-
Performance Evaluation of Cooperative ML-IDMA Communications with DF Protocols
Basma A. Mahmoud,
Esam A. A. Hagras,
Mohamed A. Abo El-Dhab
Issue:
Volume 2, Issue 3, June 2013
Pages:
56-61
Received:
23 April 2013
Published:
10 June 2013
Abstract: Relaying and cooperative diversity allow multiple wireless radios to effectively share their antennas and create a virtual antenna array, thereby leveraging the spatial diversity benefits of multiple-input multiple-output antenna systems. In this paper, we consider the bit error rate performance analysis of a cooperative relay communication system on Multi-Layer-IDMA (ML-IDMA) using Maximal-Ratio-Combining (MRC) technique; we examine the effect of layers number on the performance and derive the average bit error probability of the Decode-and-Forward (DF) relay schemes by using the closed-form relay link Signal-to-Noise Ratio (SNR). Based on the analysis, we show that from the simulation results, degradation in the performance is observed when increasing number of layers but on the other hand we saved in the Band Width (BW).
Abstract: Relaying and cooperative diversity allow multiple wireless radios to effectively share their antennas and create a virtual antenna array, thereby leveraging the spatial diversity benefits of multiple-input multiple-output antenna systems. In this paper, we consider the bit error rate performance analysis of a cooperative relay communication system ...
Show More
-
Textual Based Retrieval System with Bloom in Unstructured Peer-to-Peer Networks
E. Mohan,
S. Uvaraj,
S. Suresh,
U. Helen Monisha,
N. Kannaiya Raja
Issue:
Volume 2, Issue 3, June 2013
Pages:
62-66
Received:
11 May 2013
Published:
20 June 2013
Abstract: P2P network is the best and popular network sharing of contents by the user through internet. Bloom Cast is an efficient technique used for full-text retrieval scheme in unstructured P2P networks. By using the fullest of a hybrid P2P protocol, Bloom Cast makes copies of the contents in the network uniformly at a random across the P2P networks in order to achieve a guaranteed recall at a communication cost of the network. Bloom Cast model works only when the two constraints are met: 1) the query replicas and document replicas are randomly and uniformly distributed across the P2P network; and 2) every peer knows N, the size of the network. To support random node sampling and network size estimation, Bloom Cast mixes a lightweight DHT into an unstructured P2P network. Further to reduce the replication cost, Bloom Cast utilizes Bloom Filters to encode the entire document. Bloom Cast hybridizes a lightweight DHT with an unstructured P2P overlay to support random node sampling and network size estimation. Since P2P networks are self-configuring networks with minimal or no central control, P2P networks are more vulnerable to malwares, malicious code, viruses, etc., than the traditional client-server networks, due to their lack of structure and unmanaged nature. All peers in a P2P network is identified by its identity certificates (aka identity). The identity here is attached to the repudiation of a given peer. Self-certification helps us to generate the identity certificate, thus here all the peers maintain their own and hence trusted certificate authority which issues the identity certificate to the peer.
Abstract: P2P network is the best and popular network sharing of contents by the user through internet. Bloom Cast is an efficient technique used for full-text retrieval scheme in unstructured P2P networks. By using the fullest of a hybrid P2P protocol, Bloom Cast makes copies of the contents in the network uniformly at a random across the P2P networks in or...
Show More
-
Authority System to Prevent Privacy Protection in Peer-to-Peer Network System
S. Uvaraj,
N. Kannaiya Raja
Issue:
Volume 2, Issue 3, June 2013
Pages:
67-72
Received:
4 June 2013
Published:
20 June 2013
Abstract: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing. The basic idea is to detect pirates timely with identity-based signatures and time-stamped tokens. The scheme stops collusive piracy without hurting legitimate P2P clients by targeting poisoning on detected violators, exclusively. We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts. Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet. We achieved 85-98 percent prevention rate on eMule, eDonkey, Morpheus, etc. The scheme is shown less effective in protecting some poison-resilient networks like BitTorrent and Azureus. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
Abstract: Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network. Paid clients (colluders) may illegally share copyrighted content files with unpaid clients (pirates). Such online piracy has hindered the use of open P2P networks for commercial content delivery. We proposed a proactive content poisoning sc...
Show More
-
Simulation and Evaluation of WIMAX Handover over Homogeneous and Heterogeneous Networks
Anmar Hamid Hameed,
Salama A. Mostafa,
Mazin Abed Mohammed
Issue:
Volume 2, Issue 3, June 2013
Pages:
73-80
Received:
11 May 2013
Published:
30 June 2013
Abstract: Different aspects of wireless networks are changing as a result of the continuous needs in terms of speed, data rates and quality of service. Such aspects are required to be adaptable within the same network or among networks of different technologies and service providers. Consequently, Worldwide Interoperability for Microwave Access (WiMAX) is one of the future generation networks (4G) that needs further study. However, a major consideration for WiMAX to achieve mobility is the handover mechanism that concerns with the mobile station movement within the range of network coverage from one base station to another similar homogeneous or different homogeneous network. In this paper, an intensive analysis to handover mechanism in WiMAX followed by comparisons to WiMAX performance with UMTS and WiFi networks is carried out. QualNet 4.5.1 simulator is used to simulate the comparison process homogeneously and heterogeneously. Performance metrics of Throughput, End-to-End (E-2-E) Delay and Jitter in the comparison during handover process in/between the wireless networks are used. The simulation results are evaluated to identify the performance of the handover process over WiMAX-WiMAX, WiMAX-UMTS and WiMAX-WiFi with respect to the selected metrics. The environment of Wi-MAX-WiMAX has shown substantial enhancement of the system Throughput, reduction of E-2-E Delay and Jitter.
Abstract: Different aspects of wireless networks are changing as a result of the continuous needs in terms of speed, data rates and quality of service. Such aspects are required to be adaptable within the same network or among networks of different technologies and service providers. Consequently, Worldwide Interoperability for Microwave Access (WiMAX) is on...
Show More
-
AquaMesh - Design and Implementation of Smart Wireless Mesh Sensor Networks for Aquaculture
Adinya John Odey,
Li Daoliang
Issue:
Volume 2, Issue 3, June 2013
Pages:
81-87
Received:
28 May 2013
Published:
10 July 2013
Abstract: In this paper we design and implemented a dynamic and smart wireless mesh sensor network for aquaculture and water quality management applications. This system utilizes the Waspmote embedded systems platform developed by Libelium, mesh networking transceivers from Digi International and smart sensors from UNISM to implement a novel smart Wireless Mesh Sensor network –Aquamesh with multiple gateways of different technologies (Zigbee, GPRS and WIFI). The system is designed to continuously monitor aqua-environmental parameters and then initiate an alert or early warning to system user when certain thresholds are exceeded. The data generated from this system is stored locally on the gateway or sent to a remote web server. Data on the local database or remote web server can be accessed with smart mobile phones or personal computers. The experimental results show that the system presented in this paper is feasible to implement and present results consistent with traditional aqua-quality monitoring systems. This system will find application in the monitoring of marine and wetlands environments like fish ponds, coastal water pollution monitoring systems, effluent and sewage treatment plants, offshore oil and gas drilling facilities.
Abstract: In this paper we design and implemented a dynamic and smart wireless mesh sensor network for aquaculture and water quality management applications. This system utilizes the Waspmote embedded systems platform developed by Libelium, mesh networking transceivers from Digi International and smart sensors from UNISM to implement a novel smart Wireless ...
Show More