With an increase in number of software defined network (SDN) deployments,and OpenFlow consolidating as the protocol of choice for controller-switch interactions, a need to analytically model the system for performance analysis is increasing. An attempt has previously been made in [1] to model the syste considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane.These two short-comings are addressed in this paper where thecontroller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent analysis shows the resilience of the model even for higher number of new flow entries. An example is also used
to illustrate the case of multiple nodes in the data plane.
OpenFlow is one of the most commonly used protocols for communication between the
controller and the forwarding element in a software defined network (SDN). A model based on
M/M/1 queues is proposed in [1] to capture the communication between the forwarding element
and the controller. Albeit the model provides useful insight, it is accurate only for the case when
the probability of expecting a new flow is small.
Secondly, it is not straight forward to extend the model in [1] to more than one forwarding
element in the data plane. In this work we propose a model which addresses both these
challenges. The model is based on Jackson assumption but with corrections tailored to the
OpenFlow based SDN network. Performance analysis using the proposed model indicates that
the model is accurate even for the case when the probability of new flow is quite large. Further
we show by a toy example that the model can be extended to more than one node in the data plane.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
This document summarizes a research paper that proposes a distributed flow-based access scheme for slotted-time protocols in ad-hoc wireless networks. The scheme aims to provide proportional fairness between end-to-end flows while constraining buffer overflow probabilities at each node. It formulates the problem as a nonlinear program and presents a distributed dual approach with low computational overhead. Simulation results support that the proposed scheme converges to the unique global optimum and satisfies fairness and quality of service objectives.
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
In this paper, we propose a novel multi-hop cluster architecture for location service protocol in vehicular ad
hoc networks. The proposed scheme uses two parameters which are the connectivity between vehicles and the
vehicle mobility to select cluster head. The performance of the proposed scheme is the tradeoff between the
vehicle locations and the communication overheads. The proposed scheme is not only scalable but also
reliable and is able to achieve high load balancing with fast convergence. The cluster constructed by the
proposed scheme is more stable than exiting vehicular ad hoc network clustering schemes. Specifically, the
proposed scheme can increase the cluster-head lifetime up to 50%. The reason behind this achievement is
that the proposed scheme considers vehicle mobility in terms of average link expiration time while selecting
cluster-head.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
- The document discusses developing quality of service (QoS) in Internet of Things (IoT) networks by using priority routing for real-time data.
- It proposes a novel solution that integrates mobile ad hoc networks (MANETs) to improve delivery of high priority real-time application data over low latency MANET paths.
- Experimental results showed the proposed approach was effective in reducing network overhead and congestion, while also improving routing protocol performance in terms of packet delay and throughput.
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
This document proposes a new routing protocol called MuMHR for wireless sensor networks. MuMHR aims to improve energy efficiency and robustness over LEACH in three ways: 1) By enabling nodes to select cluster heads based on the number of hops away to reduce transmission distances. 2) By using a back-off timer and multiple paths for transmissions to reduce setup overhead and add reliability. 3) By electing backup cluster heads to substitute when primary heads fail. The protocol operates in setup and data transfer phases, with the setup phase selecting cluster heads and forming clusters in an energy-efficient multi-hop manner.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
The document proposes a new routing protocol called Sector Tree-Based Clustering for Energy Efficient Routing Protocol (STB-EE) for wireless sensor networks. STB-EE partitions the sensor field into dynamic sectors to balance the number of nodes per cluster. Within each sector, STB-EE constructs a minimum spanning tree to connect nodes and reduce long-distance communication. STB-EE selects cluster heads based on remaining energy and distance to the base station. Simulation results show STB-EE can improve network lifespan by about 15-16% compared to other protocols.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
OpenFlow is one of the most commonly used protocols for communication between the
controller and the forwarding element in a software defined network (SDN). A model based on
M/M/1 queues is proposed in [1] to capture the communication between the forwarding element
and the controller. Albeit the model provides useful insight, it is accurate only for the case when
the probability of expecting a new flow is small.
Secondly, it is not straight forward to extend the model in [1] to more than one forwarding
element in the data plane. In this work we propose a model which addresses both these
challenges. The model is based on Jackson assumption but with corrections tailored to the
OpenFlow based SDN network. Performance analysis using the proposed model indicates that
the model is accurate even for the case when the probability of new flow is quite large. Further
we show by a toy example that the model can be extended to more than one node in the data plane.
Enforcing end to-end proportional fairness with bounded buffer overflow proba...ijwmn
This document summarizes a research paper that proposes a distributed flow-based access scheme for slotted-time protocols in ad-hoc wireless networks. The scheme aims to provide proportional fairness between end-to-end flows while constraining buffer overflow probabilities at each node. It formulates the problem as a nonlinear program and presents a distributed dual approach with low computational overhead. Simulation results support that the proposed scheme converges to the unique global optimum and satisfies fairness and quality of service objectives.
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
In this paper, we propose a novel multi-hop cluster architecture for location service protocol in vehicular ad
hoc networks. The proposed scheme uses two parameters which are the connectivity between vehicles and the
vehicle mobility to select cluster head. The performance of the proposed scheme is the tradeoff between the
vehicle locations and the communication overheads. The proposed scheme is not only scalable but also
reliable and is able to achieve high load balancing with fast convergence. The cluster constructed by the
proposed scheme is more stable than exiting vehicular ad hoc network clustering schemes. Specifically, the
proposed scheme can increase the cluster-head lifetime up to 50%. The reason behind this achievement is
that the proposed scheme considers vehicle mobility in terms of average link expiration time while selecting
cluster-head.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
- The document discusses developing quality of service (QoS) in Internet of Things (IoT) networks by using priority routing for real-time data.
- It proposes a novel solution that integrates mobile ad hoc networks (MANETs) to improve delivery of high priority real-time application data over low latency MANET paths.
- Experimental results showed the proposed approach was effective in reducing network overhead and congestion, while also improving routing protocol performance in terms of packet delay and throughput.
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
This document proposes a new routing protocol called MuMHR for wireless sensor networks. MuMHR aims to improve energy efficiency and robustness over LEACH in three ways: 1) By enabling nodes to select cluster heads based on the number of hops away to reduce transmission distances. 2) By using a back-off timer and multiple paths for transmissions to reduce setup overhead and add reliability. 3) By electing backup cluster heads to substitute when primary heads fail. The protocol operates in setup and data transfer phases, with the setup phase selecting cluster heads and forming clusters in an energy-efficient multi-hop manner.
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
The document proposes a new routing protocol called Sector Tree-Based Clustering for Energy Efficient Routing Protocol (STB-EE) for wireless sensor networks. STB-EE partitions the sensor field into dynamic sectors to balance the number of nodes per cluster. Within each sector, STB-EE constructs a minimum spanning tree to connect nodes and reduce long-distance communication. STB-EE selects cluster heads based on remaining energy and distance to the base station. Simulation results show STB-EE can improve network lifespan by about 15-16% compared to other protocols.
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.
Stochastic analysis of random ad hoc networks with maximum entropy deploymentsijwmn
In this paper, we present the first stochastic analysis of the link performance of an ad hoc network modelled
by a single homogeneous Poisson point process (HPPP). According to the maximum entropy principle, the
single HPPP model is mathematically the best model for random deployments with a given node density.
However, previous works in the literature only consider a modified model which shows a discrepancy in the
interference distribution with the more suitable single HPPP model. The main contributions of this paper
are as follows. 1) It presents a new mathematical framework leading to closed form expressions of the
probability of success of both one-way transmissions and handshakes for a deployment modelled by a
single HPPP. Our approach, based on stochastic geometry, can be extended to complex protocols. 2) From
the obtained results, all confirmed by comparison to simulated data, optimal PHY and MAC layer
parameters are determined and the relations between them is described in details. 3) The influence of the
routing protocol on handshake performance is taken into account in a realistic manner, leading to the
confirmation of the intuitive result that the effect of imperfect feedback on the probability of success of a
handshake is only negligible for transmissions to the first neighbour node.
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN ijsc
This document summarizes and compares the optimized R-LEACH wireless sensor network routing protocol to the standard LEACH protocol. It first provides background on wireless sensor networks and discusses the LEACH protocol. It then proposes an enhanced R-LEACH protocol that aims to reduce energy consumption by adding active, ready, and sleep communication modes. Simulation results show that R-LEACH balances energy consumption better and extends network lifetime more than LEACH. Key parameters like energy usage, packet loss, delay, throughput, and overhead are compared between the two protocols, with R-LEACH performing better in all areas.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch.
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)Amulya Naik
Develop MAC Protocol using NetSim Network Simulator for MANETs to send the packet without any contention through wireless link using the following MAC protocol(CSMA/CA (802.11)).
Analyze its performance with
1.Increasing node density
2.Mobility
This experiment is part of Visvesvaraya Technological University (VTU) syllabus for post graduate students.
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Ad Hoc mobile networks are constituted of nodes that move freely without a centralized administration.
These nodes contribute in the routing of data packets that are sent by a source. This happens when the
latter is not capable of reaching its destination. On the other hand, their mobility causes recurrent
breakdowns of the routing paths notably with sparse MANET. In order to optimize the performance of such
networks, we suggest a new extension of protocols: Stream Control Transmission Protocols (SCTP) named
SCTP-MANET. Their main function is therefore to improve the availability of the links in sparse MANET
protocols. This could be achieved by a better integration of Multihoming. With this aim in mind, this new
extension is based on a cross-layer interface between transport and routing layers as well as the use of
specific messages.
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
The Link Quality Indicator (LQI) and Residual Energy have a fundamental impact on the network
performance in Wireless Sensor Networks (WSNs) and affects as well in the life time of nodes. This paper
will provide a comparative of Link Quality Estimator, the Link Quality Estimator with Link Quality
Indicator and Link Quality Estimator with Residual Energy. In this paper we develop a Collect Tree
Protocol (CTP) and compare the performance of LQI and Residual Energy, and show their effect on the
packet delivery ratio and throughput, covering the characteristics of low-power links, and their
performance to the best of our knowledge, we believe that our efforts would have implementations on
embedded application.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
Improvement of Congestion window and Link utilization of High Speed Protocols...IOSR Journals
This document summarizes a research paper that proposes using a k-nearest neighbors (k-NN) algorithm to help high-speed transport layer protocols like CUBIC better distinguish between packet drops due to network congestion versus other factors like noise. The k-NN algorithm would analyze patterns in packet drop history to classify new drops, helping protocols avoid unnecessary window size reductions when drops are not actually due to congestion. The document provides background on high-speed protocols, issues like underutilization from treating all drops as congestion, and how incorporating k-NN classification could improve protocols' performance in noisy network conditions.
This document summarizes three routing strategies - Cluster and Chain Based (CCB), Transmission Ranges and Chain Based (TRCB), and GRAdient Broadcast (GRAB) - proposed for wireless sensor networks to improve energy efficiency. CCB uses both clustering from LEACH and chain formation from PEGASIS to transmit sensor data to the base station. TRCB uses transmission ranges and distances to transmit sensor data within clusters to heads, which then form chains to the base station. GRAB builds and maintains a cost field to efficiently transmit data along descending costs towards the base station along multiple paths. Simulation results show GRAB performs better than CCB and TRCB in terms of network lifetime.
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6journalBEEI
The objective of this paper is to present performance analysis of a new enhanced mobile multicast network mobility management scheme. The initial developed network mobility management called Proxy Mobile IPv6 (PMIPv6) is based on unicast network support. This paper enabled multicast support in network mobility management and named it as MPMIPv6. Additionally this enhancement also provides better network performance with the new context transfer operations and fast reroute operations. In brief, this paper also describes other current mobile multicast schemes. The new scheme is evaluated using mathematical analysis and NS3.19 simulator. Theoretically this scheme reduces service recovery time, total signalling cost, handover latency, and packet loss for multicast communication. However for this paper, the analysed parameters are throughput and handover latency. Both mathematical and simulation results exhibit better network performance for multicast environment compared to the standard benchmark scheme.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the client’s interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the client’s interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN ijsc
This document summarizes and compares the optimized R-LEACH wireless sensor network routing protocol to the standard LEACH protocol. It first provides background on wireless sensor networks and discusses the LEACH protocol. It then proposes an enhanced R-LEACH protocol that aims to reduce energy consumption by adding active, ready, and sleep communication modes. Simulation results show that R-LEACH balances energy consumption better and extends network lifetime more than LEACH. Key parameters like energy usage, packet loss, delay, throughput, and overhead are compared between the two protocols, with R-LEACH performing better in all areas.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
The simple architecture with high forwarding capacity bandwidth is load balancing switch is build with two stage switch fabric to eliminate the mis sequencing problems and kept packets of the same flow in the order of load balanced two stage switch. Before load balancing two stages has perform with the Full
frame first algorithm and use centralized scheduler to eliminate those mis sequencing problemsand getting the 100% throughput result. There comes at some additional cost and needs costly online scheduling algorithms and need for a complex scheduler and quality being reduced. In this paper we introduce the two stage switch fabric with round robin scheduling algorithmis used to solve mis sequencing problems and two maximum weight matching algorithms Longest queue first(LQF) and Oldest cell first(OCF) to achieve 100% throughput results. Theoretical analysis and simulation results shows that using these algorithms, achieve all the possible outcome results in the switch.
MANET Experiment - I (Using Network Simulator NetSim -www.tetcos.com)Amulya Naik
Develop MAC Protocol using NetSim Network Simulator for MANETs to send the packet without any contention through wireless link using the following MAC protocol(CSMA/CA (802.11)).
Analyze its performance with
1.Increasing node density
2.Mobility
This experiment is part of Visvesvaraya Technological University (VTU) syllabus for post graduate students.
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Ad Hoc mobile networks are constituted of nodes that move freely without a centralized administration.
These nodes contribute in the routing of data packets that are sent by a source. This happens when the
latter is not capable of reaching its destination. On the other hand, their mobility causes recurrent
breakdowns of the routing paths notably with sparse MANET. In order to optimize the performance of such
networks, we suggest a new extension of protocols: Stream Control Transmission Protocols (SCTP) named
SCTP-MANET. Their main function is therefore to improve the availability of the links in sparse MANET
protocols. This could be achieved by a better integration of Multihoming. With this aim in mind, this new
extension is based on a cross-layer interface between transport and routing layers as well as the use of
specific messages.
Impact of energy and link quality indicator with link quality estimators in w...graphhoc
The Link Quality Indicator (LQI) and Residual Energy have a fundamental impact on the network
performance in Wireless Sensor Networks (WSNs) and affects as well in the life time of nodes. This paper
will provide a comparative of Link Quality Estimator, the Link Quality Estimator with Link Quality
Indicator and Link Quality Estimator with Residual Energy. In this paper we develop a Collect Tree
Protocol (CTP) and compare the performance of LQI and Residual Energy, and show their effect on the
packet delivery ratio and throughput, covering the characteristics of low-power links, and their
performance to the best of our knowledge, we believe that our efforts would have implementations on
embedded application.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
Abstract The aim of this paper is to investigate the transmission of data between client and server through different IEEE 802.11 wireless LAN multi- HOP network. To improve this issue, the transmission opportunity (TXOP) mechanism is defined in the IEEE 802.11e standard, with which a wireless node can transmit multiple frames consecutively for a maximum channel occupancy time, called TXOP limit. This paper considers the performance of the TXOP mechanism for multi-hop wireless networks. Focusing on a three-node chain topology, we model it as a tandem queuing network with two nodes. The E2ET is derived and the analysis is validated by simulation. Numerical results show that the TXOP mechanism works well for multi-hop wireless networks. It is also shown that adjusting TXOP limit is significantly important in order to increase the overall throughput. In terms of multi-hop wireless networks, there is little analytical work with regard to the E2ET performance. One of the rationales for the analytical difficulty for multi-hop wireless networks is that IEEE 802.11 MAC protocol is too complex to model the behavior of multi-hop frame transmissions. Keywords: IEEE 802.11e, multi-hop wireless LAN, TXOP, E2ET
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
Improvement of Congestion window and Link utilization of High Speed Protocols...IOSR Journals
This document summarizes a research paper that proposes using a k-nearest neighbors (k-NN) algorithm to help high-speed transport layer protocols like CUBIC better distinguish between packet drops due to network congestion versus other factors like noise. The k-NN algorithm would analyze patterns in packet drop history to classify new drops, helping protocols avoid unnecessary window size reductions when drops are not actually due to congestion. The document provides background on high-speed protocols, issues like underutilization from treating all drops as congestion, and how incorporating k-NN classification could improve protocols' performance in noisy network conditions.
This document summarizes three routing strategies - Cluster and Chain Based (CCB), Transmission Ranges and Chain Based (TRCB), and GRAdient Broadcast (GRAB) - proposed for wireless sensor networks to improve energy efficiency. CCB uses both clustering from LEACH and chain formation from PEGASIS to transmit sensor data to the base station. TRCB uses transmission ranges and distances to transmit sensor data within clusters to heads, which then form chains to the base station. GRAB builds and maintains a cost field to efficiently transmit data along descending costs towards the base station along multiple paths. Simulation results show GRAB performs better than CCB and TRCB in terms of network lifetime.
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
Cloud computing has an indispensable role in the modern digital scenario. The fundamental challenge of cloud systems is to accommodate user requirements which keep on varying. This dynamic cloud environment demands the necessity of complex algorithms to resolve the trouble of task allotment. The overall performance of cloud systems is rooted in the efficiency of task scheduling algorithms. The dynamic property of cloud systems makes it challenging to find an optimal solution satisfying all the evaluation metrics. The new approach is formulated on the Round Robin and the Shortest Job First algorithms. The Round Robin method reduces starvation, and the Shortest Job First decreases the average waiting time. In this work, the advantages of both algorithms are incorporated to improve the makespan of user tasks.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
A PROACTIVE FLOW ADMISSION AND RE-ROUTING SCHEME FOR LOAD BALANCING AND MITIG...IJCNCJournal
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load
balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that
when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6journalBEEI
The objective of this paper is to present performance analysis of a new enhanced mobile multicast network mobility management scheme. The initial developed network mobility management called Proxy Mobile IPv6 (PMIPv6) is based on unicast network support. This paper enabled multicast support in network mobility management and named it as MPMIPv6. Additionally this enhancement also provides better network performance with the new context transfer operations and fast reroute operations. In brief, this paper also describes other current mobile multicast schemes. The new scheme is evaluated using mathematical analysis and NS3.19 simulator. Theoretically this scheme reduces service recovery time, total signalling cost, handover latency, and packet loss for multicast communication. However for this paper, the analysed parameters are throughput and handover latency. Both mathematical and simulation results exhibit better network performance for multicast environment compared to the standard benchmark scheme.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet.
This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand
streaming system. The vast majority of these proposals focus on modifying the piece and peer selection
policies, respectively, of the original protocols. Nonetheless, it is true that more attention has often been
given to the piece selection policy rather than to the peer selection policy. Within this context, this article
proposes a simple algorithm to be used as basis for peer selection policies of BitTorrent-like protocols,
considering interactive scenarios. To this end, we analyze the client’s interactive behaviour when accessing
real multimedia systems. This analysis consists of looking into workloads of real content providers and
assessing three important metrics, namely temporal dispersion, spatial dispersion and object position
popularity. These metrics are then used as the main guidelines for writing the algorithm. To the best of our
knowledge, this is the first time that the client’s interactive behaviour is specially considered to derive an
algorithm for peer selection policies. Finally, the conclusion of this article is drawn with key challenges
and possible future work in this research field.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
This document evaluates the effect of noise power jamming on Bluetooth personal area networks (PANs). It finds that barrage noise jamming across the full 79MHz Bluetooth band is ineffective from 10 meters away. Narrower 20MHz and 5MHz sweep jamming can reduce the processing gain over time by causing channels to be blocked by the adaptive frequency hopping (AFH) mechanism. Jamming power levels of 2-5 watts were still insufficient to overcome path loss and processing gain at distances over 1 meter. Future work could evaluate follower jamming techniques targeting the frequency hopping scheme.
A comparative analysis of number portability routing schemesIJCNCJournal
To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost
important. NP allows end user to retain their telephone number in case of change of geographical location
or service type or service provider. This paper describes the various number portability routing schemes
namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis
between these routing schemes on various parameters is presented here. The issues pertaining to NP have
also been described.
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
The Bandwidth Allocation Models (MAM, RDM, G-RDM and AllocTC-Sharing) are management
alternatives currently available which propose different resource (bandwidth) allocation strategies in
multiservice networks. The BAM adoption by a network is typically a management choice and
configuration task executed by the network operations and management system setup in a static or nearly
static way. This paper proposes and explores the alternative of allowing BAM definition and configuration
on a more dynamic way. In effect, one of the basic motivations towards BAM dynamic allocation is the fact
that multiservice networks characteristics (traffic load) may change considerably in daily network
operation and, as such, some dynamics in BAM allocation should be introduced in order to improve
performance. A framework is presented supporting BAM dynamic allocation. The framework adopts an
OpenFlow-based software-defined networking (SDN) implementation approach in order to support
scalability issues with a centralized controller and management network view. The framework architecture
also supports the implementation of some autonomic characteristics which, in brief, look for improving and
facilitating the decision-making process involved with BAM provisioning in a multiservice network. A
proof of concept is presented evaluating different BAM performance under different traffic loads in order to
demonstrate the framework strategy adopted.
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
We propose a new evaluation method for‘generalized confidential modulation(GCM)’ for quantum
communication. Confidential modulationrealizes a secret communication by using secret information for
modulationand noise in a channel. Y-00 is one of the famous methods of GCM forquantum communication.
The existing evaluation methods for GCM arebased on stream ciphers. They can estimate its analytical
security andthe evaluation depends on the security status of pseudo random numbergenerator (PRNG)
which controls the modulation. On the other hand,our method is based on mode of operation for block
ciphers and clears theweaknesses from structural viewpoint. Using our method, we can comparethe
security of different GCM structures. Our method of security evaluationand comparison does not depend on
the security status of PRNG.From the results of our evaluation, we conclude that the security of GCMis
limited to computational security.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
In the performance evaluation of a protocol for a vehicular ad hoc network, the protocol should be tested under a realistic conditions including, representative data traffic models, and realistic movements of the mobile nodes which are the vehicles (i.e., a mobility model). This work is a comparative study between two mobility models that are used in the simulations of vehicular networks, i.e., MOVE (MObility model generator for VEhicular networks) and CityMob, a mobility pattern generator for VANET. We describe several mobility models for VANET simulations.
In this paper we aim to show that the mobility models can significantly affect the simulation results in VANET networks. The results presented in this article prove the importance of choosing a suitable real world scenario for performances studies of routing protocols in this kind of network.
In recent years, cooperative communication is a hot topic of research and it is a powerful physical layer
technique to combat fading in wireless relaying scenario. Concerning with the physical layer issues, in this
paper it is focussed on with providing a better space time block coding (STBC) scheme and incorporating it
in the cooperative relaying nodes to upgrade the system performance. Recently, the golden codes have
proven to exhibit a superior performance in a wireless MIMO (Multiple Input Multiple Output) scenario
than any other code. However, a serious limitation associated with it is its increased decoding complexity.
This paper attempts to resolve this challenge through suitable modification of golden code such that a less
complex sphere decoder could be used without much compromising the error rates. The decoder complexity
is analyzed through simulation and it proves to exhibit less complexity compared to the conventional
(Maximum likelihood) ML decoder. The single relay cooperative STBC consisting of source, relay and
destination are considered. The cooperative protocol strategy considered in the relay node is Decode and
forward (DF) protocol. The proposed modified golden code with less complex sphere decoder is
implemented in the nodes of the cooperative relaying system to achieve better performance in the system.
The simulation results have validated the effectiveness of the proposed scheme by offering better BER
performance, minimum outage probability and increased spectral efficiency compared to the non
cooperative transmission method.
Pwm technique to overcome the effect ofIJCNCJournal
Many current communication systems suffer from performance degradation due to the high sensitivity to
high power peaks especially in the nonlinear devices. The author introduces a new concept based on the
Pulse Width Modulation (PWM), namely MIMO-OFDM system based PWM (MO-PWM) to overcome this
deficiency. Here, the peak-to-average power ratio (PAPR) problem in Orthogonal Frequency Division
Multiplexing (OFDM) technique is used as a criterion to check the validity of the proposed work.
Moreover, the proposed system work has been implemented over Field Programmable Gate Array (FPGA),
which is designed to characterize both of the complexity and the speed issues.
The systems performance based MO-PWM and validity have been checked based on a numerical analysis
and a conducted simulation. The simulation results show that the MO-PWM can clearly reduce the PAPR
values nevertheless the used OFDM systems’ specifications, and gives a promising results over some
techniques found in the literature, such as clipping, SLM and PTS under same bandwidth occupancy and
system’s specifications.
Real time audio translation module between iax and rswIJCNCJournal
At the last few years, multimedia communication has
been developed and improved rapidly in order to
enable users to communicate between each other over
the internet. Generally, multimedia communication
consists of audio and video communication. However,
this research concentrates on audio conferencing
only. The audio translation between protocols is a
very critical issue, because it solves the communic
ation
problems between any two protocols. So, it enables
people around the world to talk with each other eve
n
they use different protocols. In this research, a r
eal time audio translation module between two proto
cols
has been done. These two protocols are: InterAsteri
sk eXchange Protocol (IAX) and Real-Time Switching
Control Protocol (RSW), which they are widely used
to provide two ways audio transfer feature. The
solution here is to provide interworking between th
e two protocols which they have different media
transports, audio codec’s, header formats and diffe
rent transport protocols for the audio transmission
. This
translation will help bridging the gap between the
two protocols by providing interworking capability
between the two audio streams of IAX and RSW. Some
related works have been done to provide translation
between IAX and RSW control signalling messages. Bu
t, this research paper concentrates on the
translation that depends on the media transfer. The
proposed translation module was tested and evaluat
ed
in different scenarios in order to examine its perf
ormance. The obtained results showed that the Real-
Time
Audio Translation Module produces lower rates of pa
cket delay and jitter than the acceptance values fo
r
each of the mentioned performance metrics.
Energy aware clustering protocol (eacp)IJCNCJournal
The document summarizes an Energy Aware Clustering Protocol (EACP) proposed for heterogeneous wireless sensor networks. EACP introduces heterogeneity by using two types of nodes: normal and advanced. Normal nodes elect cluster heads using a probability scheme based on residual and average energy. Advanced nodes use a separate probability scheme and act as gateways for normal cluster heads, transmitting their data to the base station. The performance of EACP is compared to SEP through simulations, showing better results for stability period, network life and energy savings.
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
We propose a method to measure available network ba
ndwidth using the Internet Control Message
Protocol (ICMP). The recently proposed ImTCP techni
que uses Transmission Control Protocol (TCP) data
packets and the corresponding acknowledgement respo
nses to measure the available bandwidth between
sender and receiver. Since ImTCP needs to change th
e sender’s TCP implementation, it needs
modifications to sender’s operating system kernel.
Moreover, ImTCP cannot measure available bandwidth
accurately if the receiver sends delayed acknowledg
ments. These problems stem from the use of TCP. In
this paper, we discuss an ICMP-based method that ov
ercomes these limitations. We evaluate the
performance of the proposed method in an experiment
al network and show that it generates less
measurement traffic and requires less time for band
width measurement than PathLoad. We also show that
proposed method can measure the available bandwidth
even if the bandwidth changes during
measurement
A new method for controlling and maintainingIJCNCJournal
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Cloud computing challenges and solutionsIJCNCJournal
Cloud computing is an emerging area of computer technology that benefits form the processing power and
the computing resources of many connected, geographically distanced computers connected via Internet.
Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet
users requirements and applications. It can be thought of or considered as a complete or a partial
outsourcing of hardware and software resources. To access cloud applications, a good Internet connection
and a standard Internet browser are required. Cloud computing has its own drawback from the security
point of view; this paper aims to address most of these threats and their possible solutions.
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
Education data mining is an emerging stream which h
elps in mining academic data for solving various
types of problems. One of the problems is the selec
tion of a proper academic track. The admission of a
student in engineering college depends on many fact
ors. In this paper we have tried to implement a
classification technique to assist students in pred
icting their success in admission in an engineering
stream.We have analyzed the data set containing inf
ormation about student’s academic as well as socio-
demographic variables, with attributes such as fami
ly pressure, interest, gender, XII marks and CET ra
nk
in entrance examinations and historical data of pre
vious batch of students. Feature selection is a pro
cess
for removing irrelevant and redundant features whic
h will help improve the predictive accuracy of
classifiers. In this paper first we have used featu
re selection attribute algorithms Chi-square.InfoGa
in, and
GainRatio to predict the relevant features. Then we
have applied fast correlation base filter on given
features. Later classification is done using NBTree
, MultilayerPerceptron, NaiveBayes and Instance bas
ed
–K- nearest neighbor. Results showed reduction in c
omputational cost and time and increase in predicti
ve
accuracy for the student model
There is no doubt that network coding is a promising enhancement of routing to improve network throughput and provide high reliability. However, there are several open problems in practical network coding, especially on how to guarantee coding advantage for a decentralized control network without the knowledge of the network topology. The biggest benefit of OpenFlow is to decouple the control plane from the data plane, allowing the centralized forwarding decisions in comparison to traditional distributed control network. As a result, we propose a Software-Defined coding network and address key technical challenges in practice. We design NC-OF, a framework to enable networking coding in SDN networks, and use MMF-NC coding strategy proposed by Guan Xu in NC-OF. Finally, we proved that our solutions can effectively improve network performance through simulation experiments. And we also find that network coding is not necessary when the link bandwidth is enough , because it will bring the problems of time delay, the increase in the amount of calculation and so on.
DYNAMIC SDN CONTROLLER PLACEMENT BASED ON DEEP REINFORCEMENT LEARNINGjosephjonse
Software-defined Networking (SDN) is a revolutionary network architecture whose benefits stem partly
from separating the data plane and control plane. In this scheme, the control functionalities are relocated
to a logically centralized SDN controller which makes efficient and globally optimal forwarding decisions
for network devices. Despite the fact that network virtualization technologies enable elastic capacity
engineering and seamless fault recovery of the SDN controller, an optimal controller placement strategy
that can adapt to changes in networks is an important but underexplored research topic. This paper
proposes a novel deep reinforcement learning-based model that dynamically and strategically adjusts the
location of the controller to minimize the OpenFlow latency in a virtualized environment. The experimental
results demonstrate that the proposed strategy out performs both a random strategy and a generic strategy.
Furthermore, this paper provides detailed instructions on how to implement the proposed model in realworld software-defined networks.
Dynamic SDN Controller Placement based on Deep Reinforcement Learningjosephjonse
Software-defined Networking (SDN) is a revolutionary network architecture whose benefits stem partly from separating the data plane and control plane. In this scheme, the control functionalities are relocated to a logically centralized SDN controller which makes efficient and globally optimal forwarding decisions for network devices. Despite the fact that network virtualization technologies enable elastic capacity engineering and seamless fault recovery of the SDN controller, an optimal controller placement strategy that can adapt to changes in networks is an important but underexplored research topic. This paper proposes a novel deep reinforcement learning-based model that dynamically and strategically adjusts the location of the controller to minimize the OpenFlow latency in a virtualized environment. The experimental results demonstrate that the proposed strategy out performs both a random strategy and a generic strategy. Furthermore, this paper provides detailed instructions on how to implement the proposed model in realworld software-defined networks.
SIMULATION OF SOFTWARE DEFINED NETWORKS WITH OPEN NETWORK OPERATING SYSTEM AN...ijcsit
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
With the emergence of recent technologies in the field of computer network, traditional infrastructure in the field of networks have become obsolete and incompatible with respect to the new architectures of open networks that emerge with force. This is how software-defined networks emerge by enabling cloud computing ecosystem, enterprise data centers, and telecommunications service providers. The major contribution of this paper is the simulation of an ecosystem based on a software defined network by making use of certain types of networks topologies and using the virtualization of the open network operating system (ONOS) and Mininet as a network emulator.
SDN and it’s Application in Wireless Mesh NetworkMilap Bhanderi
This is a review report (and also a kind of survey paper) which comprises some research papers having concepts of SDN like SDWMN, wmSDN, NEON technology, D-SDWMN which gives insights of SDN architecture and related studies. This paper was submitted by myself in the year 2019 at Dalhousie University, Halifax, NS during the SDN course.
The document proposes OpenQoS, a novel OpenFlow controller design that enables quality of service for multimedia delivery over software-defined networks. OpenQoS uses dynamic QoS routing to optimize routes for multimedia traffic to fulfill required quality of service levels, while other traffic remains on shortest paths. The design was tested on a real OpenFlow network and showed it could guarantee seamless video delivery with little video quality degradation, unlike existing QoS architectures that can adversely affect other traffic.
The document is a scientific composition about the
system architecture of OpenFlow and describes their principles of data handling, the types of messages and operations on the network.
The software-defined network (SDN) controller adds and removes the contents of the flow table through secure channels to determine how packets are processed and how the flow table is managed. The controller pays attention to network intelligence and becomes the middle part, where the network manages the transfer data of the aircraft delivered via the OpenFlow (OF) switch. To this end, the controller provides an interface for managing, controlling, and managing this switch flow table. Run tests to calculate controller throughput and latency levels and test using the cbance tool, which can test transmission control protocol (TCP) and user datagram protocol (UDP) protocols. The tests are run by forcing the controller to run at maximum without any additional settings (default settings) in order to use the correct information about the controller’s capabilities. Because of this need, you need to test the performance of your controller. In this study, the tests were run on three popular controllers. Test results show that flowed controllers are more stable than open network operating dystem (ONOS) and open daylight (ODL) controllers in managing switch and host loads.
OpenFlow enables network innovation by allowing researchers to run experimental protocols on campus networks. It takes OpenFlow switches and separates the data and control planes, with an external controller managing flow tables. This allows experimental traffic to be isolated yet realistic. OpenFlow provides high performance, supports research, isolates production and experimental traffic, and is compatible with vendor switches through upgrades. It offers a cost-effective way to deploy new ideas compared to large-scale SDNs.
Amaru Plug Resilient In-Band Control For SDNJeff Brooks
Amaru is a protocol that provides plug-and-play, resilient in-band control for SDN networks. It uses an exploration mechanism to quickly find all possible paths between the controller and network nodes. Routing is based on masked MAC addresses, which simplifies routing tables to only one entry per path. Amaru was evaluated using three implementations across diverse networks and failures. It provided near instant rerouting and low recovery times.
Efficient Dynamic Load-Balance Flow Scheduling in cloud for Big Data Centers.IRJET Journal
This document proposes a novel dynamic load balancing scheduling (DLBS) approach to maximize network throughput in big data centers by dynamically balancing data flows. It formulates the DLBS problem and develops heuristic scheduling algorithms for two OpenFlow network models - three-layer non-blocking fully populated network (FPN) and three-layer fat-tree network (FTN). The algorithms balance data flows each time slot by migrating the largest flows on the most congested links to the lightest links. Experimental results show DLBS significantly improves network performance compared to other load balancing algorithms under different traffic patterns.
On the latency and jitter evaluation of software defined networksjournalBEEI
Conventional networking devices require that each is programmed with different rules to perform specific collective tasks. Next generation networks are required to be elastic, scalable and secured to connect millions of heterogeneous devices. Software defined networking (SDN) is an emerging network architecture that separates control from forwarding devices. This decoupling allows centralized network control to be done network-wide. This paper analyzes the latency and jitter of SDN against a conventional network. Through simulation, it is shown that SDN has an average three times lower jitter and latency per packet that translate to improved throughput under varying traffic conditions.
This document summarizes a simulation of wireless sensor networks to analyze power-efficient protocols and algorithms. It describes simulating three techniques - power control, closest-first and farthest-first routing algorithms, and sleep mode. The simulation analyzes these techniques individually and together to evaluate their impact on network lifetime and mean delay.
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
With the increased use of real time applications, there is a need for improved network traffic and bandwidth management. Switches are being used by computer networks for enabling connection between those hosts which are not connected by a direct link. When two or more than two host attempt to transmit packet at the same time, collision in data packets occurred. In this paper an optimized performance of local area network in terms of collision count and some other parameter have been investigated using simulation model. Simulation results have been obtained in different network scenarios by varying the number of devices in the network.
This document describes a study that designed and tested a physical SDN switch using Open vSwitch (OVS) software and the Soekris net4801 hardware platform. OVS was installed on the Soekris board to enable it with OpenFlow protocol support and act as a controllable SDN switch. Performance tests showed the switch could achieve up to 50Mbps bandwidth but was CPU-limited. Analysis of traffic between the switch and SDN controller found the controller impact on performance was small despite a large number of packets during high-load testing. The study demonstrated a proof-of-concept physical SDN switch but also highlighted hardware limitations for supporting wire-speed throughput.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
The document is a cover sheet for a student submitting a coursework assignment. It includes the student's details such as name, student number, degree and module. It requires the student to declare that the submitted work is their own and has not been plagiarized. The student must sign and date the form for the submission to be accepted by examiners.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
On modeling controller switch interaction in openflow based sdns
1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
ON MODELING CONTROLLER-SWITCH
INTERACTION IN OPENFLOW BASED SDNS
Ameen Chilwan1,Kashif Mahmood2, Olav N. Østerbø2 and Michael Jarschel3
1Department of Telematics, NTNU, Norway
2Telenor Research, Norway
3Nokia, Germany
ABSTRACT
With an increase in number of software defined network (SDN) deployments, and OpenFlow consolidating
as the protocol of choice for controller-switch interactions, a need to analytically model the system for
performance analysis is increasing. An attempt has previously been made in [1] to model the system
considering both a controller and a switch as an M/M/1 queue. The method, although useful, lacks
accuracy for higher probabilities of new flows entering the network. The approach is also deficient of
details on how it can be extended to more than one node in the data plane
.
These two short-comings are addressed in this paper where the controller and switch are modeled
collectively as Jackson’s network, with essential tuning to suit OpenFlow-based SDN. The consequent
analysis shows the resilience of the model even for higher number of new flow entries. An example is also
used to illustrate the case of multiple nodes in the data plane.
KEYWORDS
OpenFlow, Performance analysis, Queuing theory, Software defined networks.
1. INTRODUCTION
Software defined networking (SDN) is a networking concept which involves separating the
control plane from the data plane. SDN promises network deployment and service upgrade on
software time scales which has huge benefits especially in the carrier network domain because in
the future the network operators will not compete on the basis of network coverage alone but on
the basis of features and services.
The initial impact of SDN was seen in the datacenters. As early as January 2012, Google had their
full scaled datacenter WAN running as OpenFlow based SDN [2]. SDN is now all set to roar in
the wireless domain too. All this has been possible due to the basic architectural principle of SDN
which is the separation of the control plane from the data plane. The architecture involves SDN
controller(s) residing in the control plane while the forwarding element(s) make the data plane. In
order to handle the communication between the control plane and the data plane elements,
OpenFlow is the only open, standard protocol [3].
OpenFlow started as a test protocol in Stanford but is now managed and maintained by Open
Networking Foundation (ONF) [3]. It started with OpenFlow version 1.0.0 and at the writing of
the paper, version 1.4 has been specified [3]. The working principle is the same but each version
involves some additional features. For example the version 1.1.0 has support for group tables
DOI : 10.5121/ijcnc.2014.6611 137
2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
which was not there in version 1.0.0. The work in this paper is based on OpenFlow version 1.0.0
and we believe that it can be easily extended to the new versions.
Under an OpenFlow network, the controller-to-switch communication takes place as follows:
where we use the term switch and node interchangeably to represent the forwarding element in
the data plane in an SDN network.
When a flow with no specified forwarding instructions comes into a network the following actions
are taken:
i. A packet (or part of the packet) of the flow is sent by the switch to the controller, assuming
138
that the switch is not configured to drop unknown packets.
ii. The controller computes the forwarding path and updates the required nodes in the data
path by sending entries to be added to the flow tables.
iii. All subsequent packets of the flow are forwarded based on pre-calculated forwarding
decisions and do not need any control plane action.
It is important to model the controller-to-switch communication for the performance analysis of
OpenFlow (OF)-based SDN networks. The modeling of OpenFlow networks will help us to
answer questions such as how much data we can pump into the network, what is the packet
sojourn time, when and what (switch or the controller) is the bottleneck in a network.
Most of the work on performance analysis of SDN networks is based on simulations or
experimentations. Albeit their benefits, analytical modeling is a time efficient alternative because
setting up an SDN experiment or performing a simulation can take hours. The analytical model
for an OF-based SDN should be able to capture the OpenFlow working principle and at the same
time shall be flexible to handle any amount of query traffic going to the controller. Further, the
model shall be readily extendable to more than one node in the data plane.
The analytical modeling of OpenFlow-based networks has only been attempted in a handful of
papers before. For example feedback oriented queuing theory has been used in [1] to capture the
control plane and data plane interaction where the Markovian servers are assumed for both the
controller and the switch. However the model becomes less accurate as the probability of traffic
going to the controller increases. Secondly it is not clear how the model can be extended to more
than one switch in the data plane.
In [4] a network calculus based approach is used to quantify the packet processing capability of
the switch in the data plane. However the feedback between the nodes in the data plane and the
controller is not considered. This shortcoming of feedback modeling is addressed in [5]. However
the model is depicted only for a single node in the data plane and the time stopping method
employed therein has limited real time application. Secondly the framework used in [4] and [5] is
based on deterministic network calculus which does not provide any meaningful bounds [6]. To
the best of our knowledge apart from these handful analytical works, almost all the other efforts
of evaluating performance of OpenFlow-based networks are carried out by simulations or
measurements, for example [7], [8], [9]. Moreover, Cbench tool to benchmark the controller
performance is also introduced in [10] and is proved to be instrumental in benchmarking.
It is therefore of paramount importance to have an analytical model which can capture the
feedback interaction between the controller and the switch, is able to model any amount of traffic
going from switch to controller (and vice versa), and can be easily extended to more than one
switch in the data plane. The model proposed in this paper is an attempt in that direction. We
model the OpenFlow network as a Jackson network but with a modification to accurately
represent the traffic flow from the switch to the controller in an actual OF-based SDN network. It
3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
needs to be emphasized that this model was first presented by us in [11]. Here in this work we
elaborate the model with more performance measures.
It is highlighted later in the paper (Fig. 2) that this modification to the native Jackson network is
necessary to capture the OpenFlow working principle. The model is in turn used for performance
analysis of OF-based SDN networks to calculate the mean packet sojourn time, to find out how
much data we can pump into the network and when and what (switch or the controller) is the
bottleneck in a network. The main contributions of this work are:
· A model is proposed to capture the feedback interaction between the switch and the
jack Γ1 (1)
139
controller mimicking an actual OpenFlow based SDN network
· The model is accurate even for the case when large amount of new flows are arriving at the
switch.
· The model can be easily extended to more than one switch in the data plane.
· We show mathematically that the packet sojourn time calculated by our proposed model
based on Jackson assumption is the same as the one explicitly calculated for OF-based SDN
network in [1].
The rest of the paper is organized as follows; we first present the system model along with the
limitations and the necessary preliminaries in Section 2. The performance measures are outlined
in Section 3, while the numerical results are presented in Section 4. An insight as to how the
proposed model can be used for multi-node case is highlighted in Section 5, while the conclusions
along with the future research directions are presented in Section 6.
2.MODEL DESCRIPTION
We assume that the overall traffic process at the switch and at the controller follows Poison
process similar to [1] given that the two processes are on a different time scale. Further we
assume Markovian servers for the switch and the controller wherein we incorporate the
transmission time of the packets from the switch to the controller in the service time of the
controller. As for the buffer size we assume infinite buffer for the switch while for the controller
we initially do the analysis based on infinite buffer and later in the paper we extend it to the finite
buffer case.
We use Jackson network model to represent the OF-based SDN network. To this end a recap of
the Jackson model for open queuing networks [12], in which the nodes behaves locally as single
M/M/1 queues, is outlined. Albeit trivial, this is done in order to highlight that Jackson model
cannot be used as such for modeling OF-based SDNs.
Let us consider a Jackson network consisting of two nodes 1 and c connected in a feedback path
as shown in Fig. 1(a). The service rates of nodes 1 and c are exponentially distributed with
average values of μ1 and μc, respectively. The external traffic arrival to the node 1 is denoted as λ1
packets per unit time.
Let Γ1 be the net input to node 1 out of which Γc=q1
jack Γ1 goes to the node c where q1
jack is the
probability that the packet goes to the node c.
Assuming that no packet is lost at the controller (infinite buffer at the controller) the balance
equation for the system can be written as
Γ1 = λ1 + q1
4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
Figure 1(a): Jackson Model Figure 1(b): Simple OpenFlow Model [1]
nf λ1 (2)
nf (4)
140
It is the term q1
jack which needs modification in order to model OF-based SDN in Fig. 1(b) as a
Jackson network in Fig. 1(a). This is because an OF-based SDN, as shown in Fig. 1(b), has the
following two salient features:
i. A packet coming to any node in the data plane will at most visit the controller once.
ii. Only a fraction of the external traffic λ1 and not a fraction of the net input traffic Γ1 will go
the controller. (Two lines directly out of the data node in Fig. 1(b) as opposed to one line in
Fig. 1(a) are used to represent this phenomenon).
In an OpenFlow network, let q1
nf be the probability that the packet goes to the controller in case
there is no flow entry in flow-table of the node, then in order to use the Jackson network to
represent the OF-based SDN we have to adjust q1
jack by demanding that the input rates to the
nodes in both the models are the same. Hence
Γ1 = λ1 + q1
and
jackΓ1 = q1
q 1
nf λ1 (3)
As a result q1
jack can be solved as
jack=
q1
nf
q1
1 + q1
Fig. 2 highlights the need of having a modified Jackson model to represent OF-based SDN
networks where we represent mean time spent by a packet in the network (node + controller) as a
function of load on the controller.
The curve simulation is obtained from simulating the OpenFlow behavior taking into account the
aforementioned two salient features. Further, in the simulation, we assume Poisson arrivals at the
input and exponentially distributed service times for the nodes.
The curve denoted by Jackson Model is obtained by using q1
jack as such without modification i.e.
q1
jack = q1
nf while the curve Modified Jackson Model is based on q1
jack in (4).
It can be seen that as the percentage of traffic going to the controller dictated by q1
nf increases, the
modification to the probability q1
jack in (4) becomes all the more important.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
141
Figure 2: Jackson model without modification overestimates the mean packet sojourn time
2.1. Limitations
The work in this paper makes the following assumptions:
· The overall traffic arrival process at the switch and the controller is Poison. Further
exponentially distributed service times are used for the switch and the controller. This allows
us to use the Jackson network results based on M/M/1 queues.
· Secondly we assume a single queue at the switch instead of a separate queue per line card.
· TCP traffic is used for which only the first packet of the unknown flow is sent to the
controller.
· Infinite buffer is assumed at the switch as typically it is quite large.
It needs to be emphasized that the main goal of this work is to develop an analytical model for
OF-based SDN networks. The assumptions will be relaxed in the subsequent work.
3. PERFORMANCEMEASURES
One of the advantages of our proposed model is that we can leverage the well-established results
for performance analysis of Jackson networks for analysing OpenFlow-based SDNs. In this
section, we will use the proposed model to find two elementary performance measures, the
average packet sojourn time, and the distribution of time spent by a packet in the network.
6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
142
3.1. Average Packet Sojourn Time
The average packet sojourn time, E[Wjack], is defined as the time spent by a packet in the network
from the moment it enters the network at its source node, until it leaves through the destination.
E[Wjack] for the network in Fig. 1 is given as [12]
E[Wjack]=
1
λ1
ρ1
1 - ρ1
+
ρc
1 - ρc
(5)
where ρ1 = Γ1/μ1 and ρc = Γc/μc denote the load on the node 1 and the controller c, respectively.
Further, in order to have a stable system, it is assumed that all the loads are less than unity that is
ρ1 < 1 and ρc < 1.
Alternatively, we can use the delay formula derived explicitly for the OpenFlow model, depicted
in Fig. 1(b), as highlighted in [1].
To this end it needs to be highlighted that a packet arriving at the switch in the data plane of the
OpenFlow network is confronted with two conditions. If there is already a flow entry installed in
the switch then the packet is forwarded as such after spending time T1 otherwise it goes to the
controller, spends time Tc then returns back to the same switch for packet matching where it
spends time T1
(2) and is forwarded on the output interface.
So the absolute value of packet sojourn time Wof in an OF-based SDN network where node 1
interacts with the SDN controller c as shown in Fig. 1(b) is given as
Wof=
nf
T1 with probability 1- q1
(2) with probability q1
T1+ Tc+ T1
nf (6)
where T1 and Tc are sojourn times in node 1 and node c respectively, while T1
(2) is the sojourn time
when a packet enters node 1 the second time after visiting the controller.
Eventually, the mean of Wof is given as
nf E[T1]+ q1
E Wof = 1- q1
nf E[T1]+ E[Tc]+ E T1 (
2)
nf 1
μ1- Γ1
= 1+ q1
nf 1
μc- Γc
+ q1
(7)
We draft a short proof in Lemma 1 to show that the mean packet sojourn time calculated by the
two methods is indeed the same.
Lemma 1: For the single node case the packet sojourn time calculated in (5) using the standard
Jackson assumption is the same as explicitly calculated using (7).
Proof: By rearranging (7) in terms of traffic loads we have:
E Wof =
nf
Γ1
1+ q1
ρ1
1 - ρ1
+
nf
Γc
q1
ρc
1 - ρc
(8)
7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
143
Using Γ1 = (1 + q1
nf) λ1 from (2) and Γc = q1
nf λ1 from (3) we obtain E[Wjack], in (5) which proves
the Lemma.
3.2. Distribution of Time Spent by the Packet
In this section we take a step forward by presenting the probability density function (PDF) and the
cumulative density function (CDF) of the time spent by a packet in the node.
Lemma 2: The PDF w1
c(t) and the CDF W1
c(t) of the time spent by a packet in the node 1 are
given respectively as
w1 c
(t)= b1(1)a1e-a1t+b1 (
2)a1(a1t)e-a1t+ d1ace-act (9)
c(t) = P Wof>t = b1 (
W1
1)+ b1 (
2) e-a1t+ b1 (
2)(a1t)e-a1t+ d1e-act (10)
where
a1 = μ1 - Γ1, ac = μc - Γc
while
b1 (
1)=1- q1
nf a1ac
(ac- a1)2 , b1 (
nf- q1
nf ac
ac- a1
2)= q1
nf a1 2
(ac- a1)2
, d1= q1
Proof: If we assume that the sojourn times T1 and T1
(2) are independent then the Laplace
transform W1
c(s) = E[e-sWof
] may be written as
W1 c
nf a1
(s)= 1- q1
a1+s
nf a1
+ q1
a1+s
2 ac
ac+s
(11)
which can further be written as
W1 c
(s)= b1(1) a1
a1+s
+ b1(2) a1
a1+s
2
+d1
ac
ac+s
(12)
Inverting the Laplace transform proves the Lemma.
3.3. Finite buffer at the controller: The M/M/1-S case
We relax the assumption of having infinite buffer at the controller. Instead we assume that the
buffer space at the controller is limited to at most S places and the rest remains the same. Let pb
be the probability that the packet is blocked at the controller. For this model (M/M/1-S) the
distribution of the number of packets jc is given as
P jc =
1- ρc
1- ρc
S+1 ρc
jc (13)
Hence pb which is the probability that the buffer is full can be written by replacing jc with S in
(13). Further the mean numbers of packets E[Nc] in the controller is found as [12]
8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
144
E[Nc] =
ρc
1- ρc
S+1
1- ρc
S+1
1- ρc
- Sρc
S (14)
where the load on the controller ρc is given as ρc = Γc/μc with Γc = q1
jack Γ1 being the traffic
going to the controller.
Finally by applying Little's formula [12], the sojourn time of a packet in controller is calculated as
E[Tc] =
E[Nc]
Γc(1 - pb)
(15)
Applying the rate equivalence detailed earlier and incorporating pb in the balance equation for Γ1
we get q1
jack for the finite buffer case as
jack=
q1
nf
q1
nf 1- pb
1+ q1
(16)
4. NUMERICAL RESULTS
In order to verify our proposed model we developed a discrete event simulation model to mimic
the queuing behavior in an OF-based SDN. We assume that at the arrival to the node 1, packets
are queued in the data node before being processed. The processing time of data node 1/μ1 is
considered to be exponentially distributed with a mean value of 9.8μs. The value of 9.8 is the
average processing time taken by Pronto 3290 switch for forwarding packets of size 1500 bytes
[1]. We here assume that TCP uses maximum transmission unit (MTU) of 1500 bytes.
At the controller, the number of responses per second are taken to be 4175 as reported in [1] by
using the Cbench tool [10]. Hence this is parameterized as 1/μc = 240μs in the model.
To enhance confidence in the simulation result, five replications for each value were run and the
normally distributed 95% confidence interval is incorporated in the plots.
We first highlight in Fig. 3 that our proposed model provides a fix to the results reported by [1].
To this end we first plot the Simulation curve from [1] as a reference. On top of it we plot the
analytical curves; Analytical [1] and Modified Jackson Model, obtained using the model in [1]
and our proposed Jackson model, respectively.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
145
Figure 3: Comparing Modified Jackson Model to Results from [1]
It can be seen that the model proposed by [1] performs very well for small loads (q1
nf=0.2).
However in the cases when there is a large amount of query traffic coming to the controller due to
unknown flows the model in [1] falls short. In such cases the proposed modification to the
Jackson model is quite accurate as seen for the extreme case of q1
nf=1.0.
Figure 4: Dimensioning Network Throughput
In Fig. 4, the effect of q1
nf on network throughput is studied where the network throughput is
defined as the amount of traffic λ1 which can be injected into the OF-based SDN for a given delay
guarantee. In this case the delay guarantee is the average packet sojourn time. This plot also
highlights how the proposed model can be used to dimension the network if packet sojourn time
is considered as the design parameter. A striking feature of this plot is that the network
10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
throughput saturates after reaching a certain value of packet sojourn time. Subsequently, it can be
inferred that even if the network is over-loaded after crossing a certain traffic threshold, the result
will be just increased packet sojourn time without further enhancing the network throughput.
Similarly, it is also observed that the critical value for packet sojourn time remains almost the
same for all the values of q1
nf but the resulting network throughput for each of them is quite
146
different.
In Fig. 5 a fundamental performance plot is shown in which packet sojourn time is plotted against
the controller load ρc for differing values of the controller service time μc with q1
nf constant at 0.5.
Although the plot is mainly for evaluating performance, it can also play a role in designing a
network with controller of known average service time and giving guarantees on packet sojourn
time by keeping the controller load at a certain level.
In Fig. 6, the plot shows the probability that packet sojourn time ≤ 0.5 ms for varying values of
controller load ρc and for different q1
nf values. The plot can be used to determine the maximum
load that the controller should reach before its performance is compromised. The plot in Fig. 6 is
pilot and similar plots for different values of packet sojourn time can be obtained depending upon
the requirements.
Figure 5: Effect of the controller service rate μc
11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
147
Figure 6: CCDF of packet sojourn time as a function of load on controller
(a) Node is Bottleneck (b) Node/Controller is Bottleneck
(c) Controller is Bottleneck
Figure 7: Bottleneck: the Controller or the Data Node?
Finally in Fig. 7 we plot the load on both the switch and the controller against q1
nf for different
values of mean controller service rate μc. By doing so, the sensitivity of the load on the switch and
the controller for varying values of q1
nf are inferred. Furthermore this plot can also be helpful in
determining the bottleneck node for different network settings. Hence, for a specific value of
controller service time, it can be determined by using Fig. 7 that which node is actually service
bottleneck and should be selected intelligently. For example for the average controller service
12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
times (μc) of 31μs, the switch is the bottle neck while for 5.3ms it is the controller. However for
the case when the mean service time of the controller is 240μs, the switch is the bottleneck for
approximately q1
148
nf ≤ 0.04 while it is the controller when q1
nf = Γ1, q1
(b) Multi-node OpenFlow Model
nf > 0.04.
It needs to be emphasized that blocking probability pb was zero for the setup which we had for the
simulation and infinitesimal small for the analytical model.
5. THEMULTI-NODE CASE
In a real life SDN deployment, an SDN controller is responsible for more than one node in the
data plane. In this section we highlight how the proposed model can be used to model this
scenario. To this end we take a toy example in which we only have two nodes in the data plane as
shown in Fig. 8. We define q2
jack and q2
nf for node 2 similar to q1
jack and q1
nf defined earlier for
node 1.
Figure 8: Modeling more than one node in the data plane
In order to leverage the Jackson model in Fig. 8(a) for modeling the OF-based SDNs in Fig. 8(b),
the probabilities q2
jack and q1
jack need to be adjusted. This is accomplished by forcing the rates at
all the nodes in both the models to be the same as
For node 1: λ1 1+q1
nfλ1 = q1
jackΓ1 (17)
nf = Γ2, q2
For node 2: λ1+λ2 1+q2
nfλ2 = q2
jackΓ2 (18)
Solving (17) we get q1
jack same as (4) while by solving (18) we have q1
jack as
jack =
q2
nf λ2
q2
nf)
λ1+ λ2 (1+ q2
(19)
We can then use the modified q1
jack and q2
jack to derive the appropriate performance metrics such
as packet sojourn time using existing queuing theory results [12] similar to the single node case.
6. CONCLUSION
In this work we have proposed an analytical model for an OpenFlow enabled SDN based on
Jackson network. We have shown that the model is accurate even for the case when the
probability of new flows is quite large. The applicability of the model is determined by
establishing two performance measures, the average packet sojourn time and the distribution of
time spent by a packet in the network, by using the proposed model. Secondly we showed by a
13. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
toy example that the model can be readily extended to more than one switch in the data plane.
Conclusively it is noted, and can be safely stated, that the model proposed in this paper caters for
realistic OpenFlow-based SDNs and this argument has readily been validated in this paper.
Furthermore, the effects of key parameters in an SDN network are studied which include the time
required by the controller to process a request, amount of traffic going to the controller, average
time spent by a packet in a network and the network throughput.
There is more than one direction that the work presented in this paper can be taken forth. First of
all, the work presented and validated for a single node can be extended to larger and more
realistic topological scenarios, such as fat-tree topology. Secondly, the model in this work is
based on Markovian arrival and service processes which can be generalized and more realistic
distributions or traces can be used in modeling. This can be supplemented with simulations for
validation and verification of the model. Also, a test-bed study for verifying our model can be
performed which will enhance the confidence in the proposed model.
REFERENCES
[1] Jarschel, Michael & Oechsner, Simon & Schlosser, Daniel & Pries, Rastin & Goll, Sebastian &
Tran-Gia, Phuoc (2011) “Modeling and Performance Evaluation of an OpenFlow Architecture”,
Proceedings of the 23rd International Teletraffic Congress (ITC ’11), pp1-7.
[2] Hoelzle, Urs (2012) “Opening Address: 2012 Open Network Summit”, [Online] Available:
http://www.opennetsummit.org/archives/apr12/hoelzle-tue-openflow.pdf, Date Retrieved:
08/08/2014.
[3] ONF, Open Networking Foundation, [Online] Available: https://www.opennetworking.org.
[4] Bozakov, Zdravko & Rizk, Amr (2013) “Taming SDN Controllers in Heterogeneous Hardware
149
Environments”, 2nd IEEE European Workshop on Software-Defined Networks (EWSDN).
[5] Azodolmolky, Siamak & Nejabati, Reza & Pazouki, Maryam & Simeonidou, Dimitra (2013) “An
Analytical Model for Software Defined Networking: A Network Calculus-based Approach”, IEEE
Globecom.
[6] Ciucu, Florin & Schmitt, Jens (2012) “Perspectives on Network Calculus: No Free Lunch, but Still
Good Value”, SIGCOMM Computer Communication Reviews, vol. 42, no. 4, pp 311-322.
[7] Naous, Jad & Erickson, David & Covington, G. Adam & Appenzeller, Guido & McKeown, Nick
(2008) “Implementing an OpenFlow Switch on the NetFPGA Platform”, Proceedings of the 4th
ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS
’08), pp 1-9.
[8] Bianco, Andrea & Birke, Robert & Giraudo, Luca & Palacin, Manuel (2010) “OpenFlow
Switching: Data Plane Performance”, IEEE International Conference on Communications (ICC)
2010, pp 1-5.
[9] Khan, Asif & Dave, Nirav (2013) “Enabling Hardware Exploration in Software-Defined
Networking: A Flexible, Portable OpenFlow Switch”, IEEE 21st Annual International Symposium
on Field-Programmable Custom Computing Machines (FCCM), 2013.
[10] Sherwood, Rob “Cbench (Controller benchmarker)”, [Online] Available:
http://archive.openflow.org/wk/index.php/Oflops, Date Retrieved: 13/03/2014.
[11] Mahmood, Kashif & Chilwan, Ameen & Østerbø, Olav N. & Jarschel, Michael (2014) “On the
Modeling of OpenFlow-based SDNs: The Single Node Case”, Proceedings of the Sixth
International Conference on Networks and Communications (NeCOM 2014), CS & IT-CSCP
2014, vol. 4, pp 207-214, [Online] Available: http://airccj.org/CSCP/vol4/csit42920.pdf.
[12] Jackson, James R. (1957) “Networks of Waiting Lines”, Operations Research, vol. 5, no. 4, pp
518-521.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014
AUTHORS
Ameen Chilwan is currently pursuing his PhD in Telematics at the Norwegian University
of Science and Technology (NTNU) from where he did his MSc too in 2011. Previously, he
received BSc in Telecommunications Engineering from the University of Dar es Salaam
(UDSM). His current work focuses on providing network infrastructure with guaranteed
delays for distributed media plays. His research interests also include modelling and
performance analysis of communication systems, dependability modelling, buffer
management, real-time internet, cloud computing and SDNs.
Kashif Mahmood is a Research Scientist at Telenor Research in Norway. He received his
MS in Electronics from Ghulam Ishaq Khan Institute (GIKI), and PhD degree in
Telematics from Norwegian university of science and technology (NTNU), Norway.
Kashif is a recipient of the “Youth Award in Science and Technology” by the government
of Pakistan. His work on radio wave propagation modelling using semi deterministic
approach was awarded the best paper presentation award in ISAP 2007 while the work on
cross layer modelling of CDMA networks won the best student paper award in ICON 2011.His research
interests include cross layer modelling of communication networks, NFV and SDN, scheduling algorithms,
traffic modelling and M2M.
150
Olav N. Østerbø received his MSc in Applied Mathematics from the University of Bergen
in 1980 and his PhD from the Norwegian University of Science and Technology in 2004.
He joined Telenor in 1980 and has more than 30 years of experience in telecom research.
Activities in recent years have been related to QoS and performance analysis. Current
research topics include traffic modelling, analysis of interference in radio networks,
scheduling, traffic differentiation and M2M.
Michael Jarchel is working as a research engineer in the area of Software Defined
Networking at Nokia in Munich, Germany. He finished his Ph.D. thesis, titled "An
Assessment of Applications and Performance Analysis of Software Defined Networking",
at the University of Würzburg in 2014. His main research interests are in the applicability
of SDN and NFV concepts to next generation mobile networks.