Abstract: In this research article of modeling Underwater
Wireless Sensor Network Simulators, we provide a comprehensive
overview of the various currently available simulators used in UWSN
modeling. In this work, we compare their working environment,
software platform, simulation language, key features, limitations and
corresponding applications. Based on extensive experimentation and
performance analysis, we provide their efficiency for specific
applications. We have also provided guidelines for developing
protocols in different layers of the protocol stack, and finally these
parameters are also compared and tabulated. This analysis is
significant for researchers and designers to find the right simulator
for their research activities.
Abstract: Wireless Sensor Networks (WSNs) have wide variety
of applications and provide limitless future potentials. Nodes in
WSNs are prone to failure due to energy depletion, hardware failure,
communication link errors, malicious attacks, and so on. Therefore,
fault tolerance is one of the critical issues in WSNs. We study how
fault tolerance is addressed in different applications of WSNs. Fault
tolerant routing is a critical task for sensor networks operating in
dynamic environments. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs
where energy awareness is an essential design issue. The focus,
however, has been given to the routing protocols which might differ
depending on the application and network architecture.
Abstract: IEEE 802.11a/b/g standards provide multiple
transmission rates, which can be changed dynamically according to the
channel condition. Cooperative communications were introduced to
improve the overall performance of wireless LANs with the help of
relay nodes with higher transmission rates. The cooperative
communications are based on the fact that the transmission is much
faster when sending data packets to a destination node through a relay
node with higher transmission rate, rather than sending data directly to
the destination node at low transmission rate. To apply the cooperative
communications in wireless LAN, several MAC protocols have been
proposed. Some of them can result in collisions among relay nodes in a
dense network. In order to solve this problem, we propose a new
protocol. Relay nodes are grouped based on their transmission rates.
And then, relay nodes only in the highest group try to get channel
access. Performance evaluation is conducted using simulation, and
shows that the proposed protocol significantly outperforms the
previous protocol in terms of throughput and collision probability.
Abstract: In this paper we describe one critical research
program within a complex, ongoing multi-year project (2010 to 2014
inclusive) with the overall goal to improve the learning outcomes for
first year undergraduate commerce/business students within an
Information Systems (IS) subject with very large enrolment. The
single research program described in this paper is the analysis of
student attitudes and decision making in relation to the availability of
formative assessment feedback via Web-based real time conferencing
and document exchange software (Adobe Connect). The formative
assessment feedback between teaching staff and students is in respect
of an authentic problem-based, team-completed assignment. The
analysis of student attitudes and decision making is investigated via
both qualitative (firstly) and quantitative (secondly) application of the
Theory of Planned Behavior (TPB) with a two statistically-significant
and separate trial samples of the enrolled students. The initial
qualitative TPB investigation revealed that perceived self-efficacy,
improved time-management, and lecturer-student relationship
building were the major factors in shaping an overall favorable
student attitude to online feedback, whilst some students expressed
valid concerns with perceived control limitations identified within the
online feedback protocols. The subsequent quantitative TPB
investigation then confirmed that attitude towards usage, subjective
norms surrounding usage, and perceived behavioral control of usage
were all significant in shaping student intention to use the online
feedback protocol, with these three variables explaining 63 percent of
the variance in the behavioral intention to use the online feedback
protocol. The identification in this research of perceived behavioral
control as a significant determinant in student usage of a specific
technology component within a virtual learning environment (VLE)
suggests that VLEs could now be viewed not as a single, atomic
entity, but as a spectrum of technology offerings ranging from the
mature and simple (e.g., email, Web downloads) to the cutting-edge
and challenging (e.g., Web conferencing and real-time document
exchange). That is, that all VLEs should not be considered the same.
The results of this research suggest that tertiary students have the
technological sophistication to assess a VLE in this more selective
manner.
Abstract: Underwater acoustic network is one of the rapidly
growing areas of research and finds different applications for
monitoring and collecting various data for environmental studies. The
communication among dynamic nodes and high error probability in
an acoustic medium forced to maximize energy consumption in
Underwater Sensor Networks (USN) than in traditional sensor
networks. Developing energy-efficient routing protocol is the
fundamental and a curb challenge because all the sensor nodes are
powered by batteries, and they cannot be easily replaced in UWSNs.
This paper surveys the various recent routing techniques that mainly
focus on energy efficiency.
Abstract: The paper deals with communication standards for
control and production system. The authors formulate the
requirements for communication security protection. The paper is
focused on application protocols of the industrial networks and their
basic classification. The typical attacks are analysed and the safety
protection, based on requirements for specific industrial network is
suggested and defined in this paper.
Abstract: Recent advances in wireless networking technologies
introduce several energy aware routing protocols in sensor networks.
Such protocols aim to extend the lifetime of network by reducing the
energy consumption of nodes. Many researchers are looking for
certain challenges that are predominant in the grounds of energy
consumption. One such protocol that addresses this energy
consumption issue is ‘Cluster based hierarchical routing protocol’. In
this paper, we intend to discuss some of the major hierarchical
routing protocols adhering towards sensor networks. Furthermore, we
examine and compare several aspects and characteristics of few
widely explored hierarchical clustering protocols, and its operations
in wireless sensor networks (WSN). This paper also presents a
discussion on the future research topics and the challenges of
hierarchical clustering in WSNs.
Abstract: Opportunistic routing is used, where the network has
the features like dynamic topology changes and intermittent network
connectivity. In Delay tolerant network or Disruption tolerant
network opportunistic forwarding technique is widely used. The key
idea of opportunistic routing is selecting forwarding nodes to forward
data packets and coordination among these nodes to avoid duplicate
transmissions. This paper gives the analysis of pros and cons of
various opportunistic routing techniques used in MANET.
Abstract: This research proposes a novel reconstruction protocol
for restoring missing surfaces and low-quality edges and shapes in
photos of artifacts at historical sites. The protocol starts with the
extraction of a cloud of points. This extraction process is based on
four subordinate algorithms, which differ in the robustness and
amount of resultant. Moreover, they use different -but
complementary- accuracy to some related features and to the way
they build a quality mesh. The performance of our proposed protocol
is compared with other state-of-the-art algorithms and toolkits. The
statistical analysis shows that our algorithm significantly outperforms
its rivals in the resultant quality of its object files used to reconstruct
the desired model.
Abstract: Concerns on corrosion and effective coating
protection of double hull tankers and bulk carriers in service have
been raised especially in water ballast tanks (WBTs). Test
protocols/methodologies specifically that which is incorporated in the
International Maritime Organisation (IMO), Performance Standard
for Protective Coatings for Dedicated Sea Water ballast tanks (PSPC)
are being used to assess and evaluate the performance of the coatings
for type approval prior to their application in WBTs. However, some
of the type approved coatings may be applied as very thick films to
less than ideally prepared steel substrates in the WBT. As such films
experience hygrothermal cycling from operating and environmental
conditions, they become embrittled which may ultimately result in
cracking. This embrittlement of the coatings is identified as an
undesirable feature in the PSPC but is not mentioned in the test
protocols within it. There is therefore renewed industrial research
aimed at understanding this issue in order to eliminate cracking and
achieve the intended coating lifespan of 15 years in good condition.
This paper will critically review test protocols currently used for
assessing and evaluating coating performance, particularly the IMO
PSPC.
Abstract: The society of 3rd Generation Partnership Project (3GPP) is completed developing Long Term Evolution Advanced (LTE-Advanced) systems as a standard 4G cellular system. This generation goals to produce conditions for a new radio-access technology geared to higher data rates, low latency, and better spectral efficiency. LTE-Advanced is an evolutionary step in the continuing development of LTE where the description in this article is based on LTE release 10. This paper provides a model of the traffic links of 4G system represented by LTE-Advanced system with the effect of the Transmission Control Protocols (TCP) and Stream Control Transmission Protocol (SCTP) in term of throughput and packet loss. Furthermore, the article presents the investigation and the analysis the behavior of SCTP and TCP variants over the 4G cellular systems. The traffic model and the scenario of the simulation developed using the network simulator NS-2 using different TCP source variants.
Abstract: Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) used to establish communications and exchange information among nearby vehicles and between vehicles and nearby fixed infrastructure. VANET is seen as a promising technology used to provide safety, efficiency, assistance and comfort to the road users. Routing is an important issue in Vehicular Ad Hoc Network to find and maintain communication between vehicles due to the highly dynamic topology, frequently disconnected network and mobility constraints.
This paper evaluates the performance of two most popular proactive routing protocols OLSR and DSDV in real city traffic scenario on the basis of three metrics namely Packet delivery ratio, throughput and average end to end delay by varying vehicles density and transmission range.
Abstract: Transmission Control Protocol (TCP) among the wired and wireless networks, it still has a practical problem; where the congestion control mechanism does not permit the data stream to get complete bandwidth over the existing network links. To solve this problem, many TCP protocols have been introduced with high speed performance. Therefore, an enhanced congestion window (cwnd) for the congestion control mechanism is proposed in this article to improve the performance of TCP by increasing the number of cycles of the new window to improve the transmitted packet number. The proposed algorithm used a new mechanism based on the available bandwidth of the connection to detect the capacity of network path in order to improve the regular clocking of congestion avoidance mechanism. The work in this paper based on using Network Simulator 2 (NS-2) to simulate the proposed algorithm.
Abstract: Mobile Ad-Hoc Network (MANET) is a network without infrastructure dynamically formed by autonomous system of mobile nodes that are connected via wireless links. Mobile nodes communicate with each other on the fly. In this network each node also acts as a router. The battery power and the bandwidth are very scarce resources in this network. The network lifetime and connectivity of nodes depend on battery power. Therefore, energy is a valuable constraint which should be efficiently used. In this paper we survey various energy efficient routing protocols. The energy efficient routing protocols are classified on the basis of approaches they use to minimize the energy consumption. The purpose of this paper is to facilitate the research work and combine the existing solution and to develop a more energy efficient routing mechanism.
Abstract: IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.
Abstract: The conventional routing protocol designed for MANET fail to handle dynamic movement and self-starting behavior of the node effectively. Every node in MANET is considered as forward as well receiver node and all of them participate in routing the packet from source to the destination. While the interconnection topology is highly dynamic, the performance of the most of the routing protocol is not encouraging. In this paper, a reliable broadcast approach for MANET is proposed for improving the transmission rate. The MANET is considered with asymmetric characteristics and the properties of the source and destination nodes are different. The non-forwarding node list is generated with a downstream node and they do not participate in the routing. While the forwarding and non-forwarding node is constructed in a conventional way, the number of nodes in non-forwarding list is more and increases the load. In this work, we construct the forwarding and non-forwarding node optimally so that the flooding and broadcasting is reduced to certain extent. The forwarded packet is considered as acknowledgements and the non-forwarding nodes explicitly send the acknowledgements to the source. The performance of the proposed approach is evaluated in NS2 environment. Since the proposed approach reduces the flooding, we have considered functionality of the proposed approach with AODV variants. The effect of network density on the overhead and collision rate is considered for performance evaluation. The performance is compared with the AODV variants found that the proposed approach outperforms all the variants.
Abstract: A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.
Abstract: The International Building Code (IBC) and the
California Building Code (CBC) both recognize four basic types of
steel seismic resistant frames; moment frames, concentrically braced
frames, shear walls and eccentrically braced frames. Based on
specified geometries and detailing, the seismic performance of these
steel frames is well understood. In 2011, the authors designed an
innovative steel braced frame system with tapering members in the
general shape of a branching tree as a seismic retrofit solution to an
existing four story “lift-slab” building. Located in the seismically
active San Francisco Bay Area of California, a frame of this
configuration, not covered by the governing codes, would typically
require model or full scale testing to obtain jurisdiction approval.
This paper describes how the theories, protocols, and code
requirements of eccentrically braced frames (EBFs) were employed
to satisfy the 2009 International Building Code (IBC) and the 2010
California Building Code (CBC) for seismically resistant steel frames
and permit construction of these nonconforming geometries.
Abstract: As a node monitoring protocol, which is a part of network management, operates in distributed manner, conformance testing of such protocols is more tedious than testing a peer-to-peer protocol. Various works carried out to give the methodology to do conformance testing of distributed protocol. In this paper, we have presented a formal approach for conformance testing of a Node Monitoring Protocol, which uses both static and mobile agents, for MANETs. First, we use SDL to obtain MSCs, which represent the scenario descriptions by sequence diagrams, which in turn generate test sequences and test cases. Later, Testing and Test Control Notation Version-3 (TTCN-3) is used to execute test cases with respect to generated test sequences to know the conformance of protocol against the given specification. This approach shows, the effective conformance testing of the distributed protocols for the network with varying node density and complex behavior. Experimental results for the protocol scenario represent the effectiveness of the method used.
Abstract: Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) due to its unique nature such as scarce of resources and absence of centralized authority. There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers. The concept of anonymity (in terms of unlinkability and unobservability) and pseudonymity has been introduced in this paper to ensure privacy and security. In this paper, a Secure Onion Throat (SOT) protocol is proposed to provide complete anonymity in an adverse environment. The SOT protocol is designed based on the combination of group signature and onion routing with ID-based encryption for route discovery. The security analysis demonstrates the performance of SOT protocol against all categories of attacks. The simulation results ensure the necessity and importance of the proposed SOT protocol in achieving such anonymity.