{"title":"Grid Coverage Algorithm & Analyzing for wireless sensor networks","authors":"Ammar Hawbani, Xingfu Wang, Naji Husaini, Saleem Karmoshi","doi":"10.5296/npa.v6i4.6449","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6449","url":null,"abstract":"The problem of having sufficient coverage is an essential issue in wireless sensor networks (WSN). A high coverage rate delivers a higher quality of service. The aim of coverage strategy is to ensure that there will be a minimum number of nodes (at least one node) with little redundant data to cover every point inside the interest area. This paper addresses the problems of coverage of WSN by proposing two grid-based algorithms: Grid Square Coverage version (1) and Grid Square Coverage version (2). Moreover, we have analyzed the performance of both algorithms and provided a compression between them. The results present that the Grid Square Coverage (1) algorithms has 78% coverage efficiency while the Grid Square Coverage (2) has 73%.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds","authors":"A. Mehmood, Houbing Song, J. Mauri","doi":"10.5296/npa.v6i4.6028","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6028","url":null,"abstract":"Cloud Computing (CC) is an emerging field of Information Technology. CC environment completely relies on the perception of utility, service-oriented, cluster and grid computing. The idea of virtualization discriminates CC from other fields . CC environment provides better, reliable, and scalable services. Since clouds are working independently smooth, but standalone, cloud operation is complex. Therefore the need of interoperability and portability with other clouds come into play which increases the scope of the cloud environment. Then, the security threats are increased in the cloud environments. In order to address the problem, a Secure Multi-Agent based framework for Communication among Open Clouds is proposed in this paper. In the framework, each cloud has a secure Mobile Agent which is responsible of the secure communication among clouds. Thus, authentication of Mobile Agents is performed by the Directory Agent. Directory agents are included in order to avoid the joining malicious or attacker mobile agents into the cloud. The theoretical and practical results show that Multi-agent based framework is more reliable and secure than other cloud environments.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids","authors":"G. López, E. achhab, J. I. Moreno","doi":"10.5296/npa.v6i3.5374","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5374","url":null,"abstract":"Due to the fact that the information managed in the so-called Smart Grids is extremely sensitive, security is a key requirement for their wide deployment and adoption. However, the use of secure mechanisms entails not only technical costs but also economic costs. This paper discusses several protocols commonly used to establish VPN (Virtual Private Networks) and assesses the impact of using them on the operational costs of a cellular M2M (Machine-to-Machine) communications platform aiming to reduce power consumption and integrate distributed micro-generation at district level.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Arcas, R. Vilches, Jesus Alcober i Segura, Marc Bajet
{"title":"Pervasive sensors network for wellness based-on Raspberry Pi","authors":"T. Arcas, R. Vilches, Jesus Alcober i Segura, Marc Bajet","doi":"10.5296/npa.v6i3.5424","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5424","url":null,"abstract":"Pervasive sensors networks coexist with users offering them services transparently, without the need for users to interact directly. This work defines an architecture that allows the creation of products and services to provide home automation functionalities for a large segment of population. A platform, on a low cost device and high-capacity computing, as basis of a transparent and indistinguishable sensors network has been designed. This includes simple configuration methods and it is capable of accommodating multiple services, from automation of blinds, lighting controls or security, to mechanisms for monitoring a patient health. A medication reminder service and warning, completely transparent to the user, has been the first developed application. This service plays, at the configured time, a reminder through the speakers. The user will close the event, simply performing the action (take the pill), thanks to the information transmitted by a device installed in the medicines drawer. Otherwise, if he forgets, the system will remind it to the user from time to time.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123220257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing Protocols and Quality of Services for Security Based Applications Using Wireless Video Sensor Networks","authors":"M. Atto, C. Guy","doi":"10.5296/npa.v6i3.5802","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5802","url":null,"abstract":"Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Gómez, Pablo Garrido, Carlos Rabadán, Ramón Agüero, L. Muñoz
{"title":"TCP Performance Enhancement over Wireless Mesh Networks by means of the Combination of Multi-RAT Devices and the MPTCP Protocol","authors":"David Gómez, Pablo Garrido, Carlos Rabadán, Ramón Agüero, L. Muñoz","doi":"10.5296/npa.v6i3.5387","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5387","url":null,"abstract":"The last trends at communications realms, in particular, wireless technologies, where it is more and more usual that devices carry more than one interface (i.e. multi-RAT, Radio Access Technology), to get access to the Internet, question the classic single-path paradigm, imposed by the mainstream transport protocol, TCP. In this work we assess the behavior of Multipath TCP (MPTCP), which allows the transparent breakdown of a single TCP session into multiple simultaneous subflows. This straightforward feature might lead to remarkable performance enhancements, yielding as well a stronger resilience against failures within any of the routes. Moreover, we evaluate three different routing algorithms (link, node and zone disjoint) that aim to discover the optimal route configuration of disjoint paths over a Wireless Mesh Network (WMN), exploiting the possibilities arisen by this brand new protocol. We use the obtained results to evaluate, by means of simulation, the behavior of the MPTCP protocol, showing that the aggregated performance is significatively higher than that of achieved by the traditional single-path and single-flow TCP.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to a cross layer-based QoE improvement for MANET routing protocols","authors":"R. Sanchez-Iborra, M. Cano","doi":"10.5296/npa.v6i3.5827","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5827","url":null,"abstract":"Currently, multimedia communications are monopolizing Internet traffic. These services present highly demanding real-time requirements that need great bandwidths in order to provide acceptable quality levels. Meanwhile, the variety of network architectures employed by final users to access these contents is wider and wider. One of the most attractive access networks due to its ease-of-deployment and decentralized architecture is the Mobile Ad-hoc NETworks (MANETs). The inherent dynamic nature of these networks entails the use of appropriate routing protocols in order to obtain good performance in the services supported by the system. In this work, we focus on evaluating the performance of the novel routing protocol Better Approach To Mobile Ad-hoc Networking (BATMAN) and the widely extended IETF experimental drafts Optimized Link State Routing (OLSR) and Ad hoc On-Demand Distance Vector (AODV) protocols supporting video traffic. The results obtained from a chain-topology network have been improved in terms of Quality of Experience (QoE) by means of different modifications at different OSI layers. We have found out that each protocol presents low performance in different scenarios that can be enhanced by means of the proposed techniques. As we show in this work, taking a proper action in the right OSI layer permits an improvement on the multimedia traffic support in MANETs.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framed ALOHA Protocol with FIFO-Blocking and LIFO-Push out Discipline","authors":"V. Giner, V. Sempere-Payá, David Todolí Ferrandis","doi":"10.5296/npa.v6i3.5557","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5557","url":null,"abstract":"This paper considers the framed ALOHA protocol for a finite number of terminals. Terminals are single-buffered, i.e. each one can store only one packet. We derive the throughput and the delay under two types of queue disciplines, first-in-first-out (FIFO) and last-in-first-out LIFO. It is assumed that terminals are independent each other and generate packets of constant size according to a Bernoulli process. The one slot duration equals to the one packet transmission. The analysis is carried out by means of Markovian tools. Some discussion on the applicability of that protocol is addressed.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Study of SCTP in NS2","authors":"Md. Ibrahim Chowdhury, Imran Hossain Jony","doi":"10.5296/npa.v6i3.5535","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5535","url":null,"abstract":"SCTP (Stream Control Transport Protocol) is a reliable transport layer protocol which provides acknowledged, error-free and non-duplicated transfer of message. It combines the advantages of TCP and UDP. In additional to that, SCTP has many attractive characteristics such as multi-homing, multi-streaming and partial data reliability. This paper thoroughly discusses about the advantages of SCTP. We have experimented the SCTP endpoints data transmission by using NS2 (Network Simulator 2) tool including multi-homed SCTP nodes data transmission. The result shows that an SCTP node in NS2 cannot be truly multi-homed. Hence, NS2 still lacks of full implementation of SCTP features.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special Issue on JITEL 2013 Best Papers","authors":"J. López-Soler","doi":"10.5296/npa.v6i2.5962","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5962","url":null,"abstract":"This editorial introduces the twelve best papers selected for this special issue from the XI Jornadas de Ingenieria TELematica (JITEL 2013) –XI Conference on Telematics Engineering-, held from 28 to 30 October 2013, in Granada (Spain).","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}