICATIONS LETTERS, VOL. 20, NO. 2, FEBRUARY 2016.
[9] Khalid, A. M., Cossu, G., Corsini, R., Choudhury, P and Ciaramella, E “1-Gb/s Transmission Over a
Phosphorescent White LED by Using Rate-Adaptive Discrete Multitone Modulation,” IEEE
Photonics Journal 4, 1465–1473 (Oct. 2012).
[10] Cossu, G., Khalid, A. M., Choudhury, P., Corsini, R., and Ciaramella, E., “3.4 Gbit/s Visible Optical
Wireless Transmission Based on RGB LED,” Optics Express 20, B501–B506 2012.
[11] M.Z.Afgani, H. Haas, H. Elgala, and D. Knipp, “Visible light communication using OFDM,” in Proc.
2nd Int. Conf. Testbeds Res.Infrastruct. Develop. Netw. Commun., 2006, p. 134, doi: 10.1109/
TRIDNT.2006.1649137.
[12] J.Armstrong and A. Lowery, “Power efficient optical OFDM,” Electron.Lett., vol. 42, no. 6, pp. 370–
372, Mar. 2006.
[13] H.Elgala, R. Mesleh, H. Haas, and B. Pricope, “OFDM visible light wireless communication based on
whiteLEDs,” in Proc. IEEE 65th VTC-Spring, Apr. 2007, pp. 2185–2189.
[14] IEEE Std. 802.15.7-2011, IEEE Standard for Local and Metropolitan Area Networks, Part 15.7:
Short-Range Wireless Optical Communication Using Visible Light, IEEE Std., 2011.
[15] P.M.Butala, J. C. Chau, and T. D. C. Little, “Metameric modulation for diffuse visible light
communications with constant ambient lighting,” in Proc. Int. Workshop Opt. Wireless
Communication., Pisa, Italy, Oct. 2012,pp. 1–3.
[16] K.-I.Ahn and J. K. Kwon,“Color intensity modulation for multicolored visible light communication”,
IEEE Photon. Technol. Lett., vol. 24, no. 24, pp. 2254–2257, Dec. 2012.
[17] D.Tsonev, S. Sinanovic, and H. Haas, “Practical MIMO capacity for indoor optical wireless
communication with white LEDs,” in Proc. IEEE VTC—Spring, 2013, pp. 1–5.
[18] F.Bohagen, P. Orten, and G. Oien, “Design of optimal high-rank line of-sight MIMO channels,” IEEE
Trans. Wireless Commun., vol. 6, no. 4,pp. 1420–1425, Apr. 2007.
[19] Seok-Ju Lee and Sung-Yoon Jung “A SNR Analysis of the Visible Light channel Environment for
Visible Light Communication” IEEE APCC 2012.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.3, May 2016
31
AUTHORS
Farooq Aftab received his BS Telecommunication Engineering degree in 2013 from
Foundation University, Islamabad, Pakistan. Currently he is pursuing master degree in
Information and Communication Engineering from University of Science and
Technology Beijing, China. His research area is Mobile adhoc network (Manets), Light
fidelity (Li-Fi) and Network coding.
Muhammad Nafees Ulfat khan received his degree ofBachelor of Science in
Electronics and Communication in 2013 from University of Lahore, Pakistan. Currently
he is pursuing master degree in Information and Communication Engineering from
University of Science and Technology Beijing, China. His research area is Light fidelity
(Li-Fi) and visible light communication (VLC).
Shahzad Ali received his degree of M.Sc computer Science in 2013 from Abdul wali
khan Mardan, Pakistan. Currently he is pursuing master degree in Information and
Communication Engineering from University of Science and Technology Beijing,
China. His research area is Wireless Communication.