The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
Impact of mobility on the generalized fading channelssahar148
This document summarizes a research paper that analyzed the impact of mobility on wireless communication channels using generalized fading models. It derived expressions for the probability density function (PDF) and cumulative distribution function (CDF) of the received signal power for a mobile node under κ-μ and η-μ fading models in 1D, 2D and 3D network topologies. It also analyzed the outage probability (OP) and average bit error rate (ABER) of the mobile system under interference and interference-plus-noise conditions to quantify performance. The analysis provided a flexible framework for evaluating mobile wireless networks operating under various conditions.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
This document proposes a cross-layer resource allocation scheme over wireless relay networks to guarantee quality of service (QoS) in terms of delay. The scheme aims to maximize network throughput subject to a given delay constraint, characterized by a QoS exponent θ. Dynamic resource allocation algorithms are developed for amplify-and-forward and decode-and-forward relay networks based on network channel state information and the QoS constraint. Simulations show the scheme efficiently supports diverse QoS requirements over wireless relay networks, and relay networks outperform direct transmissions under stringent delay constraints.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
QoS based Admission Control using Multipath Scheduler for IP over Satellite N...IJECEIAES
This paper presents a novel scheduling algorithm to support quality of service (QoS) for multiservice applications over integrated satellite and terrestrial networks using admission control system with multipath selection capabilities. The algorithm exploits the multipath routing paradigm over LEO and GEO satellites constellation in order to achieve optimum end-toend QoS of the client-server Internet architecture for HTTP web service, file transfer, video streaming and VoIP applications. The proposed multipath scheduler over the satellite networks advocates load balancing technique based on optimum time-bandwidth in order to accommodate the burst of application traffics. The method tries to balance the bandwidth load and queue length on each link over satellite in order to fulfil the optimum QoS level for each traffic type. Each connection of a traffic type will be routed over a link with the least bandwidth load and queue length at current time in order to avoid congestion state. The multipath routing scheduling decision is based on per connection granularity so that packet reordering at the receiver side could be avoided. The performance evaluation of IP over satellites has been carried out using multiple connections, different file sizes and bit-errorrate (BER) variations to measure the packet delay, loss ratio and throughput.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
The document discusses several topics related to mobile networks and context-aware computing. It describes research presented at a conference on the following topics: evolution of cellular standards and the telecom market; mobility metrics and routing in mobile ad hoc networks; wireless web services using mobile agents; modeling and reasoning about context; and adapting applications and services based on user context. It also summarizes research on topics like vertical handoff, quality of service, location-based services, and context-aware recommendation systems.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
The IEEE 802.11n supports high data rate transmissions due its physical layer Multiple Input Multiple Output (MIMO) advanced antenna system and MAC layer enhancement features (frame aggregation and block acknowledgement). As a result this standard is very suitable for multimedia services through its Enhanced Distributed Channel Access (EDCA). This paper focuses on evaluating the Quality of Service (QoS) application on the performance of the IEEE 802.11n random topology WLAN. Three different number of nodes (3, 9 and 18) random topology with one access point are modeled and simulated by using the Riverbed OPNET 17.5 Modular to investigate the Wireless Local Area Network (WLAN) performance for different spatial streams. The result clarified the impact of QoS application and showed that its effect is best at the 18 node number topology. For a 4x4 MIMO, when QoS is applied and with respect to the no QoS application case, simulation results show a maximum improvement of 86.4%, 33.9%, 52.2% and 68.9% for throughput, delay, data drop and retransmission attempts, respectively.
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
The Queue Management Techniques play an important role in improving the Quality of Service in Mobile Ad hoc Networks. The need of congestion control and Queue management is inevitable in Mobile Ad hoc Network. Understanding and analyzing the latest AQM Techniques give an insight to improving throughput, packet loss rate, average end to end delay and other parameters that severely affect the performance. The performance of mobile ad hoc networks is evaluated by varying the Channel Error Rate, Bandwidth and Delay at different fragment sizes of different traffic flows. The proposed method performs the network analysis of new Routing protocols. The work proposes to evaluate various Active Queue Management Techniques in a multi traffic environment i.e., sources generating both TCP and UDP traffic classes. The UDP is propagated via CBR and TCP is propagated via FTP. The implementation of the proposed queue management technique has been done in NS 2. In the proposed work we have make NS 2 compatible with GREEN by integrating source code into the ns 2 installation files and using various AQMs in comparison with GREEN to calculate the throughput at various Bandwidths across network. Using various AQMs in comparison with GREEN we have calculated the throughput at various Delays across the network and we have also calculated the throughput at various channels Error Rate across the network. The proposed method has been compared with other primitive AQM techniques so that a repository of best available results can be obtained for design and research purposes. The proposed method has outperformed the existing queue management techniques in number of scenarios. Zulai Khan | Rashmi Raj ""Comparative Analysis of Green Algorithm within Active Queue Management for Mobile Ad Hoc Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23950.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23950/comparative-analysis-of-green-algorithm-within-active-queue-management-for-mobile-ad-hoc-network/zulai-khan
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
This document proposes a secure clock synchronization technique for wireless sensor networks used in event-driven measurement applications. The technique aims to 1) provide high synchronization accuracy around detected events, 2) ensure long network lifetime, and 3) provide secure packet transmission. It divides nodes into an improved synchronization subset (ISS) with high accuracy around events, and a default synchronization subset (DSS) with lower accuracy elsewhere. When an event is detected, neighboring nodes in the ISS exchange synchronization packets more frequently for better accuracy. Authentication is used to securely transmit packets and identify intercepted messages. Simulation results show the technique accurately records event occurrence times while maintaining network lifetime through efficient energy usage.
This document analyzes the performance of vehicular ad hoc networks (VANETs) using WiMAX technology with realistic mobility patterns. It designs VANET systems in different environments using the NS2 simulator. Multiple-input multiple-output (MIMO) and adaptive modulation and coding (AMC) techniques are implemented to improve quality of service. Simulation results show that MIMO and AMC provide significant gains in throughput, delay, jitter, packet delivery ratio, and packet loss ratio. Different routing protocols are also evaluated under various realistic mobility scenarios.
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
Network congestion is one of the major problems of GSM service providers as the number of
subscribers increase and new services are introduced. All the proposed techniques in literatures for controlling
congestion are centered on two principles which are either to reject excessive traffic to prevent over-utilization
of network resources or diverting excess load if overload occurs. These techniques do not specify how network
resource can be provided to absorb rejected or diverted traffic so that revenue will not be lost during congestion
and hence, they do not really address congestion during busy hour. Real-time traffic analysis is required to
understand user traffic demand pattern on network resources for proper prediction of network congestion so
that resources can be provided to take care of rejected or diverted traffic. However, available literature survey
on mobile network congestion modeling showed that none of the existing literature: address congestion at the
three basic elements of GSM network to characterize end-to-end connection; use busy hour traffic data to
adequately dimension GSM network elements so that the network can cope with load B. Therefore, effective
congestion control mechanism that can take these research gaps into consideration for proper forecasting and
efficient dimension of the network resources to address busy hour congestion must be developed. This paper is a
preliminary report on development of such accurate congestion prediction model through an ongoing research
work using real live network data from one of the Service provider’s networks in Abuja, Nigeria as a case study
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIOIJCI JOURNAL
A Mobile Ad hoc Network comprises of a group of mobile nodes that are connected in wireless medium
and they dynamically form a self-organizing mobile network for temporary period of time. Due to ease of
deployment, MANET is very effective in situations where it is difficult to create infrastructure based
network. Nodes in a MANET are self configured and self governed without being controlled by any central
administrator. Mobile Adhoc Network (MANET) has always been a rising technology which supports real
time multimedia transmission service, a common trend in current communication technology that uses
maximum real time applications with dynamic mobility of the mobile devices. Offering Quality of Service is
also an important parameter during communication in real time scenario.Many routing protocols for
Mobile Adhoc Network Supporting Real Time Applications have been developed, basic intention being
maximum utilization of resource in resource constraint environment, minimum power consumption using
limited residual battery power of the highly movable mobile nodes. This paper presents an intensive study
and analysis of MANET based effective routing protocols and secondly, it provides report on comparative
analysis of efficient real time supported protocols based on power consumption, delay analysis and packet
delivery ratio.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
L shaped slot loaded semicircular patch antenna for wideband operation ijwmn
This document summarizes a research paper that analyzes a dual-band semicircular microstrip patch antenna loaded with an L-shaped slot. Introducing the L-shaped slot creates two resonant frequencies for wideband operation. Parametric studies using MATLAB and HFSS simulation software show that the slot dimensions affect the lower resonance frequency more than the upper frequency, while the notch dimensions have more impact on the upper frequency. Radiation patterns are presented for both resonance frequencies, demonstrating dual-band behavior. The proposed antenna design achieves size reduction compared to other techniques for obtaining multiple bands in microstrip antennas.
In ad hoc networks, routing plays a pertinent role. Deploying the appropriate routing protocol is very important in order to achieve best routing performance and reliability. Equally important is the mobility model that is used in the routing protocol. Various mobility models are available and each can have different impact on the performance of the routing protocol. In this paper, we focus on this issue by examining how the routing protocol, Optimized Link State Routing protocol, behaves as the mobility model is varied. For this, three random mobility models, viz., random waypoint, random walk and random direction are considered. The performance metrics used for assessment of Optimized Link State Routing protocol are throughput, end-to-end delay and packet delivery ratio.
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
Mobile Ad hoc Networks are open, shared, dynamic and self-organized networks. These distinct nature
lead to efficient use in emergency and recue scenarios where the sharing of information is necessary. In
order to share information within the network, a proper routing protocol is required to establish routes
between nodes. This article discusses which of the routing protocols such as reactive or proactive has
better performance in such scenario. In order to implement the test bed, we choose a real area in
Uttarakhand state, India where the disaster occurred recently hence so many civilizations had vanished
due to lack of communication and failure in recovery. Our aim is to choose an optimum routing protocol
that is correct and used for efficient route establishment between nodes so that message could be delivered
on time without loss and it will be implemented and used in future based on the model that we propose.
Unmanned aerial vehicles (UAVs) have become very popular recently for both civil uses and potential commercial uses, such as law enforcement, crop survey, grocery delivery, and photographing, although they were mainly used for military purposes before. Researchers need the help of simulations when they design and test new protocols for UAV networks because simulations can be done for a network of a size
that a test bed can hardly approach. In the simulation of an UAV network it is important to choose a radio propagation model for the links in the network. We study the shadowing radio propagation model in this paper and compare it with the free space model, both of which are available in the ns2 network simulation package. We also show how the choice of the parameters of the shadowing model would impact on the
network performance of a UAV network.
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
In this paper, we propose a novel energy efficient environment monitoring scheme for wireless sensor
networks, based on data mining formulation. The proposed adapting routing scheme for sensors for
achieving energy efficiency from temperature wireless sensor network data set. The experimental
validation of the proposed approach using publicly available Intel Berkeley lab Wireless Sensor Network
dataset shows that it is possible to achieve energy efficient environment monitoring for wireless sensor
networks, with a trade-off between accuracy and life time extension factor of sensors, using the proposed
approach.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
ENERGY EFFICIENT GRID AND TREE BASED ROUTING PROTOCOLijwmn
In Wireless Sensor Network, a large number of sensor nodes are deployed and they mainly consume energy
in transmitting data over long distances. Sensor nodes are battery powered and their energy is restricted.
Since the location of the sink is remote, considerable energy would be consumed if each node directly
transmits data to the base station. Aggregating data at the intermediate nodes and transmitting using multihops
aids in reducing energy consumption to a great extent. This paper proposes a hybrid protocol
“Energy efficient Grid and Tree based routing protocol” (EGT) in which the sensing area is divided into
grids. The nodes in the grid relay data to the cell leader which aggregates the data and transmits to the
sink using the constructed hop tree. Simulation results show that EGT performs better than LEACH.
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
This document proposes a fuzzy logic-based approach to detect and control congestion in wireless sensor networks (WSNs). The approach divides the WSN into grids monitored by designated Monitor Nodes. These nodes use fuzzy logic and three input metrics (transmission delay, grid density, dropped packets) to determine the congestion level of their grid. Based on the congestion level, packets are either forwarded through the grid or through alternative relay nodes to avoid congestion. Simulation results show this approach achieves higher packet delivery and lower packet loss compared to an existing baseline approach.
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
System level simulation for two tier macro femto cellular networksijwmn
LTE is an emerging wireless communication technology to provide high- speed data service for the mobile
phones and data terminals. To improve indoor coverage and capacity Femtocells are included in 3GPP
since Release 8. There is no common simulation platform is available for performance justification of LTEFemtocells.
LTE-Sim is an object-oriented open source simulator which incorporates a complete protocol
stack can be used for simulating two-tier macro-femto scenarios. To the best of our knowledge no paper
provides the guideline to perform system level simulation of Femtocell networks. Here, in this paper
Femtocells performance is evaluated in multi-Macrocells and multi-Femtocells environment with
interference from Microcells and Macrocell users along with the scripting.
Energy balanced on demand clustering algorithm based on leach-cijwmn
The proposed algorithm aims to improve energy efficiency in wireless sensor networks. It uses a centralized k-means clustering algorithm to form clusters based on minimizing total energy. The base station calculates relevant information for each node, including total network energy, distance to neighbor nodes, and cluster assignment. Nodes then use this information to probabilistically elect cluster heads within each cluster in a distributed manner. The algorithm considers both energy levels and communication distances to select optimal cluster heads. Simulation results show the proposed algorithm outperforms LEACH-C in network lifetime, stability period, and energy efficiency.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Study of vanet routing protocols for end to end delaycsandit
Less than a century since the automobile was made affordable enough for the general
public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the
communication between vehicle to vehicle for p r o v i d i n g i n f o rma t i o n t o travelers with
new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing
Protocols for end-to-end delay in V2V communication.
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
This document discusses the need for network simulation tools to test telecom network components before deployment. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses modeling internet traffic and using semi-Markovian models to generate traffic. It also covers the importance of considering physical layer factors like RF path loss and mechanisms like power control when simulating UMTS networks. The document provides details on the algorithms and architecture needed for a simulation tool to generate traffic according to specified models and evaluate network performance and capacity.
Medium access in cloud-based for the internet of things based on mobile vehic...TELKOMNIKA JOURNAL
Smart cities are made up of a large number of smart, intelligent gadgets that can sense, compute, act, and communicate. Focusing on how data is transferred between sensory devices and applications in the internet of things (IoT), and cyber-physical systems have led to 5G/IoT integration. This paper proposes a revolutionary architecture for mobile vehicular cloud infrastructure that takes variable weather, road, and traffic circumstances into consideration. It proposes a dynamic speed management system for smart cities. To optimize system flexibility and reduce costs, the system makes advantage of the most recent advancements in wireless communication and utilizes current telecommunication infrastructures utilized in data streaming, sound, and video. The study presents an internet protocol (IP) real-time subsystem-network-based framework for requesting bandwidth from free wireless channel resources using the channell quality indicator channel.
RF Planning and Optimization in GSM and UMTS NetworksApurv Agrawal
The report covers various aspects involved in improving the network coverage as well as the parameters used in planning of new network sites for GSM and UMTS networks.
Optimal Content Downloading in Vehicular Network with Density MeasurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will
easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications
of vehicular communication proliferate, and range from the updating of road maps to the repossession of
nearby points of interest, downloading of touristic information and multimedia files. This content
downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile
customers. By this approach communication-enabled vehicles are paying attention in downloading
different contents from Internet-based servers. We summarize the performance limits of such a vehicular
multimedia content downloading system by modeling the content downloading process as an effective
problem and developing the overall system throughput with density measurement. Results highlight the
methods where the Roadside infrastructure i.e., access points are working at different capabilities
irrespective of vehicle density, the vehicle-to-vehicle communication.
This document summarizes a research paper that proposes a new algorithm for calculating TCP timeout over wireless ad hoc networks. The current TCP timeout calculation does not adapt well to the unstable nature of wireless networks where factors like node mobility can cause estimated round trip times to vary greatly. The proposed algorithm aims to make timeout calculation more adaptive to network conditions in wireless ad hoc networks to improve TCP performance and quality of service for real-time multimedia applications. It describes challenges with existing TCP timeout approaches over wireless networks and reviews related literature before introducing the novel algorithm developed and tested through simulation.
This document discusses strategies for bandwidth management and capacity planning for IP and 3G networks. It describes how traditional models like Poisson and Erlang are insufficient for today's internet traffic, which exhibits self-similar and multifractal properties. The document outlines different traffic modeling approaches, including self-similar and multifractal models, and how they can be applied to network planning, traffic engineering, and capacity forecasting. Case studies analyzing real network traffic traces are presented.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
Similar to AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS (20)
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecJames Anderson
The lecture titled "Automating AppSec" delves into the critical challenges associated with manual application security (AppSec) processes and outlines strategic approaches for incorporating automation to enhance efficiency, accuracy, and scalability. The lecture is structured to highlight the inherent difficulties in traditional AppSec practices, emphasizing the labor-intensive triage of issues, the complexity of identifying responsible owners for security flaws, and the challenges of implementing security checks within CI/CD pipelines. Furthermore, it provides actionable insights on automating these processes to not only mitigate these pains but also to enable a more proactive and scalable security posture within development cycles.
The Pains of Manual AppSec:
This section will explore the time-consuming and error-prone nature of manually triaging security issues, including the difficulty of prioritizing vulnerabilities based on their actual risk to the organization. It will also discuss the challenges in determining ownership for remediation tasks, a process often complicated by cross-functional teams and microservices architectures. Additionally, the inefficiencies of manual checks within CI/CD gates will be examined, highlighting how they can delay deployments and introduce security risks.
Automating CI/CD Gates:
Here, the focus shifts to the automation of security within the CI/CD pipelines. The lecture will cover methods to seamlessly integrate security tools that automatically scan for vulnerabilities as part of the build process, thereby ensuring that security is a core component of the development lifecycle. Strategies for configuring automated gates that can block or flag builds based on the severity of detected issues will be discussed, ensuring that only secure code progresses through the pipeline.
Triaging Issues with Automation:
This segment addresses how automation can be leveraged to intelligently triage and prioritize security issues. It will cover technologies and methodologies for automatically assessing the context and potential impact of vulnerabilities, facilitating quicker and more accurate decision-making. The use of automated alerting and reporting mechanisms to ensure the right stakeholders are informed in a timely manner will also be discussed.
Identifying Ownership Automatically:
Automating the process of identifying who owns the responsibility for fixing specific security issues is critical for efficient remediation. This part of the lecture will explore tools and practices for mapping vulnerabilities to code owners, leveraging version control and project management tools.
Three Tips to Scale the Shift Left Program:
Finally, the lecture will offer three practical tips for organizations looking to scale their Shift Left security programs. These will include recommendations on fostering a security culture within development teams, employing DevSecOps principles to integrate security throughout the development
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
AI_dev Europe 2024 - From OpenAI to Opensource AIRaphaël Semeteys
Navigating Between Commercial Ownership and Collaborative Openness
This presentation explores the evolution of generative AI, highlighting the trajectories of various models such as GPT-4, and examining the dynamics between commercial interests and the ethics of open collaboration. We offer an in-depth analysis of the levels of openness of different language models, assessing various components and aspects, and exploring how the (de)centralization of computing power and technology could shape the future of AI research and development. Additionally, we explore concrete examples like LLaMA and its descendants, as well as other open and collaborative projects, which illustrate the diversity and creativity in the field, while navigating the complex waters of intellectual property and licensing.
Blockchain and Cyber Defense Strategies in new genre timesanupriti
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
this resume for sadika shaikh bca studentSadikaShaikh7
I am a dedicated BCA student with a strong foundation in web technologies, including PHP and MySQL. I have hands-on experience in Java and Python, and a solid understanding of data structures. My technical skills are complemented by my ability to learn quickly and adapt to new challenges in the ever-evolving field of computer science.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
What Not to Document and Why_ (North Bay Python 2024)Margaret Fero
We’re hopefully all on board with writing documentation for our projects. However, especially with the rise of supply-chain attacks, there are some aspects of our projects that we really shouldn’t document, and should instead remediate as vulnerabilities. If we do document these aspects of a project, it may help someone compromise the project itself or our users. In this talk, you will learn why some aspects of documentation may help attackers more than users, how to recognize those aspects in your own projects, and what to do when you encounter such an issue.
These are slides as presented at North Bay Python 2024, with one minor modification to add the URL of a tweet screenshotted in the presentation.
What Not to Document and Why_ (North Bay Python 2024)
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
DOI: 10.5121/ijwmn.2016.8304 55
AN ADVANCED QOS ANALYSIS AND EVALUATION
METHOD FOR MOBILE INTERNET ACCESS
F. Beritelli, C. Rametta, A. Raspanti*, M. Russo°, F. Scaglione° and G. Spallina*
Dipartimento di Ingegneria Elettrica, Elettronica e Informatica,University of Catania,
V.le A. Doria, 6 – 95125 Catania, Italy
* HELILAB S.R.L. Via IV Novembre, 130 F – 95022 Aci Catena (CT) - Italy
° VICOSYSTEMS S.R.L. V. le O. Da Pordenone, 33 -95128 Catania - Italy
ABSTRACT
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS) in a
mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based
on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic
Streams (SloPS) technique. The obtained measurements were then analyzed by estimating the degree of
correlation with other parameters that characterize the data transmission such as power, round trip time,
etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service
provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are
discussed.
KEYWORDS
Radio Access Evaluation; 3G-4G Networks, Throughput Evaluation Algorithms; RAN KPIs Correlation.
1. INTRODUCTION
Mobile Internet is growing rapidly due to low setup costs and decrease in price. We live in a
wireless world, where the demand for the Internet on our laptops, tablets and smart phones is a
necessity anywhere we go. However, not everyone has access to the data speed they require. The
main reason for slow Internet speed is weak signal strength due to inadequate radio coverage in
critical areas such as those in the suburbs.
The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS)
in a mobile Internet access scenario. In particular, the paper proposes a throughput evaluation
method based on PathChirp algorithm [1]. The end-to-end bandwidth was estimated by means of
the Self Loading of Periodic Streams (SLoPS) technique [2][3].
Part of the work done in this paper was focused on the identification of an alternative technique to
simple FTP, but still able to provide an accurate estimate of the throughput. This parameter is
often measured through an FTP session, by sending a file and analyzing the time it takes to
transfer it, calculating thus the file transfer speed, expressed in bit/s. The selection of too small
size files could speed the measurement time, but it could lead to an inaccurate estimate of
throughput, conversely the selection of large files would provide a more accurate estimate of
throughput, but it would require more time to complete the transfer and, obtaining the result, still
rank higher in low bandwidth availability.
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
56
To this end, we have analyzed the PathLoad [2] and PathChirp techniques, both techniques based
on a client-server paradigm, and able to provide an estimate of the available bandwidth end-to-
end.
By comparing these techniques with the FTP technique, it was found that the data rate of the
measured values with PathChirp are very close to the measured values with the FTP technique,
but with the advantage of significantly faster convergence time.
Once the technique to derive the throughput estimates was identified, measurements on certain
KPIs (Key Performance Indicators) were taken and presented in Section III. Following these
measurements, the correlation values were also calculated between the received signal strength
and other parameters measured, in order to assess how the latter were influenced by the signal
strength level received.
In order to estimate the QoS in a Mobile Internet context, nowadays many measurements are
carried out in motion on board a motor vehicle by identifying various test points along the route
in which the measurements are taken. Obviously there are limitations: the measurements are
limited only to areas accessible by a motor vehicle and they provide estimates of the QoS offered
to a preset altitude from ground level, thus not providing any suggestions as to the possible
variations in height.
The final idea is to apply this measuring mechanism aboard a drone, with the considerable
advantage of being able to take measurements in areas not easily accessible and above all provide
an overview of QoS in a 3D scene, with drone being able to take measurements even in height.
2. STATE OF ART
On the one hand, recently we have been assisting to a relevant increase in the drone use in many
different scenarios: inspection of large infrastructure for remote damage assessment and
monitoring purposes [4], support for emergency operations, such as finding missing persons [5],
support in rapid and effective organization of disaster recovery operations [6][7][8], applications
for smart city contexts [9][10], and many other scenarios.
On the other hand, mobile networks are gradually becoming the predominant source of Internet
access, so developers, researchers, network operators, and regulatory communities have taken an
increased interest in measuring end-to-end mobile network performance [11][12].
The first approach to the use of drones in mobile network performance evaluation was already
taken by employing drones carrying smartphones with network testing applications to analyze the
KPIs and estimate the offered QoS [13].
In this paper, however, we propose a new method of network mobile performance evaluation,
which is not based on a simple smartphone, but rather on a dedicated and optimized prototype
installed on a drone.
3. DRONE-INTERNET TECHNOLOGY
Drones for civilian applications (less than 10 kg in weight) have been one of the topics of great
interest in recent years (Fig. 1). The application contexts are numerous and applications range from
video footage, 3D reconstructions of buildings and architectural structures, to playful contexts,
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
57
etc.As is well known, while our increasingly hyperconnected world brings many benefits, it also
exacerbates inequalities for the share of the global population that has limited or no Internet access.
In some scenarios it is also essential to ensure Internet access as a backup to traditional solutions,
consider, for special events such as earthquakes, the ground war actions, etc. where it is vital to
ensure immediate coverage of Internet access.
Another equally important application area covers the drone as a multi-sensor mobile system that
allows measurement of a parameter set. The benefit is a completely innovative spatial sampling
method that becomes fundamental in many applications in which a greater spatial resolution of the
measured data may be necessary.
Figure 1. Drone for civilian applications
Recently, much has been said of the drone-Internet combination as an innovative technology to
expand Internet access in areas not reached by the traditional radio coverage for the delivery of
services via Internet. Think of Google's top-secret Project SkyBender testing the viability of
millimeter wave technology beamed from solar-powered Titan drones, in order to deliver 5G
internet and other internet-over-the-air projects.
Mountain View has reportedly been experimenting with millimeter wave-based Internet.
Millimeter waves are believed to be capable of transmitting data 40 times faster than LTE and
could become the technology behind 5G internet.
Lately, though, two initiatives — Google Project Loon and Mark Zuckerberg’s internet.org —
have drawn widespread attention to the challenge of using alternative delivery platforms to bring
low cost broadband access to unserved or underserved parts of the world.
Project Loon plans to bring Internet access to remote locations via the network of high-altitude
balloons. As Google describes it, “People can connect to the balloon network using a special
Internet antenna attached to their building.”
Internet.org offers a similar approach, except instead of balloons, it envisions using drones as the
delivery platform.
The benefits of all-wireless network in the sky are clear. Such a network would be far less
expensive, far less disruptive and it would take far less time to build than implementing a wired /
land based infrastructure over very large swaths of the earth where no communications
infrastructure currently exists.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
58
4. DESCRIPTION OF THE PROTOTYPE
To perform our tests we developed a prototype by using a small form factor system boards
optimized for wireless routing and network applications, an ALIX2D2 board [14], equipped with
a 500 MHz AMD Geode LX800 CPU and 256 MB DDR DRAM on board; a USB Internet key
has been used to provide cellular connectivity [15][16]; ZeroShell[17] has been used as the
operative system whereas proprietary scripts have been developed by using bash and python
language [18] to evaluate the available end-to-end bandwidth between the prototype and a remote
server acting as the end point of the communication, RSSI, Round Trip Time (RTT) and standard
deviation of RTT. A picture of the hardware employed to realize our prototype is shown in Figure
2.
Two algorithms have been implemented on board the prototype: PathLoad and PathChirp. Both
algorithms evaluate the end-to-end bandwidth by means of the Self Loading of Periodic Streams
(SloPS) technique and they are based on a client-server paradigm: the sender process runs on the
mobile equipment whereas the receiver process runs on a remote host.
Figure 2. The prototype employed for our test bed.
The working principle of the Self Loading of Periodic Streams is very simple: it is based on the
periodic transmission of packet streams from the source to the destination and on the consequent
measurement of the One Way Delay (OWD), which is the time interval between the transmission
of the data packet and its reception at the receiver side.
The number of packets transmitted increases until the growing one way delay; when this happens
it means that the packet transmission rate is greater than the available bandwidth provided by the
radio access network.
Figure 3 shows the above mentioned procedure: when the transmission rate I is compatible with
the available bandwidth (A), i.e. R < A, one way delay shows an almost constant trend; however,
when the packet rate from the source to the destination is greater than the available bandwidth,
i.e. R > A, one way delay increases because of the TCP congestion window mechanism.
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
59
Figure 3. One way delay values of the ith
packet train in the SloPS technique [3].
In PathLoad the measurement is obtained by iterative sending of a series of K packets of L bit
each of which is transmitted during an interval of T seconds. In such a way the transmission rate
is equal to R = L/T [bit/s]. Each packet of the series has a timestamp to indicate when the data
packet has been created and sent to the receiver node. Once the destination node receives the
packets stream it compares the arrival time (Ai) and the sending time (Si) of the packets in order
to calculate the one way delay of the ith
stream, i.e. Di = Ai – Si.
The sender and the receiver communicate according to the client-server paradigm in order to
establish the available bandwidth. When one way delay at the destination side increases, in fact,
the receiver process notifies the sender that behaves as follows:
a. If R(i) < A, the source process will send the following packets stream at R(i+1) > R(i)
b. If R(i) > A, the source process will send the following packets stream at R(i+1) < R(i)
Furthermore, the rate of the stream (i+1) is established as follows [19]:
1. Two start parameters, RminedRmax, are initialized equal to zero and equal to the ideal
maximum throughput provided by the connection Rmax;
o If R(i) < A then Rmin = R(i)
o If R(i) > A then Rmax = R(i)
2. R(i+1) = (Rmax – Rmin)/2
The iterative process ends when Rmax – Rmin< w, where w indicates the value depending on the
precision of the bandwidth evaluation procedure (obviously, the greater the w the less accurate
the evaluation but, at the same time, the faster the convergence period required by the algorithm).
PathChirp is based on the same principle but, in this case, the algorithm does not need to send
multiple trains of equally spaced data packets increasing at each step the transmission rate.
PathChirp is based on the sending of trains of packets, called chirps, characterized by the fact that
they are not equally spaced but, vice versa, the interval time between a packet and the next one
gradually decreases according to the exponential distribution.
5. PERFORMANCE EVALUATION
A.Description of the Testbed
Tests were carried out in mobility, along predetermined paths and identifying for each path 10
test points where the measurements were taken.
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
60
Tests have been classified into three scenarios which are considered to be of particular interest,
especially for the study of how Throughput, Round Trip Time (RTT) and Standard deviation of
RTT are related to the RSSI value: the first results refer to the condition of a high quality of the
received signal in a high density of mobile users area; the second scenario, instead, refers to an
urban context where the areas of particular concentration of users have not been crossed; finally,
the last scenario proposes the measurements carried out in a extra-urban environment, where the
received signal levels were very poor.
B.Metrics
The metrics taken into consideration to compare the duplication system and the commonly used
single streaming transmissions can be summarized as follows.
To give a first evaluation of the QoS offered by the mobile radio access network, in our analysis,
we focused on the measurement of the following parameters:
RSSI (Received Signal Strength Indicator)
Throughput
Throughputevaluationlatency
Round Trip Time
Mdev (standard deviation of RTT)
C.RSSI
In telecommunications, received signal strength indicator (RSSI) is a measurement of the power
present in the received radiosignal. RSSI is usually invisible to a user of the receiving device.
However, because signal strength can vary greatly, it has an impact on the functionality in
wireless networking.
A mobile phone signal is the signal strength received by a mobile phone from a cellular network
(on the downlink). This parameter can depend on several factors, such as the distance from the
Base Station, any obstacle such buildings and trees, etc. So the signal strength can vary greatly.
Typically RSSI is measured in dBm. Another way to express RSSI is the Arbitrary Strength Unit
(ASU).Arbitrary Strength Unit (ASU) is an integer value proportional to the received signal
strength measured by the mobile phone.It is possible to map the real signal strength measured in
dBm in ASU by means of mathematical relationship depending on the radio access
technologyError! Reference source not found..
D.Throughput:
This parameter represents the average end-to-end bandwidth between source and destination of
data packet communication; it is possible to evaluate the average and/or the instantaneous value
of the parameter that will have more or less impact according to the type of user application.
Throughput is the key performance indicator in case of data transfer and one of the most
important indicators in case of multimedia content delivery applications such as real-time audio
and video delivery services, i.e. video surveillance, VoIP, private communications system and so
on.
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
61
E.Throughput evaluation latency
In scenarios characterized by high user’s mobility or in other cases where the radio access
network performance evaluation is carried out by using high mobility vehicles such as drones, the
time needed to evaluate the throughput plays a key role in order to implement an effective and
efficient measurement campaign; with this scope two well known throughput evaluation methods
have been proposed under this perspective, comparing the time needed to converge with the
estimated value and the latter with the value obtained by using the traditional file transfer protocol
procedure.
F.RTT
The measurements of the Round Trip Time were carried out using the ICMP protocol. To get a
fairly accurate measurement of RTT, each value was obtained by sending 30 packets with an
interval of 0.2 sec from each other, for each of them RTT was calculated and finally the average
value was estimated.
G.MDEV
It is the standard deviation, essentially the average measurement of how far each ping RTT is
situated from the mean RTT. The higher mdev is, the more variable the RTT is (over time).This
parameter, calculated using the same set of ICMP packets sent to the calculation of the average
RTT, is an indicator of the homogeneity of the measured delays: the lower the value, the higher
the homogeneity level of the delays.
A.Results
In this section the results obtained by the prototype are illustrated and the conclusions about the
behavior of the measurement system are drawn.
The first test campaign is concerned with the assessment of the bandwidth estimation algorithms;
as previously mentioned PathLoad and PathChirp were installed on board the prototype and their
performances were compared. More specifically, 20 tests were carried out at different points in
the urban area of Catania; the first 10 points characterized by a high signal to noise ratio and the
second 10 points characterized by low signal-to-noise ratio. For each point, both tools were run
for 25 seconds and the detected bandwidth measurements were compared with the results
obtained using one proprietary script based on the detection of the effective end-to-end bandwidth
by means of the common file transfer protocol. The two algorithms have been compared within
the context of traditional wired IP networks, showing that PathChirp offers better performance if
compared to PathLoad; the goal of this test was to verify if such behavior was the same also in the
context of mobile access network. The results found confirm that PathChirp bandwidth evaluation
is more consistent with the value experienced by the end user than the one performed by means of
PathLoad. In particular, Table 1 shows the bandwidth values measured by means of the two
algorithms and by means of a common file transfer protocol measurement mechanism.PathChirp
outperforms PathLoad in all tests: for the twenty performed measurements, each of duration equal
to 25 seconds, the average percentage error equaled 21% for PathChirp and 56% while running
PathLoad.
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
62
Table 1. PathLoad and PathChirp comparison.
Test PathChirp
[Mb/s]
PathLoad
[Mb/s]
FTP
[Mb/s]
P.Chirp
vs FTP
[%]
P.Load
vs FTP
[%]
1 1.13 0.45 2.1 46,2 78,6
2 1.17 0.48 1.4 16,4 65,7
3 0.93 0.92 1.02 8,8 9,8
4 0.92 0.5 0.73 26,0 31,5
5 0.87 0.5 1.44 39,6 65,3
6 0.82 0.57 1.09 24,8 47,7
7 0.67 0.47 0.92 27,2 48,9
8 0.96 0.29 1.01 5,0 71,3
9 0.99 0.4 1.21 18,2 66,9
10 0.78 0.67 1.46 46,6 54,1
11 1.02 0.39 1.04 1,9 62,5
12 0.8 0.36 1.01 20,8 64,4
13 1.03 0.39 1.16 11,2 66,4
14 1.04 0.42 0.85 22,4 50,6
15 0.99 0.42 0.85 16,5 50,6
16 1.02 0.5 1.05 2,9 52,4
17 1.04 0.4 1.4 25,7 71,4
18 1.02 0.5 1.05 2,9 52,4
19 1.1 0.42 0.85 29,4 50,6
20 0.8 0.36 1.01 20,8 64,4
Once found that the “Pathchirp” technique best approximates the throughput measured with an
FTP session and converges quickly with this value; thus, the following results have been
proposed in connection to the three previously mentioned scenarios.
Table 2 shows the results obtained in a scenario with a high level of received signal and high
concentration of mobile users. Table 3 shows the results obtained in an urban scenario.
Finally, Table 4 shows the results obtained in an extra-urban scenario where the received signal
level was very weak.
Figure 4 (a)Bandwidth evaluation with PathLoad and PathChirp compared with the effective value
measured by means of a FTP session for the first 10 test points
0.0
0.5
1.0
1.5
2.0
2.5
1 2 3 4 5 6 7 8 9 10
Evaluatedbandwidth[Mb/s]
Number of test
Pathchirp Pathload FTP
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
63
Figure 4 (b) Bandwidth evaluation with PathLoad and PathChirp compared with the effective value
measured by means of a FTP session for the last 10 test points
Figure 5 Measurement time for FTP technique
0
0.5
1
1.5
2
1 2 3 4 5 6 7 8 9 10
Evaluatedbandwidth[Mb/s]
Number of test
Pathchirp Pathload FTP
0
30
60
90
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Timeofmeasure[s]
Number of test
FTP
11. International Journal of Wireless & Mobile Networks (
To facilitate the understanding of how the RSSI values influence the other Key Performance
Indicators (throughput, RTT and MDEV) we have
with the RSSI.
The level of correlation was calculated by means of the Pearson correlation coefficient.
Given two statistical variables, X and Y, the Pearson correlation index is defined as their
covariance divided by the product of the standard deviations of the two variables:
where σxy is the covariance between
The Pearson correlation coefficient always takes values between
Generally, we can distinguish three types of correlation.
• if ρxy> 0, variables X and Y
• if ρxy= 0, variables X and Y
• if ρxy< 0, variables X and Y
In addition, for direct correlation (and similarly for inverse correlation) we can distinguish:
• if 0 <ρxy< 0.3 we have a weak correlation;
• if 0.3 <ρxy< 0.7 we have a moderate correlation;
• if ρxy> 0.7 we have a strong correlation.
TEST
POINT
1 lat
long
2 lat
long
3 lat 37, 5692652
long
4 lat
long
5 lat
long
6 lat
long
7 lat
long
8 lat
long
9 lat
long
10 lat
long
GPS Coordinates
Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
Table 4. Suburban area.
To facilitate the understanding of how the RSSI values influence the other Key Performance
Indicators (throughput, RTT and MDEV) we have calculated as these parameters were correlated
The level of correlation was calculated by means of the Pearson correlation coefficient.
Given two statistical variables, X and Y, the Pearson correlation index is defined as their
divided by the product of the standard deviations of the two variables:
ρxy =
between X and Y, and σx and σyare the two standard deviations.
The Pearson correlation coefficient always takes values between -1 and 1
-1 ≤ ρxy ≤ 1
Generally, we can distinguish three types of correlation.
are called directly correlated;
and Y are uncorrelated;
are called inversely correlated.
In addition, for direct correlation (and similarly for inverse correlation) we can distinguish:
we have a weak correlation;
we have a moderate correlation;
we have a strong correlation.
RSSI
(ASU)
Average RTT
(ms)
MDEV
(ms)
Bandwidth
(Mbps)
37,5677718 5 135,753 14,922 0,4208
15,0046058
37,5684959 3 462,014 621,078 0
15,0039841
37, 5692652 3 367,022 521,051 0
15,0031255
37,5674959 1 Unreachable Unreachable 0
15,0054827 host net host net
37,5677718 3 Unreachable Unreachable 0
15,0046058 host net host net
37,5660917 3 Unreachable Unreachable 0
15,003075 host net host net
37,5644837 5 141,27 26,645 0,2752
15,0015622
37,5675927 5 152,362 28,733 0,2896
15,0026377
37,5695428 5 162,457 27,232 0,3088
15,0039383
37,5645331 5 159,122 32,452 0,4256
15,0037947
GPS Coordinates
IJWMN) Vol. 8, No. 3, June 2016
65
To facilitate the understanding of how the RSSI values influence the other Key Performance
calculated as these parameters were correlated
The level of correlation was calculated by means of the Pearson correlation coefficient.
Given two statistical variables, X and Y, the Pearson correlation index is defined as their
deviations.
In addition, for direct correlation (and similarly for inverse correlation) we can distinguish:
12. International Journal of Wireless & Mobile Networks (
Figure 6: Correlation coefficient between RSSI and Throughput, RTT and MDEV
From the results obtained we can evince how, in the case of the first test (Figure
what was expected, there seems to be no correlation between the values of power and
bandwidth.As already mentioned, these measurements were carried out in correspondence of high
RSSI values and, especially, in an area with a high concentrat
of a high level of commitment of the Mobile Network resources. Consequently, in these cases, we
should consider some additional variables not foreseeable in advance that considerably influence
the measured parameters.
Figure 7: Correlation coefficient between RSSI and Throughput, RTT and MDEV
Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
: Correlation coefficient between RSSI and Throughput, RTT and MDEV for scenario 1
From the results obtained we can evince how, in the case of the first test (Figure 6), contrary to
what was expected, there seems to be no correlation between the values of power and
bandwidth.As already mentioned, these measurements were carried out in correspondence of high
RSSI values and, especially, in an area with a high concentration of mobile users, in a condition
of a high level of commitment of the Mobile Network resources. Consequently, in these cases, we
should consider some additional variables not foreseeable in advance that considerably influence
: Correlation coefficient between RSSI and Throughput, RTT and MDEV for scenario 2
IJWMN) Vol. 8, No. 3, June 2016
66
for scenario 1
6), contrary to
what was expected, there seems to be no correlation between the values of power and
bandwidth.As already mentioned, these measurements were carried out in correspondence of high
ion of mobile users, in a condition
of a high level of commitment of the Mobile Network resources. Consequently, in these cases, we
should consider some additional variables not foreseeable in advance that considerably influence
for scenario 2
13. International Journal of Wireless & Mobile Networks (
Figure 8: Correlation coefficient between RSSI and Throughput, RTT and MDEV
These results certainly deserve further study, but seem to be
it is not the signal strength received to limit the available bandwidth, and neither to influence the
Round Trip Time values and their deviation standard.
Instead, by analyzing the results obtained in relation to the second series of measurements (Figure
7), we can see that, in this case, a higher correlation value was reached between RSSI and
Available Bandwidth. In this case, the tests were carried out in
crossing particularly "crowded" or "isolated" areas. Along the route, in addition, we could
experience a range of variability of the much larger RSSI. As we can see, when the RSSI values
decline to relatively low values (te
considerably. It is evident that when the RSSI drops below certain values it especially affects the
value of available bandwidth.
As regards the values of RTT and standard deviation, they are stil
results proposed are related to a suburban area with very poor cell coverage
one can evince from the RSSI values, the received signal levels are very scarce.
Due to the poor conditions of coverage,
measurement took too long. By convention, it was decided to put the value of available
bandwidth to zero when the measurement time exceeded 300 sec. It is also quite clear that very
low RSSI values (<= 3 ASU) lead to a significant instability of Internet connectivity.
In this scenario, by observing the correlation values we can see that there is a strong correlation
between RSSI and Available Bandwidth, RTT and MDEV (direct correlation between RSSI and
available bandwidth, inverse correlation between RSSI and RTT and between RSSI and MDEV).
From the results obtained from the three series of proposed measurements we can conclude that
there is a correlation between the RSSI and the measured parameters
when the RSSI values drop to gradually lower values.
In good received signal level conditions, the variables are decidedly uncorrelated since, in this
case, it was determined that it is certainly not the signal power to influence th
parameters measured but other parameters (e.g. traffic conditions, momentary network
congestion, number of mobile users in the cell, etc.).
Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
: Correlation coefficient between RSSI and Throughput, RTT and MDEV for scenario 3
These results certainly deserve further study, but seem to be enough to indicate that, in this case,
it is not the signal strength received to limit the available bandwidth, and neither to influence the
Round Trip Time values and their deviation standard.
Instead, by analyzing the results obtained in relation to the second series of measurements (Figure
), we can see that, in this case, a higher correlation value was reached between RSSI and
Available Bandwidth. In this case, the tests were carried out in a normal urban scenario, without
crossing particularly "crowded" or "isolated" areas. Along the route, in addition, we could
experience a range of variability of the much larger RSSI. As we can see, when the RSSI values
decline to relatively low values (test points 4, 5, and 7), the measured bandwidth value drops
considerably. It is evident that when the RSSI drops below certain values it especially affects the
As regards the values of RTT and standard deviation, they are still clearly uncorrelated.The latest
results proposed are related to a suburban area with very poor cell coverage (Figure 8)
one can evince from the RSSI values, the received signal levels are very scarce.
Due to the poor conditions of coverage, measurements often failed, and at times the bandwidth
measurement took too long. By convention, it was decided to put the value of available
bandwidth to zero when the measurement time exceeded 300 sec. It is also quite clear that very
3 ASU) lead to a significant instability of Internet connectivity.
In this scenario, by observing the correlation values we can see that there is a strong correlation
between RSSI and Available Bandwidth, RTT and MDEV (direct correlation between RSSI and
available bandwidth, inverse correlation between RSSI and RTT and between RSSI and MDEV).
From the results obtained from the three series of proposed measurements we can conclude that
there is a correlation between the RSSI and the measured parameters which becomes stronger
when the RSSI values drop to gradually lower values.
In good received signal level conditions, the variables are decidedly uncorrelated since, in this
case, it was determined that it is certainly not the signal power to influence th
parameters measured but other parameters (e.g. traffic conditions, momentary network
congestion, number of mobile users in the cell, etc.).
IJWMN) Vol. 8, No. 3, June 2016
67
for scenario 3
enough to indicate that, in this case,
it is not the signal strength received to limit the available bandwidth, and neither to influence the
Instead, by analyzing the results obtained in relation to the second series of measurements (Figure
), we can see that, in this case, a higher correlation value was reached between RSSI and
a normal urban scenario, without
crossing particularly "crowded" or "isolated" areas. Along the route, in addition, we could
experience a range of variability of the much larger RSSI. As we can see, when the RSSI values
st points 4, 5, and 7), the measured bandwidth value drops
considerably. It is evident that when the RSSI drops below certain values it especially affects the
l clearly uncorrelated.The latest
(Figure 8). In fact, as
measurements often failed, and at times the bandwidth
measurement took too long. By convention, it was decided to put the value of available
bandwidth to zero when the measurement time exceeded 300 sec. It is also quite clear that very
3 ASU) lead to a significant instability of Internet connectivity.
In this scenario, by observing the correlation values we can see that there is a strong correlation
between RSSI and Available Bandwidth, RTT and MDEV (direct correlation between RSSI and
available bandwidth, inverse correlation between RSSI and RTT and between RSSI and MDEV).
From the results obtained from the three series of proposed measurements we can conclude that
which becomes stronger
In good received signal level conditions, the variables are decidedly uncorrelated since, in this
case, it was determined that it is certainly not the signal power to influence the network
parameters measured but other parameters (e.g. traffic conditions, momentary network
14. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
68
6. CONCLUSIONS AND FUTURE WORKS
The present paper provides an extended performance evaluation method of Quality of Service in
mobile Internet access. In particular, the paper proposes an algorithm for the throughput estimate
based on PathChirp technique, which we have seen to be preferable to PathLoad technique as it is
able to better approximate measurements using the FTP technique and converges with the desired
values in a significantly more rapid way. The convergence speed is a decisive factor especially if
applied to a context in which the measurements are taken by the use of drones. The use of drones
definitely has several advantages:
• possibility of moving in 3 dimensions and consequently greater spatial resolution of the
measurements;
• ability to record measurements in not easily accessible areas;
• carrying out measurements near the radio base station.
In contrast, a problem arises from the autonomy of the drone. Measurements must therefore be
carried out respecting certain timing constraints precisely due to the autonomy of the drone in
flight.During a single flight session it is possible to obtain several measurement points and
therefore have a more precise estimate of the QoS and increased spatial resolution.
ACKNOWLEDGMENT
We would like to thank HELI-LAB S.r.l., drone aerial filming company, and VICOSYSTEMS
S.r.l., company of telecommunications equipment design that has provided the modem-router
multi-sensor on board the drone.
REFERENCES
[1] Vinay J. Ribeiro, Rudolf H. Riedi, Richard G. Baraniuk Jiri Navratil, Les Cottrell, “pathChirp:
Efficient Available Bandwidth Estimation for Network Paths”, in Passive and Active Measurement
Workshop, April2003
[2] Manish Jain, ConstatninosDovrolis, “Pathload: a measurement tool for end-to-end availabla
bandwidth”, in Proc. Of Passive and Active Measurements (PAM) Workshop, 2002.
[3] R.S. Prasad, M.Murray, C.Dovrolis, K.Claffy, “Bandwidth Estimation: metrics, measurement
techniques and tools”, IEEE Network, Nov 2003
[4] C. Eschmann, C.-M. Kuo, C.-H. Kuo, C. Boller,” High-resolution multisensory infrastructure
inspection with unmanned aircraft systems”, International Archives of the Photogrammetry, Remote
Sensing and Spatial Information Sciences, Volume XL-1/W2, 2013 UAV-g2013, 4 – 6 September
2013, Rostock, Germany
[5] Md. Arafatur Rahman, “Enabling drone communications with WiMAX Technology”, Information,
Intelligence, Systems and Applications, IISA 2014, The 5th International Conference on
[6] LudovicApvrille, Yves Roudier, Tullio Joseph Tanzi, “Autonomous drones for disasters management:
Safety and security verifications”,Radio Science Conference (URSI AT-RASC), 2015 1st URSI
Atlantic
[7] Daniel Câmara, “Cavalry to the rescue: Drones fleet to help rescuers operations over disasters
scenarios”, Antenna Measurements & Applications (CAMA), 2014 IEEE Conference on
[8] LudovicApvrille, TullioTanzi ; Jean-Luc Dugelay, “Autonomous drones for assisting rescue services
within the context of natural disasters”, General Assembly and Scientific Symposium (URSI GASS),
2014 XXXIth URSI
[9] R.Viguier,C.,C.Lin ; K.Swaminathan, A.Vega, A.Buyuktosunoglu; S.Pankanti, P.Bose,
H.Akbarpour, F.Bunyak ; K.Palaniappan, G. Seetharaman, “Resilient mobile cognition:Algorithms,
innovations, and architectures - - Computer Design (ICCD), 2015 33rd IEEE International Conference
on
15. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
69
[10] AislanGomideFoina Raja Sengupta ; Patrick Lerchi ; Zhilong Liu ; Clemens Krainer, “Drones in
smart cities: Overcoming barriers through air traffic control research”, 2015 Workshop on Research,
Education and Development of Unmanned Aerial Systems (RED-UAS)
[11] UtkarshGoel, Mike P. Wittie, Kimberly C. Claffy, and Andrew Le , “Survey of End-to-End Mobile
Network Measurement Testbeds, Tools, and Services”, IEEE Communications Surveys & Tutorials
(Volume:18 , Issue: 1 ), Ott. 2015
[12] AshkanNikravesh, David R. Choffnes, Ethan Katz-Bassett, Z. Morley Mao, and Matt Welsh, “Mobile
Network Performance from User Devices: A Longitudinal, Multidimensional Analysis”, 15th
International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings
[13] http://company.nokia.com/en/news/press-releases/2015/07/07/nokia-networks-du-first-in-uae-to-use-
telco-drones-for-better-network-planning-faster-optimization
[14] http://www.pcengines.ch/alix.htm
[15] F. Beritelli, A. La Corte, C. Rametta and F. Scaglione “A Cellular Bonding and Adaptive Load
Balancing based Multi-SIM Gateway for Mobile ad Hoc and Sensor Network” International Journal
on Ad Hoc Networking Systems (IJANS), Vol. 5, No. 3, July 2015
[16] F. Beritelli, A. La Corte, G. Lo Sciuto, C. Rametta, F. Scaglione, “Adaptive VPN BondingTechnique
for Enhancing Dual-SIM Mobile Internet Access”. Proc. of the International Symposium for Young
Scientists in Technology, Engineering and Mathematics (SYSTEM) 2015, Catania, Italy, September
27-29, 2015.
[17] http://www.zeroshell.net
[18] http://www.python.org/
[19] Manish Jain, ConstantinosDovrolis, “End-to-end Available Bandwidth: Measurements, Methodology,
Dynamic and Relation with TCP Throughput”, IEEE/ACM Transactions on Networking, Ago 2003.
[20] 3GPP TS 27.007 version 8.5.0 Release 8
AUTHORS
Francesco Beritelli received the Laurea degree in electronic engineering and the
Ph.D. degree in electronics, computer science, and telecommunications engineering
from the University of Catania, Catania, Italy, in 1993 and in 1997, respectively.
From 1997 to 2000 in collaboration with CSELT (now Telecom Italia LAB) took an
active part in international ITU-T standardization meetings. From 1998 he is
founding member of the “Multimedia Technologies Institute - MTI”, applied
research laboratory operating in DSP (Digital Signal Processor) and CTI (Computer
Telephony Integration) applications. Currently, from 2002, he is Assistant Professor
in the Department of Electric, Electronic and Computer Science Engineering at the
University of Catania. His main research activities are in the area of robust audio and speech signal
classification and recognition, variable bit-rate speech coding, and adaptive-rate voice and dual stream
transmission for mobile IP telephony applications, QoS in mobile Internet access and drone
communications. His interests also include the field of biometric identification and cardiac signal
processing. He is member of the Institute of Electrical and Electronic Engineers (IEEE) and the “IEEE
Signal Processing Society” since 1996 and has 120 scientific publications, mainly in international
journals, books and conference proceedings.
CorradoRametta received the Laurea degree in electronic engineering and the
Ph.D. degree in computer science and telecommunications engineering from the
University of Catania, Italy, in 2008 and in 2012, respectively. From 2009 to 2012,
he was a Research Engineer in the field of wireless communications with the CNIT
(ConsorzioNazionaleInteruniversitario per le Telecomunicazioni). From 2012 he
works as post-doc researcher at the University of Catania. His research interests
include wireless mesh networks, ad-hoc and sensor networks, modeling and
simulation of communications protocols, software defined networking, network
functions virtualization and embedded systems for multimedia applications.
16. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 3, June 2016
70
Antonio Raspanti founder of Heli-Lab,drone aerial filming company. His research
interests include drone communications and performance evaluation techniques for
mobile Internet access.
Michele Russo received the Laurea degree in Computer Science Engineering from
the University of Catania, Italy, in 2010. His research interests include IoT systems,
VoIP Gateway (SIP compliant) and ICT technologies for environmental control and
monitoring.
Francesco Scaglionereceived the Laurea degree in Telecommunications
Engineeringfrom the University of Catania in 2011. His research interests include
embedded systems,VoIP communications and ICT technologies for environmental
control and monitoring.
GiuseppeSpallina founder of Heli-Lab,drone aerial filming company. His research
interests include drone communications and performance evaluation techniques for
mobile Internet access.