Abstract: The Ocean is vast as it covers around 140 million square miles, more than 75% of earth’s surface. New technologies have brought us new ways to explore this vast unexplored aquatic environment which provided us with a number of... more
Abstract: The Ocean is vast as it covers around 140 million square miles, more than 75% of earth’s surface. New technologies have brought us new ways to explore this vast unexplored aquatic environment which provided us with a number of applications. Existing solution of terrestrial sensor networks cannot be applied directly to underwater sensor networks. Due to several architectural difference with respect to terrestrial ones, which are mainly due to transmission medium characteristics (sea water) and the signal employed to transmit data underwater sensor network requires wireless communication and acoustics is the primary modality of choice even though it presents a difficult channel. In this thesis we develop a simulation framework to be able to evaluate Underwater Wireless Sensor Networks with a realistic approach. Keywords: Underwater sensor network, Acoustic communications, simulator framework, protocol stack. Title: AN EFFICIENT INVESTIGATION OF WIRELESS SENSOR NETWORK FOR UNDERWATER ENVIRONMENT USING ACOUSTIC Author: Ms. A. Sivasankari, Narmadha. N International Journal of Computer Science and Information Technology Research, ISSN 2348-120X (online), ISSN 2348-1196 (print) Research Publish Journals
It is widely recognized that the Internet transport layer has become ossified, where further evolution has become hard or even impossible. This is a direct consequence of the ubiq- uitous deployment of middleboxes that hamper the... more
It is widely recognized that the Internet transport layer has become ossified, where further evolution has become hard or even impossible. This is a direct consequence of the ubiq- uitous deployment of middleboxes that hamper the deployment of new transports, aggravated further by the limited flexibility of the Application Programming Interface (API) typically presented to applications. To tackle this problem, a wide range of solutions have been proposed in the literature, each aiming to address a particular aspect. Yet, no single proposal has emerged that is able to enable evolution of the transport layer. In this work, after an overview of the main issues and reasons for transport-layer ossification, we survey proposed solutions and discuss their potential and limitations. The survey is divided into five parts, each covering a set of point solutions for a different facet of the problem space: 1) designing middlebox- proof transports, 2) signaling for facilitating middlebox travers...
... Stack Veronica Gutierrez, Jose A. Galache, Ramon Agiiero, Luis Munoz Dept. ofCommunications Engineering, Faculty ofTelecommunications University of Cantabria 39005-Santander; Spain {veronica; jgalache; ramon; luis} gt1mat.unican.es ...
Due to immense competition in the market, mobile equipment vendors and service providers are faced with the challenge of delivering solutions early, way ahead of their competitors. Time-to-market pressures necessitate a carefully worked... more
Due to immense competition in the market, mobile equipment vendors and service providers are faced with the challenge of delivering solutions early, way ahead of their competitors. Time-to-market pressures necessitate a carefully worked out test strategy for verifying and validating the correctness of mobile communication solutions. This paper outlines the various challenges that are faced in the protocol testing of mobile communication products. An evaluation of formal languages such as SDL and TTCN in the design, development and testing phases of such products is also included in the paper. The strategy employed in the testing of a 3G 1×EV-DV Base Station stack has been covered as a case study.
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, more effective information operations which makes... more
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, more effective information operations which makes information availability a key component. Since information operations will only become more important in future network operations, a well-developed attack tool that is able to strike the adversary’s information networks is a valuable asset and should not be ignored. The goal of the proposed coordinated distributed multiple attack (CDMA) is to strike a selected adversarial network and render its services useless. In this attack, a number of compromised systems are used as facilitators in a coordinated manner to launch an attack on a victim’s host or network. • By distributing the attack and varying the type of attack the source attacker exhibits a decreased intensity of activity; therefore, the attack becomes harder to detect. Meanwhile, the concentrated ef...
energy efficient routing scheme deals with efficient utilization of energy resources. by controlling the early depletion of the battery, adjust the power to decide the proper power level of a node and incorporate the low power strategies... more
energy efficient routing scheme deals with efficient utilization of energy resources. by controlling the early depletion of the battery, adjust the power to decide the proper power level of a node and incorporate the low power strategies into the protocols used in various layers of protocol stack. ad hoc wireless networks are power constrained since nodes operate with limited battery energy. if some nodes die early due to lack of energy, they cannot communicate with each other. therefore, inordinate consumption of nodes' energy should be prevented. in fact, nodes residual energy utilization after threshold should be increase the energy utilization of networks. here we proposed a new energy utilization scheme in manet. in this scheme we set a threshold value for energy consumption by mobile nodes in our network. if the energy level of any node/s in the network reaches to threshold level that are participated in communication means it will be active in the network. but here we app...
Abstract In this paper, a novel Extended Cognitive Mobile Terminal (ExCogNet-MT) scheme is presented. In this scheme, a test bench at receiver's Mobile Terminal (MT) can estimate the channel Signal to... more
Abstract In this paper, a novel Extended Cognitive Mobile Terminal (ExCogNet-MT) scheme is presented. In this scheme, a test bench at receiver's Mobile Terminal (MT) can estimate the channel Signal to Noise Ratio (SNR) and can detect the jamming signal. The ...
Abstract The need for network processors capable of forwarding IP packets at OC-192 and higher data rates has been well established. At the same time, there is a growing need for complex tasks, like packet classification and... more
Abstract The need for network processors capable of forwarding IP packets at OC-192 and higher data rates has been well established. At the same time, there is a growing need for complex tasks, like packet classification and differentiated services, to be performed by network ...
We discuss how the location information provided by GPS can be used at different layers of the protocol stack of a mobile host. Our discussion focuses an application of the two GPS based networking protocols we have designed and... more
We discuss how the location information provided by GPS can be used at different layers of the protocol stack of a mobile host. Our discussion focuses an application of the two GPS based networking protocols we have designed and implemented. The network topology we are considering is composed of fixed Internet with base station at the edges connected with an ad hoc networks of mobile nodes that are connecting information from sensors spread through a region. In the network, base stations and mobile nodes are GPS equipped. The idea is to leverage the information of the mobile and base station positions, obtained via the GPS, to improve performance of the ad hoc routing, to adaptively determine the appropriate base station capacity to be reserved strictly for handoffs, to collect data from sensors scattered in the medium and to inform mobiles about the prospective future location.
Shared-memory multiprocessors are becoming to be formed by an increasingly larger number of nodes. In these systems, implementing cache coherence is a key issue. To-ken Coherence is a low latency cache coherence protocol that avoids... more
Shared-memory multiprocessors are becoming to be formed by an increasingly larger number of nodes. In these systems, implementing cache coherence is a key issue. To-ken Coherence is a low latency cache coherence protocol that avoids indirection for cache-to-cache ...