9 research outputs found

    Wavelength requirements for a scalable multicast single‐hop WDM network

    Get PDF
    In this paper, we present a method for designing a passive optical based single-hop wavelength division multiplexing multicast architecture that can achieve a scalable structure and form the basis of a wavelength efficient single-hop WDM network. The proposed architecture minimizes the number of wavelengths required for efficient multicast service and also minimizes tunability requirement of the transceivers. The network size scalability is achieved by adding transmitters and receivers to the designated groups. We show that the proposed system can accommodate large tuning delays and keeps with suitable throughput when the number of wavelength is equal to the number of nodes. We also show that the design can lead to a scalable structure while minimizing the number of wavelengths and tunability of the transceivers required for an efficient multicast service resulting in an improved system throughput and delay performance

    A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks

    No full text
    AbstractWireless Sensor Networks (WSNs) have shown great promise as the emerging technology for data gathering from unattended or hostile environment. The advancement in micro-electro-mechanical sensor technology, wireless communication technology and the recent energy scavenging have greatly contributed to the widespread acceptance of WSN related applications. In addtiion, the design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes. Acknowledging the severity of such attacks, this paper first presents the review on physical attacks followed by the introduction of trusted platform with protected memory that not only protect sensor node's sensitive credentials but also provide a concrete way to trust nodes in the dedicated wireless sensor network. Finally, summarization of proposed IBE_Trust framework is presented and briefly discusse

    Self-configuration Concept to Solve Physical Cell ID Conflict for SON LTE-based Femtocell Environment

    No full text
    and Self-healing functions are the most important concepts for self-managing heterogeneous network. However, the concept of self-configuration can be used to solve various challenges in the femtocell deployment phase and also in the PCIs confusion and collision problems. However, the proposed solutions for interference mitigation are not satisfying and need further improvement. Two main reasons identified for this unsatisfactory, firstly the small number of femtocells used in the simulation scenario which can lead to high failure probability if applied under real enterprise environment, secondly; the provided solutions discussed only part of the problem,i.e. either in co-tier interference or cross-tier interference but not both. Thus the need arises for stable solution which can resolve the interference problem for both inter and intra scenarios. In addition among the tree types of approaches used to solve collision and confusion problems the Nokia Siemens approach was the best. Index Terms — Self-configuration, cross-tire and co-tier interference, SON, LTE-femtocell, interference. I

    New graph colouring algorithm for resource allocation in large-scale wireless networks

    Get PDF
    The vertex-colouring problem is a well-known classical problem in graph theory in which a colour is assigned to each vertex of the graph such that no two adjacent vertices have the same colour. The minimum vertex-colouring problem is known as NP-hard problem in an arbitrary graph. In this paper a graph colouring algorithm based on modified incidence matrix is proposed for resolving Physical Cell ID (PCI) allocation for largescale femtocell deployment in LTE Telecommunication Networks. The proposed algorithm is not specified for neighbours only, but additionally can deal with neighbours of neighbours’ objects due to telecommunication requirements. Our results show that by applying proper searching and assigning methods it is possible to achieve satisfactory results for resource allocation in large and complex networks such as resolving PCI allocation and conflict for large femtocells deployment in LTE Networks

    Femtocell geo-location challenge DSL approach as solution

    Get PDF
    Femtocell or Home eNode cell in LTE is a home base station that anticipated to be deployed in very large numbers with fully automated manner. Femtocell provides enhanced coverage for in‐building cellular services. The enhanced data rates enable new multimedia services which in turn generate new revenue. However, with all the convenience such device can provide, locating the user’s geographic location represents a great deal of challenge for law enforcement and operators alike. In this work we propose a simple and direct approach that does not require any changes in the network or in the femtocell standard design by exploiting the connection between the femtocell and the network operator through the DSL backhaul. Result shows the proposed approach has achieved successfully the goal of locating the geographic location of the femtocell user precisely
    corecore