Current Issue : January - March Volume : 2018 Issue Number : 1 Articles : 6 Articles
LTE-A present deployment strategies are likely to overcome the User Equipment\n(UE) performance degradation, in certain parts of the topology incorporated\nwith coverage block holes, due to the presence of high rise buildings.\nIt also promises to serve the increase of high user density, which otherwise\nresults in capacity exhaustion of the macro cells. LTE-A addresses these challenges\nwith new features such as small cell and femto cell in its recent releases.\nSmall cell is a low-cost alternative to macro cell in rural and hard-to-reach\nareas and its installation at strategic points overcomes the capacity and coverage\nproblem. In contrast, Heterogeneous network with its ubiquitous coverage\ncan deliver high-speed data. In this paper, several LTE Key performance indicators\ne.g. average UE throughput, average area throughput, spectral efficiency,\nfairness index are analyzed between small cell network and Heterogeneous\nnetwork in close loop spatial multiplexing mode (CLSM). Besides, we also\nemphasize on the point to find out the best suited network architecture for\noverpopulated and densely urban region under proportional fair scheduling\nalgorithm....
Content Centric Networking (CCN) is an effective communication paradigm that well matches the features of wireless\nenvironments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of locationindependent\nsecurity, CCN must at least have parity with existing solutions for confidential and anonymous communication. This\npaper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE), that enables the router to test whether\nan encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the\ncore protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and\nsecurity is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction,\nwhile the encapsulated header and the token in our system consist of only three elements....
Most network service providers like MTN Nigeria, currently use two-factor\nauthentication for their 4G wireless networks. This exposes the network subscribers\nto identify theft and users data to security threats like snooping,\nsniffing, spoofing and phishing. There is need to curb these problems with the\nuse of an enhanced multi-factor authentication approach. The objective of this\nwork is to create a multi-factor authentication software for a 4G wireless network.\nMulti-factor authentication involves user�s knowledge factor, user�s\npossession factor and user�s inherence factor; that is who the user is to be presented\nbefore system access can be granted. The research methodologies used\nfor this work include Structured System Analysis and Design Methodology,\nSSADM and Prototyping. The result of this work will be a Multi-factor authentications\nsoftware. This software was designed with programming languages\nlike ASP. NET, C# and Microsoft SQL Server for the database....
The current Internet is based on host-centric networking, and a user needs to\nknow the host address before reaching a data target in the network. The new\narchitecture of information-centric networking (ICN) facilitates users to locate\ndata targets by giving their data names without any information about\nhost addresses. In-network caching is one of the prominent features in ICN,\nwhich allows network routers to cache data contents. In this paper, we emphasize\nthe management of in-network cache storage, and this includes the\nmechanisms of cache replacement and cache replication. A new cost function\nis then proposed to evaluate each cache content and the least valuable content\nis evicted when cache is full. To increase cache utilization, a cooperative\ncaching policy among neighboring routers is proposed. The proper network\nlocations to cache data contents are also discussed in the paper. Experimental\nresults show the superiority of the proposed caching policy than some traditional\ncaching polices....
Radio frequency signals are commonly used in the development of indoor localization\nsystems. The infrastructure of these systems includes some beacons placed at known positions that\nexchange radio packets with users to be located. When the system is implemented using wireless\nsensor networks, the wireless transceivers integrated in the network motes are usually based on the\nIEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in\nthis category of communication systems, is not suitable when several users want to exchange bursts\nof radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values\nneeded in the location process. Therefore, new protocols are necessary to avoid the packet collisions\nthat appear when multiple users try to communicate with the same beacons. On the other hand,\nthe RSSI sampling process should be carried out very quickly because some systems cannot tolerate\na large delay in the location process. This is even more important when the RSSI sampling process\nincludes measures with different signal power levels or frequency channels. The principal objective\nof this work is to speed up the RSSI sampling process in indoor localization systems. To achieve\nthis objective, the main contribution is the proposal of a new MAC protocol that eliminates the\nmedium access contention periods and decreases the number of packet collisions to accelerate the\nRSSI collection process. Moreover, the protocol increases the overall network throughput taking\nadvantage of the frequency channel diversity. The presented results show the suitability of this\nprotocol for reducing the RSSI gathering delay and increasing the network throughput in simulated\nand real environments....
This article presents the results of research on the acceleration of data processing in the construction routing in dynamic DTN,\nrealized through the devices established in moving objects and connected by means of Wi-Fi. The routes are constructed based\non the prehistory of the movement of objects, which is stored in the database in the csv format.This database has a large volume\nand contains unnecessary and incorrect information.The article shows the possibility of speeding up the process of constructing\nroutes using data precleaning. Reducing data volume is proposed by constructing an enlarged grid on the object movement map.\nThis article also demonstrates the use of fuzzy logic and graph theory for constructing routes....
Loading....