The designs of wireless networks are constantly challenged by the ever changing network configura... more The designs of wireless networks are constantly challenged by the ever changing network configurations due to node mobility in addition to propagation impairments and interference in wireless channels. In order to meet these challenges, networking solutions should incorporate distributed intelligence that enables network nodes to autonomously adapt to changes in networking environments and network configurations. By propagating mobile agents (software codes) to mobile nodes for execution and allowing them to spawn new agents for propagation to other nodes, mobile agents can provide an effective solution for these challenges. The existing wireless network management schemes follow a centralized approach and the process of data gathering and analysis usually involves huge transfer of management data. Consequently, this generates congestion in the area around management stations and it causes lack of scalability. There is the need to have a model for distributed and intelligent network...
With the convergence of the Internet and wireless communications, mobile wireless networks and da... more With the convergence of the Internet and wireless communications, mobile wireless networks and data services are undergoing tremendous evolutionary growth that has seen the development of fourth generation (4G) mobile wireless access technologies based on an all-IP platform. However, major challenges in the development of such heterogeneous network infrastructure such as quality of service (QoS) provisioning and network security services for mobile users' communication flows, among others still exists. In this paper an integrated architectural view and methodology for QoS and security support in 4G mobile wireless networks, which integrates QoS signaling with secure enhanced evolved packet system authentication and key agreement (SEEPS AKA protocol) is presented. The success of 4G mobile wireless networks depends on the prudent deployment of homogeneously designed, high-speed, secure, multiservice IP-centric integrated multimedia, voice and data networks.
Intelligent Agents has been ongoing for sometimes now yielding interesting results, some of which... more Intelligent Agents has been ongoing for sometimes now yielding interesting results, some of which have been translated into commercial ventures. Intelligent Agents are executable software components that represent the user, performs tasks on behalf of the user and when the task terminate, the Agents send the result to the user. Agents are best suited for the Internet: a collection of computers connected together in a worldwide computer network. A number of Agent systems have been implemented, the simulation test results do show the feasibility of Intelligent Agents and Agent systems. Agents' technology gives rise to a new computer architecture: the NET-COMPUTER based on HYDRA computer architecture in which the computing power resides in the Internet. In the NETCOMPUTER, the Internet computers form the hardware and software resources, and the user is provided with a simple input/output interface through which he/she can access the Internet to run user tasks. The simulation test r...
International Journal of Electronics and Telecommunications, 2017
As more and more Base Stations (BSs) are being deployed by mobile operators to meet the ever incr... more As more and more Base Stations (BSs) are being deployed by mobile operators to meet the ever increasing data traffic, solutions have to be found to try and reduce BS energy consumption to make the BSs more energy efficient and to reduce the mobile networks’ operational expenditure (OPEX) and carbon dioxide emissions. In this paper, a BS sleeping technology deployable in heterogeneous networks (HetNets) is proposed. The proposed scheme is validated by using extensive OMNeT++/SimuLTE simulations. From the simulations, it is shown that some lightly loaded micro BSs can be put to sleep in a HetNet when the network traffic is very low without compromising the QoS of the mobile network.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008
Abstract. One of the main objectives of transmission power control (TPC) in wireless mesh network... more Abstract. One of the main objectives of transmission power control (TPC) in wireless mesh networks (WMNs) for rural area applications is to guarantee suc-cessful packet transmission and reception (SPT-R) with low power consump-tion. However, the SPT-R depends on co-channel ...
Abstract—In recent years, multihop wireless mesh networks have emerged as the next evolution in w... more Abstract—In recent years, multihop wireless mesh networks have emerged as the next evolution in wireless network technology. The primary reason for this sudden emergence emanates from the advantages provided by the mesh networking technology. Wireless mesh networks provides ease of installation, cost effective deployments, high level of scalability in a coverage area and capacity, network flexibility and self-configuration capabilities. Furthermore, wireless mesh networks are expected to provide seamless and ubiquitous ...
IST Transactions of Electrical and Electronic Systems‐Theory and Applications, 2012
As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to... more As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote, over and under populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN). The combination of wireless mesh networks (WMNs) with VoIP is an attractive solution for enterprise infrastructures, presenting availability and reduced cost for both consumers and service providers. The large number of clients in WMNs leads to an increased number of concurrent flows. However, only a handful of these flows reach their destination while still within the quality of service (QoS) bound for VoIP. This performance degradation can be attributed to protocol overhead, packet collision and interferences. This paper introduces VoIP over WMNs and uses a link-based packet aggregation scheme to improve VoIP performance in IEEE 802.11 based WMNs operating under distributed coordinate function (DCF). Simulation results show that the proposed aggregation scheme increases the number of supported flows while also reducing end-to-end delay, jitter, and packet loss of VoIP in WMNs.
A considerable amount of energy is consumed during transmission and reception of messages in a wi... more A considerable amount of energy is consumed during transmission and reception of messages in a wireless mesh network (WMN). Reducing per-node transmission power would greatly increase the network lifetime via power conservation in addition to increasing the network capacity via better spatial bandwidth reuse. In this work, the problem of topology control in a hybrid WMN of heterogeneous wireless devices with varying maximum transmission ranges is considered. A localized distributed topology control algorithm is presented which calculates the optimal transmission power so that (1) network connectivity is maintained (2) node transmission power is reduced to cover only the nearest neighbours (3) networks lifetime is extended. Simulations and analysis of results are carried out in the NS-2 environment to demonstrate the correctness and effectiveness of the proposed algorithm.
As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to... more As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN). The combination of wireless mesh networks (WMNs) with VoIP is an attractive solution for enterprise infrastructures; presenting availability and reduced cost for both consumers and service providers. The large number of clients in WMNs leads to increased number of concurrent flows. However, only a handful ...
Protection of information is an important issue in wireless networks. Major security risks occur ... more Protection of information is an important issue in wireless networks. Major security risks occur while conducting activities at every level of business in wireless networks. In this paper, we discuss the major security risks and vulnerabilities in wireless networks and the protocols and mechanisms needed to address them. Particularly, it examines the mechanism of intrusion detection and prevention system as an optimal security solution when combined with native security scheme such as firewall. It therefore, focuses more on the design of an intrusion detection and prevention system based on secured mobile agents. Though intrusion detection and prevention systems are the most efficient in terms of securing wireless networks, there is need for them to be fortified against attacks while performing the function of securing wireless network. The implementation of an intelligent mobile agent is the based on code it executes. It is expected that the mobile agent can carry its entire implementation code to a new destination host, or on reaching a destination, the agent can determine what code is already there, and retrieve any missing code over the network. We therefore, propose a system that eliminates the core problems such as inability to detect and react to new attack in real-time, generating unreasonably large logs and inherent security vulnerabilities associated with the existing IDPSs. A system that can detect new vulnerabilities, process and filter large volumes of logs and react to intrusion in real time.
Research in Intelligent Agents is yielding interesting results, some of which have been translate... more Research in Intelligent Agents is yielding interesting results, some of which have been translated into commercial ventures. Intelligent Agents are executable software components that represent the user, performs tasks on behalf of the user and when the task terminate, the Agents send the result to the user. Agents are best suited for the Internet: a collection of computers connected together in a world-wide network. A number of Agent systems have been implemented and the simulation test results obtained do show the feasibility of Intelligent Agents and Agent systems. Agents’ technology gives rise to new application areas such as Automatic banking or Automatic Teller Machines (ATM), Imaging, Remote Teaching and Telemarketing, Telemedicine, E-Commerce among others. Several organizations have turned to the Internet to market their products to the customers. Searching the vast amount of information online on the Internet is not only time consuming but costly as well. Intelligent Agents are the user’s representative on the Internet. The Agents surf the Internet gathering information on behalf of the user, executing user tasks and send the results to the user after the task termination. The simulation test results do show that Intelligent Agents have the ability to navigate the Internet to carry out specific tasks on behalf of the user. The Intelligent Agents characteristics can therefore be applied in E-Commerce.
The Transition from IPv4 to IPv6, has required modification also done to SIP, which is the protoc... more The Transition from IPv4 to IPv6, has required modification also done to SIP, which is the protocol that carries VoIP traffic, and helps it to establish, connect and maintain calls during operation. The currently available solutions cater for the transitional period only while there are still IPv4 addresses available. Once these IP (v4) addresses are exhausted what will happen, if there are still some islands of IPv4 and IPv6 users that need to communicate? Also the solutions that have currently been provided so far are mostly not practically implementable in the core network and are application specific (VoIP/FTP). This work proposes a scheme that will be not allow for translation of traffic and enable IPv4 hosts to communicate with IPv6 host without the modification of the IPv4 and IPv6 end hosts nor require a pool of IPv4 addresses. This method is called the SBIIT (Socket identifier Based IPv4/IPv6 Translator) which is an improvement of the NAPT-PT based approach. Initially this modification was first explored in SLIIT (Shim Layer based IPv4-IPv6 Translation) in which the limitations of NAT-PT (Network Address Port –Protocol Translation) were overcame. The enhancements of SLIIT enable SBIIT to support SIP, SAP and multicasting traffic by translating addresses not only in the packet headers but also in the packet payloads through using the protocols embedded in the IP addresses of the payloads. The design to implement SBIIT will be done using a network processor IXP 435 from Intel which will be used to demonstrate that the Translator can interoperate seamlessly between v4 and v6 hosts running applications that use TCP, UDP traffic.
There has been an astronomical increase in data traffic demand as people want to get connected wh... more There has been an astronomical increase in data traffic demand as people want to get connected whilst they are on the move and as new devices like smart phones and tablets become affordable gadgets. Mobile network providers have responded to this growth by expanding their networks and naturally this has seen a rapid increase in Base Stations (BSs) all over the world. This trend has led to the telecommunications sector contributing a sizable percentage of carbon dioxide emissions to the atmosphere. Designing Base stations that consume energy corresponding to network traffic will go a long way in reducing carbon dioxide emissions .In this paper, an algorithm that can be used to switch ON/OFF BSs with the traffic variation is designed and analysed
The designs of wireless networks are constantly challenged by the ever changing network configura... more The designs of wireless networks are constantly challenged by the ever changing network configurations due to node mobility in addition to propagation impairments and interference in wireless channels. In order to meet these challenges, networking solutions should incorporate distributed intelligence that enables network nodes to autonomously adapt to changes in networking environments and network configurations. By propagating mobile agents (software codes) to mobile nodes for execution and allowing them to spawn new agents for propagation to other nodes, mobile agents can provide an effective solution for these challenges. The existing wireless network management schemes follow a centralized approach and the process of data gathering and analysis usually involves huge transfer of management data. Consequently, this generates congestion in the area around management stations and it causes lack of scalability. There is the need to have a model for distributed and intelligent network...
With the convergence of the Internet and wireless communications, mobile wireless networks and da... more With the convergence of the Internet and wireless communications, mobile wireless networks and data services are undergoing tremendous evolutionary growth that has seen the development of fourth generation (4G) mobile wireless access technologies based on an all-IP platform. However, major challenges in the development of such heterogeneous network infrastructure such as quality of service (QoS) provisioning and network security services for mobile users' communication flows, among others still exists. In this paper an integrated architectural view and methodology for QoS and security support in 4G mobile wireless networks, which integrates QoS signaling with secure enhanced evolved packet system authentication and key agreement (SEEPS AKA protocol) is presented. The success of 4G mobile wireless networks depends on the prudent deployment of homogeneously designed, high-speed, secure, multiservice IP-centric integrated multimedia, voice and data networks.
Intelligent Agents has been ongoing for sometimes now yielding interesting results, some of which... more Intelligent Agents has been ongoing for sometimes now yielding interesting results, some of which have been translated into commercial ventures. Intelligent Agents are executable software components that represent the user, performs tasks on behalf of the user and when the task terminate, the Agents send the result to the user. Agents are best suited for the Internet: a collection of computers connected together in a worldwide computer network. A number of Agent systems have been implemented, the simulation test results do show the feasibility of Intelligent Agents and Agent systems. Agents' technology gives rise to a new computer architecture: the NET-COMPUTER based on HYDRA computer architecture in which the computing power resides in the Internet. In the NETCOMPUTER, the Internet computers form the hardware and software resources, and the user is provided with a simple input/output interface through which he/she can access the Internet to run user tasks. The simulation test r...
International Journal of Electronics and Telecommunications, 2017
As more and more Base Stations (BSs) are being deployed by mobile operators to meet the ever incr... more As more and more Base Stations (BSs) are being deployed by mobile operators to meet the ever increasing data traffic, solutions have to be found to try and reduce BS energy consumption to make the BSs more energy efficient and to reduce the mobile networks’ operational expenditure (OPEX) and carbon dioxide emissions. In this paper, a BS sleeping technology deployable in heterogeneous networks (HetNets) is proposed. The proposed scheme is validated by using extensive OMNeT++/SimuLTE simulations. From the simulations, it is shown that some lightly loaded micro BSs can be put to sleep in a HetNet when the network traffic is very low without compromising the QoS of the mobile network.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008
Abstract. One of the main objectives of transmission power control (TPC) in wireless mesh network... more Abstract. One of the main objectives of transmission power control (TPC) in wireless mesh networks (WMNs) for rural area applications is to guarantee suc-cessful packet transmission and reception (SPT-R) with low power consump-tion. However, the SPT-R depends on co-channel ...
Abstract—In recent years, multihop wireless mesh networks have emerged as the next evolution in w... more Abstract—In recent years, multihop wireless mesh networks have emerged as the next evolution in wireless network technology. The primary reason for this sudden emergence emanates from the advantages provided by the mesh networking technology. Wireless mesh networks provides ease of installation, cost effective deployments, high level of scalability in a coverage area and capacity, network flexibility and self-configuration capabilities. Furthermore, wireless mesh networks are expected to provide seamless and ubiquitous ...
IST Transactions of Electrical and Electronic Systems‐Theory and Applications, 2012
As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to... more As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote, over and under populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN). The combination of wireless mesh networks (WMNs) with VoIP is an attractive solution for enterprise infrastructures, presenting availability and reduced cost for both consumers and service providers. The large number of clients in WMNs leads to an increased number of concurrent flows. However, only a handful of these flows reach their destination while still within the quality of service (QoS) bound for VoIP. This performance degradation can be attributed to protocol overhead, packet collision and interferences. This paper introduces VoIP over WMNs and uses a link-based packet aggregation scheme to improve VoIP performance in IEEE 802.11 based WMNs operating under distributed coordinate function (DCF). Simulation results show that the proposed aggregation scheme increases the number of supported flows while also reducing end-to-end delay, jitter, and packet loss of VoIP in WMNs.
A considerable amount of energy is consumed during transmission and reception of messages in a wi... more A considerable amount of energy is consumed during transmission and reception of messages in a wireless mesh network (WMN). Reducing per-node transmission power would greatly increase the network lifetime via power conservation in addition to increasing the network capacity via better spatial bandwidth reuse. In this work, the problem of topology control in a hybrid WMN of heterogeneous wireless devices with varying maximum transmission ranges is considered. A localized distributed topology control algorithm is presented which calculates the optimal transmission power so that (1) network connectivity is maintained (2) node transmission power is reduced to cover only the nearest neighbours (3) networks lifetime is extended. Simulations and analysis of results are carried out in the NS-2 environment to demonstrate the correctness and effectiveness of the proposed algorithm.
As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to... more As Voice over IP (VoIP) becomes a reality, service providers will be able to offer the service to remote and over populated areas that currently are not or are only partially reached by available Public Switched Telephone Network (PSTN). The combination of wireless mesh networks (WMNs) with VoIP is an attractive solution for enterprise infrastructures; presenting availability and reduced cost for both consumers and service providers. The large number of clients in WMNs leads to increased number of concurrent flows. However, only a handful ...
Protection of information is an important issue in wireless networks. Major security risks occur ... more Protection of information is an important issue in wireless networks. Major security risks occur while conducting activities at every level of business in wireless networks. In this paper, we discuss the major security risks and vulnerabilities in wireless networks and the protocols and mechanisms needed to address them. Particularly, it examines the mechanism of intrusion detection and prevention system as an optimal security solution when combined with native security scheme such as firewall. It therefore, focuses more on the design of an intrusion detection and prevention system based on secured mobile agents. Though intrusion detection and prevention systems are the most efficient in terms of securing wireless networks, there is need for them to be fortified against attacks while performing the function of securing wireless network. The implementation of an intelligent mobile agent is the based on code it executes. It is expected that the mobile agent can carry its entire implementation code to a new destination host, or on reaching a destination, the agent can determine what code is already there, and retrieve any missing code over the network. We therefore, propose a system that eliminates the core problems such as inability to detect and react to new attack in real-time, generating unreasonably large logs and inherent security vulnerabilities associated with the existing IDPSs. A system that can detect new vulnerabilities, process and filter large volumes of logs and react to intrusion in real time.
Research in Intelligent Agents is yielding interesting results, some of which have been translate... more Research in Intelligent Agents is yielding interesting results, some of which have been translated into commercial ventures. Intelligent Agents are executable software components that represent the user, performs tasks on behalf of the user and when the task terminate, the Agents send the result to the user. Agents are best suited for the Internet: a collection of computers connected together in a world-wide network. A number of Agent systems have been implemented and the simulation test results obtained do show the feasibility of Intelligent Agents and Agent systems. Agents’ technology gives rise to new application areas such as Automatic banking or Automatic Teller Machines (ATM), Imaging, Remote Teaching and Telemarketing, Telemedicine, E-Commerce among others. Several organizations have turned to the Internet to market their products to the customers. Searching the vast amount of information online on the Internet is not only time consuming but costly as well. Intelligent Agents are the user’s representative on the Internet. The Agents surf the Internet gathering information on behalf of the user, executing user tasks and send the results to the user after the task termination. The simulation test results do show that Intelligent Agents have the ability to navigate the Internet to carry out specific tasks on behalf of the user. The Intelligent Agents characteristics can therefore be applied in E-Commerce.
The Transition from IPv4 to IPv6, has required modification also done to SIP, which is the protoc... more The Transition from IPv4 to IPv6, has required modification also done to SIP, which is the protocol that carries VoIP traffic, and helps it to establish, connect and maintain calls during operation. The currently available solutions cater for the transitional period only while there are still IPv4 addresses available. Once these IP (v4) addresses are exhausted what will happen, if there are still some islands of IPv4 and IPv6 users that need to communicate? Also the solutions that have currently been provided so far are mostly not practically implementable in the core network and are application specific (VoIP/FTP). This work proposes a scheme that will be not allow for translation of traffic and enable IPv4 hosts to communicate with IPv6 host without the modification of the IPv4 and IPv6 end hosts nor require a pool of IPv4 addresses. This method is called the SBIIT (Socket identifier Based IPv4/IPv6 Translator) which is an improvement of the NAPT-PT based approach. Initially this modification was first explored in SLIIT (Shim Layer based IPv4-IPv6 Translation) in which the limitations of NAT-PT (Network Address Port –Protocol Translation) were overcame. The enhancements of SLIIT enable SBIIT to support SIP, SAP and multicasting traffic by translating addresses not only in the packet headers but also in the packet payloads through using the protocols embedded in the IP addresses of the payloads. The design to implement SBIIT will be done using a network processor IXP 435 from Intel which will be used to demonstrate that the Translator can interoperate seamlessly between v4 and v6 hosts running applications that use TCP, UDP traffic.
There has been an astronomical increase in data traffic demand as people want to get connected wh... more There has been an astronomical increase in data traffic demand as people want to get connected whilst they are on the move and as new devices like smart phones and tablets become affordable gadgets. Mobile network providers have responded to this growth by expanding their networks and naturally this has seen a rapid increase in Base Stations (BSs) all over the world. This trend has led to the telecommunications sector contributing a sizable percentage of carbon dioxide emissions to the atmosphere. Designing Base stations that consume energy corresponding to network traffic will go a long way in reducing carbon dioxide emissions .In this paper, an algorithm that can be used to switch ON/OFF BSs with the traffic variation is designed and analysed
This research paper analyses a method used to switch OFF micro Base Stations (BSs) when the traff... more This research paper analyses a method used to switch OFF micro Base Stations (BSs) when the traffic in a network is low and switch them back ON when traffic increases. This is done by use of extensive simulations carried out for the scheme's validation. With the exponential growth of cellular traffic, both industry and academia are both agreeable that energy consumption in next generation mobile networks should vary according to the prevailing traffic. This is necessary to save on operational expenditure (OPEX) at the same time lowering emissions. What has given researchers a problem is how some BSs can be temporarily put to idle without compromising the Quality of Service (QoS). This research paper uses end-to-end delay, queue length and other performance metrics to evaluate a proposed BS sleeping scheme in a bid to prove that the scheme does not compromise QoS of the network. Results that were obtained showed that it is indeed possible for total network energy consumption to be reduced without affecting the QoS of a network.
Wireless mesh networks (WMNs) are most recognized by their cost-effectiveness and ability to self... more Wireless mesh networks (WMNs) are most recognized by their cost-effectiveness and ability to self-organize, and self-configure communications networks over a defined network cell. As such, maintaining the quality of service (QoS) is of great importance. One of the main factors that influence network performance is bandwidth, which is more often than not underutilized when it is allocated to various services. Services such as Voice, Data and real-time streaming of Videos, require uncompromising QoS, which is guaranteed by proper bandwidth allocation as well as proper bandwidth utilization by these services. This paper proposes a design for a priority based dynamic bandwidth allocation protocol with reservation for WMNs (PDBAR). This protocol will use bandwidth allocation and utilization to provide and maintain QoS in WMNs by allocating and re-allocating unused bandwidth to the deserving service or services. The implementation will be done in a simulation environment using Network Simulator 2 (NS-2).
Uploads
Papers by Marcel Odhiambo