17 research outputs found
Performance evaluation of best route and broadcast strategy for NDN producerโs mobility
Named Data Networking is a novel concept mainly
for the future Internet infrastructure that is centered on routable
named data. The NDN infrastructure comprises of a new
constituent known as the strategy layer. The layer give access for
automatic selection of network routes by considering network
pre-conditions such as delay in Interest messages forwarding via
a producer. However, expressing appropriate pre-condition in
selecting the best possible routes to forward Interest messages
remains a challenging factor in NDN, because various
parameters and conditions opposes one another when selecting
best routes. Besides, it is possible for data in NDN to be retrieved
from several sources. Yet, so far preceding research on
forwarding strategy techniques that can calculate, from which
route accurate NDN data contents content are realized does not
regard a network attacker trying to transmit invalid data contents
containing same name as accurate data. Therefore, this paper
evaluate performance of forwarding strategy using analytical and
simulation, and that can be compatible to related network
applications such as voice. In analytical, we exploit the use of
distribution function for consistency. These are the Probability
Density Function (PDF) and Cumulative Distribution Function
(CDF). In simulation, each application require its own form of
forwarding policy using best route and broadcast. These were
exploited to evaluate the total delay in a given interval from 10
through 50 seconds for five times. Similarly in our evaluation, a
largescale ring topology was use in the simulation consisting of
30 nodes and 48 links. Link bandwidth is configured as 1Mbps.
Numbers of content consumer/producer starts from 1 to 18 so as
to achieve our simulations. Both consumers and producers were
randomly selected in term of unique content request on the
access network. ndnSIM 2.1 is used in simulating the scenarios
for several time intervals. Performance results presents best route
policy carries significant delay when compared with broadcast
policy. Also, in our result, Delay metric is half the value obtained
during analytical and simulation processes for NDN producerโs
best route and broadcast using CDF, as compared to the value
realized in our benchmark paper for NDN consumer
Detecting mobile producerโs position in a wireless named data network environment using signal strength
Named Data Networking (NDN) is a new Content Centric Network architecture that can possibly overwhelm most issues of IP mobility and security. The NDN is centered on addressing contents by themselves using names, rather than assigning IP addresses to packets on hosts where information is located on the global Internet. Due to the developing scope of remote access around the world and Wi-Fi accessibility, scenarios change because of additional networking devices. This paper analyses existing methodologies of mobile device communication using Wi-Fi in NDN. This involves using a mobile producer and a rendezvous node connected via content routers in an NDN scenario. Their location is detected and predicted immediately handoff occur and it send content transmission as a consumer. The approach of transmitting content signals uses sign power pointer (RSSI), TOA, and TSE in the network. Several challenges were noted and pointed out enhance future work
Evaluating mobility management models for content forwarding in named data networking environments
Named Data Networking (NDN) performs its routing and forwarding decisions using name prefixes. This removes some of the issues affecting addresses in our traditional IP architecture such as limitation in address allocation and management, and even NAT translations etcetera. Another positivity of NDN is its ability to use the conventional routing like the link state and distance vector algorithm. In route announcement, NDN node broadcasts its name prefix which consists of the knowledge of the next communicating node. In this paper, we evaluate the performance of mobility management models used in forwarding NDN contents to a next hop. This makes it crucial to select an approach of mobility model that translates the nature of movement of the NDN mobile routers. A detailed analysis of the famous mobility model such as the Random Waypoint mobility and Constant Velocity were computed to determine the mobility rate of the NDN mobile router. Simulation analysis was carried out using ndnSIM 2.1 on Linux Version 16.1. we build and compile with modules and libraries in NS-3.29. The sample of movement of the mobile router is illustrated and our result present the viability of the Constant Velocity model as compared with the Random Way point.
KeywordsโNamed Data Networking, Prefix, Broadcast, ndnSIM, NS-3.2
Blockchain security for 5G network using Internet of Things devices
Network of vehicles using Internet of Things
(IoT) frameworks have efficient characteristics of modern
intelligent transportation system with a few challenges in
vehicular ad-hoc networks (VANETs). However, its security
framework is required to manage trust management by
preserving user privacy. Wireless mobile communication (5G)
system is regarded as an outstanding technology that provide
ultra-reliable with limited latency wireless communication
services. By extension, integrating Software Defined Network
(SDN) with 5G-VANET enhances global information gathering
and network control. Therefore, real-time IoT application for
monitoring transport services is efficiently supported. These
ensures vehicular security on this framework. This paper
provides a technical solution to a self-confidential framework
for a smart transport system. This process exploiting IoT for
vehicle communication by incorporating SDN and 5G
technology. Due to some features of blockchain, this
framework has been implemented to provide various
alternative support for vehicular smart services. This involves
real-time access to cloud to stream video information and
protection management to vehicular network. The
implemented framework presents a promising technique and
reliable vehicular IoT environment while ensuring user
privacy. Results of simulation presents that vehicular
nodes/messages (malicious) and overhead is detected and the
impact on network performance are satisfactory when
deployed in large-scale network scenarios
Simulation of handoff algorithm for NDN producerโs mobility
Named Data networking is a novel communication scheme designed for efficient data dissemination. NDN is cantered on content management to improve on IP challenges such mobility, scalability, security and better quality of service. In this paper, producerโs mobility between two points is set-up for simulation using hard handoff technique. In this form of handoff, the carrier frequency of a connecting access gateway remains the same with the newly visited gateway of the producer (i.e intra-frequency). The mobile producer in node 3 is requesting a video content to another producer in node 4 while in a state of mobility. We considered anchorless technique of managing mobility of the nodes and simulation ensures that contents still receive routing update as they achieve handoff. These set-ups of simulation were conducted using NetSim version 12.10 software. In the results, we present video application throughput and the link throughput of link 1, link 2 and link 7 and comprehend that, efficiency and seamless mobility is realized using video application as compared to link throughout. Network and queued metrics also present more results being generated after the simulation processes. The algorithm of our inputs is tested in MATLAB and part of the coding system is build using visual studio 2015 which by default, is compatible with NetSim โbinaryโ and โdllโ folders
Evaluating average throughput for quantity of data stream in an NDN rendezvous server
This paper evaluates throughput to improve interest and data content transmission in the proposed distributed rendezvous server stream. An anchor within the network core is not considered but hence anchorless connection is adopted to aid routing between different locations of producer and rendezvous servers.This technique is simulated to present a seamless communication between producers and rendezvous servers.Using ndnSIM 2.1, performance analysis is measured to determine best route forwarding strategy and ensure minimal signalling cost and overhead. The mobile producers and servers were interfaced with Wireshark to capture packet and analyse the network statistics for throughput (moving average), segment length, round-trip time, sequence number and window scaling
Locating mobile producerโs position in anchorless NDN environment using signal strength
This paper assesses the Muslim contribution in Computer Science Applications and Technology.
This involves in-depth analysis of recent technologies in computer, based on perspective that Islam
accommodates. All research conducted from the history of civilization is basically driven from script of the
Quran and Sunnah. Therefore, technology and science are derivatives of Islamic civilization. Recent
technology of the Internet is now centred on multimedia contents applications (such as audio, video and
images). This is due to the rapid innovations and production of electronic devices across the globe. The idea
of contents on the Internet is developed from the Content Concentric Network (CCN). And the most
promising between CCN types is the Named Data Networking (NDN). Named Data Networking is a new
content centric network architecture that can possibly overwhelm most issues of IP mobility and security.
NDN approach is commonly identified under Information Concentric Network or Content Concentric
Network and is centered on addressing contents by themselves using names, rather than assigning IP
addresses to packets on hosts, where information is located on the global Internet. Due to the developing
scope of remote access around the world and Wi-Fi accessibility, scenarios change as a result of additional
networking devices. This paper also analyses existing methodologies of mobile device communication using
Wi-Fi in NDN environment. This involves using a mobile producer and a rendezvous node connected via
content routers in a network. Their location is detected and predicted immediately handoff occur and it
transmit content as a consumer. The approach of transmitting content signals uses sign power pointer,
Received Signal Strength Indicator (RSSI), Time of Arrival (TOA) and TSE in the network. Several challenges
were noted and pointed out o enhance future work
Performance of turbo code in CDMA under AWGN channel
Carrier Division Multiple Access is considered as an efficient technique in wireless
communication due to its high possibility to serve an unlimited number of users. CDMA
uses the same frequency concurrently with wireless communication. In this paper, the
performance and evaluation of turbo code are duly presented followed by the
examination of CDMA under AWGN channel was highlighted. The simulation estimated
to achieve bit error rate of less than 10-2 frame size.
To this end, the results of the simulation show that the Bit Error Rate is inversely
proportional to the size of the frame and directly proportional the number of iteration
in the decoder
An automatic facial age progression estimation system
Linear age progression models which are largely
used in prototype and conventional approaches usually produce
synthesized images that are lack of quality because of the aging
variations. Therefore, in this paper, a facial age progression
model that captures non-linear age variances is designed by
using a deep learning-based method called Generative
Adversarial Network. The proposed face aging model aims to
achieve convincing and visually plausible aging effects by
controlling the age attribute. The model first maps the face via
a convolutional encoder to a latent vector, then the vector is
projected by a deconvolutional generator to the face manifold based on age, and finally the encoder and the generator are imposed on two adversarial networks respectively. The proposed model is trained on UTKFace dataset using Pytorch machine learning library. The experimental results demonstrate the capability of the proposed Generative Advanced Network
(GAN) model of generating photorealistic aging faces and
preserving the original identity property