keyboard_arrow_up
Most cited articles in the area of Computer Networks & Communications for the month of August 2019

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM

    Nayeema Islam and Mohammed Nasir Uddin Department of Computer Science and Engineering, Jagannath University, Dhaka, Bangladesh

    ABSTRACT

    With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Internet, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired networks, where packet losses occur mostly because of congestion. However cellular wireless network suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance.This paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics.

    KEYWORDS

    TCP, Cellular Wireless Network, Handoff, High Bit Error, Explicit Loss and Handoff Notification


    For More Details :
    http://aircconline.com/ijcnc/V8N6/8616cnc02.pdf

    Volume Link :
    http://airccse.org/journal/ijc2016.html



PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 CODEC

    Mabubur Syed and Isaac Yerima Ambore Department of Computer Information Science, Minnesota State University, Mankato.Minnesota, USA

    ABSTRACT

    Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP)solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing protocols that will reduce the convergence time of the network, in the event of a link failure.Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4 and IPv6 using G.711 CODEC with riverbed modeller17.5

    KEYWORDS

    IPv4, IPv6, Network topology, VoIP, CODEC


    For More Details :
    http://aircconline.com/ijcnc/V8N6/8616cnc01.pdf

    Volume Link :
    http://airccse.org/journal/ijc2016.html



A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA NETWORKS

    Sabin Bhandari and Sangman Moh Department of Computer Engineering, Chosun University, Gwangju, South Korea

    ABSTRACT

    In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS)for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.

    KEYWORDS

    Wireless body area network; Medium access control, Energy efficiency; Quality of service; Traffic priority; IEEE 802.15.4


    For More Details :
    http://aircconline.com/ijcnc/V11N4/11419cnc02.pdf

    Volume Link :
    http://airccse.org/journal/ijc2019.html



A SOLUTION FRAMEWORK FOR MANAGING INTERNET OF THINGS (IOT)

    Sukant K. Mohapatra1, Jay N. Bhuyan2, Pankaj Asundi1, and Anand Singh3 1Ericsson, Monroe, LA, USA 2Dept. of Comp. Science, Tuskegee, AL, USA 3CenturyLink, Monroe, LA, USA

    ABSTRACT

    Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological,social, and economical value for a hyper-connected world. In this paper, we will discuss how billions of these internet connected devices and machines will change the future in which we shall live, communicate and do the business. The devices, which would be connected to the internet, could vary from simple systems on chip (SOC) without any Operating System (OS) to highly powerful processor with intelligent OS with widely varying processing capability and diverse protocol support. Many of these devices can also communicate with each other directly in a dynamic manner. A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. In this paper, we will discuss various management issues and challenges related to different communication protocol support and models, device management, security, privacy, scalability, availability and analytic support, etc., in managing IoT. The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to management of IoThaving billions of smart objects.

    KEYWORDS

    IoT, SOC, M2M, OMA, SOC, CSP, SLA, CoAP, REST


    For More Details :
    http://aircconline.com/ijcnc/V8N6/8616cnc06.pdf

    Volume Link :
    http://airccse.org/journal/ijc2016.html



MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PROTOCOL FOR MANETS: MNCQM

    Shashi Raj K1 and Siddesh G K2 1Department of Electronics and Communication, Dayananda Sagar College of Engineering, Bengaluru, India 2Department of Electronics and Communication, JSS Academy of Technical Education, Bengaluru, India

    ABSTRACT

    The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands.Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributednodes across network region. However, dynamic network conditions such as changing topology,congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted non-disjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dualsupplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.

    KEYWORDS

    MANET, QoS communication, Node-trustworthiness, Network awareness, Evolutionary computing based routing decision.


    For More Details :
    http://aircconline.com/ijcnc/V11N4/11419cnc01.pdf

    Volume Link :
    http://airccse.org/journal/ijc2019.html



WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES

    Muhammad A. Iqbal and Dr. Magdy Bayoumi The Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA 70504 USA

    ABSTRACT

    The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system,sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT.Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.

    KEYWORDS

    Internet of Things (IoT), Wireless Sensor Network (WSN), Security, Privacy, Integration, Confidentiality


    For More Details :
    http://aircconline.com/ijcnc/V8N6/8616cnc03.pdf

    Volume Link :
    http://airccse.org/journal/ijc2016.html



ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING

    1Md. Alam Hossain, 1Mohammad Nowsin Amin Sheikh, 2, *Shawon S. M. Rahman, 1Sujan Biswas, and 1Md. Ariful Islam Arman 1Dept. of Computer Science & Engineering, Jessore University of Science and Technology Jessore, Bangladesh 2Associate Professor, Dept. of Computer Science & Engineering, University of Hawaii-Hilo, 200W. Kawili Street, Hilo, HI 96720, USA

    ABSTRACT

    Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we will be able to measure the response time and throughput comparing with Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler and NOX.

    KEYWORDS

    Software Defined Networking SDN, Quality of Service, QoS, Real-time Online Interactive Application,ROIA, Network Operating System, NOX, For CES, MPLSTE, Switch Capacity, Number of Queues Impact, QoE Evaluation, Bandwidth Isolation


    For More Details :
    http://aircconline.com/ijcnc/V10N5/10518cnc02.pdf

    Volume Link :
    http://airccse.org/journal/ijc2018.html



A COMPARATIVE PERFORMANCE ANALYSIS OF ROUTE REDISTRIBUTION AMONG THREE DIFFERENT ROUTING PROTOCOLS BASED ON OPNET SIMULATION

    Zeyad Mohammad1, Ahmad Abusukhon2 and Marzooq A. Al-Maitah3 1Department of Computer Network, Al-Zaytoonah University of Jordan, Amman, Jordan 2Department of Computer Science, Al-Zaytoonah University of Jordan, Amman, Jordan 3Department of Computer Network, Al-Zaytoonah University of Jordan, Amman, Jordan

    ABSTRACT

    In an enterprise network, it is normal to use multiple dynamic routing protocols for forwarding packets.Therefore, the route redistribution is an important issue in an enterprise network that has been configured by multiple different routing protocols in its routers. In this study, we analyse the performance of the combination of three routing protocols in each scenario and make a comparison among our scenarios. We have used the OPNET 17.5 simulator to create the three scenarios in this paper by selecting three different routing protocols from the distance vector and link state routing protocols in each scenario. In the first scenario, the network routers are configured from EIGRP, IGRP, and IS-IS that is named EIGRP_IGRP_ISIS in our simulation. The OSPF_IGRP_ISIS scenario is a mixed from EIGRP, IGRP,and IS-IS protocols that is the second scenario. The third scenario is OSPF_IGRP_EIGRP that is the route redistribution among OSPF, IGRP, and IS-IS protocols. The simulation results showed that the performance of the EIGRP_IGRP_ISIS scenario is better than the other scenarios in terms of network convergence time, throughput, video packet delay variation, and FTP download response time. In contrast, the OSPF_IGRP_ISIS has less voice packet delay variation, video conferencing and voice packet end to end delays, and queuing delay as compared with the two other scenarios. On the other hand,the performance of the OSPF_IGRP_EIGRP scenario has better FTP upload response time, and voice jitter.

    KEYWORDS

    Route Redistribution, EIGRP, IGRP, IS-IS, OSPF


    For More Details :
    http://aircconline.com/ijcnc/V9N2/9217cnc04.pdf

    Volume Link :
    http://airccse.org/journal/ijc2017.html



PERFORMANCE EVALUATION OF DIFFERENT KERNELS FOR SUPPORT VECTOR MACHINE USED IN INTRUSION DETECTION SYSTEM

    Md. A1 Mehedi Hasan1, Shuxiang Xu2, Mir Md. Jahangir Kabir2 and Shamim Ahmad1 1Department of Computer Science and Engineering, University of Rajshahi, Bangladesh. 2School of Engineering and ICT, University of Tasmania, Australia.

    ABSTRACT

    The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with numerous features. As a result, in order to get rid of this problem, several types of intrusion detection methods with different levels of accuracy have been proposed which leads the choice of an effective and robust method for IDS as a very important topic in information security. In this regard, the support vector machine (SVM) has been playing an important role to provide potential solutions for the IDS problem. However, the practicability of introducing SVM is affected by the difficulties in selecting appropriate kernel and its parameters. From this viewpoint, this paper presents the work to apply different kernels for SVM in ID Son the KDD’99 Dataset and NSLKDD dataset as well as to find out which kernel is the best for SVM. The important deficiency in the KDD’99 data set is the huge number of redundant records as observed earlier. Therefore, we have derived a data set RRE-KDD by eliminating redundant record from KDD’99train and test dataset prior to apply different kernel for SVM. This RRE-KDD consists of both KDD99Train+ and KDD99 Test+ dataset for training and testing purposes, respectively. The way to derive RRE-KDD data set is different from that of NSL-KDD data set. The experimental results indicate that Laplace kernel can achieve higher detection rate and lower false positive rate with higher precision than other kernel son both RRE-KDD and NSLKDD datasets. It is also found that the performances of other kernels are dependent on datasets

    KEYWORDS

    Intrusion Detection, KDD’99, NSL-KDD, Support Vector Machine, Kernel, Kernel Selection


    For More Details :
    http://aircconline.com/ijcnc/V8N6/8616cnc04.pdf

    Volume Link :
    http://airccse.org/journal/ijc2016.html



ZIGBEE TECHNOLOGY AND ITS APPLICATION IN WIRELESS HOME AUTOMATION SYSTEMS: A SURVEY

    Thoraya Obaid, HaleemahRashed, Ali Abou-Elnour, Muhammad Rehan, Mussab Muhammad Saleh, and Mohammed Tarique Department of Electrical Engineering, Ajman University of Science and Technology P.O. Box 2202, Fujairah, United Arab Emirates (UAE)

    ABSTRACT

    Wireless home automation systems have drawn considerable attentions of the researchers for more than a decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular because of its low cost and low power consumption. In this paper ZigBee based wireless home automation systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless home automation system has been presented. The performances of the ZigBee based systems have also been compared with those of other competing technologies based systems. In addition some future opportunities and challenges of the ZigBee based systems have been listed in this paper.

    KEYWORDS

    Home automation, ZigBee, Z-Wave, Insteon, Waveins,PAN, voice control, energy management, assistive homes, industrial automation


    For More Details :
    http://airccse.org/journal/cnc/6414cnc11.pdf

    Volume Link :
    http://airccse.org/journal/ijc2014.html







menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close