48 research outputs found

    Toward designing a quantum key distribution network simulation model

    Get PDF
    As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator

    Transparent gap filler solution over a DVB-RCS2 satellite platform in a railway scenario: performance evaluation study

    Get PDF
    In this work, a performance study of a system equipped with a transparent Gap Filler solution in a DVB-RCS2 satellite platform has been provided. In particular, a simulation model based on a 3-state Markov chain, overcoming the blockage status through the introduction of a transparent Gap Filler (using devices on both tunnel sides) has been implemented. The handover time, due to switching mechanism between satellite and Gap Filler, has been taken into account. As reference scenario, the railway market has been considered, which is characterized by a N-LOS condition, due to service disruptions caused by tunnels, vegetation and buildings. The system performance, in terms of end-to-end delay, queue size and packet loss percentage, have been evaluated, in order to prove the goodness of communications in a real railroad path

    Vehicular networks and road safety: an application for emergency/danger situations management using the WAVE/802.11p standard

    Get PDF
    Car-to-car communication makes possible offering many services for vehicular environment, mainly to improve the safety. The decentralized kind of these networks requires new protocols to distribute information. The advantages that it offers depend on the penetration rate, that will be enough only after years since the introduction, due to the longevity of the current cars. The V2X communication requires On-Board Units (OBUs) in the vehicles, and Road-Side Units (RSUs) on the roads. The proposed application uses the peculiarities of the VANETs to advise danger or emergency situations with V2V and V2I message exchange. IEEE 802.11p is standard on which the communication is based, that provides the physical and the MAC layers. The WAVE protocol uses this standard, implementing other protocols defined by the family of standards IEEE P1609 in the upper layers. They define security services, resource management, multichannel operations and the message exchange protocol in WAVE. The performance of the application will be evaluated through many simulations executed in different scenarios, to provide general data independent from them

    Secrecy outage probability of a NOMA scheme and impact imperfect channel state information in underlay cooperative cognitive networks

    Get PDF
    Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e1, e2 from the source node S to User 1 (U-1) and User 2 (U-2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U-1 and U-2. The transmission's security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system's secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U-1 was also compared to the secrecy performance of U-2. Finally, the simulation results matched the Monte Carlo simulations well.Web of Science203art. no. 89

    Prediction model of triple play services for QoS assessment in IP based networks

    Get PDF
    This paper brings a QoS (Quality of Service) assessment model which can estimate voice and video quality. Based on the proposed model, speech or video quality is computed with regard to congestion management QoS configuration in the network and its level of total utilization. The contribution of this paper lies in designing a new mathematical model capable of predicting the quality of multimedia services respecting network behavior and performance. Index Terms—delay, E-Model, packet loss, QoS, SSIM, triple play.Web of Science10423923

    Mobility prediction and resource reservation in cellular networks with distributed Markov chains

    Get PDF
    Abstract-In recent years, mobile hosts desire to benefit a good level of satisfaction for the received services in wireless networks, with adequate quality of service guarantees. In this work the attention is focused on wireless services in cellular networks, where the hand-over effects need to be mitigated, through an appropriate reservation policy. Passive resources are used to ensure service continuity when mobile hosts are moving among different coverage cells. The system is modeled through a distributed set of Hidden Markov Chains and the related theory is used to design a mobility predictor (in terms of future probably visited cells), as the main component of the proposed idea, that does not depend on the considered transmission technology (GSM, UMTS, WLAN, etc.), mobility model or vehicular scenario (urban, suburban, etc.). MRSVP has been used in order to realize the active/passive bandwidth reservation in the considered network topology and a severe simulation campaign has been led-out in order to appreciate the robustness of the reservation scheme

    Vehicular networking enhancement and multi-channel routing optimization, based on multi-objective metric and minimum spanning tree

    Get PDF
    Vehicular Ad hoc NETworks (VANETs) represent a particular mobile technology that permits the communication among vehicles, offering security and comfort. Nowadays, distributed mobile wireless computing is becoming a very important communications paradigm, due to its flexibility to adapt to different mobile applications. VANETs are a practical example of data exchanging among real mobile nodes. To enable communications within an ad-hoc network, characterized by continuous node movements, routing protocols are needed to react to frequent changes in network topology. In this paper, the attention is focused mainly on the network layer of VANETs, proposing a novel approach to reduce the interference level during mobile transmission, based on the multi-channel nature of IEEE 802.11p (1609.4) standard. In this work a new routing protocol based on Distance Vector algorithm is presented to reduce the delay end to end and to increase packet delivery ratio (PDR) and throughput in VANETs. A new metric is also proposed, based on the maximization of the average Signal-to-Interference Ratio (SIR) level and the link duration probability between two VANET nodes. In order to relieve the effects of the co-channel interference perceived by mobile nodes, transmission channels are switched on a basis of a periodical SIR evaluation. A Network Simulator has been used for implementing and testing the proposed idea

    routing in mobile opportunistic social networks with selfish nodes

    Get PDF
    When the connection to Internet is not available during networking activities, an opportunistic approach exploits the encounters between mobile human-carried devices for exchanging information. When users encounter each other, their handheld devices can communicate in a cooperative way, using the encounter opportunities for forwarding their messages, in a wireless manner. But, analyzing real behaviors, most of the nodes exhibit selfish behaviors, mostly to preserve the limited resources (data buffers and residual energy). That is the reason why node selfishness should be taken into account when describing networking activities: in this paper, we first evaluate the effects of node selfishness in opportunistic networks. Then, we propose a routing mechanism for managing node selfishness in opportunistic communications, namely, SORSI (Social-based Opportunistic Routing with Selfishness detection and Incentive mechanisms). SORSI exploits the social-based nature of node mobility and other social features of nodes to optimize message dissemination together with a selfishness detection mechanism, aiming at discouraging selfish behaviors and boosting data forwarding. Simulating several percentages of selfish nodes, our results on real-world mobility traces show that SORSI is able to outperform the social-based schemes Bubble Rap and SPRINT-SELF, employing also selfishness management in terms of message delivery ratio, overhead cost, and end-to-end average latency. Moreover, SORSI achieves delivery ratios and average latencies comparable to Epidemic Routing while having a significant lower overhead cost

    Speech quality measurement of GSM infrastructure built on USRP N210 and OpenBTS project

    Get PDF
    The paper deals with the methodology for speech quality measuring in GSM networks using Perceptual Evaluation of Speech Quality (PESQ). The paper brings results of practical measurement of own GSM network build on the Universal Software Radio Peripheral (USRP N210) hardware and OpenBTS software. This OpenBTS station was installed in open terrain, and the speech quality was measured from different distances from the transmitter. The limit parameters of OpenBTS station with USRP N210 were obtained
    corecore