One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
Simulation of IEEE 802.16e Physical LayerIOSR Journals
Abstract : Growth in technology has led to unprecedented demand for high speed Internet access. IEEE
802.16e (Mobile WiMAX) is a wireless communication standard with high data transfer rates and good
performance. It not only is efficient as compared to its counterpart technologies today (Wi-Fi and 3G), but also
lays the foundation for 4G mobile communication. In 4G wireless communication systems, bandwidth is a
precious resource, and service providers are continuously met with the challenge of accommodating more users
within a limited allocated bandwidth. To increase data rate of wireless medium with higher performance,
Mobile WiMAX uses Orthogonal Frequency Division Multiple Access (OFDMA). This paper describes the
simulation of the physical layer of IEEE 802.16e using Simulink in Matlab 7.0 (R2010a). The system
performance is evaluated considering the Signal to noise ratio (SNR) and Bit error rate (BER) parameters.
Keywords: 802.16e, OFDMA, Mobile WiMAX.
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum and its industry. WiMAX is basically a wireless digital communication system which is also known as IEEE 802.16 standard intended for wireless \"metropolitan area networks\". WiMAX is based upon OFDM multiplexing technique. It was developed in order to provide high speed data rates to the users located in those areas also where broadband wireless coverage is not available. MIMO systems also play an important role in the field of wireless communication by allowing data to be transmitted and received over different antennas. WiMAX-MIMO systems are developed to improve the performance of WiMAX system. This paper analyzes WiMAX-MIMO system for different modulation schemes with different CC code rates under different fading channels (Rician and Nakagami channel). Spatial Multiplexing technique of MIMO system is used for the simulation purpose. Analysis has been done in the form of Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) plots.
Ethernet compliance test is a hard task, but we make it much easier for you. Learn more from the basics to automotive Ethernet and how we do our tests, thereby simplifying things for you when designing a custom carrier board. http://bit.ly/2SBGTNO
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
Utilizing illuminating LED arrays for visible light communication (VLC) in an indoor environment, an optical multiple-input multiple-output (MIMO) system has intrigued great interest. In order to increase the potential VLC data rates, multiple-input multiple-output (MIMO) systems have been proposed. MIMO schemes show the spectral efficiency improvement using spatial modulation
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Communication Performance Over A Gigabit Ethernet NetworkIJERA Editor
A present computing imposes heavy demands on the optical communication network. Gigabit Ethernet technology can provide the required bandwidth to meet these demands. However, it has also involve the communication Impediment to progress from network media to TCP(Transfer control protocol) processing. In this paper, present an overview of Gigabit per second Ethernet technology and study the end-to-end Gigabit Ethernet communication bandwidth and retrieval time. Performance graphs are collected using NetPipe in this clearly show the performance characteristics of TCP/IP over Gigabit Ethernet. These indicate the impact of a number of factors such as processor speeds, network adaptors, versions of the Linux Kernel or opnet softwar and device drivers, and TCP/IP(Internet protocol) tuning on the performance of Gigabit Ethernet between two Pentium II/350 PCs. Among the important conclusions are the marked superiority of the 2.1.121 and later development kernels and 2.2.x production kernels of Linux or opnet softwar used and that the ability to increase the MTU(maximum transmission unit) Further than the Ethernet standard of 1500 could significantly enhance the throughput reachable.
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
In this paper, we are defining techniques for reducing the isolated nodes in the Zigbee network. To reduce the isolated nodes, a connectivity improving mechanism is proposed which utilizes a connection shifting scheme to increase the join ratio of established devices.
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
The remote desktop environment (Virtual Desktop Infrastructure) is attracting interest as a way to
strengthen security and support mobile access ortelework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the user’s operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity of remote desktop environments makes it important to determine the factors that govern the user’s perceived operability with a remote desktop protocol. It is also necessary important to find out the conditions for a wide- area live migration of virtual machines, to use resources efficiently in the remote desktop environments.
This paper examines the impact of network quality deterioration (long network delay, high packet loss,
small downlink bandwidth) on a user’s perceived operability in remote desktop environments, assuming
RDP, PCoIP and ICA as remote desktop protocol. Next, this paper studies the impact of network quality on
the performance of a live-migration of virtual machines in remote desktop environments.
During route discovery of mobile ad hoc network, broadcasting of route request and route reply packets
are the essential operations for finding the path between two ends. In such situations, intermediate node
which may or may not belongs will participate in route discovery process, update routing table and
rebroadcast the route discovery packets again to its neighboring nodes. Finally optimal path is found with
minimum hops. This simply upsurges overhead and deteriorates the performance of routing. The proposed
Petal Ant Routing (PAR) algorithm offers a low overhead by optimizing FANT and BANT transmissions in
route discover process. The algorithm is an improved version of SARA and has features extracted from
petal routing. The algorithm is simulated on NS2, compared with ACO frame work called SARA and
classical routing protocols such as AODV and AOMDV. The simulation results shows that PAR further
reduces overhead by eliminating redundant FANT transmission compared to other routing algorithm.
Simulation of IEEE 802.16e Physical LayerIOSR Journals
Abstract : Growth in technology has led to unprecedented demand for high speed Internet access. IEEE
802.16e (Mobile WiMAX) is a wireless communication standard with high data transfer rates and good
performance. It not only is efficient as compared to its counterpart technologies today (Wi-Fi and 3G), but also
lays the foundation for 4G mobile communication. In 4G wireless communication systems, bandwidth is a
precious resource, and service providers are continuously met with the challenge of accommodating more users
within a limited allocated bandwidth. To increase data rate of wireless medium with higher performance,
Mobile WiMAX uses Orthogonal Frequency Division Multiple Access (OFDMA). This paper describes the
simulation of the physical layer of IEEE 802.16e using Simulink in Matlab 7.0 (R2010a). The system
performance is evaluated considering the Signal to noise ratio (SNR) and Bit error rate (BER) parameters.
Keywords: 802.16e, OFDMA, Mobile WiMAX.
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum and its industry. WiMAX is basically a wireless digital communication system which is also known as IEEE 802.16 standard intended for wireless \"metropolitan area networks\". WiMAX is based upon OFDM multiplexing technique. It was developed in order to provide high speed data rates to the users located in those areas also where broadband wireless coverage is not available. MIMO systems also play an important role in the field of wireless communication by allowing data to be transmitted and received over different antennas. WiMAX-MIMO systems are developed to improve the performance of WiMAX system. This paper analyzes WiMAX-MIMO system for different modulation schemes with different CC code rates under different fading channels (Rician and Nakagami channel). Spatial Multiplexing technique of MIMO system is used for the simulation purpose. Analysis has been done in the form of Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) plots.
Ethernet compliance test is a hard task, but we make it much easier for you. Learn more from the basics to automotive Ethernet and how we do our tests, thereby simplifying things for you when designing a custom carrier board. http://bit.ly/2SBGTNO
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
Design of 4x4 optical MIMO using spatial ModulationSachin Talakeri
Utilizing illuminating LED arrays for visible light communication (VLC) in an indoor environment, an optical multiple-input multiple-output (MIMO) system has intrigued great interest. In order to increase the potential VLC data rates, multiple-input multiple-output (MIMO) systems have been proposed. MIMO schemes show the spectral efficiency improvement using spatial modulation
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Communication Performance Over A Gigabit Ethernet NetworkIJERA Editor
A present computing imposes heavy demands on the optical communication network. Gigabit Ethernet technology can provide the required bandwidth to meet these demands. However, it has also involve the communication Impediment to progress from network media to TCP(Transfer control protocol) processing. In this paper, present an overview of Gigabit per second Ethernet technology and study the end-to-end Gigabit Ethernet communication bandwidth and retrieval time. Performance graphs are collected using NetPipe in this clearly show the performance characteristics of TCP/IP over Gigabit Ethernet. These indicate the impact of a number of factors such as processor speeds, network adaptors, versions of the Linux Kernel or opnet softwar and device drivers, and TCP/IP(Internet protocol) tuning on the performance of Gigabit Ethernet between two Pentium II/350 PCs. Among the important conclusions are the marked superiority of the 2.1.121 and later development kernels and 2.2.x production kernels of Linux or opnet softwar used and that the ability to increase the MTU(maximum transmission unit) Further than the Ethernet standard of 1500 could significantly enhance the throughput reachable.
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSIJCSIT Journal
In this paper, we are defining techniques for reducing the isolated nodes in the Zigbee network. To reduce the isolated nodes, a connectivity improving mechanism is proposed which utilizes a connection shifting scheme to increase the join ratio of established devices.
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
The remote desktop environment (Virtual Desktop Infrastructure) is attracting interest as a way to
strengthen security and support mobile access ortelework. To realize the remote desktop environments, a remote desktop protocol is required to transfer information via a network about the user’s operations made on the keyboard and mouse on a terminal to the remote server. The growing popularity of remote desktop environments makes it important to determine the factors that govern the user’s perceived operability with a remote desktop protocol. It is also necessary important to find out the conditions for a wide- area live migration of virtual machines, to use resources efficiently in the remote desktop environments.
This paper examines the impact of network quality deterioration (long network delay, high packet loss,
small downlink bandwidth) on a user’s perceived operability in remote desktop environments, assuming
RDP, PCoIP and ICA as remote desktop protocol. Next, this paper studies the impact of network quality on
the performance of a live-migration of virtual machines in remote desktop environments.
During route discovery of mobile ad hoc network, broadcasting of route request and route reply packets
are the essential operations for finding the path between two ends. In such situations, intermediate node
which may or may not belongs will participate in route discovery process, update routing table and
rebroadcast the route discovery packets again to its neighboring nodes. Finally optimal path is found with
minimum hops. This simply upsurges overhead and deteriorates the performance of routing. The proposed
Petal Ant Routing (PAR) algorithm offers a low overhead by optimizing FANT and BANT transmissions in
route discover process. The algorithm is an improved version of SARA and has features extracted from
petal routing. The algorithm is simulated on NS2, compared with ACO frame work called SARA and
classical routing protocols such as AODV and AOMDV. The simulation results shows that PAR further
reduces overhead by eliminating redundant FANT transmission compared to other routing algorithm.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
Extending network lifetime of wireless sensorIJCNCJournal
One critical issue in designing and managing a wireless sensor network is how to save the energy consumption
of the sensors in order to maximize network lifetime under the constraint of full coverage of the monitored
targets. In this paper, we adopt the common approach of creating disjoint sensor covers to prolong network
lifetime. The typical goal used in the literature is to maximize the number of covers without consideration of
the energy levels of the sensors. We argue that the network lifetime can be extended by maximizing the total
bottleneck energy of the created covers. We formally define the problem of maximizing the total bottleneck
energy of the covers, present for the first time an integer programming formulation of the problem, and develop
two algorithms to solve large problem instances. Extensive experimental tests show that the use of the goal of
maximizing the total bottleneck energy of the covers creates covers with substantially longer network lifetime
than the lifetime of the covers created with the goal of maximizing solely the number of covers.
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low Energy
Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in the implementation
of the hierarchy according to low energy adaptive cluster to collect and distribute the data to the base
station. The main objective of LEACH is: To prolong life time of the network, reduce the energy
consumption by each node, using the data concentration to reduce bulletins in the network. However, in the
case of large network, the distance from the nodes to the base station is very different. Therefore, the
energy consumption when becoming the host node is very different but LEACH is not based on the
remaining energy to choose the host node, which is based on the number of times to become the host node
in the previous rounds. This makes the nodes far away from the base station lose power sooner.
In this paper, we give a new routing protocol based on the LEACH protocol in order to improve operating
time of sensor network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of becoming
the cluster-head than the those in far and with lower energy.
Computer network is becoming more popular and common, the need to use the broadband connection services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of information and data to many recipients simultaneously. Multicast is a routing problem from a source node to a receiver node set, also known as the routing from one point to multipoint. The advances in technology and multimedia applications emerge quickly has provided great motivation for the application of new real-time multi-point. Many multi-point applications will not function properly if the QoS (quality of service) can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost, reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth and propose new algorithm compares with existing ones.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
Traditional network management systems use spoofing of resources to collect statistical data such as resource usage and performance. This data is exchanged with other resources through management protocols. The amount of data can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements in each network resource for
management functions increases and become inefficient as it increases the power usage for processing. In
this paper, we propose a distributed network management system where each network resource maintains a
set of Management Information Base (MIB) elements and stores resource activities in their abstraction in
terms of counters, flag and threshold values. The abstract data is exchanged between different management
agents residing in different resources on a need-to-know basis and each agent logically executes management functions locally to develop understanding of the behavior of all network resources to ensure that user protocols can function smoothly. Our proposed architecture can be implemented in any network, but is highly important to be considered in power and bandwidth constrained networks such as Mobile Ad Hoc Networks (MANET). In this research, we use cross layer models to demonstrate simplified way of efficiently managing the overall performance of individual network resources (nodes) and the network itself which is critical for not only monitoring the traffic, but also dynamically controlling the end-to-end Quality of Service (QoS) for multi-service applications.
Privacy, especially in a cellphone, is an important thing and should be protected. Steganography is a
method used to protect a sensitive information. The issue tried to be discussed in this study is the issue on
inserting technique in a text through a simple method of White Space Steganography on android. The
inserted message has been compressed through a double compression method by using LZW and Huffman
so that the size of message to be inserted can be minimized while the capacity of the inserted message can
be minimized. The compression shows that the compression ratio much depends on the type of text input to
the text to be sent; the more the repetition or duplication found on the message, the smaller the
compression ratio will be. The compression process using Android based smartphone is relatively fast with
the average duration of 0.045 seconds, either for the insertion or extraction.
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
The shortcomings of conventional bus architectures are in terms of scalability and the ever increasing
demand of more bandwidth. And also the feature size of sub-micron domain is decreasing making it
difficult for bus architectures to fulfill the requirements of modern System on Chip (SoC) systems. Network
on chip (NoC) architectures presents a solution to the earlier mentioned shortcomings by employing a
packet based network for inter IP communications. A pivotal feature of NoC systems is the topology in
which the system is arranged. Several parameters which are topology dependent like hop count, path
diversity, degree and other various parameters affect the system performance. We propose a novel
topology forNoC architecture which has been thoroughly compared with the existing topologies on the
basis of different network parameters.
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
A mass balancing theorem (MBT) was recently introduced, concerning the role of 'unbalanced nodes' in the optimization of network flow. The MBT discovers and proves a flow-balancing property, which can be exploited in the design of network flow algorithms. Subsequently a number of such applications of the MBT have been explored for various types of flow-networks. These have included, in particular, single and
multiple commodity networks with additional equipment of separators, which are present in various real world scenarios including the oil and gas industry. In this paper, the mass balancing theorem is revisited,and further developed to consider new network examples with embedded cycles. In doing so, algorithms based on the mass balancing method are extended to remove any undesirably saturated edges in the
network, consequently reducing economic costs for flow-maximization in such networks.
Correlating objective factors with videoIJCNCJournal
To succeed in providing services, the quality of services should meet users’ satisfaction. This is a motivation to study the relationship between the service quality and the real perceived quality of users, which is commonly referred to as the quality of experience (QoE). However, most of existing QoE studies that focus on video-on-demand or IPTV services analyze only the influence of network behaviors to video quality. This paper focuses on P2P video streaming services, which are becoming a significant portion of Internet traffic, and pays attention to the change of users’ perception with the adjustment of objective
factors as well as network behaviors. We propose to use mean opinion score and peak signal to noise ratio
methods as QoE evaluations to consider the effect of the chunk loss ratio, the group-of-picture size, and the
chunk size. The experimental results provide a convincing reference to build the complete relationship
between objective factors and QoE. We believe that this assessment will contribute to study a new service
quality evaluation mechanism based on users’ satisfaction in the future.
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
We propose in this paper a simulation implementation of Self-Organizing Networks (SON) optimization
related to mobility load balancing (MLB) for LTE systems using ns-3 [1]. The implementation is achieved
toward two MLB algorithms dynamically adjusting handover (HO) parameters based on the Reference
Signal Received Power (RSRP) measurements. Such adjustments are done with respect to loads of both an
overloaded cell and its cells’ neighbours having enough available resources enabling to achieve load
balancing. Numerical investigations through selected key performance indicators (KPIs) of the proposed
MLB algorithms when compared with another HO algorithm (already implemented in ns-3) based on A3
event [2] highlight the significant MLB gains provided in terms global network throughput, packet loss rate
and the number of successful HO without incurring significant overhead.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly,
users utilize the technology to track the position of a vehicle or an object of interest. They also use it to
safely navigate to the destination of their choice. As a result, there are countless number of GPS based
tracking application that has been developed. But, a main recurring issue that exists among these
applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern.
Most existing research have examined the effects that the inaccuracy of GPS have on users while others
identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of
this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective
method which could mitigate or overcome most of those factors. As part of our research, we conducted a
thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we
have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues
faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such,
most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another
objective of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
One of the challenging issues in Next Generation Wireless Network (NGWN) is achieving seamless Vertical
Handover (VHO) while roaming between different technologies such as Wireless Fidelity (Wi- Fi),
Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications
System (UMTS) and Long Term Evolution (LTE). F or that the telecommunication operators will be
required to develop a strategy for interoperability of these different types of existing network to give the
best connection anywhere anytime for the Mobile Users (MUs).
To full these requirements we propose a new VHO approach that based on loose coupling internetworking
in conjunction with Mobile IPv4 ( MIPv4) under Media Independent Handover (MIH). Our objective is
develop a strategy for interoperability of different technologies and optimized the VHO decision. Our
proposed approach provides more exhaustive, high accurate and better performance compared with the
approaches proposed in the literature.
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as “things” to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things; or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on
the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made.
Performance investigations of internet protocol versions for mobile Ad-hoc ne...nooriasukmaningtyas
A mobile ad hoc network (MANET) can be seen as a mobile nodes collection
having no support of fixed infrastructure and therefore its communication is
totally dependent on the network's nodes. As a result of the mobility of
nodes, rapid and unpredictable changes occur within the mobile ad hoc
network (MANET) arrangements. Therefore, this makes the analysis of
routing protocols very crucial so as to enhance efficient communication
between the wireless nodes. IPv4 and IpV6 within the MANET is another
issue of concern. IPv4 which has been traditionally used for ages and IPv6;
predicted to be the forthcoming network architecture model is investigated
because of its protection which has been improved as well as its enormous
address space provision. The analysis on Ad Hoc On Demand Vector and
Dynamic Manet On Demand routing protocols are performed using Qualnet
simulator under the IPv4 and IPv6 standards. A thorough evaluation of the
usability and functionality of the simulator software is carried out. The
metrics for performance are; Throughput, End-to-End Delay and Average
jitter. Afterwards, analyses and summary of the results is conducted and
summarized in order to make available an assessment of their performances.
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
The processor designing and development was designed to perform various complex logical information exchange and processing operations in a variety of resolutions. They mainly rely on concurrent and sync, both that of the software and hardware to enhance the productivity and performance. With the high speed growth approaching multi-billion transistor integration era, some of the main problems which are symbolized by all gate lengths in the range of 60-90 nm, will be from non-scalable delays generated by wire. All similar problems may be solved by using Network on Chip (NOC) systems. In the presented paper, we have summarized research papers and contributions in NOC area. With advancement in the technology in the on chip communication, faster interaction between devices is becoming vital. Network on Chip (NOC) can be one of the solutions for faster on chip communication. For efficient link between devices of NOC, routers are needed. This paper also reviews implementation of routing techniques. The use of routing gives higher throughput as required for dealing with complexity of modern systems. It is mainly focused on the routing design parameters on both system level including traffic pattern, network topology and routing algorithm, and architecture level including arbitration algorithm.
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN).
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices
across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has
been granted and this QoS feature and there are no implementations of such feature in real networks. In
this paper,we evaluate the capacity to provide QoS of these priority bits in various scenarios. We show that
under very heavy or very low network load, these bits have a limited effect on the delay
Comparative Study between OSPF and MPLS network using OPNET Simulationiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Wireless adhoc multi access networks
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7205 59
WIRELESS ADHOC MULTI ACCESS NETWORKS
OPTIMIZATION USING OSPF ROUTING
PROTOCOL BASED ON CISCO DEVICES.
Mohamed E. Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky
Department of Electronics and Communications, Arab Academy for Science, Tech. and
Maritime Transport, Alexandria, Egypt, BOX 1029
ABSTRACT
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
KEYWORDS
Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices.
1.INTRODUCTION:
Fig1. Default Administrative Distance
The OSPF routing protocol history is designed especially on the links state (Link speed) over
view due to Djkstra algorithm. It began to operate in the world in 1987 then the released was been
made.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
60
Fig2. OSPF Development timeline
2. ILLUSTRATING THE PROBLEM:
This paper aim is actually to make all end devices under coverage area and under control. adhoc
network of multi-access end devices major issue is the time delay and Packets which dropped
during the transmission process. OSPF Routing Protocol can be handled in this paper because of
its high signal transmission ratio, average administrative routing protocol distance, high
authentication and encryption algorithm that already defined. OSPF primary feature is the using
of the links speed only however all other protocols used the hops as primary feature. This will
gain much more accurate results in the Adhoc wireless networking case.
3.OSPF working phenomena:
OSPF invented to correct the wrong paths made by RIP Routing Protocol. Whichinvented by the
routing table entry algorithm called BelmmanFord (Hops Theory).[1]Note that Network Layer
(Layer3) on the Open System Interconnection (OSI) model will be ussed. The packet
encapsulation in the sending criteria must be defined as OSPF Message Encapsulation packet
header contains router ID, area ID and Type code for OSPF packet type.
Fig3. Encapsulation OSPF Message
Internet Protocol (IP) packet header contains source IP address, destination IP address and
protocol field set to 89.[2] The data link frame header contains source Multi Access Card (MAC)
address and Destination MAC address. There are 5 types of packet messages for the OSPF listed
as bellow.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
61
Fig.4 OSPF Packets Type
OSPF not only good due to administrative distance but also it is very good in the authentication
andencryption purposes for important data. Routers will only accept routing information from
other routers that have been configured with the same password or authentication information
Fig.5 Showing Authentication
4. USED NETWORK’S DEVICES:
It is urgent to use network devices in this research, that’s why routing must be made using high
speed, reliable routers. This options are only exists in cisco devices. So a 3X 2600 series cisco
routers (2621XM) routers with 2 -38db antennas will be used to make sure the coverage are is
good enough and can cover about 1Km.[3]
Fig.6. Cisco 2800 Series Catalyst Router
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
62
5. DESIGNED SCHEMA TO WORK ON:
This schema is designed using Cisco packet tracer simulator. We will use 3 2611xm routers as
mentioned. The 3 routers connected directly by smart serial interfaces not wirelessly (to check the
connection first).[4] The DCE interfaces used only to establish the connection with the universal
rate of 64000 bit/sec. every router have its own network of end devices. Ip configuration as listed
below and as shown and configured in Appendix A, B and C:
Table1: Schema Design
Device/interface IP Address+
Subnet mask
Device/interface IP Address+
Subnet mask
Adhoc 1 172.16.1.18
255.255.255.192
R3/Lo0 10.3.3.3
255.255.255.255
Adhoc 2 10.10.10.2
255.255.255.0
R3/S0/0/0 192.168.10.5
255.255.255.252
Adhoc 3 172.16.1.35
255.255.255.248
R3/S0/0/1 192.168.10.10
255.255.255.252
R1/Lo0 10.1.1.1
255.255.255.255
R1 – R2 Cost 64 Kbps
R1/S0/0/0 192.168.10.1
255.255.255.252
R2-R3 Cost 128 Kbps
R1/S0/0/1 192.168.10.6
255.255.255.252
R1-R3 Cost 256 Kbps
R2/Lo0 10.2.2.2
255.255.255.255
R1 LAN 172.16.1.16
255.255.255.192
R2/S0/0/0 192.168.10.2
255.255.255.252
R2 LAN 10.10.10.0
255.255.255.0
R2/S0/0/1 192.168.10.9
255.255.255.252
R3 LAN 172.16.1.32
255.255.255.248
Fig7. OSPF Path cost (a)
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
63
6. OSPFPATH COST METRIC
Usually there is a difference in actual bandwidth and the used bandwidth [5].So, the actual speed
can be determined using the bandwidth. The main Reason is the routing table has best path
information. The show interface command will display interface’s bandwidth. Serial links used as
shown in as bellow figure.
Fig8. OSPF Path Cost (b)
7. CONFIGURATION OF OSPF ROUTER
Configuration the path cost of a must be configured in link both sides of a serial link should be
configured with the samebandwidth. Commands used to modify bandwidth valueBandwidth
command
Router(config-if)#bandwidth 64
Fig9. OSPF bandwidth configuration
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
64
Fig10. OSPF bandwidth configuration
Editing the Cost of the link linking between bandwidth command and the ipospf path cot
command. Ipospf cost command. Sets cost to a specific value then the calculated OSPF Cost
already calculated.[6]
Fig11. Equivalent commands of bandwidth and ip PSPF commands
8. OSPF AND MULTI-ACCESS NETWORKS
Differences in Multi-access Networks, Point-to-point.[7]Broadcast Multi-access, Non
broadcastMulti-access (NBMA), Point-to-multipoint and virtual links.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
65
Fig12. OSPF Network types used
2 challenges presented by multi-access networks, multiple adjacencies and Extensive Link State
Advertisement (LSA) flooding.[8]
Fig13. No. Of Growth of paths
an acknowledgement of receipt must be sent back to transmitting router due to flooding of LSA
and . [9]
Fig14. LSA Flooding Scenario
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
66
Solution to LSA flooding issue is the use of designated router (DR) and Backup designated router
(BDR). The DR & BDR selection is Routers are elected to send and receive LSA.[10]
Fig15. DR/BDR Listens.
Various DR routers send LSAs through multicast ip address of 224.0.0.6 to DR & BDRrouters
,DR forward LSA via multicast address 224.0.0.5 to all other routers.[11]
Fig16. DR sends LSAs
9.CONCLUSIONS
Using OSPF in Multi-access networks of wireless Adhoc with cisco solutions products like
routers, switches and access points; it can be easy to make the entire network under coverage with
minimum time delay and legacy. In this paper, Appling on real life network as it is and with all
right configurations of OSPF on routers, we were able to decrease the time delay and legacy from
22mSec to only 12mSec. This will define a revolution in the adhoc networking in fields of time
based like military services.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
67
REFERENCES
[1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html
[2] SharamHekmat, Communication Networks, 2011
[3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013
[4] Patricegilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April
2011.
[5] Yi-Bing Lin &ImrichChlamtac, Wireless and Mobile network architectures, 2012
[6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013
[7] Simon Haykin, Communication Systems, fifth edition, 2014
[8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet,
2014
[9] Andrew S.Tanenbaum, Computer Network, 2012
[10] J. Walrand& P. Varaiya, High-Performance Communication Networks, 2014
[11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014
Appendix A
Controller (Routers) Configuration
For Controller 1:
Router>enable
Router#configure terminal
Router(config)#hostname Base 1
Controller1(config)#interface fastEthernet 0/0
Controller1(config-if)#ip address 172.16.1.18 255.255.255.192
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller1(config-if)#ip address 11.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller1(config)#interface serial 0/3/0
Controller1(config-if)#ip address 12.0.0.1 255.0.0.0
Controller1(config-if)#clock rate 64000
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller1(config)#line console 0
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#line vty 0 4
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
68
Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2
Appendix B
For Controller 2:
Router>enable
Router#configure terminal
Router(config)#hostname Base2
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 13.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.2 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Appendix C
For Controller 3:
Router>enable
Router#configure terminal
Router(config)#hostname Base3
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
69
Controller2(config-if)#ip address 15.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.3 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Authors
Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and
Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and
the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical
Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at
AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at
Ottawa University, Ottawa, Canada. From 2005 to 2009, he was an assistant Professor at AAST,
Department of Electronic and communications Engineering, Alexandria, Egypt. Since January 2009, He
has been an Associate professor at AAST, Department of Electronic and communications Engineering,
Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA.
Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in
1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic
wave in 2002 he works as doctor at Arab academy for science and Technology in electronic
and communication department
.
Mohamed I. El-Desoukywas born in 1989 in Alex, Egypt, graduate as electrical, Electronics
and Communications engineer from The Arab Academy for Science, Technology and
Maritime Transport in 2010, has started preparation his master from the same institute of
graduation in 2011.