17 research outputs found

    Performance evaluation of best route and broadcast strategy for NDN producerโ€™s mobility

    Get PDF
    Named Data Networking is a novel concept mainly for the future Internet infrastructure that is centered on routable named data. The NDN infrastructure comprises of a new constituent known as the strategy layer. The layer give access for automatic selection of network routes by considering network pre-conditions such as delay in Interest messages forwarding via a producer. However, expressing appropriate pre-condition in selecting the best possible routes to forward Interest messages remains a challenging factor in NDN, because various parameters and conditions opposes one another when selecting best routes. Besides, it is possible for data in NDN to be retrieved from several sources. Yet, so far preceding research on forwarding strategy techniques that can calculate, from which route accurate NDN data contents content are realized does not regard a network attacker trying to transmit invalid data contents containing same name as accurate data. Therefore, this paper evaluate performance of forwarding strategy using analytical and simulation, and that can be compatible to related network applications such as voice. In analytical, we exploit the use of distribution function for consistency. These are the Probability Density Function (PDF) and Cumulative Distribution Function (CDF). In simulation, each application require its own form of forwarding policy using best route and broadcast. These were exploited to evaluate the total delay in a given interval from 10 through 50 seconds for five times. Similarly in our evaluation, a largescale ring topology was use in the simulation consisting of 30 nodes and 48 links. Link bandwidth is configured as 1Mbps. Numbers of content consumer/producer starts from 1 to 18 so as to achieve our simulations. Both consumers and producers were randomly selected in term of unique content request on the access network. ndnSIM 2.1 is used in simulating the scenarios for several time intervals. Performance results presents best route policy carries significant delay when compared with broadcast policy. Also, in our result, Delay metric is half the value obtained during analytical and simulation processes for NDN producerโ€™s best route and broadcast using CDF, as compared to the value realized in our benchmark paper for NDN consumer

    Detecting mobile producerโ€™s position in a wireless named data network environment using signal strength

    Get PDF
    Named Data Networking (NDN) is a new Content Centric Network architecture that can possibly overwhelm most issues of IP mobility and security. The NDN is centered on addressing contents by themselves using names, rather than assigning IP addresses to packets on hosts where information is located on the global Internet. Due to the developing scope of remote access around the world and Wi-Fi accessibility, scenarios change because of additional networking devices. This paper analyses existing methodologies of mobile device communication using Wi-Fi in NDN. This involves using a mobile producer and a rendezvous node connected via content routers in an NDN scenario. Their location is detected and predicted immediately handoff occur and it send content transmission as a consumer. The approach of transmitting content signals uses sign power pointer (RSSI), TOA, and TSE in the network. Several challenges were noted and pointed out enhance future work

    Evaluating mobility management models for content forwarding in named data networking environments

    Get PDF
    Named Data Networking (NDN) performs its routing and forwarding decisions using name prefixes. This removes some of the issues affecting addresses in our traditional IP architecture such as limitation in address allocation and management, and even NAT translations etcetera. Another positivity of NDN is its ability to use the conventional routing like the link state and distance vector algorithm. In route announcement, NDN node broadcasts its name prefix which consists of the knowledge of the next communicating node. In this paper, we evaluate the performance of mobility management models used in forwarding NDN contents to a next hop. This makes it crucial to select an approach of mobility model that translates the nature of movement of the NDN mobile routers. A detailed analysis of the famous mobility model such as the Random Waypoint mobility and Constant Velocity were computed to determine the mobility rate of the NDN mobile router. Simulation analysis was carried out using ndnSIM 2.1 on Linux Version 16.1. we build and compile with modules and libraries in NS-3.29. The sample of movement of the mobile router is illustrated and our result present the viability of the Constant Velocity model as compared with the Random Way point. Keywordsโ€”Named Data Networking, Prefix, Broadcast, ndnSIM, NS-3.2

    Blockchain security for 5G network using Internet of Things devices

    Get PDF
    Network of vehicles using Internet of Things (IoT) frameworks have efficient characteristics of modern intelligent transportation system with a few challenges in vehicular ad-hoc networks (VANETs). However, its security framework is required to manage trust management by preserving user privacy. Wireless mobile communication (5G) system is regarded as an outstanding technology that provide ultra-reliable with limited latency wireless communication services. By extension, integrating Software Defined Network (SDN) with 5G-VANET enhances global information gathering and network control. Therefore, real-time IoT application for monitoring transport services is efficiently supported. These ensures vehicular security on this framework. This paper provides a technical solution to a self-confidential framework for a smart transport system. This process exploiting IoT for vehicle communication by incorporating SDN and 5G technology. Due to some features of blockchain, this framework has been implemented to provide various alternative support for vehicular smart services. This involves real-time access to cloud to stream video information and protection management to vehicular network. The implemented framework presents a promising technique and reliable vehicular IoT environment while ensuring user privacy. Results of simulation presents that vehicular nodes/messages (malicious) and overhead is detected and the impact on network performance are satisfactory when deployed in large-scale network scenarios

    Simulation of handoff algorithm for NDN producerโ€™s mobility

    Get PDF
    Named Data networking is a novel communication scheme designed for efficient data dissemination. NDN is cantered on content management to improve on IP challenges such mobility, scalability, security and better quality of service. In this paper, producerโ€™s mobility between two points is set-up for simulation using hard handoff technique. In this form of handoff, the carrier frequency of a connecting access gateway remains the same with the newly visited gateway of the producer (i.e intra-frequency). The mobile producer in node 3 is requesting a video content to another producer in node 4 while in a state of mobility. We considered anchorless technique of managing mobility of the nodes and simulation ensures that contents still receive routing update as they achieve handoff. These set-ups of simulation were conducted using NetSim version 12.10 software. In the results, we present video application throughput and the link throughput of link 1, link 2 and link 7 and comprehend that, efficiency and seamless mobility is realized using video application as compared to link throughout. Network and queued metrics also present more results being generated after the simulation processes. The algorithm of our inputs is tested in MATLAB and part of the coding system is build using visual studio 2015 which by default, is compatible with NetSim โ€œbinaryโ€ and โ€œdllโ€ folders

    Evaluating average throughput for quantity of data stream in an NDN rendezvous server

    Get PDF
    This paper evaluates throughput to improve interest and data content transmission in the proposed distributed rendezvous server stream. An anchor within the network core is not considered but hence anchorless connection is adopted to aid routing between different locations of producer and rendezvous servers.This technique is simulated to present a seamless communication between producers and rendezvous servers.Using ndnSIM 2.1, performance analysis is measured to determine best route forwarding strategy and ensure minimal signalling cost and overhead. The mobile producers and servers were interfaced with Wireshark to capture packet and analyse the network statistics for throughput (moving average), segment length, round-trip time, sequence number and window scaling

    Locating mobile producerโ€™s position in anchorless NDN environment using signal strength

    No full text
    This paper assesses the Muslim contribution in Computer Science Applications and Technology. This involves in-depth analysis of recent technologies in computer, based on perspective that Islam accommodates. All research conducted from the history of civilization is basically driven from script of the Quran and Sunnah. Therefore, technology and science are derivatives of Islamic civilization. Recent technology of the Internet is now centred on multimedia contents applications (such as audio, video and images). This is due to the rapid innovations and production of electronic devices across the globe. The idea of contents on the Internet is developed from the Content Concentric Network (CCN). And the most promising between CCN types is the Named Data Networking (NDN). Named Data Networking is a new content centric network architecture that can possibly overwhelm most issues of IP mobility and security. NDN approach is commonly identified under Information Concentric Network or Content Concentric Network and is centered on addressing contents by themselves using names, rather than assigning IP addresses to packets on hosts, where information is located on the global Internet. Due to the developing scope of remote access around the world and Wi-Fi accessibility, scenarios change as a result of additional networking devices. This paper also analyses existing methodologies of mobile device communication using Wi-Fi in NDN environment. This involves using a mobile producer and a rendezvous node connected via content routers in a network. Their location is detected and predicted immediately handoff occur and it transmit content as a consumer. The approach of transmitting content signals uses sign power pointer, Received Signal Strength Indicator (RSSI), Time of Arrival (TOA) and TSE in the network. Several challenges were noted and pointed out o enhance future work

    Performance of turbo code in CDMA under AWGN channel

    Get PDF
    Carrier Division Multiple Access is considered as an efficient technique in wireless communication due to its high possibility to serve an unlimited number of users. CDMA uses the same frequency concurrently with wireless communication. In this paper, the performance and evaluation of turbo code are duly presented followed by the examination of CDMA under AWGN channel was highlighted. The simulation estimated to achieve bit error rate of less than 10-2 frame size. To this end, the results of the simulation show that the Bit Error Rate is inversely proportional to the size of the frame and directly proportional the number of iteration in the decoder

    An automatic facial age progression estimation system

    No full text
    Linear age progression models which are largely used in prototype and conventional approaches usually produce synthesized images that are lack of quality because of the aging variations. Therefore, in this paper, a facial age progression model that captures non-linear age variances is designed by using a deep learning-based method called Generative Adversarial Network. The proposed face aging model aims to achieve convincing and visually plausible aging effects by controlling the age attribute. The model first maps the face via a convolutional encoder to a latent vector, then the vector is projected by a deconvolutional generator to the face manifold based on age, and finally the encoder and the generator are imposed on two adversarial networks respectively. The proposed model is trained on UTKFace dataset using Pytorch machine learning library. The experimental results demonstrate the capability of the proposed Generative Advanced Network (GAN) model of generating photorealistic aging faces and preserving the original identity property
    corecore