523,182 research outputs found

    Network Coding Over SATCOM: Lessons Learned

    Full text link
    Satellite networks provide unique challenges that can restrict users' quality of service. For example, high packet erasure rates and large latencies can cause significant disruptions to applications such as video streaming or voice-over-IP. Network coding is one promising technique that has been shown to help improve performance, especially in these environments. However, implementing any form of network code can be challenging. This paper will use an example of a generation-based network code and a sliding-window network code to help highlight the benefits and drawbacks of using one over the other. In-order packet delivery delay, as well as network efficiency, will be used as metrics to help differentiate between the two approaches. Furthermore, lessoned learned during the course of our research will be provided in an attempt to help the reader understand when and where network coding provides its benefits.Comment: Accepted to WiSATS 201

    A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network

    Get PDF
    Interactive Multimedia (IMM) applications such as voice and video conferencing are very important in our learning environment. They offer useful services that benefit its users but these services suffers performance degradation from todayโ€™s high speed Wireless Local Area Network (WLAN). However, guaranteed Quality of Service (QoS) remains the bottleneck in the network which becomes a great challenge in attempting to improve its performance. This work reviewed many approaches and considers mapping QoS class parameters such as Quality of Service Class Identifier (QCI), Maximum Bit Rate (MBR) and Allocation and Retention Priority (ARP) to the upstream and downstream data flowing in the network as an attempt to improve its performance. Priority is then given to the QoS bearer packets by associating Differentiated Services Code Point (DSCP). A comprehensive analysis of QoS in different protocols in wireless networks has been studied. Open issues and research directions have been addressed with a proposed mechanism to enhance the QoS of the wireless networ

    Empirical Analysis of Privacy Preservation Models for Cyber Physical Deployments from a Pragmatic Perspective

    Get PDF
    The difficulty of privacy protection in cyber-physical installations encompasses several sectors and calls for methods like encryption, hashing, secure routing, obfuscation, and data exchange, among others. To create a privacy preservation model for cyber physical deployments, it is advised that data privacy, location privacy, temporal privacy, node privacy, route privacy, and other types of privacy be taken into account. Consideration must also be given to other types of privacy, such as temporal privacy. The computationally challenging process of incorporating these models into any wireless network also affects quality of service (QoS) variables including end-to-end latency, throughput, energy use, and packet delivery ratio. The best privacy models must be used by network designers and should have the least negative influence on these quality-of-service characteristics. The designers used common privacy models for the goal of protecting cyber-physical infrastructure in order to achieve this. The limitations of these installations' interconnection and interface-ability are not taken into account in this. As a result, even while network security has increased, the network's overall quality of service has dropped. The many state-of-the-art methods for preserving privacy in cyber-physical deployments without compromising their performance in terms of quality of service are examined and analyzed in this research. Lowering the likelihood that such circumstances might arise is the aim of this investigation and review. These models are rated according to how much privacy they provide, how long it takes from start to finish to transfer data, how much energy they use, and how fast their networks are. In order to maximize privacy while maintaining a high degree of service performance, the comparison will assist network designers and researchers in selecting the optimal models for their particular deployments. Additionally, the author of this book offers a variety of tactics that, when used together, might improve each reader's performance. This study also provides a range of tried-and-true machine learning approaches that networks may take into account and examine in order to enhance their privacy performance

    Improved QoS Support for WiMAX Networks: A Survey

    Get PDF
    Quality of Service (QoS) is considered as the backbone of any Broadband media access network of which WiMAX is not an exception. Immense work is being carried out in the academia in this area. The goal is to come up with improved QoS to support different traffics in WiMAX network. This work presents a survey of the various current states-of-the-art QoS schemes that could be utilised to realise a guaranteed QoS necessary for effective general high WiMAX access network performance. We concentrate on three approaches. The approaches include Hierarchical Scheduling Framework for QoS in WiMAX point-to-point Networks, this approach divides scheduling scheme into three different Tiers. Others are Cross-layer Optimization Framework and Resource Allocation for Improved QoS in WiMAX; and On-demand Bandwidth Allocation for WiMAX. Keywords: WiMAX, QoS, Scheduling, Broadband, Bandwidth, Throughput

    Radio Resource Management Satellite Communication Network MCDM Method

    Get PDF
    Worldwide deployment of heterogeneous wireless networks is growing as a result of consumer demand for connectivity at all times and in all places. These customers' interest in multimedia apps like video streaming and VoIP, which demand tight Quality of Service (QoS) support, is growing at the same time. With such limitations, provisioning network resources is a difficult undertaking. In fact, it might be challenging for a network operator to identify trustworthy criteria to choose the optimum network that ensures user happiness while maximising network utilisation, given the availability of numerous access technologies (WiFi, WiMAX, or cellular networks). To solve this problem, each eNB just needs to learn the traffi c conditions or patterns of its owncell in our proposal. Wireless communication systems depend heavily on radio resource management (RRM). To ensure the efficient and successful operation of wireless networks, it involves the allocation and control of radio frequency spectrum, power, and other resources. RRM is significant because it can use scarce radio resources as efficiently as possible, enhancing capacity, lowering interference, and improving service quality. Successful deployment and operation of wireless communication systems like cellular networks, Wi-Fi, and Bluetooth depend on effective RRM approaches. The need for wireless communication is growing, and new technologies and standards are constantly being developed. The methodology of radio resource management (RRM) involves a variety of techniques and algorithms designed to allocate radio resources in a way that maximizes network performance while minimizing interference. Taken as alternate parameter is Laser communication, optical networks, satellite optical communication, vibrations, satellite networks. Taken as is solar radiation power, thermal bending, micro meteorite impact, solar and lunar gravity, earth oblations method. satellite optical communication has reached near 2000 data set compare other data set. The operation of wireless communication networks depends on radio resource management (RRM). Wireless networks would have interference, congestion, and a lacklustre level of service if effective RRM procedures weren't used. RRM is therefore a key component in ensuring that wireless communication systems can provide users with dependable and high-quality services

    Black hole Attack Prevention in VANET

    Get PDF
    The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANETs), from the well-known Mobile Ad Hoc Networks (MANETs) in wireless communications. VANETs are self-organizing networks established among vehicles equipped with communication facilities. In VANETs vehicles are equipped with On Board Unit (OBU) through which they are capable of organizing themselves, by discovering their neighbor vehicles and capable to communicate with Infrastructure nodes equipped with Road Side Unit (RSU) for finding optimal path, Service based Information as well as other sensible Information for safe Transportation over the wireless medium. Recently, VANETs have been getting greater attention as more applications are depending on them. Researchers have tried to propose various Protocols, Approaches and methodologies that will improve the Quality, Efficiency, Authenticity and Integrity of different services of VANETs. Many of the applications require a high level of security. Thus, the main challenge is to protect VANETs from different security attacks. VANETs use the open wireless medium to communicate which makes it easy for an attacker to impose his attacks by Manipulating, Sniffing, and blocking the different packets. In VANETs all the nodes can act as routers for the data packets and there is no clear line of defence where it is possible to place a firewall. The main concern is how to provide best security in VANET without any negotiating with performance & reliability.The objective of this work is to check feasibility of using infrastructure based vehicular communication for detecting and preventing Blackhole Attacks. In this paper we proposed three different approaches for Blackhole attack prevention. We analyze performance of the proposed approaches for different scenario by generating heterogeneous traffic environment. With the proposed approaches we get the reduction in Packet Loss of up to 79.6971%

    AWPP: A New Scheme for Wireless Access Control Proportional to Traffic Priority and Rate

    Get PDF
    Cutting-edge wireless networking approaches are required to efficiently differentiate traffic and handle it according to its special characteristics. The current Medium Access Control (MAC) scheme which is expected to be sufficiently supported by well-known networking vendors comes from the IEEE 802.11e workgroup. The standardized solution is the Hybrid Coordination Function (HCF), that includes the mandatory Enhanced Distributed Channel Access (EDCA) protocol and the optional Hybrid Control Channel Access (HCCA) protocol. These two protocols greatly differ in nature and they both have significant limitations. The objective of this work is the development of a high-performance MAC scheme for wireless networks, capable of providing predictable Quality of Service (QoS) via an efficient traffic differentiation algorithm in proportion to the traffic priority and generation rate. The proposed Adaptive Weighted and Prioritized Polling (AWPP) protocol is analyzed, and its superior deterministic operation is revealed

    Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study

    Get PDF
    Cognitive radio (CR) enables unlicensed users to explore and exploit underutilized licensed channels (or white spaces). While multi-hop CR network has drawn significant research interest in recent years, majority work has been validated through simulation. A key challenge in multi-hop CR network is to select a route with high quality of service (QoS) and lesser number of route breakages. In this paper, we propose three route selection schemes to enhance the network performance of CR networks, and investigate them using a real testbed environment, which consists of universal software radio peripheral and GNU radio units. Two schemes are based on reinforcement learning (RL), while a scheme is based on spectrum leasing (SL). RL is an artificial intelligence technique, whereas SL is a new paradigm that allows communication between licensed and unlicensed users in CR networks. We compare the route selection schemes with an existing route selection scheme in the literature, called highest-channel (HC), in a multi-hop CR network. With respect to the QoS parameters (i.e., throughput, packet delivery ratio, and the number of route breakages), the experimental results show that RL approaches achieve a better performance in comparison with the HC approach, and also achieve close to the performance achieved by the SL approach

    Smart PIN: performance and cost-oriented context-aware personal information network

    Get PDF
    The next generation of networks will involve interconnection of heterogeneous individual networks such as WPAN, WLAN, WMAN and Cellular network, adopting the IP as common infrastructural protocol and providing virtually always-connected network. Furthermore, there are many devices which enable easy acquisition and storage of information as pictures, movies, emails, etc. Therefore, the information overload and divergent contentโ€™s characteristics make it difficult for users to handle their data in manual way. Consequently, there is a need for personalised automatic services which would enable data exchange across heterogeneous network and devices. To support these personalised services, user centric approaches for data delivery across the heterogeneous network are also required. In this context, this thesis proposes Smart PIN - a novel performance and cost-oriented context-aware Personal Information Network. Smart PIN's architecture is detailed including its network, service and management components. Within the service component, two novel schemes for efficient delivery of context and content data are proposed: Multimedia Data Replication Scheme (MDRS) and Quality-oriented Algorithm for Multiple-source Multimedia Delivery (QAMMD). MDRS supports efficient data accessibility among distributed devices using data replication which is based on a utility function and a minimum data set. QAMMD employs a buffer underflow avoidance scheme for streaming, which achieves high multimedia quality without content adaptation to network conditions. Simulation models for MDRS and QAMMD were built which are based on various heterogeneous network scenarios. Additionally a multiple-source streaming based on QAMMS was implemented as a prototype and tested in an emulated network environment. Comparative tests show that MDRS and QAMMD perform significantly better than other approaches
    • โ€ฆ
    corecore