15 research outputs found

    Proposed different relay selection schemes for improving the performance of cooperative wireless networks

    Get PDF
    Relay selection is a new method currently used to develop and improve cooperative wireless networks. One of the main advantages of this new technology is that it can achieve cooperative diversity gain without installing multiple antennas in the transmitter or receiver. Relay selection algorithms can be used to select one node to become a relay node from a set of N candidate relays with optimization criteria as the outage probability or frame error rate. The selection process is preferable to operate in a distributed fashion and offers only reasonable costs in terms of manufacturing complexity and flexible handling over wireless cooperative networks. In this work, different relay selection schemes are proposed to enhance the cooperative wireless networks in terms of different approaches including: 1) Relay selection-based destination feedback scheme, 2) Relay selection based a ready-to-send/clear-to-send (RTS/CTS) messages scheme, 3) Relay selection-based identification messages (IDM) table scheme, and 4) Relay selection-based relay power consuming scheme. The experimental results via suggested case study show that the performance of overall cooperative network is enhanced in terms of increasing throughput, energy saving (efficiency maximization), blocking reduction and outage reduction (PER minimization)

    Analysis of threats and security issues evaluation in mobile P2P networks

    Get PDF
    Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks

    Improving IoT Applications Using a Proposed Routing Protocol

    Get PDF
    The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and improving the routing protocol to support them makes it more suitable for IoT systems. The proposed routing protocol is simulated using Castalia-3.2 and all the cases are examined to show the enhancement that achieved by each case. The proposed routing protocol shows better performance than other protocols do regarding Packet Delivery Ratio (PDR) and latency. It preserves network reliability since it does not generate routing or data packets needlessly. Routing protocol with added features (actuating and mobility) shows good performance. But that performance is affected by increasing the speed of mobile nodes

    Medium access control protocol design for wireless communications and networks review

    Get PDF
    Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks

    PERFORMANCE EVALUATION OF THE MOBILITY MANAGEMENT TOWARDS 4G WIRELESS NETWORKS

    No full text
    ABSTRACT The next generation of 4G wireless communication networks is supposed as a communication of different wireless access technologies (vertical communication) permitting the user with the best anywhere, anytime connection and developing the system resource utilization. So mobility management is crucial to ubiquitous computing and requires network management operations to avoid service degradation through this networks heterogeneity. Both location management and handoff management constitute mobility management. Handoff management is one of the mobility management components; it maintains mobile network's connections active while roaming or switching into a new area. The location management is a tracking process for the active mobile during his roaming without a call. In this work the performance of mobility management is evaluated during handoff and location management processes

    Real-Time SLAM Mobile Robot and Navigation Based on Cloud-Based Implementation

    No full text
    This study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database to display maps and use them at any time for navigation without the need to redraw the map. This map can be accessed by using an authentication process (username and password) supervised by the cloud server administrator. After that, using the serverless image handler (SIH), with the aid of this solution, you can change the size of images, change the color of the background, format them, or add watermarks. Experiment results demonstrated the ability to build a map of an unknown location in a complex environment and use it for navigation tasks on a real mobile robot via remote control. It also showed the success of the process of storing the map for future use and the process of modifying the map using SIH

    Developing a Video Buffer Framework for Video Streaming in Cellular Networks

    No full text
    This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different videos at different bitrates. Meanwhile, at the proposed distribution mechanism, a predetermined threshold value is selected for lower and upper levels of playout outage probability. Then, the control unit at the base station will distribute the radio resources and decide the minimum rate requirement based on clients’ urgency categories. Simulation results showed that the VBF grantees fairness of resources distribution among different clients within the same cellular network while minimizing the interruption duration and controlling the video buffer at an acceptable level. Also, the results showed that the system throughput of the proposed framework outperforms other existing algorithms such as playout buffer and discontinuous reception aware scheduling (PBDAS), maximum carrier-to-interface ratio (MAX-CIR), and proportional fair (PF) due to enhancing the quality of experience for video streaming by increasing the radio resources in fairness manner
    corecore