130 research outputs found

    Usability of Destination-Sequenced Distance Vector Routing Protocol Routes

    Get PDF
    The success of fundamental network tasks of traffic delivery from a source to a destination node is mainly dependent on the efficiency of the routing protocol. In mobile ad hoc networks, the effectiveness of routing protocols is additionally demanding due to the dynamic nature of network nodes. In this paper, we dealt with the exploitation of the routes generated using DSDV bellman-ford routing protocol. Through a total of 3960 network simulations with different topologies, network loads and mobility nodes, various parameters of the DSDV were considered. Our results show that there are a large number of unused routes, and techniques for improving the efficiency of routing and reducing routing overhead can be implemented

    A deep stochastical and predictive analysis of users mobility based on Auto-Regressive processes and pairing functions

    Get PDF
    With the proliferation of connected vehicles, new coverage technologies and colossal bandwidth availability, the quality of service and experience in mobile computing play an important role for user satisfaction (in terms of comfort, security and overall performance). Unfortunately, in mobile environments, signal degradations very often affect the perceived service quality, and predictive approaches become necessary or helpful, to handle, for example, future node locations, future network topology or future system performance. In this paper, our attention is focused on an in-depth stochastic micro-mobility analysis in terms of nodes coordinates. Many existing works focused on different approaches for realizing accurate mobility predictions. Still, none of them analyzed the way mobility should be collected and/or observed, how the granularity of mobility samples collection should be set and/or how to interpret the collected samples to derive some stochastic properties based on the mobility type (pedestrian, vehicular, etc.). The main work has been carried out by observing the characteristics of vehicular mobility, from real traces. At the same time, other environments have also been considered to compare the changes in the collected statistics. Several analyses and simulation campaigns have been carried out and proposed, verifying the effectiveness of the introduced concepts

    Effective Planning and Analysis of Huawei and Cisco Routers for MPLS Network Design Using Fast Reroute Protection

    Get PDF
    This chapter deals with a description of the MPLS traffic engineering technology behavior on two heterogeneous, but nowadays the most commonly used network vendors are Cisco and Huawei. Compatibility and functionality between network devices Huawei and Cisco were verified by testing the appropriate network topology. In this topology, we mainly focused on the useful feature of MPLS TE called Fast Reroute (FRR) protection. It provides link protection, node protection and also bandwidth protection during the failure of the primary link, especially on backbone networks. After successful validation, compatibility and functionality of the network topology between the heterogeneous routers using the Fast Reroute protection will be possible to use this MPLS TE application in the real networks

    On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis

    Get PDF
    From many years, the methods to defend against Denial of Service attacks have been very attractive from different point of views, although network security is a large and very complex topic. Different techniques have been proposed and so-called packet marking and IP tracing procedures have especially demonstrated a good capacity to face different malicious attacks. While host-based DoS attacks are more easily traced and managed, network-based DoS attacks are a more challenging threat. In this paper, we discuss a powerful aspect of the IP traceback method, which allows a router to mark and add information to attack packets on the basis of a fixed probability value. We propose a potential method for modeling the classic probabilistic packet marking algorithm as Markov chains, allowing a closed form to be obtained for evaluating the correct number of received marked packets in order to build a meaningful attack graph and analyze how marking routers must behave to minimize the overall overhead

    Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices

    Get PDF
    In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully

    Throughput analysis of non-orthogonal multiple access and orthogonal multiple access assisted wireless energy harvesting K-hop relaying networks

    Get PDF
    This study introduces the non-orthogonal multiple access (NOMA) technique into the wireless energy harvesting K-hop relay network to increase throughput. The relays have no dedicated energy source and thus depend on energy harvested by wireless from a power beacon (PB). Recently, NOMA has been promoted as a technology with the potential to enhance connectivity, reduce latency, increase fairness amongst users, and raise spectral effectiveness compared to orthogonal multiple access (OMA) technology. For performance considerations, we derive exact throughput expressions for NOMA and OMA-assisted multi-hop relaying and compare the performance between the two. The obtained results are validated via Monte Carlo simulations

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U1) and User 2 (U2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U1 and U2. The transmission’s security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system’s secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U1 was also compared to the secrecy performance of U2. Finally, the simulation results matched the Monte Carlo simulations well

    System Performance Analysis of Half-Duplex Relay Network over Rician Fading Channel

    Get PDF
    In this paper, the system performance of an amplify-and-forward (AF) relaying network over Rician Fading Channel is proposed, analyzed and demonstrated. For details this analysis, the energy and information are transferred from the source to the relay nodes by two methods: 1) time switching protocol and 2) power splitting protocol. Firstly, due to the constraint of the wireless energy harvesting at the relay node, the analytical mathematical expressions of the achievable throughput and the outage probability of both schemes were proposed and demonstrated. After that, the effect of various system parameters on the system performance is rigorously studied with closed-form expressions for the system performance. Finally, the analytical results are also demonstrated by Monte-Carlo simulation in comparison with the closed-form expressions. The numerical results demonstrated the effect of various system parameters, such as energy harvesting time, power splitting ratio, source transmission to noise power, and the threshold value, on the system performance of AF wireless relay nodes. The results show that the analytical mathematical and simulated results match for all possible parameter values for both schemes
    • …
    corecore