89 research outputs found

    Token Bucket Algorithm with Modernization Techniques to Avoid Congestion in DEC Protocol of Wsn

    Get PDF
    A wireless sensor system is an essential aspect in many fields. It consists of a great deal of sensor nodes. These sensor networks carry out a number of tasks, including interaction, distribution, recognition, and power supply. Data is transmitted from source to destination and plays an important role. Congestion may occur during data transmission from one node to another and also at cluster head locations. Congestion will arise as a result of either traffic division or resource allocation. Energy will be wasted due to traffic division congestion, which causes packet loss and retransmission of removed packets. As a result, it must be simplified; hence there are a few Wireless sensor networks with various protocols that will handle Congestion Control. The Deterministic Energy Efficient Clustering (DEC) protocol, which is fully based on residual energy and the token bucket method, is being investigated as a way to increase the energy efficiency. In the event of congestion, our proposal provides a way to cope with it and solves it using this method to improve lifespan of the sensor networks. Experiments in simulation show that the proposed strategy can significantly enhance lifetime, energy, throughput, and packet loss

    A VOICE PRIORITY QUEUE (VPQ) SCHEDULER FOR VOIP OVER WLANs

    Get PDF
    The Voice over Internet Protocol (VoIP) application has observed the fastest growth in the world of telecommunication. The Wireless Local Area Network (WLAN) is the most assuring of technologies among the wireless networks, which has facilitated high-rate voice services at low cost and good flexibility. In a voice conversation, each client works as a sender and as a receiver depending on the direction of traffic flow over the network. A VoIP application requires a higher throughput, less packet loss and a higher fairness index over the network. The packets of VoIP streaming may experience drops because of the competition among the different kinds of traffic flow over the network. A VoIP application is also sensitive to delay and requires the voice packets to arrive on time from the sender to the receiver side without any delay over WLANs. The scheduling system model for VoIP traffic is still an unresolved problem. A new traffic scheduler is necessary to offer higher throughput and a higher fairness index for a VoIP application. The objectives of this thesis are to propose a new scheduler and algorithms that support the VoIP application and to evaluate, validate and verify the newly proposed scheduler and algorithms with the existing scheduling algorithms over WLANs through simulation and experimental environment. We proposed a new Voice Priority Queue (VPQ) scheduling system model and algorithms to solve scheduling issues. VPQ system model is implemented in three stages. The first stage of the model is to ensure efficiency by producing a higher throughput and fairness for VoIP packets. The second stage will be designed for bursty Virtual-VoIP Flow (Virtual-VF) while the third stage is a Switch Movement (SM) technique. Furthermore, we compared the VPQ scheduler with other well known schedulers and algorithms. We observed in our simulation and experimental environment that the VPQ provides better results for the VoIP over WLANs

    Dynamic Bandwidth Allocation for Internet of Things System Using Elastic Wireless Local Area Network

    Get PDF
    Rapid technological development, triggering various applications development that are increasingly innovative. One of them is the Internet of Things (IoT) system that makes human works easier and more effective. Along with sensor technology development in monitoring and controlling through IoT systems, a mechanism is needed to manage bandwidth so that IoT system can function optimally, especially in buildings designated as public areas. Smart building supported by various integrated sensors to maintain safety and comfort in the area. This study proposes the application of Elastic WLAN as a model for dynamic bandwidth management in IoT systems. In this model, IoT bandwidth changes automatically according to the number of traffic measurements for each IoT connected to the network As an effort to determine the performance of the elastic WLAN mechanism, this study succeeded in developing a prototype IoT device that implements Elastic WLAN on an Access-Point Raspberry Pi by using two temperature sensors placed in separate locations. The system successfully allocates bandwidth to each IoT according to the amount of data input from each temperature sensor installed. The higher the amount of data captured by the sensor, the system will automatically allocate the higher bandwidth to the sensor system, and vice versa

    A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks

    Get PDF
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a lowpower jammer in a way that it affects a single legitimate client can cause starvation to all the other clients. In other words, the total throughput provided by the corresponding AP is drastically degraded. To fight against this attack, we design FIJI, a cross-layer anti-jamming system that detects such intelligent jammers and mitigates their impact on network performance. FIJI looks for anomalies in the AP load distribution to efficiently perform jammer detection. It then makes decisions with regards to optimally shaping the traffic such that: (a) the clients that are not explicitly jammed are shielded from experiencing starvation and, (b) the jammed clients receive the maximum possible throughput under the given conditions. We implement FIJI in real hardware; we evaluate its efficacy through experiments on two wireless testbeds, under different traffic scenarios, network densities and jammer locations. We perform experiments both indoors and outdoors, and we consider both WLAN and mesh deployments. Our measurements suggest that FIJI detects such jammers in realtime and alleviates their impact by allocating the available bandwidth in a fair and efficient way. © Springer Science+Business Media

    Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks

    Get PDF
    The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the change of gateway\u27s public IP address by switching from one Access Point (AP) to another. (2) Monitoring multiple Wi-Fi channels in a random order looking for specific data packets sent by the remote server. (3) Merging the previous solutions into one universal ETA detection method using Virtual Wireless Clients (VWCs). On the other hand, we present a new vulnerability that allows an attacker to force the victim\u27s smartphone to consume data through the cellular network by starting the data download on the victim\u27s cell phone without the victim\u27s permission. A new scheme has been developed to speed up the active dictionary attack intensity on WPA2 based on two novel ideas. First, the scheme connects multiple VWCs to the AP at the same time-each VWC has its own spoofed MAC address. Second, each of the VWCs could try many passphrases using single wireless session. Furthermore, we present a new technique to avoid bandwidth limitation imposed by Wi-Fi hotspots. The proposed method creates multiple VWCs to access the WLAN. The combination of the individual bandwidth of each VWC results in an increase of the total bandwidth gained by the attacker. All proposal techniques have been implemented and evaluated in real-life scenarios

    QoS Abstraction Layer in 4G Access Networks

    Get PDF
    Tese de Mestrado. Redes e Serviços de Comunicação. Faculdade de Engenharia. Universidade do Porto. 200

    Development of a multi-mode self-adaptive algorithm to create an efficient wireless network on a university campus

    Get PDF
    The expanding use of ubiquitous computing has created a significant demand on existing network infrastructures. The demands of voice, video, and data on the same medium require a quality of service (QoS) at a level acceptable to users. Many network providers simply scale their networks to increase bandwidth and hardware to deal with the increasing demands. However, a network may still reach its design limits with peak traffic or malicious overuse of resources. In addition, with technology changing at a rapid pace, it is difficult to provide sufficient staffing to monitor and adjust the network settings to avoid issues during periods of network saturation. One of the common method to address these issues involves implementing a traffic shaper. A traffic shaper is a computer network management technique by which data sent across the network is delayed or routed in a way to accommodate a specific level of traffic to reach a desired QoS. There are many existing traffic shaping algorithms, each performing well under specific circumstances improving some QoS measures. The algorithms make use of queuing schemes to sort and send traffic based on the parameters provided to the system. To determine the need for this research, a survey was administered which revealed dissatisfaction with QoS of the wireless network. The purpose of this study focused on the development of a traffic shaping algorithm that would improve the QoS on a local area network on a university campus. The goal of the research was to create a new architecture that would allow a router to dynamically shift between different queuing mechanisms to improve network delay and packet loss without negatively impacting data throughput. The Multi-Mode Self-Adaptive (MMSA) algorithm was proposed to define a mechanism for this architecture. The MMSA was implemented within the code of a Cisco® router in the OPNET Modeler software and tested in a simulated university network environment. The results of the simulation revealed an improvement in end to end delay and packet loss rate with an insignificant change in average transmit rate between the router and the external server. The results of this research can be used as a basis for future research to create a new QoS framework. The new framework could be implemented in a router to allow configurations tailored to the network requirements of a service provider
    corecore